0002863
FFIEC Information Technology Examination Handbook - Information Security, September 2016
US Federal Financial Institutions Examination Council (FFIEC)
Audit Guideline
Free
FFIEC IT Examination Handbook
FFIEC Information Technology Examination Handbook - Information Security
2016-09-01
The document as a whole was last reviewed and released on 2017-12-07T00:00:00-0800.
0002863
Free
US Federal Financial Institutions Examination Council (FFIEC)
Audit Guideline
FFIEC IT Examination Handbook
FFIEC Information Technology Examination Handbook - Information Security
2016-09-01
The document as a whole was last reviewed and released on 2017-12-07T00:00:00-0800.
This Authority Document In Depth Report is copyrighted - © 2024 - Network Frontiers LLC. All rights reserved. Copyright in the Authority Document analyzed herein is held by its authors. Network Frontiers makes no claims of copyright in this Authority Document.
This Authority Document In Depth Report is provided for informational purposes only and does not constitute, and should not be construed as, legal advice. The reader is encouraged to consult with an attorney experienced in these areas for further explanation and advice.
This Authority Document In Depth Report provides analysis and guidance for use and implementation of the Authority Document but it is not a substitute for the original authority document itself. Readers should refer to the original authority document as the definitive resource on obligations and compliance requirements.
This document has been mapped into the Unified Compliance Framework using a patented methodology and patented tools (you can research our patents HERE). The mapping team has taken every effort to ensure the quality of mapping is of the highest degree. To learn more about the process we use to map Authority Documents, or to become involved in that process, click HERE.
When the UCF Mapping Teams tag Citations and their associated mandates within an Authority Document, those Citations and Mandates are tied to Common Controls. In addition, and by virtue of those Citations and mandates being tied to Common Controls, there are three sets of meta data that are associated with each Citation; Controls by Impact Zone, Controls by Type, and Controls by Classification.
The online version of the mapping analysis you see here is just a fraction of the work the UCF Mapping Team has done. The downloadable version of this document, available within the Common Controls Hub (available HERE) contains the following:
Document implementation analysis – statistics about the document’s alignment with Common Controls as compared to other Authority Documents and statistics on usage of key terms and non-standard terms.
Citation and Mandate Tagging and Mapping – A complete listing of each and every Citation we found within FFIEC Information Technology Examination Handbook - Information Security, September 2016 that have been tagged with their primary and secondary nouns and primary and secondary verbs in three column format. The first column shows the Citation (the marker within the Authority Document that points to where we found the guidance). The second column shows the Citation guidance per se, along with the tagging for the mandate we found within the Citation. The third column shows the Common Control ID that the mandate is linked to, and the final column gives us the Common Control itself.
Dictionary Terms – The dictionary terms listed for FFIEC Information Technology Examination Handbook - Information Security, September 2016 are based upon terms either found within the Authority Document’s defined terms section(which most legal documents have), its glossary, and for the most part, as tagged within each mandate. The terms with links are terms that are the standardized version of the term.
An Impact Zone is a hierarchical way of organizing our suite of Common Controls — it is a taxonomy. The top levels of the UCF hierarchy are called Impact Zones. Common Controls are mapped within the UCF’s Impact Zones and are maintained in a legal hierarchy within that Impact Zone. Each Impact Zone deals with a separate area of policies, standards, and procedures: technology acquisition, physical security, continuity, records management, etc.
The UCF created its taxonomy by looking at the corpus of standards and regulations through the lens of unification and a view toward how the controls impact the organization. Thus, we created a hierarchical structure for each impact zone that takes into account regulatory and standards bodies, doctrines, and language.
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Acquisition or sale of facilities, technology, and services CC ID 01123 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain a product upgrade program. CC ID 12216 [{internal user} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Products or services delivered to either internal or external users. App A Objective 1.3.a] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain product update procedures. CC ID 12218 [Determine whether management has a process to update and patch operating systems, network devices, and software applications, including internally developed software provided to customers, for newly discovered vulnerabilities. Review whether patch management processes include the following: App A Objective 6.15] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain payment and settlement functions for selling products and services. CC ID 13538 | Business Processes | Preventive | |
Establish, implement, and maintain an electronic commerce program. CC ID 08617 | Business Processes | Preventive | |
Establish, implement, and maintain payment transaction security measures. CC ID 13088 [Review whether management does the following: Develops and maintains policies and procedures to securely offer and ensure the resilience of remote financial services (e.g., using appropriate authentication, layered security controls, and fraud detection monitoring). (For additional questions, refer to the "Mobile Financial Services" examination procedures.) App A Objective 6.25.a Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Technical Security | Preventive | |
Establish, implement, and maintain a list of approved third parties for payment transactions. CC ID 16349 | Business Processes | Preventive | |
Restrict transaction activities, as necessary. CC ID 16334 | Business Processes | Preventive | |
Notify affected parties prior to initiating high-risk funds transfer transactions. CC ID 13687 | Communicate | Preventive | |
Reset transaction limits to zero after no activity within N* time period, as necessary. CC ID 13683 | Business Processes | Preventive | |
Preset transaction limits for high-risk funds transfers, as necessary. CC ID 13682 | Business Processes | Preventive | |
Implement dual authorization for high-risk funds transfers, as necessary. CC ID 13671 | Business Processes | Preventive | |
Establish, implement, and maintain a mobile payment acceptance security program. CC ID 12182 | Establish/Maintain Documentation | Preventive | |
Obtain cardholder authorization prior to completing payment transactions. CC ID 13108 | Business Processes | Preventive | |
Encrypt electronic commerce transactions and messages. CC ID 08621 | Configuration | Preventive | |
Protect the integrity of application service transactions. CC ID 12017 | Business Processes | Preventive | |
Include required information in electronic commerce transactions and messages. CC ID 15318 | Data and Information Management | Preventive | |
Establish, implement, and maintain telephone-initiated transaction security measures. CC ID 13566 | Business Processes | Preventive | |
Disseminate and communicate confirmations of telephone-initiated transactions to affected parties. CC ID 13571 | Communicate | Preventive | |
Plan for acquiring facilities, technology, or services. CC ID 06892 [Review the institution's policies, standards, and procedures related to the use of the following: Due diligence in research and selection of third-party service providers. App A Objective 6.31.b {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Acquisition/Sale of Assets or Services | Preventive | |
Establish, implement, and maintain acquisition notices. CC ID 16682 | Acquisition/Sale of Assets or Services | Preventive | |
Include the geographic locations of the organization in the acquisition notice. CC ID 16723 | Acquisition/Sale of Assets or Services | Preventive | |
Include certification that the organizations meet applicable requirements in the acquisition notice. CC ID 16714 | Acquisition/Sale of Assets or Services | Preventive | |
Include the capital ratios in the acquisition notice. CC ID 16712 | Acquisition/Sale of Assets or Services | Preventive | |
Include the relevant authorities in the acquisition notice. CC ID 16711 | Acquisition/Sale of Assets or Services | Preventive | |
Include a description of the subsidiary's activities in the acquisition notice. CC ID 16707 | Acquisition/Sale of Assets or Services | Preventive | |
Include the subsidiary's contact information in the acquisition notice. CC ID 16704 | Acquisition/Sale of Assets or Services | Preventive | |
Include in scope transactions in the acquisition notice. CC ID 16700 | Acquisition/Sale of Assets or Services | Preventive | |
Involve all stakeholders in the acquisition process. CC ID 13169 | Human Resources Management | Preventive | |
Perform a due diligence assessment on bidding suppliers prior to acquiring assets. CC ID 15714 | Acquisition/Sale of Assets or Services | Preventive | |
Require third parties to disclose all known vulnerabilities in third party products and services. CC ID 15491 | Communicate | Preventive | |
Allocate sufficient resources to protect Information Systems during capital planning. CC ID 01444 | Acquisition/Sale of Assets or Services | Preventive | |
Establish, implement, and maintain system acquisition contracts. CC ID 14758 | Establish/Maintain Documentation | Preventive | |
Include security requirements in system acquisition contracts. CC ID 01124 [With respect to developed software, determine whether institution management does the following: Obtains attestation or evidence from third-party developers that the applications acquired by the institution meet the necessary security requirements and that noted vulnerabilities or flaws are remediated in a timely manner. App A Objective 6.28.b Review the institution's policies, standards, and procedures related to the use of the following: Contractual assurances from third-party service providers for security responsibilities, controls, and reporting. App A Objective 6.31.c {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Establish/Maintain Documentation | Preventive | |
Include operational requirements in system acquisition contracts. CC ID 00825 | Establish/Maintain Documentation | Preventive | |
Provide suppliers with operational requirement information needed to define required service levels in system acquisition contracts. CC ID 06890 | Establish/Maintain Documentation | Preventive | |
Include required service levels in system acquisition contracts. CC ID 11652 | Establish/Maintain Documentation | Preventive | |
Include security controls in system acquisition contracts. CC ID 01125 | Establish/Maintain Documentation | Preventive | |
Include the cost effectiveness of security controls in system acquisition contracts. CC ID 11653 | Technical Security | Detective | |
Obtain system documentation before acquiring products and services. CC ID 01445 | Establish/Maintain Documentation | Preventive | |
Include a description of the use and maintenance of security functions in the administration documentation. CC ID 14309 | Establish/Maintain Documentation | Preventive | |
Include a description of the known vulnerabilities for administrative functions in the administration documentation. CC ID 14302 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the system documentation to interested personnel and affected parties. CC ID 14285 | Communicate | Preventive | |
Document attempts to obtain system documentation. CC ID 14284 | Process or Activity | Corrective | |
Obtain user documentation before acquiring products and services. CC ID 14283 | Acquisition/Sale of Assets or Services | Preventive | |
Include instructions on how to use the security functions in the user documentation. CC ID 14314 | Establish/Maintain Documentation | Preventive | |
Include security functions in the user documentation. CC ID 14313 | Establish/Maintain Documentation | Preventive | |
Include user responsibilities for maintaining system security in the user documentation. CC ID 14312 | Establish/Maintain Documentation | Preventive | |
Include a description of user interactions in the user documentation. CC ID 14311 | Establish/Maintain Documentation | Preventive | |
Require the information system developer to create a continuous monitoring plan. CC ID 14307 | Establish/Maintain Documentation | Preventive | |
Provide a Configuration Management plan by the Information System developer for all newly acquired assets. CC ID 01446 | Testing | Detective | |
Require the Information System developer to create a Security Testing and Evaluation plan, implement the test, and provide the test results for all newly acquired assets. CC ID 01447 | Testing | Detective | |
Include roles and responsibilities in system acquisition contracts. CC ID 14765 | Establish/Maintain Documentation | Preventive | |
Include the acceptance criteria in system acquisition contracts. CC ID 14288 | Acquisition/Sale of Assets or Services | Preventive | |
Include audit record generation capabilities in system acquisition contracts. CC ID 16427 | Acquisition/Sale of Assets or Services | Preventive | |
Include a description of the development environment and operational environment in system acquisition contracts. CC ID 14256 | Acquisition/Sale of Assets or Services | Preventive | |
Identify and include alternatives to meeting the security requirements when acquiring assets. CC ID 01128 | Acquisition/Sale of Assets or Services | Detective | |
Conduct an acquisition feasibility study prior to acquiring assets. CC ID 01129 | Acquisition/Sale of Assets or Services | Detective | |
Include a Business Impact Analysis in the acquisition feasibility study. CC ID 16231 | Acquisition/Sale of Assets or Services | Preventive | |
Include environmental considerations in the acquisition feasibility study. CC ID 16224 | Acquisition/Sale of Assets or Services | Preventive | |
Conduct a risk assessment to determine operational risks as a part of the acquisition feasibility study. CC ID 01135 | Testing | Detective | |
Refrain from implementing systems that are beyond the organization's risk acceptance level. CC ID 13054 | Acquisition/Sale of Assets or Services | Preventive | |
Approve the risk assessment report of operational risks as a part of the acquisition feasibility study. CC ID 11666 | Technical Security | Preventive | |
Establish test environments separate from the production environment to support feasibility testing before product acquisition. CC ID 01130 | Configuration | Preventive | |
Establish test environments separate from the production environment to support integration testing before product acquisition. CC ID 11668 | Testing | Detective | |
Analyze the proposed Information Architecture as it pertains to acquisition feasibility. CC ID 01132 | Acquisition/Sale of Assets or Services | Detective | |
Establish, implement, and maintain a product and services acquisition strategy. CC ID 01133 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a product and services acquisition program. CC ID 01136 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a product and services acquisition policy. CC ID 14028 | Establish/Maintain Documentation | Preventive | |
Obtain authorization for marketing new products. CC ID 16805 | Business Processes | Preventive | |
Include compliance requirements in the product and services acquisition policy. CC ID 14163 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the product and services acquisition policy. CC ID 14162 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the product and services acquisition policy. CC ID 14161 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the product and services acquisition policy. CC ID 14160 | Establish/Maintain Documentation | Preventive | |
Include the scope in the product and services acquisition policy. CC ID 14159 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the product and services acquisition policy. CC ID 14158 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the product and services acquisition policy to interested personnel and affected parties. CC ID 14157 | Communicate | Preventive | |
Establish, implement, and maintain product and services acquisition procedures. CC ID 14065 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the product and services acquisition procedures to interested personnel and affected parties. CC ID 14152 | Communicate | Preventive | |
Establish, implement, and maintain acquisition approval requirements. CC ID 13704 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate acquisition approval requirements to all affected parties. CC ID 13706 | Communicate | Preventive | |
Include preventive maintenance contracts in system acquisition contracts. CC ID 06658 | Establish/Maintain Documentation | Preventive | |
Prohibit the use of Personal Electronic Devices, absent approval. CC ID 04599 | Behavior | Detective | |
Sign a forfeiture statement acknowledging unapproved Personal Electronic Devices will be confiscated. CC ID 11667 | Physical and Environmental Protection | Preventive | |
Include chain of custody procedures in the product and services acquisition program. CC ID 10058 | Acquisition/Sale of Assets or Services | Preventive | |
Review and update the acquisition contracts, as necessary. CC ID 14279 | Acquisition/Sale of Assets or Services | Corrective | |
Establish, implement, and maintain a software product acquisition methodology. CC ID 01138 | Establish/Maintain Documentation | Preventive | |
Align the service management program with the Code of Conduct. CC ID 14211 | Establish/Maintain Documentation | Preventive | |
Store source code documentation in escrow by an independent third party. CC ID 01139 | Testing | Detective | |
Review software licensing agreements to ensure compliance. CC ID 01140 | Establish/Maintain Documentation | Detective | |
Establish, implement, and maintain third party Software Maintenance Agreements. CC ID 01143 | Establish/Maintain Documentation | Preventive | |
Establish and maintain a register of approved third parties, technologies and tools. CC ID 06836 | Establish/Maintain Documentation | Preventive | |
Install software that originates from approved third parties. CC ID 12184 | Technical Security | Preventive | |
Promote joint acquisition of products or services. CC ID 11453 | Acquisition/Sale of Assets or Services | Preventive | |
Acquire products or services. CC ID 11450 | Acquisition/Sale of Assets or Services | Preventive | |
Acquire products through suppliers, as necessary. CC ID 13171 [Review whether management implements the following as appropriate: Purchases are made through a third party to shield the institution's identity. App A Objective 6.19.b] | Acquisition/Sale of Assets or Services | Preventive | |
Pay suppliers in a timely manner. CC ID 06891 | Acquisition/Sale of Assets or Services | Preventive | |
Establish, implement, and maintain facilities, assets, and services acceptance procedures. CC ID 01144 [Determine whether management does the following: Validates that new hardware complies with institution policies and guidelines. App A Objective 6.11.k] | Establish/Maintain Documentation | Preventive | |
Test new hardware or upgraded hardware and software against predefined performance requirements. CC ID 06740 | Testing | Detective | |
Test new hardware or upgraded hardware and software for error recovery and restart procedures. CC ID 06741 | Testing | Detective | |
Follow the system's operating procedures when testing new hardware or upgraded hardware and software. CC ID 06742 | Testing | Detective | |
Test new hardware or upgraded hardware and software for implementation of security controls. CC ID 06743 | Testing | Detective | |
Test new software or upgraded software for security vulnerabilities. CC ID 01898 | Testing | Detective | |
Test new software or upgraded software for compatibility with the current system. CC ID 11654 | Testing | Detective | |
Test new hardware or upgraded hardware for compatibility with the current system. CC ID 11655 | Testing | Detective | |
Test new hardware or upgraded hardware for security vulnerabilities. CC ID 01899 | Testing | Detective | |
Test new hardware or upgraded hardware and software for implementation of predefined continuity arrangements. CC ID 06744 | Testing | Detective | |
Correct defective acquired goods or services. CC ID 06911 | Acquisition/Sale of Assets or Services | Corrective | |
Authorize new assets prior to putting them into the production environment. CC ID 13530 | Process or Activity | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Audits and risk management CC ID 00677 | IT Impact Zone | IT Impact Zone | |
Define the roles and responsibilities for personnel assigned to tasks in the Audit function. CC ID 00678 | Establish Roles | Preventive | |
Define and assign the external auditor's roles and responsibilities. CC ID 00683 | Establish Roles | Preventive | |
Retain copies of external auditor outsourcing contracts and engagement letters. CC ID 01188 | Establish/Maintain Documentation | Preventive | |
Review external auditor outsourcing contracts and engagement letters. CC ID 01189 | Establish/Maintain Documentation | Preventive | |
Review the risk assessments as compared to the in scope controls. CC ID 06978 [{compare} Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Allow comparisons among different threats, events, and potential mitigating controls. App A Objective 5.1.e] | Testing | Detective | |
Include the scope and work to be performed in external auditor outsourcing contracts. CC ID 01190 | Establish/Maintain Documentation | Preventive | |
Review the conclusions of the external auditor's work papers and audit reports. CC ID 01200 [Review preliminary conclusions with the examiner-in-charge regarding the following: App A Objective 11.1 {include} Review preliminary conclusions with the examiner-in-charge regarding the following: Significant issues warranting inclusion as matters requiring attention or recommendations in the report of examination. App A Objective 11.1.b] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an audit program. CC ID 00684 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain audit policies. CC ID 13166 | Establish/Maintain Documentation | Preventive | |
Assign the audit to impartial auditors. CC ID 07118 [Verify whether management ensures the following are done: Audits performed by independent internal departments or third parties. App A Objective 10.3.d] | Establish Roles | Preventive | |
Define what constitutes a threat to independence. CC ID 16824 | Audits and Risk Management | Preventive | |
Determine if requested services create a threat to independence. CC ID 16823 | Audits and Risk Management | Detective | |
Exercise due professional care during the planning and performance of the audit. CC ID 07119 | Behavior | Preventive | |
Include resource requirements in the audit program. CC ID 15237 | Establish/Maintain Documentation | Preventive | |
Include risks and opportunities in the audit program. CC ID 15236 | Establish/Maintain Documentation | Preventive | |
Include provisions for legislative plurality and legislative domain in the audit program. CC ID 06959 | Audits and Risk Management | Preventive | |
Establish and maintain audit terms. CC ID 13880 | Establish/Maintain Documentation | Preventive | |
Refrain from approving changes to the audit terms absent reasonable justification. CC ID 13973 | Process or Activity | Preventive | |
Include a statement about the inherent limitations of the audit in the audit terms. CC ID 13883 | Establish/Maintain Documentation | Preventive | |
Include a statement that the audit will be conducted in accordance with attestation standards in the audit terms. CC ID 13882 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain agreed upon procedures that are in scope for the audit. CC ID 13893 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an in scope system description. CC ID 14873 | Establish/Maintain Documentation | Preventive | |
Include in scope procedures in the audit assertion's in scope system description. CC ID 16551 | Audits and Risk Management | Preventive | |
Include roles and responsibilities in the audit assertion's in scope system description. CC ID 16558 | Audits and Risk Management | Preventive | |
Include the audit criteria in the audit assertion's in scope system description. CC ID 16548 | Audits and Risk Management | Preventive | |
Include third party data in the audit assertion's in scope system description. CC ID 16554 | Audits and Risk Management | Preventive | |
Include third party personnel in the audit assertion's in scope system description. CC ID 16552 | Audits and Risk Management | Preventive | |
Include compliance requirements in the audit assertion's in scope system description. CC ID 16506 | Audits and Risk Management | Preventive | |
Include third party assets in the audit assertion's in scope system description. CC ID 16550 | Audits and Risk Management | Preventive | |
Include third party services in the audit assertion's in scope system description. CC ID 16503 | Establish/Maintain Documentation | Preventive | |
Include monitoring controls in the audit assertion's in scope system description. CC ID 16501 | Establish/Maintain Documentation | Preventive | |
Include availability commitments in the audit assertion's in scope system description. CC ID 14914 | Establish/Maintain Documentation | Preventive | |
Include deviations and the corrective actions taken in the audit assertion's in scope system description. CC ID 16549 | Audits and Risk Management | Preventive | |
Include changes in the audit assertion's in scope system description. CC ID 14894 | Establish/Maintain Documentation | Preventive | |
Include external communications in the audit assertion's in scope system description. CC ID 14913 | Establish/Maintain Documentation | Preventive | |
Include a section regarding incidents related to the system in the audit assertion’s in scope system description. CC ID 14878 | Establish/Maintain Documentation | Preventive | |
Include the function performed by the in scope system in the audit assertion's in scope system description. CC ID 14911 | Establish/Maintain Documentation | Preventive | |
Include the disposition of the incident in the audit assertion's in scope system description. CC ID 14896 | Establish/Maintain Documentation | Preventive | |
Include the extent of the incident in the audit assertion's in scope system description. CC ID 14895 | Establish/Maintain Documentation | Preventive | |
Include the timing of each incident in the audit assertion's in scope system description. CC ID 14891 | Establish/Maintain Documentation | Preventive | |
Include the nature of each incident in the audit assertion's in scope system description. CC ID 14889 | Establish/Maintain Documentation | Preventive | |
Include a section regarding in scope controls related to the system in the audit assertion's in scope system description. CC ID 14897 | Establish/Maintain Documentation | Preventive | |
Include how the in scope system meets external requirements in the audit assertion's in scope system description. CC ID 16502 | Establish/Maintain Documentation | Preventive | |
Include the timing of each control in the audit assertion's in scope system description. CC ID 14916 | Establish/Maintain Documentation | Preventive | |
Include the nature of the control in the audit assertion's in scope system description. CC ID 14910 | Establish/Maintain Documentation | Preventive | |
Include the information sources used in performing the control in the audit assertion's in scope system description. CC ID 14909 | Establish/Maintain Documentation | Preventive | |
Include the responsible party for performing the control in the audit assertion's in scope system description. CC ID 14907 | Establish/Maintain Documentation | Preventive | |
Include the subject matter to which the control is applied in the audit assertion's in scope system description. CC ID 14904 | Establish/Maintain Documentation | Preventive | |
Refrain from omitting or distorting information in the audit assertion's in scope system description. CC ID 14893 | Establish/Maintain Documentation | Preventive | |
Include the timing of each change in the audit assertion's in scope system description. CC ID 14892 | Establish/Maintain Documentation | Preventive | |
Include the system boundaries in the audit assertion's in scope system description. CC ID 14887 | Establish/Maintain Documentation | Preventive | |
Determine the presentation method of the audit assertion's in scope system description. CC ID 14885 | Establish/Maintain Documentation | Detective | |
Include the time frame covered by the description in the audit assertion's in scope system description. CC ID 14884 | Establish/Maintain Documentation | Preventive | |
Include commitments to third parties in the audit assertion. CC ID 14899 | Establish/Maintain Documentation | Preventive | |
Determine the completeness of the audit assertion's in scope system description. CC ID 14883 | Establish/Maintain Documentation | Preventive | |
Determine the appropriateness of the audit assertion's in scope system description. CC ID 16449 | Audits and Risk Management | Detective | |
Include system requirements in the audit assertion's in scope system description. CC ID 14881 | Establish/Maintain Documentation | Preventive | |
Include third party controls in the audit assertion's in scope system description. CC ID 14880 | Establish/Maintain Documentation | Preventive | |
Hold an opening meeting with interested personnel and affected parties prior to an audit. CC ID 15256 | Audits and Risk Management | Preventive | |
Identify personnel who should attend the closing meeting. CC ID 15261 | Business Processes | Preventive | |
Confirm audit requirements during the opening meeting. CC ID 15255 | Audits and Risk Management | Detective | |
Include discussions about how particular situations will be handled in the opening meeting. CC ID 15254 | Audits and Risk Management | Preventive | |
Include agreement to the audit scope and audit terms in the audit program. CC ID 06965 | Establish/Maintain Documentation | Preventive | |
Establish and maintain a bespoke audit scope for each audit being performed. CC ID 13077 [Determine the appropriate scope and objectives for the examination. App A Objective 1] | Establish/Maintain Documentation | Preventive | |
Include third party assets in the audit scope. CC ID 16504 | Audits and Risk Management | Preventive | |
Include audit subject matter in the audit program. CC ID 07103 | Establish/Maintain Documentation | Preventive | |
Examine the availability of the audit criteria in the audit program. CC ID 16520 | Investigate | Preventive | |
Examine the objectivity of the audit criteria in the audit program. CC ID 07104 | Establish/Maintain Documentation | Preventive | |
Examine the measurability of the audit criteria in the audit program. CC ID 07105 | Establish/Maintain Documentation | Preventive | |
Examine the completeness of the audit criteria in the audit program. CC ID 07106 | Establish/Maintain Documentation | Preventive | |
Examine the relevance of the audit criteria in the audit program. CC ID 07107 | Establish/Maintain Documentation | Preventive | |
Determine the appropriateness of the audit subject matter. CC ID 16505 | Audits and Risk Management | Preventive | |
Disseminate and communicate the audit program with the audit subject matter and audit criteria to all interested personnel and affected parties. CC ID 07116 | Establish/Maintain Documentation | Preventive | |
Include the in scope material or in scope products in the audit program. CC ID 08961 | Audits and Risk Management | Preventive | |
Include in scope information in the audit program. CC ID 16198 | Establish/Maintain Documentation | Preventive | |
Include the out of scope material or out of scope products in the audit program. CC ID 08962 | Establish/Maintain Documentation | Preventive | |
Provide a representation letter in support of the audit assertion. CC ID 07158 | Establish/Maintain Documentation | Preventive | |
Include the date of the audit in the representation letter. CC ID 16517 | Audits and Risk Management | Preventive | |
Include a statement that management has evaluated compliance with external requirements in the representation letter. CC ID 13942 | Establish/Maintain Documentation | Preventive | |
Include a statement that the assumptions used for estimates are reasonable in the representation letter. CC ID 13934 | Establish/Maintain Documentation | Preventive | |
Include a statement that uncorrected misstatements are believed to be immaterial in the representation letter. CC ID 13884 | Establish/Maintain Documentation | Preventive | |
Include a statement that system incidents have been disclosed to the auditor in the representation letter. CC ID 16772 | Establish/Maintain Documentation | Preventive | |
Include a statement that incidents of fraud and non-compliance have been disclosed to the auditor in the representation letter. CC ID 16769 | Establish/Maintain Documentation | Preventive | |
Include a statement of responsibility for the subject matter in the representation letter. CC ID 07159 | Establish/Maintain Documentation | Preventive | |
Include a statement of responsibility for selecting the audit criteria in the representation letter. CC ID 07160 | Establish/Maintain Documentation | Preventive | |
Include a statement of responsibility regarding the appropriateness of the audit criteria in the representation letter. CC ID 07161 | Establish/Maintain Documentation | Preventive | |
Include an assertion about the subject matter based on the selected audit criteria in the representation letter. CC ID 07162 | Establish/Maintain Documentation | Preventive | |
Include a statement that all known matters contradicting the audit assertion have been disclosed to the auditor in the representation letter. CC ID 07163 | Establish/Maintain Documentation | Preventive | |
Include the availability of all in scope records relevant to the subject matter in the representation letter. CC ID 07164 | Establish/Maintain Documentation | Preventive | |
Include a statement that any known subsequent events have been disclosed to the auditor in the representation letter. CC ID 07165 | Establish/Maintain Documentation | Preventive | |
Include a statement that deficiencies in internal controls have been disclosed to the auditor in the representation letter. CC ID 13899 | Establish/Maintain Documentation | Preventive | |
Establish and maintain audit assertions, as necessary. CC ID 14871 | Establish/Maintain Documentation | Detective | |
Include an in scope system description in the audit assertion. CC ID 14872 | Establish/Maintain Documentation | Preventive | |
Include any assumptions that are improbable in the audit assertion. CC ID 13950 | Establish/Maintain Documentation | Preventive | |
Include investigations and legal proceedings in the audit assertion. CC ID 16846 | Establish/Maintain Documentation | Preventive | |
Include how the audit scope matches in scope controls in the audit assertion. CC ID 06969 | Establish/Maintain Documentation | Preventive | |
Include why specific criteria are ignored by in scope controls in the audit assertion. CC ID 07027 | Establish/Maintain Documentation | Preventive | |
Include how the in scope system is designed and implemented in the audit assertion. CC ID 06970 | Establish/Maintain Documentation | Preventive | |
Include the responsible party's opinion of the quality of the evidence in the audit assertion. CC ID 13949 | Establish/Maintain Documentation | Preventive | |
Include the end users and affected parties of the in scope system in the audit assertion. CC ID 07028 | Establish/Maintain Documentation | Preventive | |
Include the in scope services offered or in scope transactions processed in the audit assertion. CC ID 06971 | Establish/Maintain Documentation | Preventive | |
Include the in scope procedures in the audit assertion. CC ID 06972 | Establish/Maintain Documentation | Preventive | |
Include the in scope records produced in the audit assertion. CC ID 06968 | Establish/Maintain Documentation | Preventive | |
Include how in scope material events are monitored and logged in the audit assertion. CC ID 06973 | Establish/Maintain Documentation | Preventive | |
Include any in scope material events that might affect the assertion in the audit assertion. CC ID 06991 | Establish/Maintain Documentation | Preventive | |
Include the in scope controls and compliance documents in the audit assertion. CC ID 06974 | Establish/Maintain Documentation | Preventive | |
Include the in scope risk assessment processes in the audit assertion. CC ID 06975 [Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d] | Establish/Maintain Documentation | Preventive | |
Include in scope change controls in the audit assertion. CC ID 06976 | Establish/Maintain Documentation | Preventive | |
Include any in scope uncorrected errors or non-compliance issues in the audit assertion. CC ID 06989 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate a written audit assertion of the audit scope and audit terms to interested personnel and affected parties. CC ID 06967 | Establish/Maintain Documentation | Preventive | |
Include the scope for the desired level of assurance in the audit program. CC ID 12793 | Communicate | Preventive | |
Include conditions that might require modification of the audit program in the audit terms. CC ID 07149 | Establish/Maintain Documentation | Preventive | |
Include how access to in scope systems, personnel and in scope records are provided to the auditor in the audit terms. CC ID 06988 | Establish/Maintain Documentation | Preventive | |
Include the criteria for determining the desired level of assurance in the audit program. CC ID 12795 [Determine the appropriate scope and objectives for the examination. App A Objective 1] | Audits and Risk Management | Preventive | |
Establish, implement, and maintain procedures for determining the desired level of assurance in the audit program. CC ID 12794 | Establish/Maintain Documentation | Preventive | |
Include the expectations for the audit report in the audit terms. CC ID 07148 | Establish/Maintain Documentation | Preventive | |
Establish and maintain a practitioner’s report on management’s assertions, as necessary. CC ID 13888 | Establish/Maintain Documentation | Preventive | |
Refrain from changing the date of the practitioner's report on agreed-upon procedures when reissuing it. CC ID 13896 | Establish/Maintain Documentation | Corrective | |
Hold a closing meeting following an audit to present audit findings and conclusions. CC ID 15248 | Communicate | Preventive | |
Include materiality levels in the audit terms. CC ID 01238 | Establish/Maintain Documentation | Preventive | |
Include material changes in information processes, Information Systems, and assets that could affect audits in the audit terms. CC ID 01239 [{hardware inventory} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Hardware and software inventories. App A Objective 1.3.c {hardware inventory} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Hardware and software inventories. App A Objective 1.3.c Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d] | Establish/Maintain Documentation | Preventive | |
Include material weaknesses, material failures, and material errors in information processes, Information Systems, and assets that could affect audits in the audit terms. CC ID 01240 | Establish/Maintain Documentation | Preventive | |
Schedule attestation engagement meetings with interested personnel and affected parties, as necessary. CC ID 15263 | Business Processes | Preventive | |
Refrain from performing an attestation engagement under defined conditions. CC ID 13952 | Audits and Risk Management | Detective | |
Refrain from accepting an attestation engagement when the engaging party refuses to sign the engagement letter. CC ID 14912 | Business Processes | Preventive | |
Refrain from accepting an attestation engagement unless the prospective financial information includes a summary of significant assumptions. CC ID 13954 | Behavior | Preventive | |
Refrain from accepting an attestation engagement when all parties disagree on the procedures. CC ID 13951 | Audits and Risk Management | Preventive | |
Accept the attestation engagement when all preconditions are met. CC ID 13933 | Business Processes | Preventive | |
Audit in scope audit items and compliance documents. CC ID 06730 | Audits and Risk Management | Preventive | |
Collect all work papers for the audit and audit report into an engagement file. CC ID 07001 [Organize work papers to ensure clear support for significant findings by examination objective. App A Objective 11.4] | Actionable Reports or Measurements | Preventive | |
Document any after the fact changes to the engagement file. CC ID 07002 | Establish/Maintain Documentation | Preventive | |
Protect access to the engagement file and all associated audit documentation in compliance with Authority Documents the organization must follow. CC ID 07179 | Establish/Maintain Documentation | Preventive | |
Disclose work papers in the engagement file in compliance with legal requirements. CC ID 07180 | Establish/Maintain Documentation | Preventive | |
Archive the engagement file and all work papers for the period prescribed by law or contract. CC ID 10038 | Records Management | Preventive | |
Conduct onsite inspections, as necessary. CC ID 16199 | Testing | Preventive | |
Identify hypothetical assumptions in forecasts and projections during an audit. CC ID 13946 | Audits and Risk Management | Detective | |
Refrain from examining forecasts and projections which refrain from disclosing assumptions during an audit. CC ID 13932 | Audits and Risk Management | Detective | |
Audit policies, standards, and procedures. CC ID 12927 | Audits and Risk Management | Preventive | |
Audit cybersecurity risk management within the policies, standards, and procedures of the organization. CC ID 13011 | Investigate | Detective | |
Audit information systems, as necessary. CC ID 13010 | Investigate | Detective | |
Audit the potential costs of compromise to information systems. CC ID 13012 | Investigate | Detective | |
Determine the accurateness of the audit assertion's in scope system description. CC ID 06979 | Testing | Detective | |
Determine if the in scope system has been implemented as described in the audit assertion. CC ID 06983 | Testing | Detective | |
Investigate the nature and causes of misstatements in the audit assertion's in scope system description. CC ID 16557 | Audits and Risk Management | Detective | |
Determine the effect of fraud and non-compliance on the description of the system in the audit assertion, as necessary. CC ID 13977 | Process or Activity | Detective | |
Edit the audit assertion for accuracy. CC ID 07030 | Establish/Maintain Documentation | Preventive | |
Determine if the audit assertion's in scope procedures are accurately documented. CC ID 06982 | Establish/Maintain Documentation | Preventive | |
Determine if the audit assertion's in scope controls are reasonable. CC ID 06980 | Testing | Detective | |
Determine the effect of fraud and non-compliance on the achievement of in scope controls in the audit assertion, as necessary. CC ID 13978 | Process or Activity | Detective | |
Document test plans for auditing in scope controls. CC ID 06985 [{test scope} Determine whether management considers the following key testing factors when developing and implementing independent tests: Scope. App A Objective 10.2.a] | Testing | Detective | |
Determine the implementation status of the audit assertion's in scope controls. CC ID 06981 | Testing | Detective | |
Determine the effectiveness of in scope controls. CC ID 06984 [Review whether management does the following: Verifies that compensating controls are used appropriately to compensate for weaknesses with the system or process. App A Objective 6.4.c] | Testing | Detective | |
Review incident management audit logs to determine the effectiveness of in scope controls. CC ID 12157 | Audits and Risk Management | Detective | |
Review audit reports to determine the effectiveness of in scope controls. CC ID 12156 | Audits and Risk Management | Detective | |
Observe processes to determine the effectiveness of in scope controls. CC ID 12155 | Audits and Risk Management | Detective | |
Interview stakeholders to determine the effectiveness of in scope controls. CC ID 12154 | Audits and Risk Management | Detective | |
Review documentation to determine the effectiveness of in scope controls. CC ID 16522 | Process or Activity | Preventive | |
Review policies and procedures to determine the effectiveness of in scope controls. CC ID 12144 | Audits and Risk Management | Detective | |
Evaluate personnel status changes to determine the effectiveness of in scope controls. CC ID 16556 | Audits and Risk Management | Detective | |
Determine whether individuals performing a control have the appropriate staff qualifications, staff clearances, and staff competencies. CC ID 16555 | Audits and Risk Management | Detective | |
Determine any errors or material omissions in the audit assertion that affect in scope control implementations. CC ID 06990 | Testing | Detective | |
Include the process of using evidential matter to test in scope controls in the test plan. CC ID 06996 | Establish/Maintain Documentation | Preventive | |
Audit the in scope system according to the test plan using relevant evidence. CC ID 07112 | Testing | Preventive | |
Implement procedures that collect sufficient audit evidence. CC ID 07153 | Audits and Risk Management | Preventive | |
Collect evidence about the in scope audit items of the audit assertion. CC ID 07154 | Audits and Risk Management | Preventive | |
Collect audit evidence sufficient to avoid misstatements. CC ID 07155 | Audits and Risk Management | Preventive | |
Collect audit evidence at the level of the organization's competence in the subject matter. CC ID 07156 | Audits and Risk Management | Preventive | |
Collect audit evidence sufficient to overcome inadequacies in the organization's attestation. CC ID 07157 | Audits and Risk Management | Preventive | |
Report that audit evidence collected was not sufficient to the proper authorities. CC ID 16847 | Communicate | Preventive | |
Provide transactional walkthrough procedures for external auditors. CC ID 00672 | Testing | Preventive | |
Establish, implement, and maintain interview procedures. CC ID 16282 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the interview procedures. CC ID 16297 | Human Resources Management | Preventive | |
Coordinate the scheduling of interviews. CC ID 16293 | Process or Activity | Preventive | |
Create a schedule for the interviews. CC ID 16292 | Process or Activity | Preventive | |
Identify interviewees. CC ID 16290 | Process or Activity | Preventive | |
Conduct interviews, as necessary. CC ID 07188 | Testing | Detective | |
Verify statements made by interviewees are correct. CC ID 16299 | Behavior | Detective | |
Discuss unsolved questions with the interviewee. CC ID 16298 | Process or Activity | Detective | |
Allow interviewee to respond to explanations. CC ID 16296 | Process or Activity | Detective | |
Explain the requirements being discussed to the interviewee. CC ID 16294 | Process or Activity | Detective | |
Explain the goals of the interview to the interviewee. CC ID 07189 | Behavior | Detective | |
Explain the testing results to the interviewee. CC ID 16291 | Process or Activity | Preventive | |
Withdraw from the audit, when defined conditions exist. CC ID 13885 | Process or Activity | Corrective | |
Establish and maintain work papers, as necessary. CC ID 13891 | Establish/Maintain Documentation | Preventive | |
Include the auditor's conclusions on work performed by individuals assigned to the audit in the work papers. CC ID 16775 | Establish/Maintain Documentation | Preventive | |
Include audit irregularities in the work papers. CC ID 16774 | Establish/Maintain Documentation | Preventive | |
Include corrective actions in the work papers. CC ID 16771 | Establish/Maintain Documentation | Preventive | |
Include information about the organization being audited and the auditor performing the audit in the work papers. CC ID 16770 | Establish/Maintain Documentation | Preventive | |
Include discussions with interested personnel and affected parties in the work papers. CC ID 16768 | Establish/Maintain Documentation | Preventive | |
Include justification for departing from mandatory requirements in the work papers. CC ID 13935 | Establish/Maintain Documentation | Preventive | |
Include audit evidence obtained from previous engagements in the work papers. CC ID 16518 | Audits and Risk Management | Preventive | |
Include the reviewer, and dates, for using evidential matter to test in scope controls in the work papers. CC ID 06998 | Establish/Maintain Documentation | Preventive | |
Include the tests, examinations, interviews and observations performed during the audit in the work papers. CC ID 07190 | Establish/Maintain Documentation | Preventive | |
Include if any subject matter experts or additional research had to be undertaken to test in scope controls in the work papers. CC ID 07026 | Establish/Maintain Documentation | Preventive | |
Include the tester, and dates, for using evidential matter to test in scope controls in the work papers. CC ID 06997 | Establish/Maintain Documentation | Preventive | |
Include if the audit evidence has identified in scope control deficiencies in the work papers. CC ID 07152 | Audits and Risk Management | Detective | |
Include any subsequent events related to the audit assertion or audit subject matter in the work papers. CC ID 07177 | Audits and Risk Management | Preventive | |
Include if in scope control deviations allow in scope controls to be performed acceptably in the work papers. CC ID 06987 | Testing | Detective | |
Include the causes of identified in scope control deficiencies in the work papers. CC ID 07000 | Establish/Maintain Documentation | Preventive | |
Include discussions regarding the causes of identified in scope control deficiencies in the work papers. CC ID 06999 | Establish/Maintain Documentation | Preventive | |
Investigate the nature and causes of identified in scope control deviations. CC ID 06986 | Testing | Detective | |
Supervise interested personnel and affected parties participating in the audit. CC ID 07150 | Monitor and Evaluate Occurrences | Preventive | |
Notify interested personnel and affected parties participating in the audit of their roles and responsibilities during the audit. CC ID 07151 | Establish Roles | Preventive | |
Respond to questions or clarification requests regarding the audit. CC ID 08902 | Business Processes | Preventive | |
Track and measure the implementation of the organizational compliance framework. CC ID 06445 | Monitor and Evaluate Occurrences | Preventive | |
Review the need for organizational efficiency as balanced against the needs of compliance and security. CC ID 07111 | Business Processes | Preventive | |
Engage subject matter experts when the auditor requires additional expertise during an attestation engagement, as necessary. CC ID 13971 | Process or Activity | Preventive | |
Review the subject matter expert's findings. CC ID 16559 | Audits and Risk Management | Detective | |
Establish, implement, and maintain a practitioner’s report on agreed-upon procedures. CC ID 13894 | Establish/Maintain Documentation | Preventive | |
Provide auditors access to all in scope records, in scope assets, personnel and in scope procedures. CC ID 06966 | Audits and Risk Management | Preventive | |
Permit assessment teams to conduct audits, as necessary. CC ID 16430 | Investigate | Detective | |
Provide auditors access to affected parties during the audit, as necessary. CC ID 07187 | Business Processes | Preventive | |
Solve any access problems auditors encounter during the audit. CC ID 08959 | Audits and Risk Management | Corrective | |
Notify interested personnel and affected parties when an auditee refuses to provide access or participate in the audit. CC ID 08960 | Audits and Risk Management | Preventive | |
Establish and maintain a practitioner's examination report on pro forma financial information. CC ID 13968 | Establish/Maintain Documentation | Preventive | |
Include references to where financial information was derived in the practitioner's review report on pro forma financial information. CC ID 13982 | Establish/Maintain Documentation | Preventive | |
Include a statement that the financial statements used were audited by other practitioners in the practitioner's examination report on pro forma financial information, as necessary. CC ID 13981 | Establish/Maintain Documentation | Preventive | |
Establish and maintain organizational audit reports. CC ID 06731 | Establish/Maintain Documentation | Preventive | |
Determine what disclosures are required in the audit report. CC ID 14888 | Establish/Maintain Documentation | Detective | |
Include the justification for not following the applicable requirements in the audit report. CC ID 16822 | Audits and Risk Management | Preventive | |
Include a statement that the applicable requirements were not followed in the audit report. CC ID 16821 | Audits and Risk Management | Preventive | |
Include audit subject matter in the audit report. CC ID 14882 | Establish/Maintain Documentation | Preventive | |
Include an other-matter paragraph in the audit report. CC ID 14901 | Establish/Maintain Documentation | Preventive | |
Identify the audit team members in the audit report. CC ID 15259 | Human Resources Management | Detective | |
Include that the auditee did not provide comments in the audit report. CC ID 16849 | Establish/Maintain Documentation | Preventive | |
Write the audit report using clear and conspicuous language. CC ID 13948 | Establish/Maintain Documentation | Preventive | |
Include a statement that the sufficiency of the agreed upon procedures is the responsibility of the specified parties in the audit report. CC ID 13936 | Establish/Maintain Documentation | Preventive | |
Include a statement that the financial statements were audited in the audit report. CC ID 13963 | Establish/Maintain Documentation | Preventive | |
Include the criteria that financial information was measured against in the audit report. CC ID 13966 | Establish/Maintain Documentation | Preventive | |
Include a description of the financial information being reported on in the audit report. CC ID 13965 | Establish/Maintain Documentation | Preventive | |
Include references to any adjustments of financial information in the audit report. CC ID 13964 | Establish/Maintain Documentation | Preventive | |
Include in the audit report that audit opinions are not dependent on references to subject matter experts, as necessary. CC ID 13953 | Establish/Maintain Documentation | Preventive | |
Include references to historical financial information used in the audit report. CC ID 13961 | Establish/Maintain Documentation | Preventive | |
Include a statement about the inherent limitations of the audit in the audit report. CC ID 14900 | Establish/Maintain Documentation | Preventive | |
Include a description of the limitations on the usefulness of hypothetical assumptions in the audit report. CC ID 13958 | Establish/Maintain Documentation | Preventive | |
Include the word independent in the title of audit reports. CC ID 07003 | Actionable Reports or Measurements | Preventive | |
Include the date of the audit in the audit report. CC ID 07024 | Actionable Reports or Measurements | Preventive | |
Structure the audit report to be in the form of procedures and findings. CC ID 13940 | Establish/Maintain Documentation | Preventive | |
Include information about the organization being audited and the auditor performing the audit in the audit report. CC ID 07004 | Actionable Reports or Measurements | Preventive | |
Include any discussions of significant findings in the audit report. CC ID 13955 | Establish/Maintain Documentation | Preventive | |
Include the date and with whom discussions about significant findings took place in the audit report. CC ID 13962 | Establish/Maintain Documentation | Preventive | |
Include the audit criteria in the audit report. CC ID 13945 | Establish/Maintain Documentation | Preventive | |
Include a statement in the audit report that the agreed upon procedures were potentially insufficient in identifying material risks, as necessary. CC ID 13957 | Establish/Maintain Documentation | Preventive | |
Include all hypothetical assumptions in the audit report. CC ID 13947 | Establish/Maintain Documentation | Preventive | |
Include a statement that access to the report is restricted based on least privilege in the audit report. CC ID 07023 | Actionable Reports or Measurements | Preventive | |
Include a statement that identifies the distribution list for the report in the audit report. CC ID 07172 | Establish/Maintain Documentation | Preventive | |
Include a statement that identifies the use restrictions for the report in the audit report. CC ID 07173 | Establish/Maintain Documentation | Preventive | |
Include a statement that the agreed upon procedures involves collecting evidence in the audit report. CC ID 13956 | Establish/Maintain Documentation | Preventive | |
Include all of the facts and demonstrated plausibility in the audit report. CC ID 08929 | Establish/Maintain Documentation | Preventive | |
Include a statement that the agreed upon procedures were performed by all parties in the audit report. CC ID 13931 | Establish/Maintain Documentation | Preventive | |
Include references to subject matter experts in the audit report when citing qualified opinions. CC ID 13929 | Establish/Maintain Documentation | Preventive | |
Include a description of the assistance provided by Subject Matter Experts in the audit report. CC ID 13939 | Establish/Maintain Documentation | Preventive | |
Include a review of the subject matter expert's findings in the audit report. CC ID 13972 | Establish/Maintain Documentation | Preventive | |
Include a statement of the character of the engagement in the audit report. CC ID 07166 | Establish/Maintain Documentation | Preventive | |
Include the nature and scope of the audit performed in the statement of the character of the engagement in the audit report. CC ID 07167 | Establish/Maintain Documentation | Preventive | |
Include the professional standards governing the audit in the statement of the character of the engagement in the audit report. CC ID 07168 | Establish/Maintain Documentation | Preventive | |
Include all restrictions on the audit in the audit report. CC ID 13930 | Establish/Maintain Documentation | Preventive | |
Include a statement that the auditor has no responsibility to update the audit report after its submission. CC ID 13943 | Establish/Maintain Documentation | Preventive | |
Include a statement on the auditor's ethical requirements in the audit report. CC ID 16767 | Establish/Maintain Documentation | Preventive | |
Include a statement that the responsible party refused to provide a written assertion in the audit report. CC ID 13887 | Establish/Maintain Documentation | Preventive | |
Include a statement that the examination involves procedures for collecting evidence in the audit report. CC ID 13941 | Establish/Maintain Documentation | Preventive | |
Express an adverse opinion in the audit report when significant assumptions are not suitably supported. CC ID 13944 | Establish/Maintain Documentation | Preventive | |
Include a statement that modifications to historical evidence accurately reflect current evidence in the audit report. CC ID 13938 | Establish/Maintain Documentation | Preventive | |
Refrain from referencing previous engagements in the audit report. CC ID 16516 | Audits and Risk Management | Preventive | |
Refrain from referencing other auditor's work in the audit report. CC ID 13881 | Establish/Maintain Documentation | Preventive | |
Include that the audit findings are not a predictive analysis of future compliance in the audit report. CC ID 07018 | Establish/Maintain Documentation | Preventive | |
Identify the participants from the organization being audited in the audit report. CC ID 15258 | Audits and Risk Management | Detective | |
Include how in scope controls meet external requirements in the audit report. CC ID 16450 | Establish/Maintain Documentation | Preventive | |
Include the in scope records used to obtain audit evidence in the description of tests of controls and results in the audit report. CC ID 14915 | Establish/Maintain Documentation | Preventive | |
Include recommended corrective actions in the audit report. CC ID 16197 | Establish/Maintain Documentation | Preventive | |
Include risks and opportunities in the audit report. CC ID 16196 | Establish/Maintain Documentation | Preventive | |
Include the description of tests of controls and results in the audit report. CC ID 14898 | Establish/Maintain Documentation | Preventive | |
Include the nature of the tests performed in the description of tests of controls and results in the audit report. CC ID 14908 | Establish/Maintain Documentation | Preventive | |
Include the test scope in the description of tests of controls and results in the audit report. CC ID 14906 | Establish/Maintain Documentation | Preventive | |
Identify the stakeholders interviewed to obtain audit evidence in the description of tests of controls and results in the audit report. CC ID 14905 | Establish/Maintain Documentation | Preventive | |
Include the timing of controls in the description of tests of controls and results in the audit report. CC ID 16553 | Audits and Risk Management | Preventive | |
Include the controls that were tested in the description of tests of controls and results in the audit report. CC ID 14902 | Establish/Maintain Documentation | Preventive | |
Include subsequent events related to the audit assertion or audit subject matter in the audit report. CC ID 16773 | Establish/Maintain Documentation | Preventive | |
Include the organization's audit assertion of the in scope system in the audit report. CC ID 07005 | Actionable Reports or Measurements | Preventive | |
Include that the organization is the responsible party for the content of its audit assertion and in scope system description in the audit report. CC ID 07010 | Establish/Maintain Documentation | Preventive | |
Include that the organization is the responsible party for providing in scope services in the audit report. CC ID 14903 | Establish/Maintain Documentation | Preventive | |
Include that the organization is the responsible party for specifying in scope controls not defined by law or contractual obligation in the audit report. CC ID 07011 | Establish/Maintain Documentation | Preventive | |
Include that the organization is the responsible party for designing and implementing the in scope controls it identified in the audit scope in the audit report. CC ID 07014 | Establish/Maintain Documentation | Preventive | |
Include the audit opinion regarding the accurateness of the in scope system description in the audit report. CC ID 07019 | Establish/Maintain Documentation | Preventive | |
Include the attestation standards the auditor follows in the audit report. CC ID 07015 | Establish/Maintain Documentation | Preventive | |
Include the audit opinion about the audit assertion in relation to the audit criteria used for evaluation in the audit report. CC ID 07169 [Document conclusions in a memo to the examiner-in-charge that provides report-ready comments for all relevant sections of the report of examination and guidance to future examiners. App A Objective 11.3] | Establish/Maintain Documentation | Preventive | |
Include the auditor's significant reservations about the engagement, the audit assertion, or the audit subject matter in the audit report. CC ID 07170 | Establish/Maintain Documentation | Preventive | |
Include an emphasis-of-matter paragraph in the audit report. CC ID 14890 | Establish/Maintain Documentation | Preventive | |
Include the organization's in scope system description in the audit report. CC ID 11626 | Audits and Risk Management | Preventive | |
Include any out of scope components of in scope systems in the audit report. CC ID 07006 | Establish/Maintain Documentation | Preventive | |
Include that the organization is the responsible party for identifying material risks in the audit report. CC ID 07012 | Establish/Maintain Documentation | Preventive | |
Include that the organization is the responsible party for selecting the audit criteria in the audit report. CC ID 07013 | Establish/Maintain Documentation | Preventive | |
Include the scope and work performed in the audit report. CC ID 11621 | Audits and Risk Management | Preventive | |
Review the adequacy of the internal auditor's work papers. CC ID 01146 | Audits and Risk Management | Detective | |
Compare the evaluations completed by the internal auditors and the external auditors in past audit reports. CC ID 01158 | Establish/Maintain Documentation | Detective | |
Review the adequacy of the internal auditor's audit reports. CC ID 11620 | Audits and Risk Management | Detective | |
Review past audit reports. CC ID 01155 [{audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8 With respect to developed software, determine whether institution management does the following: Reviews available audit reports, and considers and implements appropriate control recommendations. App A Objective 6.28.e Review past reports for outstanding issues or previous problems. Consider the following: Internal and external audit reports. App A Objective 1.1.b] | Establish/Maintain Documentation | Detective | |
Review past audit reports for specific process steps and calculations that were stated to support the audit report's conclusions. CC ID 01160 | Establish/Maintain Documentation | Detective | |
Review the reporting of material weaknesses and risks in past audit reports. CC ID 01161 [Review past reports for outstanding issues or previous problems. Consider the following: Regulatory reports of examination. App A Objective 1.1.a Review past reports for outstanding issues or previous problems. Consider the following: Independent security tests. App A Objective 1.1.c Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk management and control decisions. App A Objective 2.4.b Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk management and control decisions. App A Objective 2.4.b {risk monitoring process}{risk reporting process}{be operational and effective} Determine whether the risk monitoring and reporting process is regular and prompts action, when necessary, in a timely manner. App A Objective 7.2] | Establish/Maintain Documentation | Detective | |
Resolve disputes before creating the audit summary. CC ID 08964 | Behavior | Preventive | |
Refrain from including the description of the audit in the audit report when the auditor is disclaiming an audit opinion. CC ID 13975 | Establish/Maintain Documentation | Preventive | |
Refrain from including scope limitations from changed attestation engagements in the audit report. CC ID 13983 | Establish/Maintain Documentation | Preventive | |
Refrain from including in the audit report any procedures that were performed that the auditor is disclaiming in an audit opinion. CC ID 13974 | Establish/Maintain Documentation | Preventive | |
Include deficiencies and non-compliance in the audit report. CC ID 14879 | Establish/Maintain Documentation | Corrective | |
Determine the effect of deficiencies on the audit report, as necessary. CC ID 14886 | Investigate | Detective | |
Determine the effect of fraud and non-compliance on the audit report, as necessary. CC ID 13979 | Process or Activity | Detective | |
Include an audit opinion in the audit report. CC ID 07017 | Establish/Maintain Documentation | Preventive | |
Include qualified opinions in the audit report. CC ID 13928 | Establish/Maintain Documentation | Preventive | |
Include that the auditor is the responsible party to express an opinion on the audit subject matter based on examination of evidence in the audit report. CC ID 07174 | Establish/Maintain Documentation | Preventive | |
Include a description of the reasons for modifying the audit opinion in the audit report. CC ID 13898 | Establish/Maintain Documentation | Corrective | |
Include that the auditor did not express an opinion in the audit report, as necessary. CC ID 13886 | Establish/Maintain Documentation | Preventive | |
Disclaim the audit opinion in the audit report, as necessary. CC ID 13901 | Business Processes | Corrective | |
Include items that were excluded from the audit report in the audit report. CC ID 07007 | Establish/Maintain Documentation | Preventive | |
Include the organization's privacy practices in the audit report. CC ID 07029 | Establish/Maintain Documentation | Preventive | |
Include items that pertain to third parties in the audit report. CC ID 07008 | Establish/Maintain Documentation | Preventive | |
Refrain from including reference to procedures performed in previous attestation engagements in the audit report. CC ID 13970 | Establish/Maintain Documentation | Preventive | |
Include a statement in the audit report that no procedures were performed subsequent to the date of the practitioner's review report on pro forma financial information, as necessary. CC ID 13969 | Establish/Maintain Documentation | Preventive | |
Include any of the organization's use of compensating controls that were not audited in the audit report. CC ID 07009 | Establish/Maintain Documentation | Preventive | |
Include whether the use of compensating controls are necessary in the audit report. CC ID 07020 | Establish/Maintain Documentation | Preventive | |
Include the pass or fail test status of all in scope controls in the audit report. CC ID 07016 | Establish/Maintain Documentation | Preventive | |
Include the process of using evidential matter to test in scope controls in the audit report. CC ID 07021 | Establish/Maintain Documentation | Preventive | |
Include the nature and causes of identified in scope control deviations in the audit report. CC ID 07022 | Establish/Maintain Documentation | Preventive | |
Modify the audit opinion in the audit report under defined conditions. CC ID 13937 | Establish/Maintain Documentation | Corrective | |
Disclose any audit irregularities in the audit report. CC ID 06995 | Actionable Reports or Measurements | Preventive | |
Include the written signature of the auditor's organization in the audit report. CC ID 13897 | Establish/Maintain Documentation | Preventive | |
Include a statement that additional reports are being submitted in the audit report. CC ID 16848 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the audit report to all interested personnel and affected parties identified in the distribution list. CC ID 07117 | Establish/Maintain Documentation | Preventive | |
Define the roles and responsibilities for distributing the audit report. CC ID 16845 | Human Resources Management | Preventive | |
Disseminate and communicate the reviews of audit reports to organizational management. CC ID 00653 | Log Management | Detective | |
Disseminate and communicate the reasons the audit report was delayed to interested personnel and affected parties. CC ID 15257 | Communicate | Preventive | |
Notify auditees if disclosure of audit documentation is required by law. CC ID 15249 | Communicate | Preventive | |
Disseminate and communicate to the organization that access and use of audit reports are based on least privilege. CC ID 07171 | Behavior | Preventive | |
Disseminate and communicate documents that contain information in support of the audit report. CC ID 07175 | Establish/Maintain Documentation | Preventive | |
Correct any material misstatements in documents that contain information in support of the audit report. CC ID 07176 | Establish/Maintain Documentation | Preventive | |
Review the issues of non-compliance from past audit reports. CC ID 01148 [Review past reports for outstanding issues or previous problems. Consider the following: App A Objective 1.1 {regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d Review preliminary conclusions with the examiner-in-charge regarding the following: Violations of laws or regulations. App A Objective 11.1.a {include} Review preliminary conclusions with the examiner-in-charge regarding the following: Significant issues warranting inclusion as matters requiring attention or recommendations in the report of examination. App A Objective 11.1.b] | Establish/Maintain Documentation | Detective | |
Notify interested personnel and affected parties after bribes are offered during the audit. CC ID 08872 | Business Processes | Preventive | |
Submit an audit report that is complete. CC ID 01145 | Testing | Detective | |
Accept the audit report. CC ID 07025 | Establish/Maintain Documentation | Preventive | |
Implement a corrective action plan in response to the audit report. CC ID 06777 | Establish/Maintain Documentation | Corrective | |
Assign responsibility for remediation actions. CC ID 13622 | Human Resources Management | Preventive | |
Monitor and report on the status of mitigation actions in the corrective action plan. CC ID 15250 | Actionable Reports or Measurements | Corrective | |
Review management's response to issues raised in past audit reports. CC ID 01149 [Review management's response to issues raised at, or since, the last examination. Consider the following: App A Objective 1.2 Review management's response to issues raised at, or since, the last examination. Consider the following: Adequacy and timing of corrective action. App A Objective 1.2.a Review management's response to issues raised at, or since, the last examination. Consider the following: Adequacy and timing of corrective action. App A Objective 1.2.a Review management's response to issues raised at, or since, the last examination. Consider the following: Existence of any outstanding issues. App A Objective 1.2.c With respect to developed software, determine whether institution management does the following: Reviews available audit reports, and considers and implements appropriate control recommendations. App A Objective 6.28.e] | Audits and Risk Management | Detective | |
Define penalties for uncorrected audit findings or remaining non-compliant with the audit report. CC ID 08963 | Establish/Maintain Documentation | Preventive | |
Assess the quality of the audit program in regards to the staff and their qualifications. CC ID 01150 | Testing | Detective | |
Evaluate the competency of auditors. CC ID 15253 | Human Resources Management | Detective | |
Review the audit program scope as it relates to the organization's profile. CC ID 01159 | Audits and Risk Management | Detective | |
Assess the quality of the audit program in regards to its documentation. CC ID 11622 | Audits and Risk Management | Preventive | |
Establish, implement, and maintain the audit plan. CC ID 01156 | Testing | Detective | |
Include the audit criteria in the audit plan. CC ID 15262 | Establish/Maintain Documentation | Preventive | |
Include a list of reference documents in the audit plan. CC ID 15260 | Establish/Maintain Documentation | Preventive | |
Include the languages to be used for the audit in the audit plan. CC ID 15252 | Establish/Maintain Documentation | Preventive | |
Include the allocation of resources in the audit plan. CC ID 15251 | Establish/Maintain Documentation | Preventive | |
Include communication protocols in the audit plan. CC ID 15247 | Establish/Maintain Documentation | Preventive | |
Include the level of audit sampling necessary to collect sufficient audit evidence in the audit plan. CC ID 15246 | Establish/Maintain Documentation | Preventive | |
Include meeting schedules in the audit plan. CC ID 15245 | Establish/Maintain Documentation | Preventive | |
Include the time frames for the audit in the audit plan. CC ID 15244 | Establish/Maintain Documentation | Preventive | |
Include the time frames for conducting the audit in the audit plan. CC ID 15243 | Establish/Maintain Documentation | Preventive | |
Include the locations to be audited in the audit plan. CC ID 15242 | Establish/Maintain Documentation | Preventive | |
Include the processes to be audited in the audit plan. CC ID 15241 | Establish/Maintain Documentation | Preventive | |
Include audit objectives in the audit plan. CC ID 15240 | Establish/Maintain Documentation | Preventive | |
Include the risks associated with audit activities in the audit plan. CC ID 15239 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the audit plan to interested personnel and affected parties. CC ID 15238 | Communicate | Preventive | |
Establish, implement, and maintain an audit schedule for the audit program. CC ID 13158 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a risk management program. CC ID 12051 [[threat assessment} Determine whether the institution's security operations activities include the following: Threat identification and assessment. App A Objective 8.1.i {threat and vulnerability management procedure} Determine whether management has effective threat identification and assessment processes, including the following: Maintaining procedures for obtaining, monitoring, assessing, and responding to evolving threat and vulnerability information. App A Objective 8.3.a {threat and vulnerability management policy} Determine whether management has effective threat identification and assessment processes, including the following: Designing policies to allow immediate and consequential threats to be dealt with expeditiously. App A Objective 8.3.e {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Establish/Maintain Documentation | Preventive | |
Include the scope of risk management activities in the risk management program. CC ID 13658 | Establish/Maintain Documentation | Preventive | |
Document and justify any exclusions from the scope of the risk management activities in the risk management program. CC ID 15336 | Business Processes | Detective | |
Integrate the risk management program with the organization's business activities. CC ID 13661 | Business Processes | Preventive | |
Integrate the risk management program into daily business decision-making. CC ID 13659 | Business Processes | Preventive | |
Include managing mobile risks in the risk management program. CC ID 13535 | Establish/Maintain Documentation | Preventive | |
Take into account if the system will be accessed by or have an impact on children in the risk management program. CC ID 14992 | Audits and Risk Management | Preventive | |
Include regular updating in the risk management system. CC ID 14990 | Business Processes | Preventive | |
Establish, implement, and maintain risk management strategies. CC ID 13209 | Establish/Maintain Documentation | Preventive | |
Include off-site storage of supplies in the risk management strategies. CC ID 13221 | Establish/Maintain Documentation | Preventive | |
Include data quality in the risk management strategies. CC ID 15308 | Data and Information Management | Preventive | |
Include the use of alternate service providers in the risk management strategies. CC ID 13217 | Establish/Maintain Documentation | Preventive | |
Include minimizing service interruptions in the risk management strategies. CC ID 13215 | Establish/Maintain Documentation | Preventive | |
Include off-site storage in the risk mitigation strategies. CC ID 13213 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain the risk assessment framework. CC ID 00685 | Establish/Maintain Documentation | Preventive | |
Analyze the risk management strategy for addressing requirements. CC ID 12926 | Audits and Risk Management | Detective | |
Analyze the risk management strategy for addressing threats. CC ID 12925 [Determine whether management effectively identifies threats and vulnerabilities continuously. App A Objective 4.1] | Audits and Risk Management | Detective | |
Analyze the risk management strategy for addressing opportunities. CC ID 12924 | Audits and Risk Management | Detective | |
Define and assign the roles and responsibilities for the risk assessment framework, as necessary. CC ID 06456 | Establish Roles | Preventive | |
Establish, implement, and maintain a risk assessment program. CC ID 00687 | Establish/Maintain Documentation | Preventive | |
Address past incidents in the risk assessment program. CC ID 12743 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: App A Objective 5.1] | Audits and Risk Management | Preventive | |
Employ third parties when implementing a risk assessment, as necessary. CC ID 16306 | Human Resources Management | Detective | |
Include the need for risk assessments in the risk assessment program. CC ID 06447 [[threat assessment} Determine whether the institution's security operations activities include the following: Threat identification and assessment. App A Objective 8.1.i] | Establish/Maintain Documentation | Preventive | |
Include the information flow of restricted data in the risk assessment program. CC ID 12339 | Establish/Maintain Documentation | Preventive | |
Establish and maintain the factors and context for risk to the organization. CC ID 12230 | Audits and Risk Management | Preventive | |
Establish, implement, and maintain a financial plan to support the risk management strategy. CC ID 12786 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain insurance requirements. CC ID 16562 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate insurance options to interested personnel and affected parties. CC ID 16572 | Communicate | Preventive | |
Disseminate and communicate insurance requirements to interested personnel and affected parties. CC ID 16567 | Communicate | Preventive | |
Purchase insurance on behalf of interested personnel and affected parties. CC ID 16571 | Acquisition/Sale of Assets or Services | Corrective | |
Design a portfolio of insurance options in accordance with risk decision-making criteria. CC ID 12878 | Business Processes | Preventive | |
Design a portfolio of loans in accordance with risk decision-making criteria. CC ID 12877 | Business Processes | Preventive | |
Design a portfolio of risk limiting and mitigating approaches in organizational contracts in accordance with risk decision-making criteria. CC ID 12903 | Business Processes | Preventive | |
Address cybersecurity risks in the risk assessment program. CC ID 13193 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain Data Protection Impact Assessments. CC ID 14830 | Process or Activity | Preventive | |
Include a Data Protection Impact Assessment in the risk assessment program. CC ID 12630 | Establish/Maintain Documentation | Preventive | |
Include an assessment of the necessity and proportionality of the processing operations in relation to the purposes in the Data Protection Impact Assessment. CC ID 12681 | Establish/Maintain Documentation | Preventive | |
Include an assessment of the relationship between the data subject and the parties processing the data in the Data Protection Impact Assessment. CC ID 16371 | Establish/Maintain Documentation | Preventive | |
Include a risk assessment of data subject's rights in the Data Protection Impact Assessment. CC ID 12674 | Establish/Maintain Documentation | Preventive | |
Include the description and purpose of processing restricted data in the Data Protection Impact Assessment. CC ID 12673 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the Data Protection Impact Assessment to interested personnel and affected parties. CC ID 15313 | Communicate | Preventive | |
Include consideration of the data subject's expectations in the Data Protection Impact Assessment. CC ID 16370 | Establish/Maintain Documentation | Preventive | |
Include monitoring unsecured areas in the Data Protection Impact Assessment. CC ID 12671 | Establish/Maintain Documentation | Preventive | |
Include security measures for protecting restricted data in the Data Protection Impact Assessment. CC ID 12635 | Establish/Maintain Documentation | Preventive | |
Use the risk taxonomy when managing risk. CC ID 12280 | Behavior | Preventive | |
Establish, implement, and maintain a risk assessment policy. CC ID 14026 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the risk assessment policy. CC ID 14121 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the risk assessment policy. CC ID 14120 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the risk assessment policy. CC ID 14119 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the risk assessment policy. CC ID 14118 | Establish/Maintain Documentation | Preventive | |
Include the scope in the risk assessment policy. CC ID 14117 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the risk assessment policy. CC ID 14116 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the risk assessment policy to interested personnel and affected parties. CC ID 14115 | Communicate | Preventive | |
Establish, implement, and maintain risk assessment procedures. CC ID 06446 [As part of the information security program, determine whether management has established risk identification processes. App A Objective 4 Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: App A Objective 5.1 Determine whether management has effective threat identification and assessment processes, including the following: Identifying and assessing threats (e.g., threat information is often ad hoc, although some providers present threat information within a defined framework that readily lends itself to analytical operations). App A Objective 8.3.b Determine whether management has effective threat identification and assessment processes, including the following: Identifying and assessing threats (e.g., threat information is often ad hoc, although some providers present threat information within a defined framework that readily lends itself to analytical operations). App A Objective 8.3.b {risk monitoring process}{risk reporting process} Determine whether management has effective risk monitoring and reporting processes. App A Objective 7 Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Establish/Maintain Documentation | Preventive | |
Employ risk assessment procedures that follow legal requirements and contractual obligations when risk profiling. CC ID 06472 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Incorporate legal and regulatory requirements. App A Objective 5.1.b] | Establish/Maintain Documentation | Preventive | |
Analyze the organization's information security environment. CC ID 13122 [Determine the complexity of the institution's information security environment. App A Objective 1.4] | Technical Security | Preventive | |
Employ risk assessment procedures that follow standards and best practices, as necessary. CC ID 06473 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Improve consistency in risk measurement. App A Objective 5.1.c Management should develop risk measurement processes that evaluate the inherent risk to the institution. II.B Risk Measurement] | Establish/Maintain Documentation | Preventive | |
Document cybersecurity risks. CC ID 12281 | Establish/Maintain Documentation | Preventive | |
Employ risk assessment procedures that take into account both electronic records and printed records. CC ID 06476 | Establish/Maintain Documentation | Preventive | |
Employ risk assessment procedures that take into account information classification. CC ID 06477 | Establish/Maintain Documentation | Preventive | |
Engage appropriate parties to assist with risk assessments, as necessary. CC ID 12153 | Human Resources Management | Preventive | |
Employ risk assessment procedures that align with strategic objectives. CC ID 06474 | Establish/Maintain Documentation | Preventive | |
Employ risk assessment procedures that take into account prior risk assessment findings of the same scope. CC ID 06478 | Establish/Maintain Documentation | Preventive | |
Employ risk assessment procedures that take into account the target environment. CC ID 06479 [{information security program review} Verify whether that review does the following: Addresses the program in its current environment. App A Objective 9.1.a] | Establish/Maintain Documentation | Preventive | |
Employ risk assessment procedures that take into account incidents associated with the target environment. CC ID 06480 [{indicators of compromise} Determine whether management has effective incident identification and assessment processes to do the following: Analyze the event associated with the indicators. App A Objective 8.5.b {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Establish/Maintain Documentation | Preventive | |
Employ risk assessment procedures that take into account risk factors. CC ID 16560 | Audits and Risk Management | Preventive | |
Include compliance with disposition requirements in the risk assessment procedures. CC ID 12342 | Establish/Maintain Documentation | Preventive | |
Include compliance with retention requirements in the risk assessment procedures. CC ID 12341 | Establish/Maintain Documentation | Preventive | |
Employ risk assessment procedures that include appropriate risk treatment options for each identified risk. CC ID 06484 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a threat and risk classification scheme. CC ID 07183 [Review whether management has the following: A method or taxonomy for categorizing threats, sources, and vulnerabilities. App A Objective 4.2.b Determine whether the risk identification process produces manageable groupings of information security threats, including cybersecurity threats. Review whether management has the following: App A Objective 4.2 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {risk response} Determine whether management has effective threat identification and assessment processes, including the following: Using threat knowledge to drive risk assessment and response. App A Objective 8.3.d {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Establish/Maintain Documentation | Preventive | |
Document organizational risk criteria. CC ID 12277 | Establish/Maintain Documentation | Preventive | |
Include security threats and vulnerabilities in the threat and risk classification scheme. CC ID 00699 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Map threats and vulnerabilities App A Objective 5.1.a Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Map threats and vulnerabilities App A Objective 5.1.a Verify whether management ensures the following are done: Vulnerability assessments that define, identify, and classify the security holes found in the system. App A Objective 10.3.c] | Technical Security | Preventive | |
Include an analysis of system interdependencies in the threat and risk classification scheme. CC ID 13056 | Investigate | Detective | |
Categorize the systems, information, and data by risk profile in the threat and risk classification scheme. CC ID 01443 [Review whether management has the following: A process to determine the institution's information security risk profile. App A Objective 4.2.c] | Audits and Risk Management | Preventive | |
Review the risk profiles, as necessary. CC ID 16561 | Audits and Risk Management | Detective | |
Include risks to critical personnel and assets in the threat and risk classification scheme. CC ID 00698 | Audits and Risk Management | Preventive | |
Include the traceability of malicious code in the threat and risk classification scheme. CC ID 06600 | Establish/Maintain Documentation | Preventive | |
Assign a probability of occurrence to all types of threats in the threat and risk classification scheme. CC ID 01173 | Audits and Risk Management | Preventive | |
Approve the threat and risk classification scheme. CC ID 15693 | Business Processes | Preventive | |
Establish, implement, and maintain risk profiling procedures for internal risk assessments. CC ID 01157 | Audits and Risk Management | Preventive | |
Include language that is easy to understand in the risk assessment report. CC ID 06461 | Establish/Maintain Documentation | Preventive | |
Include the environments that call for risk assessments in the risk assessment program. CC ID 06448 | Establish/Maintain Documentation | Preventive | |
Include the process for defining the scope of each risk assessment in the risk assessment program. CC ID 06462 | Establish/Maintain Documentation | Preventive | |
Include the circumstances that call for risk assessments in the risk assessment program. CC ID 06449 | Establish/Maintain Documentation | Preventive | |
Include the roles and responsibilities involved in risk assessments in the risk assessment program. CC ID 06450 | Establish/Maintain Documentation | Preventive | |
Include the methods of managing and responding to the risk assessment report in the risk assessment program. CC ID 06451 | Establish/Maintain Documentation | Preventive | |
Automate as much of the risk assessment program, as necessary. CC ID 06459 | Audits and Risk Management | Preventive | |
Disseminate and communicate the risk assessment procedures to interested personnel and affected parties. CC ID 14136 | Communicate | Preventive | |
Approve the risk assessment program and associated risk assessment procedures at the senior management level. CC ID 06458 | Establish/Maintain Documentation | Preventive | |
Perform risk assessments for all target environments, as necessary. CC ID 06452 [{application control} With respect to developed software, determine whether institution management does the following: Performs ongoing risk assessments to consider the adequacy of application-level controls in light of changing threat, network, and host environments. App A Objective 6.28.c Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Testing | Preventive | |
Include the probability and potential impact of pandemics in the scope of the risk assessment. CC ID 13241 | Establish/Maintain Documentation | Preventive | |
Include physical assets in the scope of the risk assessment. CC ID 13075 | Establish/Maintain Documentation | Preventive | |
Include the results of the risk assessment in the risk assessment report. CC ID 06481 | Establish/Maintain Documentation | Preventive | |
Approve the results of the risk assessment as documented in the risk assessment report. CC ID 07109 | Audits and Risk Management | Preventive | |
Update the risk assessment upon discovery of a new threat. CC ID 00708 | Establish/Maintain Documentation | Detective | |
Review risks to the organization's audit function when changes in the supply chain occur. CC ID 01154 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Technology service providers and software vendor listings. App A Objective 1.3.e Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Technology service providers and software vendor listings. App A Objective 1.3.e] | Audits and Risk Management | Preventive | |
Update the risk assessment upon changes to the risk profile. CC ID 11627 | Establish/Maintain Documentation | Detective | |
Review the risk to the audit function when the audit personnel status changes. CC ID 01153 | Audits and Risk Management | Preventive | |
Document any reasons for modifying or refraining from modifying the organization's risk assessment when the risk assessment has been reviewed. CC ID 13312 | Establish/Maintain Documentation | Preventive | |
Create a risk assessment report based on the risk assessment results. CC ID 15695 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the approved risk assessment report to interested personnel and affected parties. CC ID 10633 | Communicate | Preventive | |
Conduct external audits of risk assessments, as necessary. CC ID 13308 | Audits and Risk Management | Detective | |
Notify the organization upon completion of the external audits of the organization's risk assessment. CC ID 13313 | Communicate | Preventive | |
Establish, implement, and maintain a risk assessment awareness and training program. CC ID 06453 | Business Processes | Preventive | |
Disseminate and communicate information about risks to all interested personnel and affected parties. CC ID 06718 | Behavior | Preventive | |
Evaluate the effectiveness of threat and vulnerability management procedures. CC ID 13491 | Investigate | Detective | |
Correlate the business impact of identified risks in the risk assessment report. CC ID 00686 [Review preliminary conclusions with the examiner-in-charge regarding the following: The proposed Uniform Rating System for Information Technology management component rating and the potential impact of the conclusion on the composite or other component IT ratings. App A Objective 11.1.c Review preliminary conclusions with the examiner-in-charge regarding the following: Potential impact of conclusions on the institution's risk assessment. App A Objective 11.1.d] | Audits and Risk Management | Preventive | |
Conduct a Business Impact Analysis, as necessary. CC ID 01147 | Audits and Risk Management | Detective | |
Include recovery of the critical path in the Business Impact Analysis. CC ID 13224 | Establish/Maintain Documentation | Preventive | |
Include acceptable levels of data loss in the Business Impact Analysis. CC ID 13264 | Establish/Maintain Documentation | Preventive | |
Include Recovery Point Objectives in the Business Impact Analysis. CC ID 13223 | Establish/Maintain Documentation | Preventive | |
Include the Recovery Time Objectives in the Business Impact Analysis. CC ID 13222 | Establish/Maintain Documentation | Preventive | |
Include pandemic risks in the Business Impact Analysis. CC ID 13219 | Establish/Maintain Documentation | Preventive | |
Include tolerance to downtime in the Business Impact Analysis report. CC ID 01172 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the Business Impact Analysis to interested personnel and affected parties. CC ID 15300 | Communicate | Preventive | |
Establish, implement, and maintain a risk register. CC ID 14828 | Establish/Maintain Documentation | Preventive | |
Document organizational risk tolerance in a risk register. CC ID 09961 | Establish/Maintain Documentation | Preventive | |
Align organizational risk tolerance to that of industry peers in the risk register. CC ID 09962 | Business Processes | Preventive | |
Review the Business Impact Analysis, as necessary. CC ID 12774 | Business Processes | Preventive | |
Analyze and quantify the risks to in scope systems and information. CC ID 00701 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: App A Objective 1.3 Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Audits and Risk Management | Preventive | |
Establish and maintain a Risk Scoping and Measurement Definitions Document. CC ID 00703 | Audits and Risk Management | Preventive | |
Identify the material risks in the risk assessment report. CC ID 06482 [Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3] | Audits and Risk Management | Preventive | |
Assess the potential level of business impact risk associated with each business process. CC ID 06463 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Changes to internal business processes. App A Objective 1.3.h Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Internal reorganizations. App A Objective 1.3.i] | Audits and Risk Management | Detective | |
Assess the potential level of business impact risk associated with the business environment. CC ID 06464 | Audits and Risk Management | Detective | |
Assess the potential level of business impact risk associated with business information of in scope systems. CC ID 06465 | Audits and Risk Management | Detective | |
Identify changes to in scope systems that could threaten communication between business units. CC ID 13173 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Communication lines with other business units (e.g., loan review, credit risk management, line of business quality assurance, and internal audit). App A Objective 1.3.f] | Investigate | Detective | |
Assess the potential business impact risk of in scope systems caused by deliberate threats to their confidentiality, integrity, and availability. CC ID 06466 | Audits and Risk Management | Detective | |
Assess the potential level of business impact risk caused by accidental threats to the confidentiality, integrity and availability of critical systems. CC ID 06467 | Audits and Risk Management | Detective | |
Assess the potential level of business impact risk associated with reputational damage. CC ID 15335 | Audits and Risk Management | Detective | |
Assess the potential level of business impact risk associated with insider threats. CC ID 06468 | Audits and Risk Management | Detective | |
Assess the potential level of business impact risk associated with external entities. CC ID 06469 | Audits and Risk Management | Detective | |
Assess the potential level of business impact risk associated with natural disasters. CC ID 06470 | Actionable Reports or Measurements | Detective | |
Assess the potential level of business impact risk associated with control weaknesses. CC ID 06471 | Audits and Risk Management | Detective | |
Establish a risk acceptance level that is appropriate to the organization's risk appetite. CC ID 00706 | Establish/Maintain Documentation | Preventive | |
Investigate alternative risk control strategies appropriate to the organization's risk appetite. CC ID 12887 | Investigate | Preventive | |
Select the appropriate risk treatment option for each identified risk in the risk register. CC ID 06483 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the risk acceptance level in the risk treatment plan to all interested personnel and affected parties. CC ID 06849 | Behavior | Preventive | |
Perform a gap analysis to review in scope controls for identified risks and implement new controls, as necessary. CC ID 00704 | Establish/Maintain Documentation | Detective | |
Document the results of the gap analysis. CC ID 16271 | Establish/Maintain Documentation | Preventive | |
Prioritize and select controls based on the risk assessment findings. CC ID 00707 [Specifically, review whether management does the following: Implements controls based on the institution's risk assessment to mitigate risk from information security threats and vulnerabilities, such as interconnectivity risk. App A Objective 6.5.a Determine whether management measures the risk to guide its recommendations for and use of mitigating controls. App A Objective 5 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Audits and Risk Management | Preventive | |
Analyze the effect of threats on organizational strategies and objectives. CC ID 12850 [{security incident} Determine whether management responsibilities are appropriate and include the following: Participation in assessing the effect of security threats or incidents on the institution and its business lines and processes. App A Objective 2.5.c] | Process or Activity | Detective | |
Analyze the effect of opportunities on organizational strategies and objectives. CC ID 12849 | Process or Activity | Detective | |
Prioritize and categorize the effects of opportunities, threats and requirements on control activities. CC ID 12822 | Audits and Risk Management | Preventive | |
Determine the effectiveness of risk control measures. CC ID 06601 | Testing | Detective | |
Develop key indicators to inform management on the effectiveness of risk control measures. CC ID 12946 | Audits and Risk Management | Preventive | |
Establish, implement, and maintain a risk treatment plan. CC ID 11983 [{oversee} Determine whether management responsibilities are appropriate and include the following: Oversight of risk mitigation activities that support the information security program. App A Objective 2.5.f Determine whether management effectively implements controls to mitigate identified risk. App A Objective 6 Management should develop and implement appropriate controls to mitigate identified risks. II.C Risk Mitigation] | Establish/Maintain Documentation | Preventive | |
Include the date of the risk assessment in the risk treatment plan. CC ID 16321 | Establish/Maintain Documentation | Preventive | |
Include the release status of the risk assessment in the risk treatment plan. CC ID 16320 | Audits and Risk Management | Preventive | |
Identify the planned actions and controls that address high risk in the risk treatment plan. CC ID 12835 | Audits and Risk Management | Preventive | |
Identify the current actions and controls that address high risk in the risk treatment plan. CC ID 12834 | Audits and Risk Management | Preventive | |
Include the risk treatment strategy in the risk treatment plan. CC ID 12159 | Establish/Maintain Documentation | Preventive | |
Revise the risk treatment strategies in the risk treatment plan, as necessary. CC ID 12552 | Establish/Maintain Documentation | Corrective | |
Include an overview of the migration project plan in the risk treatment plan. CC ID 11982 | Establish/Maintain Documentation | Preventive | |
Include change control processes in the risk treatment plan. CC ID 11981 | Establish/Maintain Documentation | Preventive | |
Include a description of the processes to check for new vulnerabilities in the risk treatment plan. CC ID 11980 | Establish/Maintain Documentation | Preventive | |
Include the implemented risk management controls in the risk treatment plan. CC ID 11979 [Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Implementation of risk mitigation. App A Objective 3.1.c] | Establish/Maintain Documentation | Preventive | |
Include requirements for monitoring and reporting in the risk treatment plan, as necessary. CC ID 13620 | Establish/Maintain Documentation | Preventive | |
Include risk assessment results in the risk treatment plan. CC ID 11978 | Establish/Maintain Documentation | Preventive | |
Include a description of usage in the risk treatment plan. CC ID 11977 | Establish/Maintain Documentation | Preventive | |
Document all constraints applied to the risk treatment plan, as necessary. CC ID 13619 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the risk treatment plan to interested personnel and affected parties. CC ID 15694 | Communicate | Preventive | |
Approve the risk treatment plan. CC ID 13495 | Audits and Risk Management | Preventive | |
Integrate the corrective action plan based on the risk assessment findings with other risk management activities. CC ID 06457 | Establish/Maintain Documentation | Preventive | |
Document and communicate a corrective action plan based on the risk assessment findings. CC ID 00705 [Discuss corrective action and communicate findings. App A Objective 11 Discuss corrective action and communicate findings. App A Objective 11 Discuss findings with management and obtain proposed corrective action for significant deficiencies. App A Objective 11.2] | Establish/Maintain Documentation | Corrective | |
Review and approve the risk assessment findings. CC ID 06485 [Review preliminary conclusions with the examiner-in-charge regarding the following: The proposed Uniform Rating System for Information Technology management component rating and the potential impact of the conclusion on the composite or other component IT ratings. App A Objective 11.1.c] | Establish/Maintain Documentation | Preventive | |
Include risk responses in the risk management program. CC ID 13195 | Establish/Maintain Documentation | Preventive | |
Document residual risk in a residual risk report. CC ID 13664 | Establish/Maintain Documentation | Corrective | |
Review and approve material risks documented in the residual risk report, as necessary. CC ID 13672 | Business Processes | Preventive | |
Establish, implement, and maintain an artificial intelligence risk management program. CC ID 16220 | Establish/Maintain Documentation | Preventive | |
Include diversity and equal opportunity in the artificial intelligence risk management program. CC ID 16255 | Establish/Maintain Documentation | Preventive | |
Analyze the impact of artificial intelligence systems on business operations. CC ID 16356 | Business Processes | Preventive | |
Analyze the impact of artificial intelligence systems on society. CC ID 16317 | Audits and Risk Management | Detective | |
Analyze the impact of artificial intelligence systems on individuals. CC ID 16316 | Audits and Risk Management | Detective | |
Establish, implement, and maintain a cybersecurity risk management program. CC ID 16827 | Audits and Risk Management | Preventive | |
Include a commitment to continuous improvement In the cybersecurity risk management program. CC ID 16839 | Establish/Maintain Documentation | Preventive | |
Monitor the effectiveness of the cybersecurity risk management program. CC ID 16831 | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain a cybersecurity risk management policy. CC ID 16834 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the cybersecurity risk management policy to interested personnel and affected parties. CC ID 16832 | Communicate | Preventive | |
Disseminate and communicate the cybersecurity risk management program to interested personnel and affected parties. CC ID 16829 | Communicate | Preventive | |
Establish, implement, and maintain a cybersecurity risk management strategy. CC ID 11991 | Establish/Maintain Documentation | Preventive | |
Include a risk prioritization approach in the Cybersecurity Risk Management Strategy. CC ID 12276 | Establish/Maintain Documentation | Preventive | |
Include defense in depth strategies in the cybersecurity risk management strategy. CC ID 15582 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the cybersecurity risk management strategy to interested personnel and affected parties. CC ID 16825 | Communicate | Preventive | |
Evaluate the cyber insurance market. CC ID 12695 | Business Processes | Preventive | |
Evaluate the usefulness of cyber insurance to the organization. CC ID 12694 | Business Processes | Preventive | |
Acquire cyber insurance, as necessary. CC ID 12693 | Business Processes | Preventive | |
Establish, implement, and maintain a cybersecurity supply chain risk management program. CC ID 16826 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain cybersecurity supply chain risk management procedures. CC ID 16830 | Establish/Maintain Documentation | Preventive | |
Monitor the effectiveness of the cybersecurity supply chain risk management program. CC ID 16828 | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain a supply chain risk management policy. CC ID 14663 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the supply chain risk management policy. CC ID 14711 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the supply chain risk management policy. CC ID 14710 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the supply chain risk management policy. CC ID 14709 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the supply chain risk management policy. CC ID 14708 | Establish/Maintain Documentation | Preventive | |
Include the scope in the supply chain risk management policy. CC ID 14707 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the supply chain risk management policy. CC ID 14706 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the supply chain risk management policy to all interested personnel and affected parties. CC ID 14662 | Communicate | Preventive | |
Establish, implement, and maintain a supply chain risk management plan. CC ID 14713 | Establish/Maintain Documentation | Preventive | |
Include processes for monitoring and reporting in the supply chain risk management plan. CC ID 15619 | Establish/Maintain Documentation | Preventive | |
Include dates in the supply chain risk management plan. CC ID 15617 | Establish/Maintain Documentation | Preventive | |
Include implementation milestones in the supply chain risk management plan. CC ID 15615 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the supply chain risk management plan. CC ID 15613 | Establish/Maintain Documentation | Preventive | |
Include supply chain risk management procedures in the risk management program. CC ID 13190 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the supply chain risk management procedures to all interested personnel and affected parties. CC ID 14712 | Communicate | Preventive | |
Assign key stakeholders to review and approve supply chain risk management procedures. CC ID 13199 | Human Resources Management | Preventive | |
Analyze supply chain risk management procedures, as necessary. CC ID 13198 | Process or Activity | Detective | |
Disseminate and communicate the risk management policy to interested personnel and affected parties. CC ID 13792 | Communicate | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Human Resources management CC ID 00763 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain high level operational roles and responsibilities. CC ID 00806 | Establish Roles | Preventive | |
Assign the roles and responsibilities of management in establishing, implementing, and maintaining the information security program. CC ID 13112 [{information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Determine whether the board, or a committee of the board, is responsible for overseeing the development, implementation, and maintenance of the institution's information security program. App A Objective 2.2 Determine whether the board holds management accountable for the following: Central oversight and coordination. App A Objective 2.3.a Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3] | Human Resources Management | Preventive | |
Define and assign the Board of Directors roles and responsibilities and senior management roles and responsibilities, including signing off on key policies and procedures. CC ID 00807 [Determine whether the board holds management accountable for the following: App A Objective 2.3 Determine whether the board holds management accountable for the following: Assignment of responsibility. App A Objective 2.3.b] | Establish Roles | Preventive | |
Establish and maintain board committees, as necessary. CC ID 14789 | Human Resources Management | Preventive | |
Define and assign the roles and responsibilities of the chairman of the board. CC ID 14786 | Establish/Maintain Documentation | Preventive | |
Assign oversight of C-level executives to the Board of Directors. CC ID 14784 | Human Resources Management | Preventive | |
Establish, implement, and maintain candidate selection procedures to the board of directors. CC ID 14782 | Establish/Maintain Documentation | Preventive | |
Include the criteria of mixed experiences and skills in the candidate selection procedures. CC ID 14791 | Establish/Maintain Documentation | Preventive | |
Assign oversight of the financial management program to the board of directors. CC ID 14781 | Human Resources Management | Preventive | |
Assign senior management to the role of supporting Quality Management. CC ID 13692 | Human Resources Management | Preventive | |
Assign senior management to the role of authorizing official. CC ID 14238 | Establish Roles | Preventive | |
Assign members who are independent from management to the Board of Directors. CC ID 12395 | Human Resources Management | Preventive | |
Assign ownership of risks to the Board of Directors or senior management. CC ID 13662 | Human Resources Management | Preventive | |
Assign the organization's board and senior management to oversee the continuity planning process. CC ID 12991 | Human Resources Management | Preventive | |
Rotate members of the board of directors, as necessary. CC ID 14803 | Human Resources Management | Corrective | |
Define and assign the security staff roles and responsibilities. CC ID 11750 [Determine whether security officers and employees know, understand, and are accountable for fulfilling their security responsibilities. App A Objective 2.7 Determine whether management has effective threat monitoring processes, including the following: Establishing responsibility and accountability for security personnel and system administrators for monitoring. App A Objective 8.4.b Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Establish/Maintain Documentation | Preventive | |
Define and assign workforce roles and responsibilities. CC ID 13267 | Human Resources Management | Preventive | |
Assign roles and responsibilities for physical security, as necessary. CC ID 13113 [{layered security} {information security} {coordinate} Determine whether management responsibilities are appropriate and include the following: Coordination of both information and physical security. App A Objective 2.5.h] | Establish Roles | Preventive | |
Establish, implement, and maintain a personnel management program. CC ID 14018 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a personnel security program. CC ID 10628 | Establish/Maintain Documentation | Preventive | |
Employ individuals who have the appropriate staff qualifications, staff clearances, and staff competencies. CC ID 00782 [{staff qualifications} Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Personnel with knowledge of technology standards, practices, and risk methodologies. App A Objective 2.9.b Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Appropriate staff with the necessary skills to meet the institution's technical and managerial needs. App A Objective 2.9.a] | Testing | Detective | |
Perform security skills assessments for all critical employees. CC ID 12102 | Human Resources Management | Detective | |
Assign security clearance procedures to qualified personnel. CC ID 06812 | Establish Roles | Preventive | |
Assign personnel screening procedures to qualified personnel. CC ID 11699 | Establish Roles | Preventive | |
Establish, implement, and maintain personnel screening procedures. CC ID 11700 | Establish/Maintain Documentation | Preventive | |
Perform a background check during personnel screening. CC ID 11758 | Human Resources Management | Detective | |
Perform a personal identification check during personnel screening. CC ID 06721 | Human Resources Management | Preventive | |
Perform a criminal records check during personnel screening. CC ID 06643 | Establish/Maintain Documentation | Preventive | |
Include all residences in the criminal records check. CC ID 13306 | Process or Activity | Preventive | |
Document any reasons a full criminal records check could not be performed. CC ID 13305 | Establish/Maintain Documentation | Preventive | |
Perform a personal references check during personnel screening. CC ID 06645 | Human Resources Management | Preventive | |
Perform a credit check during personnel screening. CC ID 06646 | Human Resources Management | Preventive | |
Perform an academic records check during personnel screening. CC ID 06647 | Establish/Maintain Documentation | Preventive | |
Perform a drug test during personnel screening. CC ID 06648 | Testing | Preventive | |
Perform a resume check during personnel screening. CC ID 06659 | Human Resources Management | Preventive | |
Perform a curriculum vitae check during personnel screening. CC ID 06660 | Human Resources Management | Preventive | |
Allow personnel being screened to appeal findings and appeal decisions. CC ID 06720 | Human Resources Management | Preventive | |
Disseminate and communicate screening results to interested personnel and affected parties. CC ID 16445 | Communicate | Preventive | |
Perform personnel screening procedures, as necessary. CC ID 11763 | Human Resources Management | Preventive | |
Document the personnel risk assessment results. CC ID 11764 | Establish/Maintain Documentation | Detective | |
Establish, implement, and maintain security clearance procedures. CC ID 00783 [Review whether management does the following: Establishes and effectively administers appropriate security screening in IT hiring practices. App A Objective 6.8.b {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Establish/Maintain Documentation | Preventive | |
Perform periodic background checks on designated roles, as necessary. CC ID 11759 | Human Resources Management | Detective | |
Perform security clearance procedures, as necessary. CC ID 06644 | Human Resources Management | Preventive | |
Establish and maintain security clearances. CC ID 01634 | Human Resources Management | Preventive | |
Document the security clearance procedure results. CC ID 01635 | Establish/Maintain Documentation | Detective | |
Identify and watch individuals that pose a risk to the organization. CC ID 10674 [Determine whether management effectively mitigates risks posed by users. Review whether management does the following: App A Objective 6.8 {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Monitor and Evaluate Occurrences | Detective | |
Establish and maintain the staff structure in line with the strategic plan. CC ID 00764 | Establish Roles | Preventive | |
Assign and staff all roles appropriately. CC ID 00784 [Determine whether management has designated one or more individuals as an information security officer and determine appropriateness of the reporting line. App A Objective 2.6] | Testing | Detective | |
Delegate authority for specific processes, as necessary. CC ID 06780 | Behavior | Preventive | |
Implement segregation of duties in roles and responsibilities. CC ID 00774 [{establish} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate segregation of duties. App A Objective 2.5.g Review whether management does the following: Employs appropriate segregation of duties. App A Objective 6.8.d {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Testing | Detective | |
Establish, implement, and maintain segregation of duties compensating controls if segregation of duties is not practical. CC ID 06960 | Technical Security | Preventive | |
Train all personnel and third parties, as necessary. CC ID 00785 [(train} Review whether the institution has the following: Training to prepare staff for their short- and long-term security responsibilities. App A Objective 2.9.c] | Behavior | Preventive | |
Establish, implement, and maintain an education methodology. CC ID 06671 | Business Processes | Preventive | |
Support certification programs as viable training programs. CC ID 13268 | Human Resources Management | Preventive | |
Include evidence of experience in applications for professional certification. CC ID 16193 | Establish/Maintain Documentation | Preventive | |
Include supporting documentation in applications for professional certification. CC ID 16195 | Establish/Maintain Documentation | Preventive | |
Submit applications for professional certification. CC ID 16192 | Training | Preventive | |
Retrain all personnel, as necessary. CC ID 01362 | Behavior | Preventive | |
Tailor training to meet published guidance on the subject being taught. CC ID 02217 [{training} Determine whether management develops customer awareness and education efforts that address both retail (consumer) and commercial account holders. App A Objective 6.26] | Behavior | Preventive | |
Tailor training to be taught at each person's level of responsibility. CC ID 06674 | Behavior | Preventive | |
Conduct cross-training or staff backup training to minimize dependency on critical individuals. CC ID 00786 | Behavior | Preventive | |
Document all training in a training record. CC ID 01423 | Establish/Maintain Documentation | Detective | |
Use automated mechanisms in the training environment, where appropriate. CC ID 06752 | Behavior | Preventive | |
Conduct tests and evaluate training. CC ID 06672 [Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b] | Testing | Detective | |
Hire third parties to conduct training, as necessary. CC ID 13167 | Human Resources Management | Preventive | |
Review the current published guidance and awareness and training programs. CC ID 01245 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain training plans. CC ID 00828 | Establish/Maintain Documentation | Preventive | |
Train personnel to recognize conditions of diseases or sicknesses, as necessary. CC ID 14383 | Training | Detective | |
Include prevention techniques in training regarding diseases or sicknesses. CC ID 14387 | Training | Preventive | |
Include the concept of disease clusters when training to recognize conditions of diseases or sicknesses. CC ID 14386 | Training | Preventive | |
Train personnel to identify and communicate symptoms of exposure to disease or sickness. CC ID 14385 | Training | Detective | |
Develop or acquire content to update the training plans. CC ID 12867 | Training | Preventive | |
Designate training facilities in the training plan. CC ID 16200 | Training | Preventive | |
Include portions of the visitor control program in the training plan. CC ID 13287 | Establish/Maintain Documentation | Preventive | |
Include ethical culture in the training plan, as necessary. CC ID 12801 | Human Resources Management | Preventive | |
Include in scope external requirements in the training plan, as necessary. CC ID 13041 [{security awareness training} {compliance training} Review whether management does the following: Provides training to support awareness and policy compliance. App A Objective 6.8.f {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Training | Preventive | |
Include duties and responsibilities in the training plan, as necessary. CC ID 12800 | Human Resources Management | Preventive | |
Conduct bespoke roles and responsibilities training, as necessary. CC ID 13192 | Training | Preventive | |
Include risk management in the training plan, as necessary. CC ID 13040 | Training | Preventive | |
Conduct Archives and Records Management training. CC ID 00975 | Behavior | Preventive | |
Conduct personal data processing training. CC ID 13757 | Training | Preventive | |
Include in personal data processing training how to provide the contact information for the categories of personal data the organization may disclose. CC ID 13758 | Training | Preventive | |
Include the cloud service usage standard in the training plan. CC ID 13039 | Training | Preventive | |
Establish, implement, and maintain a security awareness program. CC ID 11746 [{facilitate} Determine whether management responsibilities are appropriate and include the following: Facilitation of annual information security and awareness training and ongoing security-related communications to employees. App A Objective 2.5.l {security awareness training} {compliance training} Review whether management does the following: Provides training to support awareness and policy compliance. App A Objective 6.8.f {security awareness program} Review whether management has the following: Common awareness and enforcement mechanisms between lines of business and information security. App A Objective 3.2.c Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a security awareness and training policy. CC ID 14022 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the security awareness and training policy. CC ID 14092 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the security awareness and training policy. CC ID 14091 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain security awareness and training procedures. CC ID 14054 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the security awareness and training procedures to interested personnel and affected parties. CC ID 14138 | Communicate | Preventive | |
Include management commitment in the security awareness and training policy. CC ID 14049 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the security awareness and training policy. CC ID 14048 | Establish/Maintain Documentation | Preventive | |
Include the scope in the security awareness and training policy. CC ID 14047 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the security awareness and training policy. CC ID 14045 | Establish/Maintain Documentation | Preventive | |
Include configuration management procedures in the security awareness program. CC ID 13967 | Establish/Maintain Documentation | Preventive | |
Include media protection in the security awareness program. CC ID 16368 | Training | Preventive | |
Document security awareness requirements. CC ID 12146 | Establish/Maintain Documentation | Preventive | |
Include safeguards for information systems in the security awareness program. CC ID 13046 | Establish/Maintain Documentation | Preventive | |
Include security policies and security standards in the security awareness program. CC ID 13045 | Establish/Maintain Documentation | Preventive | |
Include physical security in the security awareness program. CC ID 16369 | Training | Preventive | |
Include mobile device security guidelines in the security awareness program. CC ID 11803 | Establish/Maintain Documentation | Preventive | |
Include updates on emerging issues in the security awareness program. CC ID 13184 | Training | Preventive | |
Include cybersecurity in the security awareness program. CC ID 13183 | Training | Preventive | |
Include implications of non-compliance in the security awareness program. CC ID 16425 | Training | Preventive | |
Include the acceptable use policy in the security awareness program. CC ID 15487 | Training | Preventive | |
Include training based on the participants' level of responsibility and access level in the security awareness program. CC ID 11802 [{security requirements} {align} Review whether management ascertains assurance through the following: Alignment of personnel skills and program needs. App A Objective 10.1.b {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Establish/Maintain Documentation | Preventive | |
Include a requirement to train all new hires and interested personnel in the security awareness program. CC ID 11800 | Establish/Maintain Documentation | Preventive | |
Include remote access in the security awareness program. CC ID 13892 | Establish/Maintain Documentation | Preventive | |
Document the goals of the security awareness program. CC ID 12145 | Establish/Maintain Documentation | Preventive | |
Compare current security awareness assessment reports to the security awareness baseline. CC ID 12150 | Establish/Maintain Documentation | Preventive | |
Establish and maintain management's commitment to supporting the security awareness program. CC ID 12151 | Human Resources Management | Preventive | |
Establish and maintain a steering committee to guide the security awareness program. CC ID 12149 | Human Resources Management | Preventive | |
Document the scope of the security awareness program. CC ID 12148 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a security awareness baseline. CC ID 12147 | Establish/Maintain Documentation | Preventive | |
Encourage interested personnel to obtain security certification. CC ID 11804 | Human Resources Management | Preventive | |
Disseminate and communicate the security awareness program to all interested personnel and affected parties. CC ID 00823 [{facilitate} Determine whether management responsibilities are appropriate and include the following: Facilitation of annual information security and awareness training and ongoing security-related communications to employees. App A Objective 2.5.l] | Behavior | Preventive | |
Train all personnel and third parties on how to recognize and report security incidents. CC ID 01211 | Behavior | Preventive | |
Train all personnel and third parties on how to recognize and report system failures. CC ID 13475 | Training | Preventive | |
Require personnel to acknowledge, through writing their signature, that they have read and understand the organization's security policies. CC ID 01363 [Determine whether security officers and employees know, understand, and are accountable for fulfilling their security responsibilities. App A Objective 2.7] | Establish/Maintain Documentation | Preventive | |
Monitor and measure the effectiveness of security awareness. CC ID 06262 | Monitor and Evaluate Occurrences | Detective | |
Establish, implement, and maintain an environmental management system awareness program. CC ID 15200 | Establish/Maintain Documentation | Preventive | |
Conduct secure coding and development training for developers. CC ID 06822 | Behavior | Corrective | |
Conduct tampering prevention training. CC ID 11875 | Training | Preventive | |
Include the mandate to refrain from installing, refrain from replacing, and refrain from returning any asset absent verification in the tampering prevention training. CC ID 11877 | Training | Preventive | |
Include how to identify and authenticate third parties claiming to be maintenance personnel in the tampering prevention training. CC ID 11876 | Training | Preventive | |
Include how to report tampering and unauthorized substitution in the tampering prevention training. CC ID 11879 | Training | Preventive | |
Include how to prevent physical tampering in the tampering prevention training. CC ID 11878 | Training | Preventive | |
Include procedures on how to inspect devices in the tampering prevention training. CC ID 11990 | Training | Preventive | |
Train interested personnel and affected parties to collect digital forensic evidence. CC ID 08658 | Training | Preventive | |
Conduct crime prevention training. CC ID 06350 | Behavior | Preventive | |
Analyze and evaluate training records to improve the training program. CC ID 06380 | Monitor and Evaluate Occurrences | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Leadership and high level objectives CC ID 00597 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain a reporting methodology program. CC ID 02072 | Business Processes | Preventive | |
Establish, implement, and maintain communication protocols. CC ID 12245 | Establish/Maintain Documentation | Preventive | |
Align the information being disseminated and communicated with the communication requirements according to the organization's communication protocol. CC ID 12419 [{clear and conspicuous language} Review whether policies, standards, and procedures have the following characteristics: Are communicated in a clear and understandable manner. App A Objective 6.1.c] | Establish/Maintain Documentation | Preventive | |
Assess the effectiveness of the communication methods used in the communication protocol. CC ID 12691 | Process or Activity | Detective | |
Report to management and stakeholders on the findings and information gathered from all types of inquiries. CC ID 12797 [Discuss findings with management and obtain proposed corrective action for significant deficiencies. App A Objective 11.2] | Actionable Reports or Measurements | Preventive | |
Analyze organizational objectives, functions, and activities. CC ID 00598 | Monitor and Evaluate Occurrences | Preventive | |
Analyze the business environment in which the organization operates. CC ID 12798 | Business Processes | Preventive | |
Monitor for changes which affect organizational objectives in the internal business environment. CC ID 12862 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Monitor and Evaluate Occurrences | Preventive | |
Analyze the external environment in which the organization operates. CC ID 12799 | Business Processes | Preventive | |
Include industry forces in the analysis of the external environment. CC ID 12904 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Business Processes | Preventive | |
Include legal requirements in the analysis of the external environment. CC ID 12896 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Business Processes | Preventive | |
Establish, implement, and maintain organizational objectives. CC ID 09959 | Establish/Maintain Documentation | Preventive | |
Evaluate organizational objectives to determine impact on other organizational objectives. CC ID 12814 | Process or Activity | Preventive | |
Identify events that may affect organizational objectives. CC ID 12961 [Review whether management has the following: Visibility to assess the likelihood of threats and potential damage to the institution. App A Objective 3.2.d] | Process or Activity | Preventive | |
Document and communicate the linkage between organizational objectives, functions, activities, and general controls. CC ID 12398 [Determine whether management implements controls that appropriately align security with the nature of the institution's operations and strategic direction. Specifically, review whether management does the following: App A Objective 6.5 Determine whether management appropriately integrates the information security program across the institution's lines of business and support functions. Review whether management has the following: App A Objective 3.2] | Establish/Maintain Documentation | Preventive | |
Identify threats that could affect achieving organizational objectives. CC ID 12827 [Review whether management has the following: Visibility to assess the likelihood of threats and potential damage to the institution. App A Objective 3.2.d {threat identification process}{threat assessment process} Determine whether management has effective threat identification and assessment processes, including the following: App A Objective 8.3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Business Processes | Preventive | |
Identify how opportunities, threats, and external requirements are trending. CC ID 12829 | Process or Activity | Preventive | |
Identify relationships between opportunities, threats, and external requirements. CC ID 12805 | Process or Activity | Preventive | |
Review the organization's approach to managing information security, as necessary. CC ID 12005 [Review for indicators of an effective information security culture (e.g., method of introducing new business initiatives and manner in which the institution holds lines of business and employees accountable for promoting information security). App A Objective 2.1.c Review whether management does the following: Implements and assesses the adequacy of appropriate controls to ensure the security of connections. App A Objective 6.7.e {information security culture} Determine whether the institution has a culture that contributes to the effectiveness of the information security program. App A Objective 2.1 Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Business Processes | Preventive | |
Monitor regulatory trends to maintain compliance. CC ID 00604 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5 Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5 Review whether management has processes to do the following: Maintain awareness of new legal and regulatory requirements or changes to industry practices. App A Objective 4.5.a] | Monitor and Evaluate Occurrences | Detective | |
Monitor for new Information Security solutions. CC ID 07078 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Monitor and Evaluate Occurrences | Detective | |
Subscribe to a threat intelligence service to receive notification of emerging threats. CC ID 12135 | Technical Security | Detective | |
Disseminate and communicate emerging threats to all interested personnel and affected parties. CC ID 12185 | Communicate | Preventive | |
Disseminate and communicate updated guidance documentation to interested personnel and affected parties upon discovery of a new threat. CC ID 12191 | Communicate | Corrective | |
Establish and maintain the scope of the organizational compliance framework and Information Assurance controls. CC ID 01241 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a policy and procedure management program. CC ID 06285 | Establish/Maintain Documentation | Preventive | |
Include threats in the organization’s policies, standards, and procedures. CC ID 12953 [{risk identification} Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Identification of threats and risks. App A Objective 3.1.a] | Establish/Maintain Documentation | Preventive | |
Establish and maintain an Authority Document list. CC ID 07113 [Determine whether the institution's security operations activities include the following: Law enforcement interface (e.g., data retention and lawful intercepts). App A Objective 8.1.f] | Establish/Maintain Documentation | Preventive | |
Map in scope assets and in scope records to external requirements. CC ID 12189 | Establish/Maintain Documentation | Detective | |
Document organizational procedures that harmonize external requirements, including all legal requirements. CC ID 00623 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain full documentation of all policies, standards, and procedures that support the organization's compliance framework. CC ID 01636 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the organization’s policies, standards, and procedures to all interested personnel and affected parties. CC ID 12901 | Communicate | Preventive | |
Disseminate and communicate the list of Authority Documents that support the organization's compliance framework to interested personnel and affected parties. CC ID 01312 | Establish/Maintain Documentation | Preventive | |
Classify controls according to their preventive, detective, or corrective status. CC ID 06436 [Review whether management does the following: Uses controls of different classifications, including preventive, detective, and corrective. App A Objective 6.4.b {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security] | Establish/Maintain Documentation | Preventive | |
Publish, disseminate, and communicate a Statement on Internal Control, as necessary. CC ID 06727 | Establish/Maintain Documentation | Preventive | |
Include signatures of c-level executives in the Statement on Internal Control. CC ID 14778 | Establish/Maintain Documentation | Preventive | |
Include management's assertions on the effectiveness of internal control in the Statement on Internal Control. CC ID 14771 | Establish/Maintain Documentation | Corrective | |
Include confirmation of any significant weaknesses in the Statement on Internal Control. CC ID 06861 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the Statement on Internal Control. CC ID 14774 | Establish/Maintain Documentation | Preventive | |
Include an assurance statement regarding the counterterror protective security plan in the Statement on Internal Control. CC ID 06866 | Establish/Maintain Documentation | Preventive | |
Include limitations of internal control systems in the Statement on Internal Control. CC ID 14773 | Establish/Maintain Documentation | Preventive | |
Include a description of the methodology used to evaluate internal controls in the Statement on Internal Control. CC ID 14772 | Establish/Maintain Documentation | Preventive | |
Include the counterterror protective security plan test results in the Statement on Internal Control. CC ID 06867 | Establish/Maintain Documentation | Detective | |
Assign legislative body jurisdiction to the organization's assets, as necessary. CC ID 06956 | Establish Roles | Preventive | |
Define the Information Assurance strategic roles and responsibilities. CC ID 00608 [{delineate}{communicate} Determine whether management responsibilities are appropriate and include the following: Delineation of clear lines of responsibility and communication of accountability for information security. App A Objective 2.5.d] | Establish Roles | Preventive | |
Establish and maintain a compliance oversight committee. CC ID 00765 | Establish Roles | Detective | |
Review and document the meetings and actions of the Board of Directors or audit committee in the Board Report. CC ID 01151 [{audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8 {audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8] | Establish/Maintain Documentation | Detective | |
Include recommendations for changes or updates to the information security program in the Board Report. CC ID 13180 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Recommendations for changes or updates to the information security program. App A Objective 2.4.f] | Establish/Maintain Documentation | Preventive | |
Provide critical project reports to the compliance oversight committee in a timely manner. CC ID 01183 | Establish/Maintain Documentation | Detective | |
Assign the review of project plans for critical projects to the compliance oversight committee. CC ID 01182 | Establish Roles | Preventive | |
Assign the corporate governance of Information Technology to the compliance oversight committee. CC ID 01178 | Establish Roles | Preventive | |
Assign the review of Information Technology policies and procedures to the compliance oversight committee. CC ID 01179 [Review whether management has processes to do the following: Report changes of the information security program to the board. App A Objective 4.5.c] | Establish Roles | Preventive | |
Involve the Board of Directors or senior management in Information Governance. CC ID 00609 | Establish Roles | Preventive | |
Assign responsibility for enforcing the requirements of the Information Governance Plan to senior management. CC ID 12058 | Human Resources Management | Preventive | |
Address Information Security during the business planning processes. CC ID 06495 | Data and Information Management | Preventive | |
Document the requirements of stakeholders during the business planning process regarding Information Security. CC ID 06498 | Establish/Maintain Documentation | Preventive | |
Assign reviewing and approving Quality Management standards to the appropriate oversight committee. CC ID 07192 | Establish Roles | Preventive | |
Define and assign the Chief Executive's Information Assurance roles and responsibilities. CC ID 06089 | Establish Roles | Preventive | |
Define and assign the Chief Financial Officer's Information Assurance roles and responsibilities. CC ID 06090 | Establish Roles | Preventive | |
Define and assign the Chief of Risk's Information Assurance roles and responsibilities. CC ID 06092 | Establish Roles | Preventive | |
Establish, implement, and maintain a strategic plan. CC ID 12784 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a decision management strategy. CC ID 06913 | Establish/Maintain Documentation | Preventive | |
Include criteria for risk tolerance in the decision-making criteria. CC ID 12950 [{validate} {threat identification} Review whether management has the following: A validation though audits, self-assessments, penetration tests, and vulnerability assessments that risk decisions are informed by appropriate identification and analysis of threats and other potential causes of loss. App A Objective 4.2.e {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a Strategic Information Technology Plan. CC ID 00628 | Establish/Maintain Documentation | Preventive | |
Monitor and evaluate the implementation and effectiveness of Information Technology Plans. CC ID 00634 | Monitor and Evaluate Occurrences | Detective | |
Establish and maintain an Information Technology plan status report that covers both Strategic Information Technology Plans and tactical Information Technology plans. CC ID 06839 | Actionable Reports or Measurements | Preventive | |
Include key personnel status changes in the Information Technology Plan status reports. CC ID 06840 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Loss, addition, or change in duties of key personnel. App A Objective 1.3.d] | Actionable Reports or Measurements | Preventive | |
Establish, implement, and maintain a Governance, Risk, and Compliance awareness and training program. CC ID 06492 [Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Business Processes | Preventive | |
Establish and maintain a rapport with business and technical communities throughout the organization to promote the value and importance of Information Security. CC ID 06493 [Determine whether management promotes effective governance of the information security program through a strong information security culture, defined information security responsibilities and accountability, and adequate resources to support the program. App A Objective 2] | Behavior | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Monitoring and measurement CC ID 00636 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain Responding to Failures in Security Controls procedures. CC ID 12514 [Determine whether the institution's security operations activities include the following: Vulnerability cataloging and remediation tracking. App A Objective 8.1.d {credit loss} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Credit or operating losses primarily attributable (or thought to be attributable) to IT (e.g., system problems, fraud occurring due to poor controls, and improperly implemented changes to systems). App A Objective 1.3.g {credit loss} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Credit or operating losses primarily attributable (or thought to be attributable) to IT (e.g., system problems, fraud occurring due to poor controls, and improperly implemented changes to systems). App A Objective 1.3.g] | Establish/Maintain Documentation | Preventive | |
Include resuming security system monitoring and logging operations in the Responding to Failures in Security Controls procedure. CC ID 12521 | Establish/Maintain Documentation | Preventive | |
Include implementing mitigating controls to prevent the root cause of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12520 [Review whether management has the following: The ability to identify and implement controls over the root causes of an incident. App A Objective 3.2.e Review whether management has the following: The ability to identify and implement controls over the root causes of an incident. App A Objective 3.2.e] | Establish/Maintain Documentation | Preventive | |
Include performing a risk assessment to determine whether further actions are required because of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12519 | Establish/Maintain Documentation | Preventive | |
Include identification of the root cause of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 15481 | Establish/Maintain Documentation | Preventive | |
Include correcting security issues caused by the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12518 | Establish/Maintain Documentation | Preventive | |
Include documenting the duration of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12517 | Establish/Maintain Documentation | Preventive | |
Include restoring security functions in the Responding to Failures in Security Controls procedure. CC ID 12515 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain logging and monitoring operations. CC ID 00637 [Determine whether the institution's security operations activities include the following: Monitoring of network, host, and application activity. App A Objective 8.1.h {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f] | Log Management | Detective | |
Establish, implement, and maintain an audit and accountability policy. CC ID 14035 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the audit and accountability policy. CC ID 14103 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the audit and accountability policy. CC ID 14102 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the audit and accountability policy. CC ID 14100 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the audit and accountability policy. CC ID 14098 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the audit and accountability policy. CC ID 14097 | Establish/Maintain Documentation | Preventive | |
Include the scope in the audit and accountability policy. CC ID 14096 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the audit and accountability policy to interested personnel and affected parties. CC ID 14095 | Communicate | Preventive | |
Establish, implement, and maintain audit and accountability procedures. CC ID 14057 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the audit and accountability procedures to interested personnel and affected parties. CC ID 14137 | Communicate | Preventive | |
Enable monitoring and logging operations on all assets that meet the organizational criteria to maintain event logs. CC ID 06312 | Log Management | Preventive | |
Review and approve the use of continuous security management systems. CC ID 13181 [Determine whether management has effective threat monitoring processes, including the following: Appropriately reviewing and providing approval of the monitoring tools used. App A Objective 8.4.c Determine whether management has effective threat monitoring processes, including the following: Appropriately reviewing and providing approval of the monitoring tools used. App A Objective 8.4.c] | Process or Activity | Preventive | |
Protect continuous security management systems from unauthorized use. CC ID 13097 | Configuration | Preventive | |
Monitor and evaluate system telemetry data. CC ID 14929 | Actionable Reports or Measurements | Detective | |
Establish, implement, and maintain an intrusion detection and prevention program. CC ID 15211 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain intrusion management operations. CC ID 00580 | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain an intrusion detection and prevention policy. CC ID 15169 | Establish/Maintain Documentation | Preventive | |
Install and maintain an Intrusion Detection System and/or Intrusion Prevention System. CC ID 00581 | Configuration | Preventive | |
Protect each person's right to privacy and civil liberties during intrusion management operations. CC ID 10035 | Behavior | Preventive | |
Do not intercept communications of any kind when providing a service to clients. CC ID 09985 | Behavior | Preventive | |
Determine if honeypots should be installed, and if so, where the honeypots should be placed. CC ID 00582 | Technical Security | Detective | |
Monitor systems for inappropriate usage and other security violations. CC ID 00585 [{cyber threat indicator} Determine whether management has effective threat monitoring processes, including the following: Monitoring of indicators, including vulnerabilities, attacks, compromised systems, and suspicious users. App A Objective 8.4.d {incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Monitor and Evaluate Occurrences | Detective | |
Monitor systems for blended attacks and multiple component incidents. CC ID 01225 | Monitor and Evaluate Occurrences | Detective | |
Monitor systems for Denial of Service attacks. CC ID 01222 | Monitor and Evaluate Occurrences | Detective | |
Monitor systems for unauthorized data transfers. CC ID 12971 [Determine whether management has effective threat monitoring processes, including the following: Monitoring both incoming and outgoing network traffic to identify malicious activity and data exfiltration. App A Objective 8.4.e] | Monitor and Evaluate Occurrences | Preventive | |
Address operational anomalies within the incident management system. CC ID 11633 | Audits and Risk Management | Preventive | |
Monitor systems for access to restricted data or restricted information. CC ID 04721 | Monitor and Evaluate Occurrences | Detective | |
Assign roles and responsibilities for overseeing access to restricted data or restricted information. CC ID 11950 | Human Resources Management | Detective | |
Detect unauthorized access to systems. CC ID 06798 | Monitor and Evaluate Occurrences | Detective | |
Incorporate potential red flags into the organization's incident management system. CC ID 04652 | Monitor and Evaluate Occurrences | Detective | |
Incorporate an Identity Theft Prevention Program into the organization's incident management system. CC ID 11634 | Audits and Risk Management | Preventive | |
Alert interested personnel when suspicious activity is detected by an Intrusion Detection System or Intrusion Prevention System. CC ID 06430 | Monitor and Evaluate Occurrences | Detective | |
Alert interested personnel and affected parties when an incident causes an outage. CC ID 06808 | Monitor and Evaluate Occurrences | Detective | |
Monitor systems for unauthorized mobile code. CC ID 10034 | Monitor and Evaluate Occurrences | Preventive | |
Update the intrusion detection capabilities and the incident response capabilities regularly. CC ID 04653 | Technical Security | Preventive | |
Implement honeyclients to proactively seek for malicious websites and malicious code. CC ID 10658 | Technical Security | Preventive | |
Implement detonation chambers, where appropriate. CC ID 10670 | Technical Security | Preventive | |
Define and assign log management roles and responsibilities. CC ID 06311 | Establish Roles | Preventive | |
Document and communicate the log locations to the owning entity. CC ID 12047 | Log Management | Preventive | |
Make logs available for review by the owning entity. CC ID 12046 | Log Management | Preventive | |
Operationalize key monitoring and logging concepts to ensure the audit trails capture sufficient information. CC ID 00638 | Log Management | Detective | |
Establish, implement, and maintain an event logging policy. CC ID 15217 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain event logging procedures. CC ID 01335 | Log Management | Detective | |
Include the system components that generate audit records in the event logging procedures. CC ID 16426 | Data and Information Management | Preventive | |
Include a standard to collect and interpret event logs in the event logging procedures. CC ID 00643 | Log Management | Preventive | |
Protect the event logs from failure. CC ID 06290 | Log Management | Preventive | |
Overwrite the oldest records when audit logging fails. CC ID 14308 | Data and Information Management | Preventive | |
Supply each in scope asset with audit reduction tool and report generation capabilities to support after-the-fact investigations without altering the event logs. CC ID 01427 | Testing | Preventive | |
Provide predefined suspicious activity reports for suspicious activity discovered in the event log. CC ID 06774 | Establish/Maintain Documentation | Corrective | |
Include identity information of suspects in the suspicious activity report. CC ID 16648 | Establish/Maintain Documentation | Preventive | |
Compile the event logs of multiple components into a system-wide time-correlated audit trail. CC ID 01424 [Review whether management has the following: Processes to effectively collect, aggregate, analyze, and correlate security event information from discrete systems and applications. App A Objective 6.35.d] | Audits and Risk Management | Preventive | |
Review and update event logs and audit logs, as necessary. CC ID 00596 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Filters and reviews logs for potential security events and provides adequate reports and alerts. App A Objective 6.21.f Review whether management has the following: Processes to effectively collect, aggregate, analyze, and correlate security event information from discrete systems and applications. App A Objective 6.35.d Review whether management has the following: Independent review of logging practices. App A Objective 6.35.c] | Log Management | Detective | |
Eliminate false positives in event logs and audit logs. CC ID 07047 | Log Management | Corrective | |
Correlate log entries to security controls to verify the security control's effectiveness. CC ID 13207 | Log Management | Detective | |
Identify cybersecurity events in event logs and audit logs. CC ID 13206 | Technical Security | Detective | |
Follow up exceptions and anomalies identified when reviewing logs. CC ID 11925 | Investigate | Corrective | |
Reproduce the event log if a log failure is captured. CC ID 01426 | Log Management | Preventive | |
Document the event information to be logged in the event information log specification. CC ID 00639 | Configuration | Preventive | |
Enable logging for all systems that meet a traceability criteria. CC ID 00640 | Log Management | Detective | |
Enable the logging capability to capture enough information to ensure the system is functioning according to its intended purpose throughout its life cycle. CC ID 15001 | Configuration | Preventive | |
Enable and configure logging on all network access controls. CC ID 01963 | Configuration | Preventive | |
Analyze firewall logs for the correct capturing of data. CC ID 00549 | Log Management | Detective | |
Synchronize system clocks to an accurate and universal time source on all devices. CC ID 01340 | Configuration | Preventive | |
Centralize network time servers to as few as practical. CC ID 06308 | Configuration | Preventive | |
Disseminate and communicate information to customers about clock synchronization methods used by the organization. CC ID 13044 | Communicate | Preventive | |
Define the frequency to capture and log events. CC ID 06313 | Log Management | Preventive | |
Include logging frequencies in the event logging procedures. CC ID 00642 | Log Management | Preventive | |
Review and update the list of auditable events in the event logging procedures. CC ID 10097 | Establish/Maintain Documentation | Preventive | |
Monitor and evaluate system performance. CC ID 00651 | Monitor and Evaluate Occurrences | Detective | |
Disseminate and communicate monitoring capabilities with interested personnel and affected parties. CC ID 13156 | Communicate | Preventive | |
Disseminate and communicate statistics on resource usage with interested personnel and affected parties. CC ID 13155 | Communicate | Preventive | |
Monitor for and react to when suspicious activities are detected. CC ID 00586 | Monitor and Evaluate Occurrences | Detective | |
Erase payment applications when suspicious activity is confirmed. CC ID 12193 | Technical Security | Corrective | |
Report a data loss event when non-truncated payment card numbers are outputted. CC ID 04741 | Establish/Maintain Documentation | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has control of electronic information. CC ID 04727 | Monitor and Evaluate Occurrences | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has control of printed records. CC ID 04728 | Monitor and Evaluate Occurrences | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has accessed information in either paper or electronic form. CC ID 04740 | Monitor and Evaluate Occurrences | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the information has been or will likely be used in an unauthorized manner. CC ID 04729 | Monitor and Evaluate Occurrences | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the information has been or will likely be used in an unauthorized manner that could cause substantial economic impact. CC ID 04742 | Monitor and Evaluate Occurrences | Corrective | |
Establish, implement, and maintain network monitoring operations. CC ID 16444 | Monitor and Evaluate Occurrences | Preventive | |
Monitor and evaluate the effectiveness of detection tools. CC ID 13505 | Investigate | Detective | |
Monitor and review retail payment activities, as necessary. CC ID 13541 | Monitor and Evaluate Occurrences | Detective | |
Determine if high rates of retail payment activities are from Originating Depository Financial Institutions. CC ID 13546 | Investigate | Detective | |
Review retail payment service reports, as necessary. CC ID 13545 | Investigate | Detective | |
Assess customer satisfaction. CC ID 00652 | Testing | Detective | |
Establish, implement, and maintain a continuous monitoring program for configuration management. CC ID 06757 | Establish/Maintain Documentation | Detective | |
Include the correlation and analysis of information obtained during testing in the continuous monitoring program. CC ID 14250 | Process or Activity | Detective | |
Establish, implement, and maintain an automated configuration monitoring system. CC ID 07058 | Monitor and Evaluate Occurrences | Detective | |
Monitor for and report when a software configuration is updated. CC ID 06746 | Monitor and Evaluate Occurrences | Detective | |
Notify the appropriate personnel when the software configuration is updated absent authorization. CC ID 04886 | Monitor and Evaluate Occurrences | Detective | |
Monitor for firmware updates absent authorization. CC ID 10675 | Monitor and Evaluate Occurrences | Detective | |
Implement file integrity monitoring. CC ID 01205 | Monitor and Evaluate Occurrences | Detective | |
Identify unauthorized modifications during file integrity monitoring. CC ID 12096 | Technical Security | Detective | |
Monitor for software configurations updates absent authorization. CC ID 10676 | Monitor and Evaluate Occurrences | Preventive | |
Allow expected changes during file integrity monitoring. CC ID 12090 | Technical Security | Preventive | |
Monitor for when documents are being updated absent authorization. CC ID 10677 | Monitor and Evaluate Occurrences | Preventive | |
Include a change history and identify who made the changes in the file integrity monitoring report. CC ID 12091 | Establish/Maintain Documentation | Preventive | |
Alert interested personnel and affected parties when an unauthorized modification to critical files is detected. CC ID 12045 | Process or Activity | Preventive | |
Monitor and evaluate user account activity. CC ID 07066 [Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Monitor and Evaluate Occurrences | Detective | |
Develop and maintain a usage profile for each user account. CC ID 07067 | Technical Security | Preventive | |
Log account usage to determine dormant accounts. CC ID 12118 | Log Management | Detective | |
Log account usage times. CC ID 07099 | Log Management | Detective | |
Generate daily reports of user logons during hours outside of their usage profile. CC ID 07068 | Monitor and Evaluate Occurrences | Detective | |
Generate daily reports of users who have grossly exceeded their usage profile logon duration. CC ID 07069 | Monitor and Evaluate Occurrences | Detective | |
Log account usage durations. CC ID 12117 | Monitor and Evaluate Occurrences | Detective | |
Notify the appropriate personnel after identifying dormant accounts. CC ID 12125 | Communicate | Detective | |
Log Internet Protocol addresses used during logon. CC ID 07100 | Log Management | Detective | |
Report red flags when logon credentials are used on a computer different from the one in the usage profile. CC ID 07070 | Monitor and Evaluate Occurrences | Detective | |
Report inappropriate usage of user accounts to the appropriate personnel. CC ID 14243 | Communicate | Detective | |
Establish, implement, and maintain a risk monitoring program. CC ID 00658 [Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Monitoring and reporting of risks. App A Objective 3.1.d {risk monitoring process}{risk reporting process} Determine whether management has effective risk monitoring and reporting processes. App A Objective 7 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g Determine whether program monitoring and reporting instigate appropriate changes that are effective in maintaining an acceptable level of risk. App A Objective 7.3 Determine whether management has effective threat monitoring processes, including the following: App A Objective 8.4 {risk monitoring process}{risk reporting process}{be operational and effective} Determine whether the risk monitoring and reporting process is regular and prompts action, when necessary, in a timely manner. App A Objective 7.2 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Establish/Maintain Documentation | Preventive | |
Monitor the organization's exposure to threats, as necessary. CC ID 06494 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Monitor and Evaluate Occurrences | Preventive | |
Monitor and evaluate environmental threats. CC ID 13481 | Monitor and Evaluate Occurrences | Detective | |
Implement a fraud detection system. CC ID 13081 | Business Processes | Preventive | |
Update or adjust fraud detection systems, as necessary. CC ID 13684 | Process or Activity | Corrective | |
Monitor for new vulnerabilities. CC ID 06843 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain a compliance testing strategy. CC ID 00659 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a self-assessment approach as part of the compliance testing strategy. CC ID 12833 [Periodic self-assessments performed by the organizational unit being assessed. App A Objective 10.3.a] | Testing | Preventive | |
Test compliance controls for proper functionality. CC ID 00660 | Testing | Detective | |
Establish, implement, and maintain a system security plan. CC ID 01922 | Testing | Preventive | |
Include a system description in the system security plan. CC ID 16467 | Establish/Maintain Documentation | Preventive | |
Include a description of the operational context in the system security plan. CC ID 14301 | Establish/Maintain Documentation | Preventive | |
Include the results of the security categorization in the system security plan. CC ID 14281 | Establish/Maintain Documentation | Preventive | |
Include the information types in the system security plan. CC ID 14696 | Establish/Maintain Documentation | Preventive | |
Include the security requirements in the system security plan. CC ID 14274 | Establish/Maintain Documentation | Preventive | |
Include threats in the system security plan. CC ID 14693 | Establish/Maintain Documentation | Preventive | |
Include network diagrams in the system security plan. CC ID 14273 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the system security plan. CC ID 14682 | Establish/Maintain Documentation | Preventive | |
Include the results of the privacy risk assessment in the system security plan. CC ID 14676 | Establish/Maintain Documentation | Preventive | |
Include remote access methods in the system security plan. CC ID 16441 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the system security plan to interested personnel and affected parties. CC ID 14275 | Communicate | Preventive | |
Include a description of the operational environment in the system security plan. CC ID 14272 | Establish/Maintain Documentation | Preventive | |
Include the security categorizations and rationale in the system security plan. CC ID 14270 | Establish/Maintain Documentation | Preventive | |
Include the authorization boundary in the system security plan. CC ID 14257 | Establish/Maintain Documentation | Preventive | |
Align the enterprise architecture with the system security plan. CC ID 14255 | Process or Activity | Preventive | |
Include security controls in the system security plan. CC ID 14239 | Establish/Maintain Documentation | Preventive | |
Create specific test plans to test each system component. CC ID 00661 | Establish/Maintain Documentation | Preventive | |
Include the roles and responsibilities in the test plan. CC ID 14299 | Establish/Maintain Documentation | Preventive | |
Include the assessment team in the test plan. CC ID 14297 | Establish/Maintain Documentation | Preventive | |
Include the scope in the test plans. CC ID 14293 | Establish/Maintain Documentation | Preventive | |
Include the assessment environment in the test plan. CC ID 14271 | Establish/Maintain Documentation | Preventive | |
Approve the system security plan. CC ID 14241 | Business Processes | Preventive | |
Adhere to the system security plan. CC ID 11640 | Testing | Detective | |
Review the test plans for each system component. CC ID 00662 | Establish/Maintain Documentation | Preventive | |
Validate all testing assumptions in the test plans. CC ID 00663 | Testing | Detective | |
Document validated testing processes in the testing procedures. CC ID 06200 | Establish/Maintain Documentation | Preventive | |
Require testing procedures to be complete. CC ID 00664 | Testing | Detective | |
Include error details, identifying the root causes, and mitigation actions in the testing procedures. CC ID 11827 | Establish/Maintain Documentation | Preventive | |
Determine the appropriate assessment method for each testing process in the test plan. CC ID 00665 | Testing | Preventive | |
Implement automated audit tools. CC ID 04882 | Acquisition/Sale of Assets or Services | Preventive | |
Assign senior management to approve test plans. CC ID 13071 | Human Resources Management | Preventive | |
Analyze system audit reports and determine the need to perform more tests. CC ID 00666 | Testing | Detective | |
Monitor devices continuously for conformance with production specifications. CC ID 06201 [Review whether management implements the following as appropriate: Hardware is reviewed for anomalies. App A Objective 6.19.c] | Monitor and Evaluate Occurrences | Detective | |
Establish, implement, and maintain a testing program. CC ID 00654 [Determine whether management considers the following key testing factors when developing and implementing independent tests: App A Objective 10.2 {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Behavior | Preventive | |
Establish, implement, and maintain a security assessment and authorization policy. CC ID 14031 | Establish/Maintain Documentation | Preventive | |
Conduct Red Team exercises, as necessary. CC ID 12131 | Technical Security | Detective | |
Establish and maintain a scoring method for Red Team exercise results. CC ID 12136 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the security assessment and authorization policy. CC ID 14222 | Establish/Maintain Documentation | Preventive | |
Include the scope in the security assessment and authorization policy. CC ID 14220 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the security assessment and authorization policy. CC ID 14219 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the security assessment and authorization policy to interested personnel and affected parties. CC ID 14218 | Communicate | Preventive | |
Include management commitment in the security assessment and authorization policy. CC ID 14189 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the security assessment and authorization policy. CC ID 14183 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the security assessment and authorization policy. CC ID 14179 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain security assessment and authorization procedures. CC ID 14056 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate security assessment and authorization procedures to interested personnel and affected parties. CC ID 14224 | Communicate | Preventive | |
Test security systems and associated security procedures, as necessary. CC ID 11901 | Technical Security | Detective | |
Employ third parties to carry out testing programs, as necessary. CC ID 13178 [{third party} Determine whether management uses independent organizations to test aspects of its information security programs. App A Objective 10.4] | Human Resources Management | Preventive | |
Document improvement actions based on test results and exercises. CC ID 16840 | Establish/Maintain Documentation | Preventive | |
Define the test requirements for each testing program. CC ID 13177 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Proxy testing. App A Objective 10.2.g Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality, integrity, and availability of the institution's information. App A Objective 10.2.d] | Establish/Maintain Documentation | Preventive | |
Test in scope systems for segregation of duties, as necessary. CC ID 13906 | Testing | Detective | |
Include test requirements for the use of human subjects in the testing program. CC ID 16222 | Testing | Preventive | |
Test the in scope system in accordance with its intended purpose. CC ID 14961 | Testing | Preventive | |
Perform network testing in accordance with organizational standards. CC ID 16448 | Testing | Preventive | |
Test user accounts in accordance with organizational standards. CC ID 16421 | Testing | Preventive | |
Identify risk management measures when testing in scope systems. CC ID 14960 | Process or Activity | Detective | |
Scan organizational networks for rogue devices. CC ID 00536 | Testing | Detective | |
Include mechanisms for emergency stops in the testing program. CC ID 14398 | Establish/Maintain Documentation | Preventive | |
Scan the network for wireless access points. CC ID 00370 | Testing | Detective | |
Document the business need justification for authorized wireless access points. CC ID 12044 | Establish/Maintain Documentation | Preventive | |
Scan wireless networks for rogue devices. CC ID 11623 | Technical Security | Detective | |
Test the wireless device scanner's ability to detect rogue devices. CC ID 06859 | Testing | Detective | |
Implement incident response procedures when rogue devices are discovered. CC ID 11880 | Technical Security | Corrective | |
Alert appropriate personnel when rogue devices are discovered on the network. CC ID 06428 | Monitor and Evaluate Occurrences | Corrective | |
Deny network access to rogue devices until network access approval has been received. CC ID 11852 | Configuration | Preventive | |
Isolate rogue devices after a rogue device has been detected. CC ID 07061 | Configuration | Corrective | |
Establish, implement, and maintain conformity assessment procedures. CC ID 15032 | Establish/Maintain Documentation | Preventive | |
Share conformity assessment results with affected parties and interested personnel. CC ID 15113 | Communicate | Preventive | |
Notify affected parties and interested personnel of technical documentation assessment certificates that have been issued. CC ID 15112 | Communicate | Preventive | |
Notify affected parties and interested personnel of technical documentation assessment certificates that have been refused, withdrawn, suspended or restricted. CC ID 15111 | Communicate | Preventive | |
Create technical documentation assessment certificates in an official language. CC ID 15110 | Establish/Maintain Documentation | Preventive | |
Opt out of third party conformity assessments when the system meets harmonized standards. CC ID 15096 | Testing | Preventive | |
Perform conformity assessments, as necessary. CC ID 15095 | Testing | Detective | |
Define the test frequency for each testing program. CC ID 13176 [{test frequency} Determine whether management considers the following key testing factors when developing and implementing independent tests: Frequency. App A Objective 10.2.f] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a port scan baseline for all in scope systems. CC ID 12134 | Technical Security | Detective | |
Compare port scan reports for in scope systems against their port scan baseline. CC ID 12162 | Establish/Maintain Documentation | Detective | |
Establish, implement, and maintain a stress test program for identification cards or badges. CC ID 15424 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a penetration test program. CC ID 01105 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a Verify whether management ensures the following are done: Penetration tests that subject a system to real-world attacks and identify weaknesses. App A Objective 10.3.b Verify whether management ensures the following are done: Penetration tests that subject a system to real-world attacks and identify weaknesses. App A Objective 10.3.b] | Behavior | Preventive | |
Disseminate and communicate the testing program to all interested personnel and affected parties. CC ID 11871 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Personnel. App A Objective 10.2.b] | Communicate | Preventive | |
Align the penetration test program with industry standards. CC ID 12469 | Establish/Maintain Documentation | Preventive | |
Assign penetration testing to a qualified internal resource or external third party. CC ID 06429 | Establish Roles | Preventive | |
Establish, implement, and maintain a penetration testing methodology that validates scope-reduction controls through network segmentation. CC ID 11958 | Testing | Preventive | |
Retain penetration test results according to internal policy. CC ID 10049 | Records Management | Preventive | |
Retain penetration test remediation action records according to internal policy. CC ID 11629 | Records Management | Preventive | |
Use dedicated user accounts when conducting penetration testing. CC ID 13728 | Testing | Detective | |
Remove dedicated user accounts after penetration testing is concluded. CC ID 13729 | Testing | Corrective | |
Perform penetration tests, as necessary. CC ID 00655 | Testing | Detective | |
Perform internal penetration tests, as necessary. CC ID 12471 | Technical Security | Detective | |
Perform external penetration tests, as necessary. CC ID 12470 | Technical Security | Detective | |
Include coverage of all in scope systems during penetration testing. CC ID 11957 | Testing | Detective | |
Test the system for broken access controls. CC ID 01319 | Testing | Detective | |
Test the system for broken authentication and session management. CC ID 01320 | Testing | Detective | |
Test the system for insecure communications. CC ID 00535 | Testing | Detective | |
Test the system for cross-site scripting attacks. CC ID 01321 | Testing | Detective | |
Test the system for buffer overflows. CC ID 01322 | Testing | Detective | |
Test the system for injection flaws. CC ID 01323 | Testing | Detective | |
Ensure protocols are free from injection flaws. CC ID 16401 | Process or Activity | Preventive | |
Test the system for Denial of Service. CC ID 01326 | Testing | Detective | |
Test the system for insecure configuration management. CC ID 01327 | Testing | Detective | |
Perform network-layer penetration testing on all systems, as necessary. CC ID 01277 | Testing | Detective | |
Test the system for cross-site request forgery. CC ID 06296 | Testing | Detective | |
Perform application-layer penetration testing on all systems, as necessary. CC ID 11630 | Technical Security | Detective | |
Perform penetration testing on segmentation controls, as necessary. CC ID 12498 | Technical Security | Detective | |
Verify segmentation controls are operational and effective. CC ID 12545 | Audits and Risk Management | Detective | |
Repeat penetration testing, as necessary. CC ID 06860 | Testing | Detective | |
Test the system for covert channels. CC ID 10652 | Testing | Detective | |
Estimate the maximum bandwidth of any covert channels. CC ID 10653 | Technical Security | Detective | |
Reduce the maximum bandwidth of covert channels. CC ID 10655 | Technical Security | Corrective | |
Test systems to determine which covert channels might be exploited. CC ID 10654 | Testing | Detective | |
Establish, implement, and maintain a business line testing strategy. CC ID 13245 | Establish/Maintain Documentation | Preventive | |
Include facilities in the business line testing strategy. CC ID 13253 | Establish/Maintain Documentation | Preventive | |
Include electrical systems in the business line testing strategy. CC ID 13251 | Establish/Maintain Documentation | Preventive | |
Include mechanical systems in the business line testing strategy. CC ID 13250 | Establish/Maintain Documentation | Preventive | |
Include Heating Ventilation and Air Conditioning systems in the business line testing strategy. CC ID 13248 | Establish/Maintain Documentation | Preventive | |
Include emergency power supplies in the business line testing strategy. CC ID 13247 | Establish/Maintain Documentation | Preventive | |
Include environmental controls in the business line testing strategy. CC ID 13246 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a vulnerability management program. CC ID 15721 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a vulnerability assessment program. CC ID 11636 [{establish} Determine whether management has continuous, established routines to identify and assess vulnerabilities. Determine whether management has processes to receive vulnerability information disclosed by external individuals or groups, such as security or vulnerability researchers. App A Objective 4.4] | Establish/Maintain Documentation | Preventive | |
Perform vulnerability scans, as necessary. CC ID 11637 [Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3] | Technical Security | Detective | |
Repeat vulnerability scanning, as necessary. CC ID 11646 [With respect to developed software, determine whether institution management does the following: Obtains attestation or evidence from third-party developers that the applications acquired by the institution meet the necessary security requirements and that noted vulnerabilities or flaws are remediated in a timely manner. App A Objective 6.28.b] | Testing | Detective | |
Identify and document security vulnerabilities. CC ID 11857 [Determine whether the institution's security operations activities include the following: Vulnerability cataloging and remediation tracking. App A Objective 8.1.d] | Technical Security | Detective | |
Rank discovered vulnerabilities. CC ID 11940 | Investigate | Detective | |
Use dedicated user accounts when conducting vulnerability scans. CC ID 12098 | Technical Security | Preventive | |
Assign vulnerability scanning to qualified personnel or external third parties. CC ID 11638 | Technical Security | Detective | |
Record the vulnerability scanning activity in the vulnerability scan report. CC ID 12097 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the vulnerability scan results to interested personnel and affected parties. CC ID 16418 | Communicate | Preventive | |
Maintain vulnerability scan reports as organizational records. CC ID 12092 | Records Management | Preventive | |
Correlate vulnerability scan reports from the various systems. CC ID 10636 | Technical Security | Detective | |
Perform internal vulnerability scans, as necessary. CC ID 00656 | Testing | Detective | |
Perform vulnerability scans prior to installing payment applications. CC ID 12192 | Technical Security | Detective | |
Implement scanning tools, as necessary. CC ID 14282 | Technical Security | Detective | |
Update the vulnerability scanners' vulnerability list. CC ID 10634 | Configuration | Corrective | |
Repeat vulnerability scanning after an approved change occurs. CC ID 12468 | Technical Security | Detective | |
Perform external vulnerability scans, as necessary. CC ID 11624 [{establish} Determine whether management has continuous, established routines to identify and assess vulnerabilities. Determine whether management has processes to receive vulnerability information disclosed by external individuals or groups, such as security or vulnerability researchers. App A Objective 4.4 {threat and vulnerability management process} Determine whether management has effective threat identification and assessment processes, including the following: Developing appropriate processes to evaluate and respond to vulnerability information from external groups or individuals. App A Objective 8.3.f] | Technical Security | Detective | |
Employ an approved third party to perform external vulnerability scans on the organization's systems. CC ID 12467 | Business Processes | Preventive | |
Meet the requirements for a passing score during an external vulnerability scan or rescan. CC ID 12039 | Testing | Preventive | |
Use automated mechanisms to compare new vulnerability scan reports with past vulnerability scan reports. CC ID 10635 | Technical Security | Detective | |
Notify the interested personnel and affected parties after the failure of an automated security test. CC ID 06748 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Notifications. App A Objective 10.2.c] | Behavior | Corrective | |
Perform vulnerability assessments, as necessary. CC ID 11828 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a] | Technical Security | Corrective | |
Review applications for security vulnerabilities after the application is updated. CC ID 11938 | Technical Security | Detective | |
Test the system for unvalidated input. CC ID 01318 | Testing | Detective | |
Test the system for proper error handling. CC ID 01324 | Testing | Detective | |
Test the system for insecure data storage. CC ID 01325 | Testing | Detective | |
Test the system for access control enforcement in all Uniform Resource Locators. CC ID 06297 | Testing | Detective | |
Approve the vulnerability management program. CC ID 15722 | Process or Activity | Preventive | |
Assign ownership of the vulnerability management program to the appropriate role. CC ID 15723 | Establish Roles | Preventive | |
Perform penetration tests and vulnerability scans in concert, as necessary. CC ID 12111 | Technical Security | Preventive | |
Test the system for insecure cryptographic storage. CC ID 11635 | Technical Security | Detective | |
Perform self-tests on cryptographic modules within the system. CC ID 06537 | Testing | Detective | |
Perform power-up tests on cryptographic modules within the system. CC ID 06538 | Testing | Detective | |
Perform conditional tests on cryptographic modules within the system. CC ID 06539 | Testing | Detective | |
Test in scope systems for compliance with the Configuration Baseline Documentation Record. CC ID 12130 | Configuration | Detective | |
Recommend mitigation techniques based on vulnerability scan reports. CC ID 11639 | Technical Security | Corrective | |
Disallow the use of payment applications when a vulnerability scan report indicates vulnerabilities are present. CC ID 12188 | Configuration | Corrective | |
Recommend mitigation techniques based on penetration test results. CC ID 04881 | Establish/Maintain Documentation | Corrective | |
Correct or mitigate vulnerabilities. CC ID 12497 | Technical Security | Corrective | |
Establish, implement, and maintain an exception management process for vulnerabilities that cannot be remediated. CC ID 13859 | Technical Security | Corrective | |
Establish, implement, and maintain a compliance monitoring policy. CC ID 00671 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a metrics policy. CC ID 01654 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an approach for compliance monitoring. CC ID 01653 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain risk management metrics. CC ID 01656 [{risk metric} Review whether management does the following: Uses metrics to quantify and report risks in the information security program. App A Objective 7.4.e {risk management metrics} Review whether management does the following: Uses metrics that are timely, comprehensive, and actionable to improve the program's effectiveness and efficiency. App A Objective 7.4.a Determine whether management develops and effectively uses metrics as part of the risk monitoring and reporting processes for the information security program. Review whether management does the following: App A Objective 7.4] | Establish/Maintain Documentation | Preventive | |
Report on the percentage of critical assets for which an assurance strategy is implemented. CC ID 01657 | Actionable Reports or Measurements | Detective | |
Report on the percentage of key organizational functions for which an assurance strategy is implemented. CC ID 01658 | Actionable Reports or Measurements | Detective | |
Report on the percentage of key compliance requirements for which an assurance strategy has been implemented. CC ID 01659 | Actionable Reports or Measurements | Detective | |
Report on the percentage of the Information System budget allocated to Information Security. CC ID 04571 | Actionable Reports or Measurements | Detective | |
Monitor personnel and third parties for compliance to the organizational compliance framework. CC ID 04726 [{regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d {regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d] | Monitor and Evaluate Occurrences | Detective | |
Identify and document instances of non-compliance with the compliance framework. CC ID 06499 | Establish/Maintain Documentation | Preventive | |
Align enforcement reviews for non-compliance with organizational risk tolerance. CC ID 13063 | Business Processes | Detective | |
Determine the causes of compliance violations. CC ID 12401 | Investigate | Corrective | |
Identify and document events surrounding non-compliance with the organizational compliance framework. CC ID 12935 | Establish/Maintain Documentation | Preventive | |
Determine if multiple compliance violations of the same type could occur. CC ID 12402 | Investigate | Detective | |
Correct compliance violations. CC ID 13515 | Process or Activity | Corrective | |
Review the effectiveness of disciplinary actions carried out for compliance violations. CC ID 12403 | Investigate | Detective | |
Carry out disciplinary actions when a compliance violation is detected. CC ID 06675 | Behavior | Corrective | |
Align disciplinary actions with the level of compliance violation. CC ID 12404 | Human Resources Management | Preventive | |
Establish, implement, and maintain disciplinary action notices. CC ID 16577 | Establish/Maintain Documentation | Preventive | |
Include a copy of the order in the disciplinary action notice. CC ID 16606 | Establish/Maintain Documentation | Preventive | |
Include the sanctions imposed in the disciplinary action notice. CC ID 16599 | Establish/Maintain Documentation | Preventive | |
Include the effective date of the sanctions in the disciplinary action notice. CC ID 16589 | Establish/Maintain Documentation | Preventive | |
Include the requirements that were violated in the disciplinary action notice. CC ID 16588 | Establish/Maintain Documentation | Preventive | |
Include responses to charges from interested personnel and affected parties in the disciplinary action notice. CC ID 16587 | Establish/Maintain Documentation | Preventive | |
Include the reasons for imposing sanctions in the disciplinary action notice. CC ID 16586 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the disciplinary action notice to interested personnel and affected parties. CC ID 16585 | Communicate | Preventive | |
Include required information in the disciplinary action notice. CC ID 16584 | Establish/Maintain Documentation | Preventive | |
Include a justification for actions taken in the disciplinary action notice. CC ID 16583 | Establish/Maintain Documentation | Preventive | |
Include a statement on the conclusions of the investigation in the disciplinary action notice. CC ID 16582 | Establish/Maintain Documentation | Preventive | |
Include the investigation results in the disciplinary action notice. CC ID 16581 | Establish/Maintain Documentation | Preventive | |
Include a description of the causes of the actions taken in the disciplinary action notice. CC ID 16580 | Establish/Maintain Documentation | Preventive | |
Include the name of the person responsible for the charges in the disciplinary action notice. CC ID 16579 | Establish/Maintain Documentation | Preventive | |
Include contact information in the disciplinary action notice. CC ID 16578 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain compliance program metrics. CC ID 11625 [{risk metric} Review whether management does the following: Establishes metrics to measure conformance to the standards and procedures that are used to implement policies. App A Objective 7.4.d] | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain a security program metrics program. CC ID 01660 [{risk metric} Review whether management does the following: Develops metrics that demonstrate the extent to which the information security program is implemented and whether the program is effective. App A Objective 7.4.b] | Establish/Maintain Documentation | Preventive | |
Report on the policies and controls that have been implemented by management. CC ID 01670 [Determine whether management implements an integrated control system characterized by the use of different control types that mitigates identified risks. Review whether management does the following: App A Objective 6.4] | Actionable Reports or Measurements | Detective | |
Establish, implement, and maintain an Information Security metrics program. CC ID 01665 [Determine whether the annual information security report is timely and contains adequate information. App A Objective 10.6 Determine whether the annual information security report is timely and contains adequate information. App A Objective 10.6 Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Establish/Maintain Documentation | Preventive | |
Monitor the supply chain for Information Assurance effectiveness. CC ID 02043 [{outsourced process} If the institution outsources activities to a third-party service provider, determine whether management integrates those activities with the information security program. Verify that the third-party management program evidences expectations that align with the institution's information security program. App A Objective 3.3] | Establish/Maintain Documentation | Preventive | |
Report on the percentage of known Information Security risks that are related to supply chain relationships. CC ID 02044 | Actionable Reports or Measurements | Detective | |
Report on the percentage of critical information assets or critical functions for which access by supply chain personnel is disallowed. CC ID 02045 | Actionable Reports or Measurements | Detective | |
Report on the percentage of supply chain personnel who have current information asset user privileges. CC ID 02046 | Actionable Reports or Measurements | Detective | |
Report on the percentage of systems with critical information assets or functions for which electronic connection by supply chain assets is disallowed. CC ID 02047 | Actionable Reports or Measurements | Detective | |
Report on the percentage of security incidents that involved supply chain personnel. CC ID 02048 | Actionable Reports or Measurements | Detective | |
Report on the percentage of third party contracts that include a requirement to externally verify policies and procedures. CC ID 02049 | Actionable Reports or Measurements | Detective | |
Report on the percentage of supply chain relationships that have been reviewed for compliance with information security requirements. CC ID 02050 | Actionable Reports or Measurements | Detective | |
Establish, implement, and maintain a technical measurement metrics policy. CC ID 01655 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an incident management and vulnerability management metrics program. CC ID 02085 [{software development} With respect to developed software, determine whether institution management does the following: Collects data to build metrics and reporting of configuration management compliance, and vulnerability management. App A Objective 6.28.f] | Business Processes | Preventive | |
Report on the estimated damage or loss resulting from all security incidents. CC ID 01674 | Actionable Reports or Measurements | Detective | |
Report on the percentage of security incidents that did not cause confidentiality, integrity, or availability losses beyond the Service Level Agreement thresholds. CC ID 01673 | Actionable Reports or Measurements | Detective | |
Report on the percentage of operational time that critical services were unavailable due to security incidents. CC ID 02124 | Actionable Reports or Measurements | Detective | |
Report on the percentage of security incidents that exploited existing security vulnerabilities with known solutions, patches, or workarounds. CC ID 02125 | Actionable Reports or Measurements | Detective | |
Report on the percentage of systems affected by security incidents that exploited existing security vulnerabilities with known solutions, patches, or workarounds. CC ID 02126 | Actionable Reports or Measurements | Detective | |
Report on the percentage of security incidents that were managed according to established policies, procedures, and processes. CC ID 02127 | Actionable Reports or Measurements | Detective | |
Report on the number of security incidents reported to FedCIRC, NIPC, the Payment Card Industry, or local law enforcement. CC ID 02154 | Actionable Reports or Measurements | Detective | |
Report on the percentage of systems with critical information assets or critical functions that have been assessed for security vulnerabilities. CC ID 02128 | Actionable Reports or Measurements | Detective | |
Report on the percentage of vulnerability assessment findings that have been addressed since the last reporting period. CC ID 02129 | Actionable Reports or Measurements | Detective | |
Report on the average elapsed time between the discovery of a new vulnerability and implementing corrective action. CC ID 02140 | Actionable Reports or Measurements | Detective | |
Report on the percentage of physical security incidents that involved entry into a facility containing Information Systems. CC ID 04564 | Actionable Reports or Measurements | Detective | |
Delay the reporting of incident management metrics, as necessary. CC ID 15501 | Communicate | Preventive | |
Establish, implement, and maintain a log management program. CC ID 00673 [Determine whether management has an effective log management process that involves a central logging repository, timely transmission of log files, and effective log analysis. Review whether management has the following: App A Objective 6.35] | Establish/Maintain Documentation | Preventive | |
Deploy log normalization tools, as necessary. CC ID 12141 | Technical Security | Preventive | |
Restrict access to logs to authorized individuals. CC ID 01342 | Log Management | Preventive | |
Restrict access to audit trails to a need to know basis. CC ID 11641 | Technical Security | Preventive | |
Refrain from recording unnecessary restricted data in logs. CC ID 06318 | Log Management | Preventive | |
Back up audit trails according to backup procedures. CC ID 11642 | Systems Continuity | Preventive | |
Back up logs according to backup procedures. CC ID 01344 | Log Management | Preventive | |
Copy logs from all predefined hosts onto a log management infrastructure. CC ID 01346 | Log Management | Preventive | |
Identify hosts with logs that are not being stored. CC ID 06314 | Log Management | Preventive | |
Identify hosts with logs that are being stored at the system level only. CC ID 06315 | Log Management | Preventive | |
Identify hosts with logs that should be stored at both the system level and the infrastructure level. CC ID 06316 | Log Management | Preventive | |
Identify hosts with logs that are being stored at the infrastructure level only. CC ID 06317 | Log Management | Preventive | |
Protect logs from unauthorized activity. CC ID 01345 | Log Management | Preventive | |
Perform testing and validating activities on all logs. CC ID 06322 | Log Management | Preventive | |
Archive the audit trail in accordance with compliance requirements. CC ID 00674 | Log Management | Preventive | |
Enforce dual authorization as a part of information flow control for logs. CC ID 10098 | Configuration | Preventive | |
Preserve the identity of individuals in audit trails. CC ID 10594 | Log Management | Preventive | |
Establish, implement, and maintain a cross-organizational audit sharing agreement. CC ID 10595 | Establish/Maintain Documentation | Preventive | |
Provide cross-organizational audit information based on the cross-organizational audit sharing agreement. CC ID 10596 | Audits and Risk Management | Preventive | |
Report actions taken on known security issues to the Board of Directors or Senior Executive Committee on a regular basis. CC ID 12330 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Results of security operations activities and summaries of assurance reports. App A Objective 2.4.d Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Results of security operations activities and summaries of assurance reports. App A Objective 2.4.d] | Monitor and Evaluate Occurrences | Preventive | |
Report known security issues to interested personnel and affected parties on a regular basis. CC ID 12329 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Filters and reviews logs for potential security events and provides adequate reports and alerts. App A Objective 6.21.f Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Monitor and Evaluate Occurrences | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Operational and Systems Continuity CC ID 00731 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain a business continuity program. CC ID 13210 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a continuity framework. CC ID 00732 | Establish/Maintain Documentation | Preventive | |
Establish and maintain the scope of the continuity framework. CC ID 11908 | Establish/Maintain Documentation | Preventive | |
Include the organization's business products and services in the scope of the continuity framework. CC ID 12235 [Determine whether management effectively provides secure customer access to financial services and plans for potential interruptions in service. Review whether management does the following: App A Objective 6.25 Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Establish/Maintain Documentation | Preventive | |
Include information security continuity in the scope of the continuity framework. CC ID 12009 [Determine whether management effectively manages the following information security considerations related to business continuity planning. Review management's ability to do the following: App A Objective 6.34 Review management's ability to do the following: Define information security needs for backup sites and alternate communication networks. App A Objective 6.34.b {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Systems Continuity | Preventive | |
Establish, implement, and maintain continuity roles and responsibilities. CC ID 00733 [{information security personnel} Review management's ability to do the following: Identify personnel with key information security roles during a disaster and training of personnel in those roles. App A Objective 6.34.a {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Establish Roles | Preventive | |
Establish, implement, and maintain a continuity plan. CC ID 00752 [Review whether patch management processes include the following: A documentation process to ensure the institution's information assets and technology inventory and disaster recovery plans are updated as appropriate when patches are applied. App A Objective 6.15.g] | Establish/Maintain Documentation | Preventive | |
Report changes in the continuity plan to senior management. CC ID 12757 | Communicate | Corrective | |
Activate the continuity plan if the damage assessment report indicates the activation criterion has been met. CC ID 01373 | Systems Continuity | Corrective | |
Identify all stakeholders in the continuity plan. CC ID 13256 | Establish/Maintain Documentation | Preventive | |
Notify interested personnel and affected parties upon activation of the continuity plan. CC ID 16777 | Communicate | Preventive | |
Maintain normal security levels when an emergency occurs. CC ID 06377 | Systems Continuity | Preventive | |
Execute fail-safe procedures when an emergency occurs. CC ID 07108 | Systems Continuity | Preventive | |
Include a business continuity testing policy in the continuity plan, as necessary. CC ID 13234 | Establish/Maintain Documentation | Preventive | |
Lead or manage business continuity and system continuity, as necessary. CC ID 12240 | Human Resources Management | Preventive | |
Allocate financial resources to implement the continuity plan, as necessary. CC ID 12993 | Establish/Maintain Documentation | Preventive | |
Allocate personnel to implement the continuity plan, as necessary. CC ID 12992 | Human Resources Management | Preventive | |
Include the in scope system's location in the continuity plan. CC ID 16246 | Systems Continuity | Preventive | |
Include the system description in the continuity plan. CC ID 16241 | Systems Continuity | Preventive | |
Establish, implement, and maintain redundant systems. CC ID 16354 | Configuration | Preventive | |
Include identification procedures in the continuity plan, as necessary. CC ID 14372 | Establish/Maintain Documentation | Preventive | |
Refrain from adopting impromptu measures when continuity procedures exist. CC ID 13093 | Behavior | Preventive | |
Include the continuity strategy in the continuity plan. CC ID 13189 | Establish/Maintain Documentation | Preventive | |
Restore systems and environments to be operational. CC ID 13476 | Systems Continuity | Corrective | |
Implement alternate security mechanisms when the means of implementing the security function is unavailable. CC ID 10605 [{supplement} With respect to developed software, determine whether institution management does the following: Implements minimum controls recommended by third-party service providers and considers supplemental controls as appropriate. App A Objective 6.28.d] | Technical Security | Preventive | |
Include roles and responsibilities in the continuity plan, as necessary. CC ID 13254 | Establish/Maintain Documentation | Preventive | |
Document and use the lessons learned to update the continuity plan. CC ID 10037 | Establish/Maintain Documentation | Preventive | |
Monitor and evaluate business continuity management system performance. CC ID 12410 | Monitor and Evaluate Occurrences | Detective | |
Coordinate continuity planning with governmental entities, as necessary. CC ID 13258 | Process or Activity | Preventive | |
Record business continuity management system performance for posterity. CC ID 12411 | Monitor and Evaluate Occurrences | Preventive | |
Coordinate continuity planning with community organizations, as necessary. CC ID 13259 | Process or Activity | Preventive | |
Coordinate and incorporate supply chain members' continuity plans, as necessary. CC ID 13242 | Establish/Maintain Documentation | Preventive | |
Include incident management procedures in the continuity plan. CC ID 13244 | Establish/Maintain Documentation | Preventive | |
Include the use of virtual meeting tools in the continuity plan. CC ID 14390 | Establish/Maintain Documentation | Preventive | |
Include scenario analyses of various contingency scenarios in the continuity plan. CC ID 13057 | Establish/Maintain Documentation | Preventive | |
Include the annual statement based on the continuity plan review in the continuity plan. CC ID 12775 | Establish/Maintain Documentation | Preventive | |
Include the roles and responsibilities of the organization's legal counsel in the continuity plan. CC ID 16233 | Establish Roles | Preventive | |
Establish, implement, and maintain the continuity procedures. CC ID 14236 | Establish/Maintain Documentation | Corrective | |
Disseminate and communicate the continuity procedures to interested personnel and affected parties. CC ID 14055 | Communicate | Preventive | |
Document the uninterrupted power requirements for all in scope systems. CC ID 06707 | Establish/Maintain Documentation | Preventive | |
Install an Uninterruptible Power Supply sized to support all critical systems. CC ID 00725 | Configuration | Preventive | |
Install a generator sized to support the facility. CC ID 06709 | Configuration | Preventive | |
Establish, implement, and maintain a fuel supply large enough to support the generators during an emergency. CC ID 06376 | Acquisition/Sale of Assets or Services | Preventive | |
Document all supporting information in the continuity plan, such as purpose, scope, and requirements. CC ID 01371 | Establish/Maintain Documentation | Preventive | |
Include notifications to alternate facilities in the continuity plan. CC ID 13220 | Establish/Maintain Documentation | Preventive | |
Approve the continuity plan requirements before documenting the continuity plan. CC ID 12778 | Systems Continuity | Preventive | |
Document the concept of operations in the continuity plan, including a line of succession. CC ID 01372 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain the organization's call tree. CC ID 01167 | Testing | Detective | |
Establish, implement, and maintain damage assessment procedures. CC ID 01267 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a recovery plan. CC ID 13288 | Establish/Maintain Documentation | Preventive | |
Notify interested personnel and affected parties of updates to the recovery plan. CC ID 13302 | Communicate | Preventive | |
Include procedures to restore network connectivity in the recovery plan. CC ID 16250 | Establish/Maintain Documentation | Preventive | |
Include addressing backup failures in the recovery plan. CC ID 13298 | Establish/Maintain Documentation | Preventive | |
Include procedures to verify completion of the data backup procedure in the recovery plan. CC ID 13297 | Establish/Maintain Documentation | Preventive | |
Include the roles and responsibilities of responders in the recovery plan. CC ID 13296 | Human Resources Management | Preventive | |
Include the procedures for the storage of information necessary to recover functionality in the recovery plan. CC ID 13295 | Establish/Maintain Documentation | Preventive | |
Include the backup procedures for information necessary to recover functionality in the recovery plan. CC ID 13294 | Establish/Maintain Documentation | Preventive | |
Include the criteria for activation in the recovery plan. CC ID 13293 | Establish/Maintain Documentation | Preventive | |
Include escalation procedures in the recovery plan. CC ID 16248 | Establish/Maintain Documentation | Preventive | |
Include procedures to preserve data before beginning the recovery process in the recovery plan. CC ID 13292 | Establish/Maintain Documentation | Preventive | |
Determine the cause for the activation of the recovery plan. CC ID 13291 | Investigate | Detective | |
Test the recovery plan, as necessary. CC ID 13290 | Testing | Detective | |
Test the backup information, as necessary. CC ID 13303 | Testing | Detective | |
Document lessons learned from testing the recovery plan or an actual event. CC ID 13301 | Establish/Maintain Documentation | Detective | |
Disseminate and communicate the recovery plan to interested personnel and affected parties. CC ID 14859 | Communicate | Preventive | |
Include restoration procedures in the continuity plan. CC ID 01169 [{restoration strategy} {follow-up strategy} Determine whether management has effective incident response processes, including the following: Restoration and follow-up strategies. App A Objective 8.6.i] | Establish Roles | Preventive | |
Include risk prioritized recovery procedures for each business unit in the recovery plan. CC ID 01166 | Establish/Maintain Documentation | Preventive | |
Include the recovery plan in the continuity plan. CC ID 01377 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the recovery status of the contingency plan to interested personnel and affected parties. CC ID 12758 | Communicate | Preventive | |
Disseminate and communicate business functions across multiple facilities separated by geographic separation. CC ID 10662 | Systems Continuity | Preventive | |
Disseminate and communicate processing activities across multiple facilities using geographic separation. CC ID 10663 | Systems Continuity | Preventive | |
Disseminate and communicate electronic media storage devices across multiple facilities using geographic separation. CC ID 10664 | Systems Continuity | Preventive | |
Use out-of-band channels for the physical delivery or electronic transmission of information, as necessary. CC ID 10665 | Systems Continuity | Corrective | |
Establish, implement, and maintain a business continuity plan testing program. CC ID 14829 | Testing | Preventive | |
Test the continuity plan, as necessary. CC ID 00755 | Testing | Detective | |
Include the coordination and interfaces among third parties in the coverage of the scope of testing the continuity plan. CC ID 12769 [{incident response plan} Review whether management does the following: Develops and tests a response plan in conjunction with the institution's ISPs and third-party service providers to mitigate the interruption of mobile or remote financial services. App A Objective 6.25.c Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Testing | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Operational management CC ID 00805 | IT Impact Zone | IT Impact Zone | |
Manage cloud services. CC ID 13144 [Review whether management does the following: Requires appropriate controls over data stored in a cloud environment. App A Objective 6.18.c {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Business Processes | Preventive | |
Refrain from implementing network elements in a public cloud. CC ID 16382 | Technical Security | Preventive | |
Protect clients' hosted environments. CC ID 11862 | Physical and Environmental Protection | Preventive | |
Notify cloud customers of the geographic locations of the cloud service organization and its assets. CC ID 13037 | Communicate | Preventive | |
Establish, implement, and maintain cloud service agreements. CC ID 13157 | Establish/Maintain Documentation | Preventive | |
Include the asset removal policy in the cloud service agreement. CC ID 13161 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain cloud management procedures. CC ID 13149 | Technical Security | Preventive | |
Establish, implement, and maintain a migration process and/or strategy to transfer systems from one asset to another. CC ID 16384 | Process or Activity | Preventive | |
Define and enforce the deployment requirements for applications and virtual network devices in a public cloud. CC ID 16383 | Process or Activity | Preventive | |
Include cloud security requirements in the cloud management procedures. CC ID 16366 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a cloud service usage standard. CC ID 13143 | Establish/Maintain Documentation | Preventive | |
Use strong data encryption when storing information within a cloud service. CC ID 16411 | Technical Security | Preventive | |
Include the roles and responsibilities of cloud service users in the cloud service usage standard. CC ID 13984 | Establish/Maintain Documentation | Preventive | |
Include information security requirements in the cloud service usage standard. CC ID 13148 | Establish/Maintain Documentation | Preventive | |
Monitor managing cloud services. CC ID 13150 | Monitor and Evaluate Occurrences | Detective | |
Disseminate and communicate documentation of pertinent monitoring capabilities to interested personnel and affected parties. CC ID 13159 | Communicate | Preventive | |
Disseminate and communicate the legal jurisdiction of cloud services to interested personnel and affected parties. CC ID 13147 | Communicate | Preventive | |
Establish, implement, and maintain a Governance, Risk, and Compliance framework. CC ID 01406 | Establish/Maintain Documentation | Preventive | |
Evaluate the use of technology in supporting Governance, Risk, and Compliance capabilities. CC ID 12895 [Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3 Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3 Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3] | Process or Activity | Preventive | |
Establish, implement, and maintain an internal control framework. CC ID 00820 [Specifically, review whether management does the following: Reviews and improves or updates the security controls, where necessary. App A Objective 6.5.c] | Establish/Maintain Documentation | Preventive | |
Define the scope for the internal control framework. CC ID 16325 | Business Processes | Preventive | |
Measure policy compliance when reviewing the internal control framework. CC ID 06442 [Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Actionable Reports or Measurements | Corrective | |
Review the relevance of information supporting internal controls. CC ID 12420 | Business Processes | Detective | |
Assign ownership of the internal control framework to the appropriate organizational role. CC ID 06437 | Establish Roles | Preventive | |
Assign resources to implement the internal control framework. CC ID 00816 [Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: App A Objective 2.9 Determine whether the institution's board and management understand and support information security and provide appropriate resources for the implementation of an effective security program. App A Objective 2.1.a Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Business Processes | Preventive | |
Define and assign the roles and responsibilities for interested personnel and affected parties when establishing, implementing, and maintaining the internal control framework. CC ID 07146 | Establish Roles | Preventive | |
Establish, implement, and maintain a baseline of internal controls. CC ID 12415 | Business Processes | Preventive | |
Include the business need justification for excluding controls in the baseline of internal controls. CC ID 16129 | Establish/Maintain Documentation | Preventive | |
Include the implementation status of controls in the baseline of internal controls. CC ID 16128 | Establish/Maintain Documentation | Preventive | |
Leverage actionable information to support internal controls. CC ID 12414 | Business Processes | Preventive | |
Include procedures for continuous quality improvement in the internal control framework. CC ID 00819 [Review whether policies, standards, and procedures have the following characteristics: Are appropriately flexible to address changes in the environment. App A Objective 6.1.e] | Establish/Maintain Documentation | Preventive | |
Include continuous service account management procedures in the internal control framework. CC ID 13860 | Establish/Maintain Documentation | Preventive | |
Include threat assessment in the internal control framework. CC ID 01347 [Review whether management has the following: A threat assessment to help focus the risk identification efforts. App A Objective 4.2.a {threat identification process}{threat assessment process} Determine whether management has effective threat identification and assessment processes, including the following: App A Objective 8.3 Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3 {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Establish/Maintain Documentation | Preventive | |
Automate threat assessments, as necessary. CC ID 06877 | Configuration | Preventive | |
Include vulnerability management and risk assessment in the internal control framework. CC ID 13102 [Determine whether management effectively identifies threats and vulnerabilities continuously. App A Objective 4.1 Determine whether the institution's security operations activities include the following: Vulnerability identification (e.g., operation or supervision of vulnerability scans, self-assessments, penetration tests, and analysis of audit results). App A Objective 8.1.c Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk assessment process, including threat identification and assessment. App A Objective 2.4.a] | Establish/Maintain Documentation | Preventive | |
Automate vulnerability management, as necessary. CC ID 11730 [{analyze} Determine whether management has effective threat identification and assessment processes, including the following: Using tools to assist in the analysis of vulnerabilities (e.g., design of system, operation of the system, security procedures, business line controls, and implementation of the system and controls). App A Objective 8.3.c] | Configuration | Preventive | |
Include personnel security procedures in the internal control framework. CC ID 01349 | Establish/Maintain Documentation | Preventive | |
Include continuous security warning monitoring procedures in the internal control framework. CC ID 01358 | Establish/Maintain Documentation | Preventive | |
Include incident alert thresholds in the continuous security warning monitoring procedures. CC ID 13205 | Establish/Maintain Documentation | Preventive | |
Include security information sharing procedures in the internal control framework. CC ID 06489 | Establish/Maintain Documentation | Preventive | |
Share security information with interested personnel and affected parties. CC ID 11732 | Communicate | Preventive | |
Evaluate information sharing partners, as necessary. CC ID 12749 | Process or Activity | Preventive | |
Include security incident response procedures in the internal control framework. CC ID 01359 [{incident response policy} Review management's ability to do the following: Develop policies that address the concepts of information security incident response and resilience and test information security incident scenarios. App A Objective 6.34.c Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1 {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Establish/Maintain Documentation | Preventive | |
Include incident response escalation procedures in the internal control framework. CC ID 11745 | Establish/Maintain Documentation | Preventive | |
Include continuous user account management procedures in the internal control framework. CC ID 01360 | Establish/Maintain Documentation | Preventive | |
Include emergency response procedures in the internal control framework. CC ID 06779 | Establish/Maintain Documentation | Detective | |
Authorize and document all exceptions to the internal control framework. CC ID 06781 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the internal control framework to all interested personnel and affected parties. CC ID 15229 | Communicate | Preventive | |
Establish, implement, and maintain an information security program. CC ID 00812 [{implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 {information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Determine whether the information security program is subject to periodic review and whether management provides for continual improvement in the program's effectiveness. Verify whether that review does the following: App A Objective 9.1 {security program} Review whether management has the following: Security policies, standards, and procedures that are designed to support and to align with the policies in the lines of business. App A Objective 3.2.a Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Establish/Maintain Documentation | Preventive | |
Include physical safeguards in the information security program. CC ID 12375 | Establish/Maintain Documentation | Preventive | |
Include technical safeguards in the information security program. CC ID 12374 | Establish/Maintain Documentation | Preventive | |
Include administrative safeguards in the information security program. CC ID 12373 | Establish/Maintain Documentation | Preventive | |
Include system development in the information security program. CC ID 12389 | Establish/Maintain Documentation | Preventive | |
Include system maintenance in the information security program. CC ID 12388 | Establish/Maintain Documentation | Preventive | |
Include system acquisition in the information security program. CC ID 12387 | Establish/Maintain Documentation | Preventive | |
Include access control in the information security program. CC ID 12386 | Establish/Maintain Documentation | Preventive | |
Review and approve access controls, as necessary. CC ID 13074 | Process or Activity | Detective | |
Include operations management in the information security program. CC ID 12385 [Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 Determine whether management appropriately integrates the information security program across the institution's lines of business and support functions. Review whether management has the following: App A Objective 3.2 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Establish/Maintain Documentation | Preventive | |
Include communication management in the information security program. CC ID 12384 | Establish/Maintain Documentation | Preventive | |
Include environmental security in the information security program. CC ID 12383 | Establish/Maintain Documentation | Preventive | |
Include physical security in the information security program. CC ID 12382 | Establish/Maintain Documentation | Preventive | |
Include human resources security in the information security program. CC ID 12381 | Establish/Maintain Documentation | Preventive | |
Include asset management in the information security program. CC ID 12380 [Determine whether the institution's security operations activities include the following: Security software and device management (e.g., maintaining the signatures on signaturebased devices and firewall rules). App A Objective 8.1.a] | Establish/Maintain Documentation | Preventive | |
Include a continuous monitoring program in the information security program. CC ID 14323 | Establish/Maintain Documentation | Preventive | |
Include change management procedures in the continuous monitoring plan. CC ID 16227 | Establish/Maintain Documentation | Preventive | |
include recovery procedures in the continuous monitoring plan. CC ID 16226 | Establish/Maintain Documentation | Preventive | |
Include mechanisms for decommissioning a system in the continuous monitoring plan. CC ID 16225 | Establish/Maintain Documentation | Preventive | |
Include mechanisms for appeal and override in the continuous monitoring plan. CC ID 16223 | Establish/Maintain Documentation | Preventive | |
Include how the information security department is organized in the information security program. CC ID 12379 | Establish/Maintain Documentation | Preventive | |
Include risk management in the information security program. CC ID 12378 [Determine whether management has adequately incorporated information security into its overall ITRM process. App A Objective 2.10 Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Measurement of risks. App A Objective 3.1.b {risk identification} Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Identification of threats and risks. App A Objective 3.1.a Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: App A Objective 3.1 Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management Management should develop and implement a process to identify risk. II.A Risk Identification] | Establish/Maintain Documentation | Preventive | |
Include mitigating supply chain risks in the information security program. CC ID 13352 | Establish/Maintain Documentation | Preventive | |
Provide management direction and support for the information security program. CC ID 11999 [Determine whether the board holds management accountable for the following: Support of the information security program. App A Objective 2.3.c Determine whether the institution's board and management understand and support information security and provide appropriate resources for the implementation of an effective security program. App A Objective 2.1.a {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2] | Process or Activity | Preventive | |
Monitor and review the effectiveness of the information security program. CC ID 12744 [Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether policies, standards, and procedures are of sufficient scope and depth to guide information security-related decisions. Review whether policies, standards, and procedures have the following characteristics: App A Objective 6.1 Determine whether management has an effective information security program. App A Objective 9 {information security testing] Determine whether management uses the following types of tests and evaluations to determine the effectiveness of the information security program. Verify whether management ensures the following are done: App A Objective 10.3 Determine whether the information security program is subject to periodic review and whether management provides for continual improvement in the program's effectiveness. Verify whether that review does the following: App A Objective 9.1 Determine whether assurance activities provide sufficient confidence that the security program is operating as expected and reaching intended goals. App A Objective 10 Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 Review whether the program includes the following: Methods to assess the program's effectiveness. App A Objective 3.1.e {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain an information security policy. CC ID 11740 [{information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Review whether management has processes to do the following: Update the information security program to reflect changes. App A Objective 4.5.b] | Establish/Maintain Documentation | Preventive | |
Align the information security policy with the organization's risk acceptance level. CC ID 13042 | Business Processes | Preventive | |
Include business processes in the information security policy. CC ID 16326 | Establish/Maintain Documentation | Preventive | |
Include the information security strategy in the information security policy. CC ID 16125 | Establish/Maintain Documentation | Preventive | |
Include a commitment to continuous improvement in the information security policy. CC ID 16123 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the information security policy. CC ID 16120 | Establish/Maintain Documentation | Preventive | |
Include a commitment to the information security requirements in the information security policy. CC ID 13496 | Establish/Maintain Documentation | Preventive | |
Include information security objectives in the information security policy. CC ID 13493 | Establish/Maintain Documentation | Preventive | |
Include the use of Cloud Services in the information security policy. CC ID 13146 | Establish/Maintain Documentation | Preventive | |
Include notification procedures in the information security policy. CC ID 16842 | Establish/Maintain Documentation | Preventive | |
Approve the information security policy at the organization's management level or higher. CC ID 11737 [Determine whether the information security policy is annually reviewed and approved by the board. App A Objective 6.2] | Process or Activity | Preventive | |
Establish, implement, and maintain information security procedures. CC ID 12006 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Business Processes | Preventive | |
Describe the group activities that protect restricted data in the information security procedures. CC ID 12294 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the information security procedures to all interested personnel and affected parties. CC ID 16303 | Communicate | Preventive | |
Document the roles and responsibilities for all activities that protect restricted data in the information security procedures. CC ID 12304 | Establish/Maintain Documentation | Preventive | |
Define thresholds for approving information security activities in the information security program. CC ID 15702 | Process or Activity | Preventive | |
Assign ownership of the information security program to the appropriate role. CC ID 00814 | Establish Roles | Preventive | |
Assign the responsibility for establishing, implementing, and maintaining the information security program to the appropriate role. CC ID 11884 [Determine whether management responsibilities are appropriate and include the following: App A Objective 2.5 {implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a Determine whether the board holds management accountable for the following: Effectiveness of the information security program. App A Objective 2.3.d] | Human Resources Management | Preventive | |
Assign information security responsibilities to interested personnel and affected parties in the information security program. CC ID 11885 [Determine whether management has designated one or more individuals as an information security officer and determine appropriateness of the reporting line. App A Objective 2.6 {define} Determine whether management responsibilities are appropriate and include the following: Definition of the information security responsibilities of third parties. App A Objective 2.5.k Review whether policies, standards, and procedures have the following characteristics: Delineate areas of responsibility. App A Objective 6.1.b Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Establish/Maintain Documentation | Preventive | |
Assign the responsibility for distributing the information security program to the appropriate role. CC ID 11883 [{delineate}{communicate} Determine whether management responsibilities are appropriate and include the following: Delineation of clear lines of responsibility and communication of accountability for information security. App A Objective 2.5.d {implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a] | Human Resources Management | Preventive | |
Disseminate and communicate the information security policy to interested personnel and affected parties. CC ID 11739 [Review whether policies, standards, and procedures have the following characteristics: Are reviewed and agreed to by employees. App A Objective 6.1.d] | Communicate | Preventive | |
Establish, implement, and maintain a social media governance program. CC ID 06536 | Establish/Maintain Documentation | Preventive | |
Refrain from requiring supervision when users are accessing social media applications. CC ID 14011 | Business Processes | Preventive | |
Refrain from requiring users to disclose social media account usernames or authenticators. CC ID 14009 | Business Processes | Preventive | |
Refrain from accepting instant messages from unknown senders. CC ID 12537 | Behavior | Preventive | |
Include instant messaging, texting, and tweeting in the social media acceptable use policy. CC ID 04578 | Establish/Maintain Documentation | Preventive | |
Include explicit restrictions in the social media acceptable use policy. CC ID 06655 | Establish/Maintain Documentation | Preventive | |
Include contributive content sites in the social media acceptable use policy. CC ID 06656 | Establish/Maintain Documentation | Preventive | |
Perform social network analysis, as necessary. CC ID 14864 | Investigate | Detective | |
Establish, implement, and maintain operational control procedures. CC ID 00831 | Establish/Maintain Documentation | Preventive | |
Include assigning and approving operations in operational control procedures. CC ID 06382 | Establish/Maintain Documentation | Preventive | |
Include startup processes in operational control procedures. CC ID 00833 | Establish/Maintain Documentation | Preventive | |
Include change control processes in the operational control procedures. CC ID 16793 | Establish/Maintain Documentation | Preventive | |
Establish and maintain a data processing run manual. CC ID 00832 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a Standard Operating Procedures Manual. CC ID 00826 | Establish/Maintain Documentation | Preventive | |
Use systems in accordance with the standard operating procedures manual. CC ID 15049 | Process or Activity | Preventive | |
Include metrics in the standard operating procedures manual. CC ID 14988 | Establish/Maintain Documentation | Preventive | |
Include maintenance measures in the standard operating procedures manual. CC ID 14986 | Establish/Maintain Documentation | Preventive | |
Include the expected lifetime of the system in the standard operating procedures manual. CC ID 14984 | Establish/Maintain Documentation | Preventive | |
Include technical measures used to interpret output in the standard operating procedures manual. CC ID 14982 | Establish/Maintain Documentation | Preventive | |
Include predetermined changes in the standard operating procedures manual. CC ID 14977 | Establish/Maintain Documentation | Preventive | |
Include specifications for input data in the standard operating procedures manual. CC ID 14975 | Establish/Maintain Documentation | Preventive | |
Include risks to health and safety or fundamental rights in the standard operating procedures manual. CC ID 14973 | Establish/Maintain Documentation | Preventive | |
Include circumstances that may impact the system in the standard operating procedures manual. CC ID 14972 | Establish/Maintain Documentation | Preventive | |
Include what the system was tested and validated for in the standard operating procedures manual. CC ID 14969 | Establish/Maintain Documentation | Preventive | |
Include the intended purpose in the standard operating procedures manual. CC ID 14967 | Establish/Maintain Documentation | Preventive | |
Include information on system performance in the standard operating procedures manual. CC ID 14965 | Establish/Maintain Documentation | Preventive | |
Include contact details in the standard operating procedures manual. CC ID 14962 | Establish/Maintain Documentation | Preventive | |
Include information sharing procedures in standard operating procedures. CC ID 12974 | Records Management | Preventive | |
Establish, implement, and maintain information sharing agreements. CC ID 15645 | Business Processes | Preventive | |
Provide support for information sharing activities. CC ID 15644 | Process or Activity | Preventive | |
Adhere to operating procedures as defined in the Standard Operating Procedures Manual. CC ID 06328 | Business Processes | Preventive | |
Update operating procedures that contribute to user errors. CC ID 06935 | Establish/Maintain Documentation | Corrective | |
Disseminate and communicate the Standard Operating Procedures Manual to all interested personnel and affected parties. CC ID 12026 | Communicate | Preventive | |
Establish, implement, and maintain a job scheduling methodology. CC ID 00834 | Establish/Maintain Documentation | Preventive | |
Establish and maintain a job schedule exceptions list. CC ID 00835 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a data processing continuity plan. CC ID 00836 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain Voice over Internet Protocol operating procedures. CC ID 04583 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain the Acceptable Use Policy. CC ID 01350 [{unapproved information technology resources} Review whether management does the following: Has policies restricting the use of unsanctioned or unapproved IT resources (e.g., online storage services, unapproved mobile device applications, and unapproved devices). App A Objective 6.18.g Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Establish/Maintain Documentation | Preventive | |
Include that explicit management authorization must be given for the use of all technologies and their documentation in the Acceptable Use Policy. CC ID 01351 | Establish/Maintain Documentation | Preventive | |
Include requiring users to protect restricted data in accordance with the Governance, Risk, and Compliance framework in the Acceptable Use Policy. CC ID 11894 | Establish/Maintain Documentation | Preventive | |
Include Bring Your Own Device agreements in the Acceptable Use Policy. CC ID 15703 | Establish/Maintain Documentation | Preventive | |
Include the obligations of users in the Bring Your Own Device agreement. CC ID 15708 | Establish/Maintain Documentation | Preventive | |
Include the rights of the organization in the Bring Your Own Device agreement. CC ID 15707 | Establish/Maintain Documentation | Preventive | |
Include the circumstances in which the organization may confiscate, audit, or inspect assets in the Bring Your Own Device agreement. CC ID 15706 | Establish/Maintain Documentation | Preventive | |
Include the circumstances in which the organization may manage assets in the Bring Your Own Device agreement. CC ID 15705 | Establish/Maintain Documentation | Preventive | |
Include Bring Your Own Device usage in the Acceptable Use Policy. CC ID 12293 | Establish/Maintain Documentation | Preventive | |
Include a web usage policy in the Acceptable Use Policy. CC ID 16496 | Establish/Maintain Documentation | Preventive | |
Include Bring Your Own Device security guidelines in the Acceptable Use Policy. CC ID 01352 [{employee-owned device} Review whether management does the following: Implements controls over institution owned and personally owned devices used by employees to access the network (e.g., disallows remote access without business justification, requires management approval, reviews remote access approvals, restricts access to authorized network areas, logs remote access, implements robust authentication, uses encryption, and uses application white-listing). App A Objective 6.24.a {employee-owned device} Review whether management does the following: Uses an effective method to ensure personally owned devices meet defined institution security standards (e.g., such as operating system version, patch levels, and anti-malware solutions). App A Objective 6.24.c] | Establish/Maintain Documentation | Preventive | |
Include asset tags in the Acceptable Use Policy. CC ID 01354 | Establish/Maintain Documentation | Preventive | |
Specify the owner of applicable assets in the Acceptable Use Policy. CC ID 15699 | Establish/Maintain Documentation | Preventive | |
Include asset use policies in the Acceptable Use Policy. CC ID 01355 | Establish/Maintain Documentation | Preventive | |
Include authority for access authorization lists for assets in all relevant Acceptable Use Policies. CC ID 11872 | Establish/Maintain Documentation | Preventive | |
Include access control mechanisms in the Acceptable Use Policy. CC ID 01353 [{employee-owned device} Review whether management does the following: Implements controls over institution owned and personally owned devices used by employees to access the network (e.g., disallows remote access without business justification, requires management approval, reviews remote access approvals, restricts access to authorized network areas, logs remote access, implements robust authentication, uses encryption, and uses application white-listing). App A Objective 6.24.a] | Establish/Maintain Documentation | Preventive | |
Include temporary activation of remote access technologies for third parties in the Acceptable Use Policy. CC ID 11892 | Technical Security | Preventive | |
Include prohibiting the copying or moving of restricted data from its original source onto local hard drives or removable storage media in the Acceptable Use Policy. CC ID 11893 | Establish/Maintain Documentation | Preventive | |
Include a removable storage media use policy in the Acceptable Use Policy. CC ID 06772 | Data and Information Management | Preventive | |
Correlate the Acceptable Use Policy with the network security policy. CC ID 01356 | Establish/Maintain Documentation | Preventive | |
Include appropriate network locations for each technology in the Acceptable Use Policy. CC ID 11881 | Establish/Maintain Documentation | Preventive | |
Correlate the Acceptable Use Policy with the approved product list. CC ID 01357 | Establish/Maintain Documentation | Preventive | |
Include facility access and facility use in the Acceptable Use Policy. CC ID 06441 | Establish/Maintain Documentation | Preventive | |
Include disciplinary actions in the Acceptable Use Policy. CC ID 00296 | Establish/Maintain Documentation | Corrective | |
Include the usage restrictions of mobile code technologies in the Acceptable Use Policy. CC ID 15311 | Establish/Maintain Documentation | Preventive | |
Include a software installation policy in the Acceptable Use Policy. CC ID 06749 | Establish/Maintain Documentation | Preventive | |
Document idle session termination and logout for remote access technologies in the Acceptable Use Policy. CC ID 12472 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the Acceptable Use Policy to all interested personnel and affected parties. CC ID 12431 | Communicate | Preventive | |
Require interested personnel and affected parties to sign Acceptable Use Policies. CC ID 06661 [Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Establish/Maintain Documentation | Preventive | |
Require interested personnel and affected parties to re-sign Acceptable Use Policies, as necessary. CC ID 06663 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an Intellectual Property Right program. CC ID 00821 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain domain name registration and renewal procedures. CC ID 07075 | Business Processes | Preventive | |
Establish, implement, and maintain Intellectual Property Rights protection procedures. CC ID 11512 | Establish/Maintain Documentation | Preventive | |
Protect against circumvention of the organization's Intellectual Property Rights. CC ID 11513 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an e-mail policy. CC ID 06439 | Establish/Maintain Documentation | Preventive | |
Include business use of personal e-mail in the e-mail policy. CC ID 14381 | Establish/Maintain Documentation | Preventive | |
Identify the sender in all electronic messages. CC ID 13996 | Data and Information Management | Preventive | |
Protect policies, standards, and procedures from unauthorized modification or disclosure. CC ID 10603 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain nondisclosure agreements. CC ID 04536 | Establish/Maintain Documentation | Preventive | |
Require interested personnel and affected parties to sign nondisclosure agreements. CC ID 06667 [Review the institution's policies, standards, and procedures related to the use of the following: Nondisclosure agreements with third-party service providers with access to the institution's systems and data (including before, during, and following termination of the contract). App A Objective 6.31.d {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Establish/Maintain Documentation | Preventive | |
Require interested personnel and affected parties to re-sign nondisclosure agreements, as necessary. CC ID 06669 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a use of information agreement. CC ID 06215 [{nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Establish/Maintain Documentation | Preventive | |
Include use limitations in the use of information agreement. CC ID 06244 | Establish/Maintain Documentation | Preventive | |
Include disclosure requirements in the use of information agreement. CC ID 11735 | Establish/Maintain Documentation | Preventive | |
Include information recipients in the use of information agreement. CC ID 06245 | Establish/Maintain Documentation | Preventive | |
Include reporting out of scope use of information in the use of information agreement. CC ID 06246 | Establish/Maintain Documentation | Preventive | |
Include disclosure of information in the use of information agreement. CC ID 11830 | Establish/Maintain Documentation | Preventive | |
Include information security procedures assigned to the information recipient in the use of information agreement. CC ID 07130 | Establish/Maintain Documentation | Preventive | |
Include information security procedures assigned to the originator in the use of information agreement. CC ID 14418 | Establish/Maintain Documentation | Preventive | |
Include a do not contact rule for the individuals identified in a data set in the use of information agreement. CC ID 07131 | Establish/Maintain Documentation | Preventive | |
Include the information recipient's third parties accepting the agreement in the use of information agreement. CC ID 07132 | Establish/Maintain Documentation | Preventive | |
Implement and comply with the Governance, Risk, and Compliance framework. CC ID 00818 | Business Processes | Preventive | |
Provide assurance to interested personnel and affected parties that the Governance, Risk, and Compliance capability is reliable, effective, efficient, and responsive. CC ID 12788 [{is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Communicate | Preventive | |
Review systems for compliance with organizational information security policies. CC ID 12004 [Determine whether management does the following: Identifies all system components affected by the changes. App A Objective 6.11.e] | Business Processes | Preventive | |
Establish, implement, and maintain an Asset Management program. CC ID 06630 | Business Processes | Preventive | |
Establish, implement, and maintain classification schemes for all systems and assets. CC ID 01902 [{sensitivity of assets} (asset classification} Review whether management does the following: Uses the classification to determine the sensitivity and criticality of assets. App A Objective 6.6.c {sensitivity of assets} (asset classification} Review whether management does the following: Uses the classification to determine the sensitivity and criticality of assets. App A Objective 6.6.c] | Establish/Maintain Documentation | Preventive | |
Apply security controls to each level of the information classification standard. CC ID 01903 [{supplement} With respect to developed software, determine whether institution management does the following: Implements minimum controls recommended by third-party service providers and considers supplemental controls as appropriate. App A Objective 6.28.d Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Systems Design, Build, and Implementation | Preventive | |
Establish, implement, and maintain the systems' confidentiality level. CC ID 01904 | Establish/Maintain Documentation | Preventive | |
Define confidentiality controls. CC ID 01908 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain the systems' availability level. CC ID 01905 | Establish/Maintain Documentation | Preventive | |
Restrict unscheduled downtime in order to maintain high availability for critical systems. CC ID 12742 | Process or Activity | Preventive | |
Define integrity controls. CC ID 01909 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain the systems' integrity level. CC ID 01906 | Establish/Maintain Documentation | Preventive | |
Define availability controls. CC ID 01911 | Establish/Maintain Documentation | Preventive | |
Establish safety classifications for systems according to their potential harmful effects to operators or end users. CC ID 06603 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an asset safety classification scheme. CC ID 06604 [Review whether management does the following: Identifies assets that require protection, such as those that store, transmit, or process sensitive customer information, or trade secrets. App A Objective 6.6.a] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain the Asset Classification Policy. CC ID 06642 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the Asset Classification Policy to interested personnel and affected parties. CC ID 14851 | Communicate | Preventive | |
Classify assets according to the Asset Classification Policy. CC ID 07186 [Review whether management does the following: Classifies assets appropriately. App A Objective 6.6.b Management should inventory and classify assets, including hardware, software, information, and connections. II.C.5 Inventory and Classification of Assets] | Establish Roles | Preventive | |
Classify virtual systems by type and purpose. CC ID 16332 | Business Processes | Preventive | |
Document the decision for assigning an asset to a specific asset classification in the Asset Classification Policy. CC ID 07185 | Establish/Maintain Documentation | Preventive | |
Apply asset protection mechanisms for all assets according to their assigned Asset Classification Policy. CC ID 07184 [{asset classification} Specifically, review whether management does the following: Uses the classification to implement controls required to safeguard the institution's assets. App A Objective 6.6.d] | Establish Roles | Preventive | |
Disallow systems from processing information, disseminating and communicating information, or storing information that is above the system's assigned asset classification. CC ID 06606 | Configuration | Preventive | |
Assign decomposed system components the same asset classification as the originating system. CC ID 06605 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an asset inventory. CC ID 06631 [{asset inventory} Review whether management does the following: Updates the inventory(ies) appropriately. App A Objective 6.6.e] | Business Processes | Preventive | |
Establish, implement, and maintain an Information Technology inventory with asset discovery audit trails. CC ID 00689 [Determine whether management effectively maintains an inventory(ies) of hardware, software, information, and connections. Review whether management does the following: App A Objective 6.6 Management should inventory and classify assets, including hardware, software, information, and connections. II.C.5 Inventory and Classification of Assets] | Establish/Maintain Documentation | Preventive | |
Include all account types in the Information Technology inventory. CC ID 13311 | Establish/Maintain Documentation | Preventive | |
Include each Information System's system boundaries in the Information Technology inventory. CC ID 00695 | Systems Design, Build, and Implementation | Preventive | |
Identify processes, Information Systems, and third parties that transmit, process, or store restricted data. CC ID 06289 | Data and Information Management | Preventive | |
Include each Information System's major applications in the Information Technology inventory. CC ID 01407 | Establish/Maintain Documentation | Preventive | |
Categorize all major applications according to the business information they process. CC ID 07182 | Establish/Maintain Documentation | Preventive | |
Document the resources, hazards, and Evaluation Assurance Levels for each major application. CC ID 01164 | Establish/Maintain Documentation | Preventive | |
Include the General Support Systems and security support structure in the Information Technology inventory. CC ID 01408 | Establish/Maintain Documentation | Preventive | |
Include each Information System's minor applications in the Information Technology inventory. CC ID 01409 | Establish/Maintain Documentation | Preventive | |
Conduct environmental surveys. CC ID 00690 | Physical and Environmental Protection | Preventive | |
Categorize facilities in the Information Technology inventory according to their environmental risks. CC ID 06729 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a hardware asset inventory. CC ID 00691 [{software asset inventory}{information technology inventory} Review whether the institution's life cycle management includes the following: Maintaining inventories of systems and applications. App A Objective 6.16.a] | Establish/Maintain Documentation | Preventive | |
Include network equipment in the Information Technology inventory. CC ID 00693 | Establish/Maintain Documentation | Preventive | |
Include mobile devices that store restricted data or restricted information in the Information Technology inventory. CC ID 04719 | Establish/Maintain Documentation | Preventive | |
Include interconnected systems and Software as a Service in the Information Technology inventory. CC ID 04885 | Process or Activity | Preventive | |
Include software in the Information Technology inventory. CC ID 00692 [{software asset inventory}{information technology inventory} Review whether the institution's life cycle management includes the following: Maintaining inventories of systems and applications. App A Objective 6.16.a] | Establish/Maintain Documentation | Preventive | |
Establish and maintain a list of authorized software and versions required for each system. CC ID 12093 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a storage media inventory. CC ID 00694 | Establish/Maintain Documentation | Preventive | |
Include all electronic storage media containing restricted data or restricted information in the storage media inventory. CC ID 00962 | Establish/Maintain Documentation | Detective | |
Establish, implement, and maintain a records inventory and database inventory. CC ID 01260 | Establish/Maintain Documentation | Preventive | |
Add inventoried assets to the asset register database, as necessary. CC ID 07051 | Establish/Maintain Documentation | Preventive | |
Identify discrepancies between the asset register database and the Information Technology inventory, as necessary. CC ID 07052 | Monitor and Evaluate Occurrences | Corrective | |
Investigate and resolve discrepancies between the asset register database and the Information Technology inventory. CC ID 07053 | Monitor and Evaluate Occurrences | Corrective | |
Organize the asset register database by grouping objects according to an organizational information classification standard. CC ID 07181 | Establish/Maintain Documentation | Preventive | |
Use automated tools to collect Information Technology inventory information, as necessary. CC ID 07054 | Technical Security | Preventive | |
Link the authentication system to the asset inventory. CC ID 13718 | Technical Security | Preventive | |
Record a unique name for each asset in the asset inventory. CC ID 16305 | Data and Information Management | Preventive | |
Record the decommission date for applicable assets in the asset inventory. CC ID 14920 | Establish/Maintain Documentation | Preventive | |
Record the status of information systems in the asset inventory. CC ID 16304 | Data and Information Management | Preventive | |
Record the communication interfaces for applicable assets in the asset inventory. CC ID 16301 | Data and Information Management | Preventive | |
Record the Uniform Resource Locator for applicable assets in the asset inventory. CC ID 14918 | Establish/Maintain Documentation | Preventive | |
Include source code in the asset inventory. CC ID 14858 | Records Management | Preventive | |
Assign ownership of maintaining the asset inventory, as necessary. CC ID 12344 | Human Resources Management | Preventive | |
Employ Dynamic Host Configuration Protocol server logging to detect systems not in the asset inventory. CC ID 12110 | Technical Security | Detective | |
Record the review date for applicable assets in the asset inventory. CC ID 14919 | Establish/Maintain Documentation | Preventive | |
Record software license information for each asset in the asset inventory. CC ID 11736 | Data and Information Management | Preventive | |
Record services for applicable assets in the asset inventory. CC ID 13733 | Establish/Maintain Documentation | Preventive | |
Record protocols for applicable assets in the asset inventory. CC ID 13734 | Establish/Maintain Documentation | Preventive | |
Record the software version in the asset inventory. CC ID 12196 | Establish/Maintain Documentation | Preventive | |
Record the publisher for applicable assets in the asset inventory. CC ID 13725 | Establish/Maintain Documentation | Preventive | |
Record the authentication system in the asset inventory. CC ID 13724 | Establish/Maintain Documentation | Preventive | |
Tag unsupported assets in the asset inventory. CC ID 13723 | Establish/Maintain Documentation | Preventive | |
Record the install date for applicable assets in the asset inventory. CC ID 13720 | Establish/Maintain Documentation | Preventive | |
Record the make, model of device for applicable assets in the asset inventory. CC ID 12465 | Establish/Maintain Documentation | Preventive | |
Record the asset tag for physical assets in the asset inventory. CC ID 06632 | Establish/Maintain Documentation | Preventive | |
Record the host name of applicable assets in the asset inventory. CC ID 13722 | Establish/Maintain Documentation | Preventive | |
Record network ports for applicable assets in the asset inventory. CC ID 13730 | Establish/Maintain Documentation | Preventive | |
Record the MAC address for applicable assets in the asset inventory. CC ID 13721 | Establish/Maintain Documentation | Preventive | |
Record the operating system version for applicable assets in the asset inventory. CC ID 11748 | Data and Information Management | Preventive | |
Record the operating system type for applicable assets in the asset inventory. CC ID 06633 | Establish/Maintain Documentation | Preventive | |
Record rooms at external locations in the asset inventory. CC ID 16302 | Data and Information Management | Preventive | |
Record the department associated with the asset in the asset inventory. CC ID 12084 | Establish/Maintain Documentation | Preventive | |
Record the physical location for applicable assets in the asset inventory. CC ID 06634 | Establish/Maintain Documentation | Preventive | |
Record the manufacturer's serial number for applicable assets in the asset inventory. CC ID 06635 | Establish/Maintain Documentation | Preventive | |
Record the firmware version for applicable assets in the asset inventory. CC ID 12195 | Establish/Maintain Documentation | Preventive | |
Record the related business function for applicable assets in the asset inventory. CC ID 06636 | Establish/Maintain Documentation | Preventive | |
Record the deployment environment for applicable assets in the asset inventory. CC ID 06637 | Establish/Maintain Documentation | Preventive | |
Record the Internet Protocol address for applicable assets in the asset inventory. CC ID 06638 | Establish/Maintain Documentation | Preventive | |
Record trusted keys and certificates in the asset inventory. CC ID 15486 | Data and Information Management | Preventive | |
Record cipher suites and protocols in the asset inventory. CC ID 15489 | Data and Information Management | Preventive | |
Link the software asset inventory to the hardware asset inventory. CC ID 12085 | Establish/Maintain Documentation | Preventive | |
Record the owner for applicable assets in the asset inventory. CC ID 06640 | Establish/Maintain Documentation | Preventive | |
Record all compliance requirements for applicable assets in the asset inventory. CC ID 15696 | Establish/Maintain Documentation | Preventive | |
Record all changes to assets in the asset inventory. CC ID 12190 | Establish/Maintain Documentation | Preventive | |
Record cloud service derived data in the asset inventory. CC ID 13007 | Establish/Maintain Documentation | Preventive | |
Include cloud service customer data in the asset inventory. CC ID 13006 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a system redeployment program. CC ID 06276 [Review whether the institution's life cycle management includes the following: Planning for the update or replacement of und-color:#CBD0E5;" class="term_secondary-verb">tyle="background-color:#F0BBBC;" class="term_primary-noun">systems nearing obsolescence. App A Objective 6.16.d] | Establish/Maintain Documentation | Preventive | |
Test systems for malicious code prior to when the system will be redeployed. CC ID 06339 | Testing | Detective | |
Notify interested personnel and affected parties prior to when the system is redeployed or the system is disposed. CC ID 06400 | Behavior | Preventive | |
Wipe all data on systems prior to when the system is redeployed or the system is disposed. CC ID 06401 | Data and Information Management | Preventive | |
Transfer legal ownership of assets when the system is redeployed to a third party. CC ID 06698 | Acquisition/Sale of Assets or Services | Preventive | |
Document the staff's operating knowledge of the system prior to a personnel status change. CC ID 06937 | Establish/Maintain Documentation | Preventive | |
Redeploy systems to other organizational units, as necessary. CC ID 11452 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a system disposal program. CC ID 14431 [Review whether the institution's life cycle management includes the following: Adhering to an approved end-of-life or sunset policy for older systems. App A Objective 6.16.b Determine whether management plans for the life cycles of the institution's systems, eventual end of life, and any corresponding business impacts. Review whether the institution's life cycle management includes the following: App A Objective 6.16 {system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain disposal procedures. CC ID 16513 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain asset sanitization procedures. CC ID 16511 | Establish/Maintain Documentation | Preventive | |
Destroy systems in accordance with the system disposal program. CC ID 16457 | Business Processes | Preventive | |
Approve the release of systems and waste material into the public domain. CC ID 16461 | Business Processes | Preventive | |
Establish, implement, and maintain system destruction procedures. CC ID 16474 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain printer and multifunction device disposition procedures. CC ID 15216 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a customer service program. CC ID 00846 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an Incident Management program. CC ID 00853 | Business Processes | Preventive | |
Define and assign the roles and responsibilities for Incident Management program. CC ID 13055 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Human Resources Management | Preventive | |
Include incident escalation procedures in the Incident Management program. CC ID 00856 [Determine whether management has effective incident identification and assessment processes to do the following: Escalate the event consistent with the classification. App A Objective 8.5.e {notification process} Determine whether management has effective incident response processes, including the following: Thresholds for reporting significant security incidents and processes to notify, as appropriate, the institution's regulators of those incidents that may affect the institution or the financial system. App A Objective 8.6.f {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Establish/Maintain Documentation | Preventive | |
Define the characteristics of the Incident Management program. CC ID 00855 | Establish/Maintain Documentation | Preventive | |
Include the criteria for an incident in the Incident Management program. CC ID 12173 [Determine whether management has effective incident identification and assessment processes to do the following: Identify indicators of compromise. App A Objective 8.5.a {incident response procedures} Determine whether management has effective incident response processes, including the following: Protocols defined in the incident response policy to declare and respond to an incident once identified. App A Objective 8.6.a {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Establish/Maintain Documentation | Preventive | |
Include detection procedures in the Incident Management program. CC ID 00588 | Establish/Maintain Documentation | Preventive | |
Categorize the incident following an incident response. CC ID 13208 | Technical Security | Preventive | |
Define and document impact thresholds to be used in categorizing incidents. CC ID 10033 [{adhere} {information security incident} Determine whether management responsibilities are appropriate and include the following: Adherence to risk thresholds established by the board relating to information security threats or incidents, including those relating to cybersecurity. App A Objective 2.5.e {notification process} Determine whether management has effective incident response processes, including the following: Thresholds for reporting significant security incidents and processes to notify, as appropriate, the institution's regulators of those incidents that may affect the institution or the financial system. App A Objective 8.6.f] | Establish/Maintain Documentation | Preventive | |
Determine the incident severity level when assessing the security incidents. CC ID 01650 [Determine whether management has effective incident identification and assessment processes to do the following: Classify the event. App A Objective 8.5.c {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Monitor and Evaluate Occurrences | Corrective | |
Contain the incident to prevent further loss. CC ID 01751 [Determine whether management has effective incident response processes, including the following: Containment strategies. App A Objective 8.6.h {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Process or Activity | Corrective | |
Wipe data and memory after an incident has been detected. CC ID 16850 | Technical Security | Corrective | |
Refrain from accessing compromised systems. CC ID 01752 | Technical Security | Corrective | |
Isolate compromised systems from the network. CC ID 01753 | Technical Security | Corrective | |
Store system logs for in scope systems as digital forensic evidence after a security incident has been detected. CC ID 01754 | Log Management | Corrective | |
Change authenticators after a security incident has been detected. CC ID 06789 | Technical Security | Corrective | |
Refrain from turning on any in scope devices that are turned off when a security incident is detected. CC ID 08677 | Investigate | Detective | |
Record actions taken by investigators during a forensic investigation in the forensic investigation report. CC ID 07095 | Establish/Maintain Documentation | Preventive | |
Include where the digital forensic evidence was found in the forensic investigation report. CC ID 08674 | Establish/Maintain Documentation | Detective | |
Include the condition of the digital forensic evidence in the forensic investigation report. CC ID 08678 | Establish/Maintain Documentation | Detective | |
Analyze the incident response process following an incident response. CC ID 13179 [Determine whether management has effective incident response processes, including the following: Appropriate balance of adequate people and technologies in the response. App A Objective 8.6.c] | Investigate | Detective | |
Include data loss event notifications in the Incident Response program. CC ID 00364 | Establish/Maintain Documentation | Preventive | |
Notify interested personnel and affected parties of the privacy breach that affects their personal data. CC ID 00365 [{preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Behavior | Corrective | |
Determine whether or not incident response notifications are necessary during the privacy breach investigation. CC ID 00801 | Behavior | Detective | |
Delay sending incident response notifications under predetermined conditions. CC ID 00804 | Behavior | Corrective | |
Include required information in the written request to delay the notification to affected parties. CC ID 16785 | Establish/Maintain Documentation | Preventive | |
Submit written requests to delay the notification of affected parties. CC ID 16783 | Communicate | Preventive | |
Revoke the written request to delay the notification. CC ID 16843 | Process or Activity | Preventive | |
Design the text of the notice for all incident response notifications to be no smaller than 10-point type. CC ID 12985 | Establish/Maintain Documentation | Preventive | |
Avoid false positive incident response notifications. CC ID 04732 | Behavior | Detective | |
Establish, implement, and maintain incident response notifications. CC ID 12975 | Establish/Maintain Documentation | Corrective | |
Refrain from charging for providing incident response notifications. CC ID 13876 | Business Processes | Preventive | |
Include information required by law in incident response notifications. CC ID 00802 | Establish/Maintain Documentation | Detective | |
Title breach notifications "Notice of Data Breach". CC ID 12977 | Establish/Maintain Documentation | Preventive | |
Display titles of incident response notifications clearly and conspicuously. CC ID 12986 | Establish/Maintain Documentation | Preventive | |
Display headings in incident response notifications clearly and conspicuously. CC ID 12987 | Establish/Maintain Documentation | Preventive | |
Design the incident response notification to call attention to its nature and significance. CC ID 12984 | Establish/Maintain Documentation | Preventive | |
Use plain language to write incident response notifications. CC ID 12976 | Establish/Maintain Documentation | Preventive | |
Include directions for changing the user's authenticator or security questions and answers in the breach notification. CC ID 12983 | Establish/Maintain Documentation | Preventive | |
Refrain from including restricted information in the incident response notification. CC ID 16806 | Actionable Reports or Measurements | Preventive | |
Include the affected parties rights in the incident response notification. CC ID 16811 | Establish/Maintain Documentation | Preventive | |
Include details of the investigation in incident response notifications. CC ID 12296 | Establish/Maintain Documentation | Preventive | |
Include the issuer's name in incident response notifications. CC ID 12062 | Establish/Maintain Documentation | Preventive | |
Include a "What Happened" heading in breach notifications. CC ID 12978 | Establish/Maintain Documentation | Preventive | |
Include a general description of the data loss event in incident response notifications. CC ID 04734 | Establish/Maintain Documentation | Preventive | |
Include time information in incident response notifications. CC ID 04745 | Establish/Maintain Documentation | Preventive | |
Include the identification of the data source in incident response notifications. CC ID 12305 | Establish/Maintain Documentation | Preventive | |
Include a "What Information Was Involved" heading in the breach notification. CC ID 12979 | Establish/Maintain Documentation | Preventive | |
Include the type of information that was lost in incident response notifications. CC ID 04735 | Establish/Maintain Documentation | Preventive | |
Include the type of information the organization maintains about the affected parties in incident response notifications. CC ID 04776 | Establish/Maintain Documentation | Preventive | |
Include a "What We Are Doing" heading in the breach notification. CC ID 12982 | Establish/Maintain Documentation | Preventive | |
Include what the organization has done to enhance data protection controls in incident response notifications. CC ID 04736 | Establish/Maintain Documentation | Preventive | |
Include what the organization is offering or has already done to assist affected parties in incident response notifications. CC ID 04737 | Establish/Maintain Documentation | Preventive | |
Include a "For More Information" heading in breach notifications. CC ID 12981 | Establish/Maintain Documentation | Preventive | |
Include details of the companies and persons involved in incident response notifications. CC ID 12295 | Establish/Maintain Documentation | Preventive | |
Include the credit reporting agencies' contact information in incident response notifications. CC ID 04744 | Establish/Maintain Documentation | Preventive | |
Include the reporting individual's contact information in incident response notifications. CC ID 12297 | Establish/Maintain Documentation | Preventive | |
Include any consequences in the incident response notifications. CC ID 12604 | Establish/Maintain Documentation | Preventive | |
Include whether the notification was delayed due to a law enforcement investigation in incident response notifications. CC ID 04746 | Establish/Maintain Documentation | Preventive | |
Include a "What You Can Do" heading in the breach notification. CC ID 12980 | Establish/Maintain Documentation | Preventive | |
Include how the affected parties can protect themselves from identity theft in incident response notifications. CC ID 04738 | Establish/Maintain Documentation | Detective | |
Provide enrollment information for identity theft prevention services or identity theft mitigation services. CC ID 13767 | Communicate | Corrective | |
Offer identity theft prevention services or identity theft mitigation services at no cost to the affected parties. CC ID 13766 | Business Processes | Corrective | |
Include contact information in incident response notifications. CC ID 04739 | Establish/Maintain Documentation | Preventive | |
Include a copy of the incident response notification in breach notifications, as necessary. CC ID 13085 | Communicate | Preventive | |
Send paper incident response notifications to affected parties, as necessary. CC ID 00366 | Behavior | Corrective | |
Post the incident response notification on the organization's website. CC ID 16809 | Process or Activity | Preventive | |
Determine if a substitute incident response notification is permitted if notifying affected parties. CC ID 00803 | Behavior | Corrective | |
Document the determination for providing a substitute incident response notification. CC ID 16841 | Process or Activity | Preventive | |
Use a substitute incident response notification to notify interested personnel and affected parties of the privacy breach that affects their personal data. CC ID 00368 | Behavior | Corrective | |
Telephone incident response notifications to affected parties, as necessary. CC ID 04650 | Behavior | Corrective | |
Send electronic substitute incident response notifications to affected parties, as necessary. CC ID 04747 | Behavior | Preventive | |
Include contact information in the substitute incident response notification. CC ID 16776 | Establish/Maintain Documentation | Preventive | |
Post substitute incident response notifications to the organization's website, as necessary. CC ID 04748 | Establish/Maintain Documentation | Preventive | |
Send substitute incident response notifications to breach notification organizations, as necessary. CC ID 04750 | Behavior | Preventive | |
Publish the incident response notification in a general circulation periodical. CC ID 04651 | Behavior | Corrective | |
Publish the substitute incident response notification in a general circulation periodical, as necessary. CC ID 04769 | Behavior | Preventive | |
Send electronic incident response notifications to affected parties, as necessary. CC ID 00367 | Behavior | Corrective | |
Notify interested personnel and affected parties of the privacy breach about any recovered restricted data. CC ID 13347 | Communicate | Corrective | |
Include incident recovery procedures in the Incident Management program. CC ID 01758 [{preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Establish/Maintain Documentation | Corrective | |
Change wireless access variables after a data loss event has been detected. CC ID 01756 | Technical Security | Corrective | |
Eradicate the cause of the incident after the incident has been contained. CC ID 01757 | Business Processes | Corrective | |
Establish, implement, and maintain a restoration log. CC ID 12745 | Establish/Maintain Documentation | Preventive | |
Include a description of the restored data that was restored manually in the restoration log. CC ID 15463 | Data and Information Management | Preventive | |
Include a description of the restored data in the restoration log. CC ID 15462 | Data and Information Management | Preventive | |
Implement security controls for personnel that have accessed information absent authorization. CC ID 10611 | Human Resources Management | Corrective | |
Establish, implement, and maintain compromised system reaccreditation procedures. CC ID 00592 | Establish/Maintain Documentation | Preventive | |
Detect any potentially undiscovered security vulnerabilities on previously compromised systems. CC ID 06265 | Monitor and Evaluate Occurrences | Detective | |
Re-image compromised systems with secure builds. CC ID 12086 | Technical Security | Corrective | |
Analyze security violations in Suspicious Activity Reports. CC ID 00591 | Establish/Maintain Documentation | Preventive | |
Include lessons learned from analyzing security violations in the Incident Management program. CC ID 01234 [{information security program review} Verify whether that review does the following: Demonstrates that lessons learned from experience, audit findings, and other opportunities for improvement are identified and applied. App A Objective 9.1.b Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Security breaches or violations and management's responses. App A Objective 2.4.e] | Monitor and Evaluate Occurrences | Preventive | |
Include incident monitoring procedures in the Incident Management program. CC ID 01207 [{incident management] Determine whether the institution's security operations activities include the following: Incident detection and management. App A Objective 8.1.j {incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a {incident identification process}{incident assessment process} Determine whether management has effective incident identification and assessment processes to do the following: App A Objective 8.5] | Establish/Maintain Documentation | Preventive | |
Include incident response procedures in the Incident Management program. CC ID 01218 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {incident identification process}{incident assessment process} Determine whether management has effective incident identification and assessment processes to do the following: App A Objective 8.5] | Establish/Maintain Documentation | Preventive | |
Include incident management procedures in the Incident Management program. CC ID 12689 [{incident management] Determine whether the institution's security operations activities include the following: Incident detection and management. App A Objective 8.1.j] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain temporary and emergency access authorization procedures. CC ID 00858 | Establish/Maintain Documentation | Corrective | |
Establish, implement, and maintain temporary and emergency access revocation procedures. CC ID 15334 | Establish/Maintain Documentation | Preventive | |
Include after-action analysis procedures in the Incident Management program. CC ID 01219 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain incident management audit logs. CC ID 13514 | Records Management | Preventive | |
Log incidents in the Incident Management audit log. CC ID 00857 [{incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f] | Establish/Maintain Documentation | Preventive | |
Include who the incident was reported to in the incident management audit log. CC ID 16487 | Log Management | Preventive | |
Include corrective actions in the incident management audit log. CC ID 16466 | Establish/Maintain Documentation | Preventive | |
Include the organizational functions affected by disruption in the Incident Management audit log. CC ID 12238 | Log Management | Corrective | |
Include the organization's business products and services affected by disruptions in the Incident Management audit log. CC ID 12234 | Log Management | Preventive | |
Include incident reporting procedures in the Incident Management program. CC ID 11772 [{incident reporting procedure} Determine whether management has effective incident identification and assessment processes to do the following: Report internally and externally as appropriate. App A Objective 8.5.f {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain incident reporting time frame standards. CC ID 12142 | Communicate | Preventive | |
Establish, implement, and maintain an Incident Response program. CC ID 00579 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Establish/Maintain Documentation | Preventive | |
Create an incident response report following an incident response. CC ID 12700 | Establish/Maintain Documentation | Preventive | |
Include disciplinary actions taken in the incident response report. CC ID 16810 | Establish/Maintain Documentation | Preventive | |
Include the persons responsible for the incident in the incident response report. CC ID 16808 | Establish/Maintain Documentation | Preventive | |
Include the number of individuals the incident response notification was sent to in the incident response report. CC ID 16789 | Establish/Maintain Documentation | Preventive | |
Include any consequences to organizational reputation and confidence due to the incident in the incident response report. CC ID 12728 | Establish/Maintain Documentation | Preventive | |
Include the number of customers that were affected by the incident in the incident response report. CC ID 12727 | Establish/Maintain Documentation | Preventive | |
Include investments associated with the incident in the incident response report. CC ID 12726 | Establish/Maintain Documentation | Preventive | |
Include costs associated with the incident in the incident response report. CC ID 12725 | Establish/Maintain Documentation | Preventive | |
Include losses due to the incident in the incident response report. CC ID 12724 | Establish/Maintain Documentation | Preventive | |
Include a description of the impact the incident had on customer service in the incident response report. CC ID 12735 | Establish/Maintain Documentation | Preventive | |
Include foregone revenue from the incident in the incident response report. CC ID 12723 | Establish/Maintain Documentation | Preventive | |
Include the magnitude of the incident in the incident response report. CC ID 12722 | Establish/Maintain Documentation | Preventive | |
Include implications of the incident in the incident response report. CC ID 12721 | Establish/Maintain Documentation | Preventive | |
Include measures to prevent similar incidents from occurring in the incident response report. CC ID 12720 | Establish/Maintain Documentation | Preventive | |
Include breaches of regulatory requirements due to the incident in the incident response report. CC ID 12719 | Establish/Maintain Documentation | Preventive | |
Include information on all affected assets in the incident response report. CC ID 12718 | Establish/Maintain Documentation | Preventive | |
Include the scope of the incident in the incident response report. CC ID 12717 | Establish/Maintain Documentation | Preventive | |
Include the duration of the incident in the incident response report. CC ID 12716 | Establish/Maintain Documentation | Preventive | |
Include the extent of the incident in the incident response report. CC ID 12715 | Establish/Maintain Documentation | Preventive | |
Include measures to mitigate the root causes of the incident in the incident response report. CC ID 12714 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Highlight potential areas for mitigation. App A Objective 5.1.d Review management's response to issues raised at, or since, the last examination. Consider the following: Resolution of root causes rather than just specific issues. App A Objective 1.2.b] | Establish/Maintain Documentation | Preventive | |
Include the reasons the incident occurred in the incident response report. CC ID 12711 | Establish/Maintain Documentation | Preventive | |
Include the frequency of similar incidents occurring in the incident response report. CC ID 12712 | Establish/Maintain Documentation | Preventive | |
Include lessons learned from the incident in the incident response report. CC ID 12713 | Establish/Maintain Documentation | Preventive | |
Include where the incident occurred in the incident response report. CC ID 12710 | Establish/Maintain Documentation | Preventive | |
Include when the incident occurred in the incident response report. CC ID 12709 | Establish/Maintain Documentation | Preventive | |
Include corrective action taken to eradicate the incident in the incident response report. CC ID 12708 | Establish/Maintain Documentation | Preventive | |
Include a description of the impact the incident had on regulatory compliance in the incident response report. CC ID 12704 | Establish/Maintain Documentation | Preventive | |
Include a description of the impact the incident had on operations in the incident response report. CC ID 12703 [Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Establish/Maintain Documentation | Preventive | |
Include an executive summary of the incident in the incident response report. CC ID 12702 | Establish/Maintain Documentation | Preventive | |
Include a root cause analysis of the incident in the incident response report. CC ID 12701 | Establish/Maintain Documentation | Preventive | |
Submit the incident response report to the proper authorities in a timely manner. CC ID 12705 | Communicate | Preventive | |
Employ tools and mechanisms to support the organization's Incident Response program. CC ID 13182 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Acquisition/Sale of Assets or Services | Preventive | |
Define target resolution times for incident response in the Incident Response program. CC ID 13072 | Establish/Maintain Documentation | Preventive | |
Analyze and respond to security alerts. CC ID 12504 | Business Processes | Detective | |
Mitigate reported incidents. CC ID 12973 | Actionable Reports or Measurements | Preventive | |
Establish, implement, and maintain an incident response plan. CC ID 12056 | Establish/Maintain Documentation | Preventive | |
Include addressing external communications in the incident response plan. CC ID 13351 | Establish/Maintain Documentation | Preventive | |
Include addressing internal communications in the incident response plan. CC ID 13350 | Establish/Maintain Documentation | Preventive | |
Include change control procedures in the incident response plan. CC ID 15479 | Establish/Maintain Documentation | Preventive | |
Include addressing information sharing in the incident response plan. CC ID 13349 | Establish/Maintain Documentation | Preventive | |
Include dynamic reconfiguration in the incident response plan. CC ID 14306 | Establish/Maintain Documentation | Preventive | |
Include a definition of reportable incidents in the incident response plan. CC ID 14303 | Establish/Maintain Documentation | Preventive | |
Include the management support needed for incident response in the incident response plan. CC ID 14300 | Establish/Maintain Documentation | Preventive | |
Include root cause analysis in the incident response plan. CC ID 16423 | Establish/Maintain Documentation | Preventive | |
Include how incident response fits into the organization in the incident response plan. CC ID 14294 | Establish/Maintain Documentation | Preventive | |
Include the resources needed for incident response in the incident response plan. CC ID 14292 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a cyber incident response plan. CC ID 13286 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the cyber incident response plan to interested personnel and affected parties. CC ID 16838 | Communicate | Preventive | |
Include incident response team structures in the Incident Response program. CC ID 01237 | Establish/Maintain Documentation | Preventive | |
Include the incident response team member's roles and responsibilities in the Incident Response program. CC ID 01652 [{incident response personnel} Determine whether management has effective incident identification and assessment processes to do the following: Identify personnel empowered to declare an incident. App A Objective 8.5.g {assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g] | Establish Roles | Preventive | |
Include the incident response point of contact's roles and responsibilities in the Incident Response program. CC ID 01877 | Establish Roles | Preventive | |
Open a priority incident request after a security breach is detected. CC ID 04838 | Testing | Corrective | |
Activate the incident response notification procedures after a security breach is detected. CC ID 04839 | Testing | Corrective | |
Notify interested personnel and affected parties that a security breach was detected. CC ID 11788 | Communicate | Corrective | |
Include the head of information security's roles and responsibilities in the Incident Response program. CC ID 01878 | Establish Roles | Preventive | |
Include the customer database owner's roles and responsibilities in the Incident Response program. CC ID 01879 | Establish Roles | Preventive | |
Include the online sales department's roles and responsibilities in the Incident Response program. CC ID 01880 | Establish Roles | Preventive | |
Include the incident response point of contact for credit card payment system's roles and responsibilities in the Incident Response program. CC ID 01881 | Establish Roles | Preventive | |
Include the organizational legal counsel's roles and responsibilities in the Incident Response program. CC ID 01882 | Establish Roles | Preventive | |
Include the Human Resources point of contact's roles and responsibilities in the Incident Response program. CC ID 01883 | Establish Roles | Preventive | |
Include the organizational incident response network architecture point of contact's roles and responsibilities in the Incident Response program. CC ID 01884 | Establish Roles | Preventive | |
Include the organizational incident response public relations point of contact's roles and responsibilities in the Incident Response program. CC ID 01885 | Establish Roles | Preventive | |
Include the organizational incident response location manager's roles and responsibilities in the Incident Response program. CC ID 01886 | Establish Roles | Preventive | |
Assign the distribution of security alerts to the appropriate role in the incident response program. CC ID 11887 | Human Resources Management | Preventive | |
Assign monitoring and analyzing the security alert when a security alert is received to the appropriate role in the incident response program. CC ID 11886 | Investigate | Detective | |
Assign establishing, implementing, and maintaining incident response procedures to the appropriate role in the incident response program. CC ID 12473 | Establish/Maintain Documentation | Preventive | |
Assign the distribution of incident response procedures to the appropriate role in the incident response program. CC ID 12474 | Communicate | Preventive | |
Include personnel contact information in the event of an incident in the Incident Response program. CC ID 06385 | Establish/Maintain Documentation | Preventive | |
Include what information interested personnel and affected parties need in the event of an incident in the Incident Response program. CC ID 11789 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d] | Establish/Maintain Documentation | Preventive | |
Include identifying remediation actions in the incident response plan. CC ID 13354 | Establish/Maintain Documentation | Preventive | |
Include procedures for providing updated status information to the crisis management team in the incident response plan. CC ID 12776 | Establish/Maintain Documentation | Preventive | |
Include coverage of all system components in the Incident Response program. CC ID 11955 | Establish/Maintain Documentation | Preventive | |
Prepare for incident response notifications. CC ID 00584 [Review the institution's policies, standards, and procedures related to the use of the following: Coordination of incident response policies and contractual notification requirements. App A Objective 6.31.f {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Establish/Maintain Documentation | Preventive | |
Include incident response team services in the Incident Response program. CC ID 11766 [Determine whether management has effective incident identification and assessment processes to do the following: Enable the use of response teams and responses depending on the type of event. App A Objective 8.5.d] | Establish/Maintain Documentation | Preventive | |
Include the incident response training program in the Incident Response program. CC ID 06750 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Establish/Maintain Documentation | Preventive | |
Incorporate simulated events into the incident response training program. CC ID 06751 | Behavior | Preventive | |
Incorporate realistic exercises that are tested into the incident response training program. CC ID 06753 [{information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Behavior | Preventive | |
Conduct incident response training. CC ID 11889 [{assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g] | Training | Preventive | |
Establish, implement, and maintain an incident response policy. CC ID 14024 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the incident response policy. CC ID 14108 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the incident response policy. CC ID 14107 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the incident response policy. CC ID 14106 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the incident response policy. CC ID 14105 | Establish/Maintain Documentation | Preventive | |
Include the scope in the incident response policy. CC ID 14104 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the incident response policy. CC ID 14101 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the incident response policy to interested personnel and affected parties. CC ID 14099 | Communicate | Preventive | |
Establish, implement, and maintain incident response procedures. CC ID 01206 [Determine whether management has effective incident identification and assessment processes to do the following: Enable the use of response teams and responses depending on the type of event. App A Objective 8.5.d {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f Determine whether management has effective incident response processes, including the following: App A Objective 8.6 {restoration strategy} {follow-up strategy} Determine whether management has effective incident response processes, including the following: Restoration and follow-up strategies. App A Objective 8.6.i {incident response procedures} Determine whether management has effective incident response processes, including the following: Protocols defined in the incident response policy to declare and respond to an incident once identified. App A Objective 8.6.a {incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Establish/Maintain Documentation | Detective | |
Include references to industry best practices in the incident response procedures. CC ID 11956 | Establish/Maintain Documentation | Preventive | |
Include responding to alerts from security monitoring systems in the incident response procedures. CC ID 11949 | Establish/Maintain Documentation | Preventive | |
Respond when an integrity violation is detected, as necessary. CC ID 10678 | Technical Security | Corrective | |
Shut down systems when an integrity violation is detected, as necessary. CC ID 10679 | Technical Security | Corrective | |
Restart systems when an integrity violation is detected, as necessary. CC ID 10680 | Technical Security | Corrective | |
Maintain contact with breach notification organizations for notification purposes in the event a privacy breach has occurred. CC ID 01213 | Behavior | Preventive | |
Include business continuity procedures in the Incident Response program. CC ID 06433 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Establish/Maintain Documentation | Preventive | |
Coordinate backup procedures as defined in the system continuity plan with backup procedures necessary for incident response procedures. CC ID 06432 | Establish/Maintain Documentation | Preventive | |
Include consumer protection procedures in the Incident Response program. CC ID 12755 | Systems Continuity | Preventive | |
Include the reimbursement of customers for financial losses due to incidents in the Incident Response program. CC ID 12756 | Business Processes | Preventive | |
Establish trust between the incident response team and the end user community during an incident. CC ID 01217 | Testing | Detective | |
Include business recovery procedures in the Incident Response program. CC ID 11774 [Review whether management has the following: Incident response programs that include all affected lines of business and support units. App A Objective 3.2.b] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a digital forensic evidence framework. CC ID 08652 [Determine whether the institution's security operations activities include the following: Forensics (e.g., analysis of potentially compromised systems). App A Objective 8.1.b] | Establish/Maintain Documentation | Preventive | |
Retain collected evidence for potential future legal actions. CC ID 01235 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Records Management | Preventive | |
Protect devices containing digital forensic evidence during transport. CC ID 08687 | Investigate | Detective | |
Protect devices containing digital forensic evidence in sealed containers. CC ID 08685 | Investigate | Detective | |
Establish, implement, and maintain a chain of custody for all devices containing digital forensic evidence. CC ID 08686 | Establish/Maintain Documentation | Detective | |
Define the business scenarios that require digital forensic evidence. CC ID 08653 | Establish/Maintain Documentation | Preventive | |
Define the circumstances for collecting digital forensic evidence. CC ID 08657 | Establish/Maintain Documentation | Preventive | |
Conduct forensic investigations in the event of a security compromise. CC ID 11951 | Investigate | Corrective | |
Contact affected parties to participate in forensic investigations, as necessary. CC ID 12343 | Communicate | Detective | |
Identify potential sources of digital forensic evidence. CC ID 08651 | Investigate | Preventive | |
Document the legal requirements for evidence collection. CC ID 08654 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a digital forensic evidence collection program. CC ID 08655 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the digital forensic evidence collection program. CC ID 15724 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain secure storage and handling of evidence procedures. CC ID 08656 | Records Management | Preventive | |
Prepare digital forensic equipment. CC ID 08688 | Investigate | Detective | |
Use digital forensic equipment suitable to the circumstances. CC ID 08690 | Investigate | Detective | |
Provide relevant user manuals for digital forensic equipment during use. CC ID 08691 | Investigate | Detective | |
Include the hardware configuration and software configuration of the digital forensic equipment in the forensic investigation report. CC ID 08693 | Establish/Maintain Documentation | Detective | |
Test the operation of the digital forensic equipment prior to use. CC ID 08694 | Testing | Detective | |
Maintain digital forensic equipment for proper performance. CC ID 08689 | Investigate | Detective | |
Collect evidence from the incident scene. CC ID 02236 | Business Processes | Corrective | |
Include documentation of the system containing and surrounding digital forensic evidence in the forensic investigation report. CC ID 08679 | Establish/Maintain Documentation | Detective | |
Include the configuration settings of devices associated with digital forensic evidence in the forensic investigation report. CC ID 08676 | Establish/Maintain Documentation | Detective | |
Include the external connections to systems containing digital forensic evidence in the forensic investigation report. CC ID 08680 | Establish/Maintain Documentation | Detective | |
Include the electronic media storage devices containing digital forensic evidence in the forensic investigation report. CC ID 08695 | Establish/Maintain Documentation | Detective | |
Include all system components of systems containing digital forensic evidence in the forensic investigation report. CC ID 08696 | Establish/Maintain Documentation | Detective | |
Refrain from altering the state of compromised systems when collecting digital forensic evidence. CC ID 08671 | Investigate | Detective | |
Follow all applicable laws and principles when collecting digital forensic evidence. CC ID 08672 | Investigate | Detective | |
Remove everyone except interested personnel and affected parties from the proximity of digital forensic evidence. CC ID 08675 | Investigate | Detective | |
Secure devices containing digital forensic evidence. CC ID 08681 | Investigate | Detective | |
Use a write blocker to prevent digital forensic evidence from being modified. CC ID 08692 | Investigate | Detective | |
Capture volatile information from devices containing digital forensic evidence prior to shutdown. CC ID 08684 | Investigate | Detective | |
Create a system image of the device before collecting digital forensic evidence. CC ID 08673 | Investigate | Detective | |
Shut down stand alone devices containing digital forensic evidence. CC ID 08682 | Investigate | Detective | |
Disconnect electronic media storage devices of systems containing digital forensic evidence. CC ID 08697 | Investigate | Detective | |
Place evidence tape over devices containing digital forensic evidence. CC ID 08683 | Investigate | Detective | |
Disseminate and communicate the incident response procedures to all interested personnel and affected parties. CC ID 01215 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the final incident report, which includes the investigation results and any remediation activity results. CC ID 12306 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Actionable Reports or Measurements | Preventive | |
Test the incident response procedures. CC ID 01216 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {incident response plan} Review whether management does the following: Develops and tests a response plan in conjunction with the institution's ISPs and third-party service providers to mitigate the interruption of mobile or remote financial services. App A Objective 6.25.c Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Testing | Detective | |
Document the results of incident response tests and provide them to senior management. CC ID 14857 | Actionable Reports or Measurements | Preventive | |
Establish, implement, and maintain a change control program. CC ID 00886 [Determine whether management has a process to introduce changes to the environment (e.g., configuration management of IT systems and applications, hardening of systems and applications, use of standard builds, and patch management) in a controlled manner. Determine whether management does the following: App A Objective 6.11 {change control program} Determine whether management does the following: Maintains procedures to guide the process of introducing changes to the environment. App A Objective 6.11.a Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Establish/Maintain Documentation | Preventive | |
Include potential consequences of unintended changes in the change control program. CC ID 12243 | Establish/Maintain Documentation | Preventive | |
Include version control in the change control program. CC ID 13119 | Establish/Maintain Documentation | Preventive | |
Include service design and transition in the change control program. CC ID 13920 | Establish/Maintain Documentation | Preventive | |
Separate the production environment from development environment or test environment for the change control process. CC ID 11864 | Maintenance | Preventive | |
Integrate configuration management procedures into the change control program. CC ID 13646 | Technical Security | Preventive | |
Establish, implement, and maintain a back-out plan. CC ID 13623 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain back-out procedures for each proposed change in a change request. CC ID 00373 [Determine whether management does the following: Defines rollback procedures in the event of unintended or negative consequences with the introduced changes. App A Objective 6.11.h] | Establish/Maintain Documentation | Preventive | |
Approve back-out plans, as necessary. CC ID 13627 | Establish/Maintain Documentation | Corrective | |
Manage change requests. CC ID 00887 | Business Processes | Preventive | |
Include documentation of the impact level of proposed changes in the change request. CC ID 11942 [Determine whether management does the following: Reviews the potential impact changes have on security controls. App A Objective 6.11.d] | Establish/Maintain Documentation | Preventive | |
Establish and maintain a change request approver list. CC ID 06795 | Establish/Maintain Documentation | Preventive | |
Document all change requests in change request forms. CC ID 06794 | Establish/Maintain Documentation | Preventive | |
Test proposed changes prior to their approval. CC ID 00548 | Testing | Detective | |
Examine all changes to ensure they correspond with the change request. CC ID 12345 | Business Processes | Detective | |
Approve tested change requests. CC ID 11783 [Determine whether management does the following: Verifies the application or system owner has authorized changes in advance. App A Objective 6.11.i] | Data and Information Management | Preventive | |
Validate the system before implementing approved changes. CC ID 01510 | Systems Design, Build, and Implementation | Preventive | |
Disseminate and communicate proposed changes to all interested personnel and affected parties. CC ID 06807 | Behavior | Preventive | |
Establish, implement, and maintain emergency change procedures. CC ID 00890 | Establish/Maintain Documentation | Preventive | |
Perform emergency changes, as necessary. CC ID 12707 | Process or Activity | Preventive | |
Back up emergency changes after the change has been performed. CC ID 12734 | Process or Activity | Preventive | |
Log emergency changes after they have been performed. CC ID 12733 | Establish/Maintain Documentation | Preventive | |
Perform risk assessments prior to approving change requests. CC ID 00888 | Testing | Preventive | |
Conduct network certifications prior to approving change requests for networks. CC ID 13121 | Process or Activity | Detective | |
Analyze mitigating controls for vulnerabilities in the network when certifying the network. CC ID 13126 | Investigate | Detective | |
Collect data about the network environment when certifying the network. CC ID 13125 | Investigate | Detective | |
Implement changes according to the change control program. CC ID 11776 [Determine whether management does the following: Defines change requirements. App A Objective 6.11.b] | Business Processes | Preventive | |
Provide audit trails for all approved changes. CC ID 13120 [Determine whether management does the following: Maintains an audit trail of all changes. App A Objective 6.11.m Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a patch management program. CC ID 00896 [Review whether patch management processes include the following: An effective monitoring process that identifies the availability of software patches. App A Objective 6.15.a {system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c Determine whether management has a process to update and patch operating systems, network devices, and software applications, including internally developed software provided to customers, for newly discovered vulnerabilities. Review whether patch management processes include the following: App A Objective 6.15 Review whether applications in use provide the following capabilities: Allow administrators to review and install patches for applications in a timely manner. App A Objective 6.27.d Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Process or Activity | Preventive | |
Document the sources of all software updates. CC ID 13316 | Establish/Maintain Documentation | Preventive | |
Implement patch management software, as necessary. CC ID 12094 [Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d] | Technical Security | Preventive | |
Include updates and exceptions to hardened images as a part of the patch management program. CC ID 12087 [{patch exception process} Review whether patch management processes include the following: An exception process, with appropriate documentation, for patches that an institution decides to delay or not apply. App A Objective 6.15.e] | Technical Security | Preventive | |
Establish, implement, and maintain a patch management policy. CC ID 16432 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain patch management procedures. CC ID 15224 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a patch log. CC ID 01642 [{system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Establish/Maintain Documentation | Preventive | |
Review the patch log for missing patches. CC ID 13186 | Technical Security | Detective | |
Perform a patch test prior to deploying a patch. CC ID 00898 [Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d Review whether patch management processes include the following: A process to evaluate the patches against the threat and network environment. App A Objective 6.15.b Review whether patch management processes include the following: A process to evaluate the patches against the threat and network environment. App A Objective 6.15.b] | Testing | Detective | |
Prioritize deploying patches according to vulnerability risk metrics. CC ID 06796 [{patch prioritization} Review whether patch management processes include the following: A prioritization process to determine which patches to apply across classes of computers and applications. App A Objective 6.15.c] | Business Processes | Preventive | |
Deploy software patches in accordance with organizational standards. CC ID 07032 | Configuration | Corrective | |
Test software patches for any potential compromise of the system's security. CC ID 13175 [Review whether patch management processes include the following: Actions to ensure that patches do not compromise the security of the institution's systems. App A Objective 6.15.h] | Testing | Detective | |
Patch software. CC ID 11825 | Technical Security | Corrective | |
Patch the operating system, as necessary. CC ID 11824 | Technical Security | Corrective | |
Deploy software patches in the disaster recovery environment to mirror those in the production environment. CC ID 13174 [Review whether patch management processes include the following: A process to ensure that all patches installed in the production environment are also installed in the disaster recovery environment. App A Objective 6.15.f] | Configuration | Corrective | |
Remove outdated software after software has been updated. CC ID 11792 | Configuration | Corrective | |
Update computer firmware, as necessary. CC ID 11755 | Configuration | Corrective | |
Review changes to computer firmware. CC ID 12226 | Testing | Detective | |
Certify changes to computer firmware are free of malicious logic. CC ID 12227 | Testing | Detective | |
Remove outdated computer firmware after the computer firmware has been updated. CC ID 10671 | Configuration | Corrective | |
Implement cryptographic mechanisms to authenticate software and computer firmware before installation. CC ID 10682 | Technical Security | Detective | |
Establish, implement, and maintain a software release policy. CC ID 00893 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain traceability documentation. CC ID 16388 | Systems Design, Build, and Implementation | Preventive | |
Disseminate and communicate software update information to users and regulators. CC ID 06602 | Behavior | Preventive | |
Allow interested personnel and affected parties to opt out of specific version releases and software updates. CC ID 06809 | Data and Information Management | Preventive | |
Mitigate the adverse effects of unauthorized changes. CC ID 12244 | Business Processes | Corrective | |
Establish, implement, and maintain approved change acceptance testing procedures. CC ID 06391 [{system test} Determine whether management does the following: Performs necessary tests of all changes to the environment (e.g., systems testing, integration testing, functional testing, user acceptance testing, and security testing). App A Objective 6.11.g] | Establish/Maintain Documentation | Detective | |
Test the system's operational functionality after implementing approved changes. CC ID 06294 | Testing | Detective | |
Perform and pass acceptance testing before moving a system back into operation after an approved change has occurred. CC ID 04541 | Testing | Detective | |
Establish, implement, and maintain a change acceptance testing log. CC ID 06392 | Establish/Maintain Documentation | Corrective | |
Update associated documentation after the system configuration has been changed. CC ID 00891 [Review whether patch management processes include the following: A documentation process to ensure the institution's information assets and technology inventory and disaster recovery plans are updated as appropriate when patches are applied. App A Objective 6.15.g] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a configuration change log. CC ID 08710 [{system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Configuration | Detective | |
Document approved configuration deviations. CC ID 08711 | Establish/Maintain Documentation | Corrective | |
Document the organization's local environments. CC ID 06726 [Are appropriately implemented and enforced. App A Objective 6.1.a As part of management's process to secure the operating system and all system components, determine whether management does the following: App A Objective 6.21 If the institution outsources cloud computing or storage to a third-party service provider, refer to the FFIEC's "Outsourced Cloud Computing" statement. App A Objective 6.32 If the institution outsources the management of security services to a third-party service provider, refer to the information available in appendix D of the IT Handbook's "Outsourcing Technology Services" booklet and the related examination procedures. App A Objective 6.33] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain local environment security profiles. CC ID 07037 | Establish/Maintain Documentation | Preventive | |
Include individuals assigned to the local environment in the local environment security profile. CC ID 07038 | Establish/Maintain Documentation | Preventive | |
Include security requirements in the local environment security profile. CC ID 15717 | Establish/Maintain Documentation | Preventive | |
Include the business processes assigned to the local environment in the local environment security profile. CC ID 07039 | Establish/Maintain Documentation | Preventive | |
Include the technology used in the local environment in the local environment security profile. CC ID 07040 | Establish/Maintain Documentation | Preventive | |
Include contact information for critical personnel assigned to the local environment in the local environment security profile. CC ID 07041 | Establish/Maintain Documentation | Preventive | |
Include facility information for the local environment in the local environment security profile. CC ID 07042 | Establish/Maintain Documentation | Preventive | |
Include facility access information for the local environment in the local environment security profile. CC ID 11773 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the local environment security profile to interested personnel and affected parties. CC ID 15716 | Communicate | Preventive | |
Update the local environment security profile, as necessary. CC ID 07043 | Establish/Maintain Documentation | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Physical and environmental protection CC ID 00709 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain a physical security program. CC ID 11757 [Determine whether the institution's security operations activities include the following: Physical security management (e.g., CCTV, guards, and badge systems). App A Objective 8.1.e] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain physical security plans. CC ID 13307 | Establish/Maintain Documentation | Preventive | |
Include a maintenance schedule for the physical security plan in the physical security plan. CC ID 13309 | Establish/Maintain Documentation | Preventive | |
Document any reasons for modifying or refraining from modifying the physical security plan after it has been reviewed. CC ID 13315 | Establish/Maintain Documentation | Preventive | |
Conduct external audits of the physical security plan. CC ID 13314 | Audits and Risk Management | Detective | |
Establish, implement, and maintain physical security procedures. CC ID 13076 [Determine whether management applies appropriate physical security controls to protect its premises and more sensitive areas, such as its data center(s). App A Objective 6.9] | Establish/Maintain Documentation | Preventive | |
Analyze and evaluate engineering systems. CC ID 13080 | Physical and Environmental Protection | Preventive | |
Analyze and evaluate facilities and their structural elements. CC ID 13079 | Physical and Environmental Protection | Preventive | |
Analyze and evaluate mechanical systems, as necessary. CC ID 13078 | Physical and Environmental Protection | Preventive | |
Report damaged property to interested personnel and affected parties. CC ID 13702 | Communicate | Corrective | |
Establish, implement, and maintain an anti-tamper protection program. CC ID 10638 | Monitor and Evaluate Occurrences | Detective | |
Disallow disabling tamper detection and response mechanisms, absent authorization. CC ID 12211 | Configuration | Preventive | |
Prevent security mechanisms from being compromised by adverse physical conditions. CC ID 12215 | Configuration | Preventive | |
Monitor for evidence of when tampering indicators are being identified. CC ID 11905 | Monitor and Evaluate Occurrences | Detective | |
Inspect device surfaces to detect tampering. CC ID 11868 | Investigate | Detective | |
Inspect device surfaces to detect unauthorized substitution. CC ID 11869 | Investigate | Detective | |
Inspect for tampering, as necessary. CC ID 10640 | Monitor and Evaluate Occurrences | Detective | |
Alert interested personnel and affected parties when evidence of tampering is discovered. CC ID 15319 | Communicate | Preventive | |
Protect assets from tampering or unapproved substitution. CC ID 11902 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain a facility physical security program. CC ID 00711 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain opening procedures for businesses. CC ID 16671 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain closing procedures for businesses. CC ID 16670 | Establish/Maintain Documentation | Preventive | |
Establish and maintain a contract for accessing facilities that transmit, process, or store restricted data. CC ID 12050 | Establish/Maintain Documentation | Preventive | |
Refrain from providing access to facilities that transmit, process, or store restricted data until the contract for accessing the facility is signed. CC ID 12311 | Behavior | Preventive | |
Protect the facility from crime. CC ID 06347 | Physical and Environmental Protection | Preventive | |
Define communication methods for reporting crimes. CC ID 06349 | Establish/Maintain Documentation | Preventive | |
Include identification cards or badges in the physical security program. CC ID 14818 | Establish/Maintain Documentation | Preventive | |
Protect facilities from eavesdropping. CC ID 02222 | Physical and Environmental Protection | Preventive | |
Inspect telephones for eavesdropping devices. CC ID 02223 | Physical and Environmental Protection | Detective | |
Implement audio protection controls on telephone systems in controlled areas. CC ID 16455 | Technical Security | Preventive | |
Establish, implement, and maintain security procedures for virtual meetings. CC ID 15581 | Establish/Maintain Documentation | Preventive | |
Hold conferences requiring sensitive information discussions in spaces that have commensurate security. CC ID 11440 | Physical and Environmental Protection | Preventive | |
Provide one-time meeting support for discussions involving Top Secret information. CC ID 11441 | Physical and Environmental Protection | Preventive | |
Create security zones in facilities, as necessary. CC ID 16295 | Physical and Environmental Protection | Preventive | |
Establish clear zones around any sensitive facilities. CC ID 02214 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain floor plans. CC ID 16419 | Establish/Maintain Documentation | Preventive | |
Include network infrastructure and cabling infrastructure on the floor plan. CC ID 16420 | Establish/Maintain Documentation | Preventive | |
Post floor plans of critical facilities in secure locations. CC ID 16138 | Communicate | Preventive | |
Post and maintain security signage for all facilities. CC ID 02201 | Establish/Maintain Documentation | Preventive | |
Inspect items brought into the facility. CC ID 06341 | Physical and Environmental Protection | Preventive | |
Maintain all physical security systems. CC ID 02206 | Physical and Environmental Protection | Preventive | |
Detect anomalies in physical barriers. CC ID 13533 | Investigate | Detective | |
Maintain all security alarm systems. CC ID 11669 | Physical and Environmental Protection | Preventive | |
Identify and document physical access controls for all physical entry points. CC ID 01637 | Establish/Maintain Documentation | Preventive | |
Control physical access to (and within) the facility. CC ID 01329 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain physical access procedures. CC ID 13629 | Establish/Maintain Documentation | Preventive | |
Meet the physical access requirements of disabled individuals, if reasonably possible. CC ID 00419 | Physical and Environmental Protection | Preventive | |
Secure physical entry points with physical access controls or security guards. CC ID 01640 | Physical and Environmental Protection | Detective | |
Configure the access control system to grant access only during authorized working hours. CC ID 12325 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain a visitor access permission policy. CC ID 06699 | Establish/Maintain Documentation | Preventive | |
Escort visitors within the facility, as necessary. CC ID 06417 | Establish/Maintain Documentation | Preventive | |
Check the visitor's stated identity against a provided government issued identification. CC ID 06701 | Physical and Environmental Protection | Preventive | |
Authorize visitors before granting entry to physical areas containing restricted data or restricted information. CC ID 01330 | Testing | Preventive | |
Disseminate and communicate the right of the organization to search visitors while at the facility. CC ID 06702 | Behavior | Preventive | |
Establish, implement, and maintain procedures for changing a visitor's access requirements. CC ID 12048 | Establish/Maintain Documentation | Preventive | |
Maintain and review facility access lists of personnel who have been granted authorized entry to (and within) facilities that contain restricted data or restricted information. CC ID 01436 | Establish/Maintain Documentation | Preventive | |
Authorize physical access to sensitive areas based on job functions. CC ID 12462 | Establish/Maintain Documentation | Preventive | |
Change access requirements to organizational assets for personnel and visitors, as necessary. CC ID 12463 | Physical and Environmental Protection | Corrective | |
Escort uncleared personnel who need to work in or access controlled access areas. CC ID 00747 | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain physical identification procedures. CC ID 00713 | Establish/Maintain Documentation | Preventive | |
Disallow opting out of wearing or displaying identification cards or badges. CC ID 13030 | Human Resources Management | Preventive | |
Implement physical identification processes. CC ID 13715 | Process or Activity | Preventive | |
Refrain from using knowledge-based authentication for in-person identity verification. CC ID 13717 | Process or Activity | Preventive | |
Issue photo identification badges to all employees. CC ID 12326 | Physical and Environmental Protection | Preventive | |
Implement operational requirements for card readers. CC ID 02225 | Testing | Preventive | |
Establish, implement, and maintain lost or damaged identification card procedures, as necessary. CC ID 14819 | Establish/Maintain Documentation | Preventive | |
Document all lost badges in a lost badge list. CC ID 12448 | Establish/Maintain Documentation | Corrective | |
Report lost badges, stolen badges, and broken badges to the Security Manager. CC ID 12334 | Physical and Environmental Protection | Preventive | |
Manage constituent identification inside the facility. CC ID 02215 | Behavior | Preventive | |
Direct each employee to be responsible for their identification card or badge. CC ID 12332 | Human Resources Management | Preventive | |
Manage visitor identification inside the facility. CC ID 11670 | Physical and Environmental Protection | Preventive | |
Issue visitor identification badges to all non-employees. CC ID 00543 | Behavior | Preventive | |
Secure unissued visitor identification badges. CC ID 06712 | Physical and Environmental Protection | Preventive | |
Retrieve visitor identification badges prior to the exit of a visitor from the facility. CC ID 01331 | Behavior | Preventive | |
Include name, date of entry, and validity period on disposable identification cards or badges. CC ID 12331 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain identification issuance procedures for identification cards or badges. CC ID 06598 | Establish/Maintain Documentation | Preventive | |
Record the assigned identification card or badge serial number when issuing an identification card or badge. CC ID 06714 | Process or Activity | Preventive | |
Include error handling controls in identification issuance procedures. CC ID 13709 | Establish/Maintain Documentation | Preventive | |
Include an appeal process in the identification issuance procedures. CC ID 15428 | Business Processes | Preventive | |
Include information security in the identification issuance procedures. CC ID 15425 | Establish/Maintain Documentation | Preventive | |
Include identity proofing processes in the identification issuance procedures. CC ID 06597 | Process or Activity | Preventive | |
Establish, implement, and maintain post-issuance update procedures for identification cards or badges. CC ID 15426 | Establish/Maintain Documentation | Preventive | |
Include an identity registration process in the identification issuance procedures. CC ID 11671 | Establish/Maintain Documentation | Preventive | |
Restrict access to the badge system to authorized personnel. CC ID 12043 | Physical and Environmental Protection | Preventive | |
Enforce dual control for badge assignments. CC ID 12328 | Physical and Environmental Protection | Preventive | |
Enforce dual control for accessing unassigned identification cards or badges. CC ID 12327 | Physical and Environmental Protection | Preventive | |
Refrain from imprinting the company name or company logo on identification cards or badges. CC ID 12282 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain identification renewal procedures for identification cards or badges. CC ID 06599 | Establish/Maintain Documentation | Preventive | |
Assign employees the responsibility for controlling their identification badges. CC ID 12333 | Human Resources Management | Preventive | |
Establish, implement, and maintain identification re-issuing procedures for identification cards or badges. CC ID 06596 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain identification mechanism termination procedures. CC ID 06306 | Establish/Maintain Documentation | Preventive | |
Prevent tailgating through physical entry points. CC ID 06685 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain a door security standard. CC ID 06686 | Establish/Maintain Documentation | Preventive | |
Install doors so that exposed hinges are on the secured side. CC ID 06687 | Configuration | Preventive | |
Install emergency doors to permit egress only. CC ID 06688 | Configuration | Preventive | |
Install contact alarms on doors, as necessary. CC ID 06710 | Configuration | Preventive | |
Use locks to protect against unauthorized physical access. CC ID 06342 | Physical and Environmental Protection | Preventive | |
Use locks with electronic authentication systems or cipher locks, as necessary. CC ID 06650 | Configuration | Preventive | |
Test locks for physical security vulnerabilities. CC ID 04880 | Testing | Detective | |
Secure unissued access mechanisms. CC ID 06713 | Technical Security | Preventive | |
Establish, implement, and maintain a lock and access mechanism inventory (keys, lock combinations, or key cards) for all physical access control systems. CC ID 00748 | Establish/Maintain Documentation | Preventive | |
Change cipher lock codes, as necessary. CC ID 06651 | Technical Security | Preventive | |
Record the assigned access mechanism serial number or cipher lock code when issuing controlled items. CC ID 06715 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a window security standard. CC ID 06689 | Establish/Maintain Documentation | Preventive | |
Install contact alarms on openable windows, as necessary. CC ID 06690 | Configuration | Preventive | |
Install glass break alarms on windows, as necessary. CC ID 06691 | Configuration | Preventive | |
Post signs at all physical entry points stating the organization's right to inspect upon entry. CC ID 02204 | Establish/Maintain Documentation | Preventive | |
Install and maintain security lighting at all physical entry points. CC ID 02205 | Physical and Environmental Protection | Preventive | |
Use vandal resistant light fixtures for all security lighting. CC ID 16130 | Physical and Environmental Protection | Preventive | |
Manage access to loading docks, unloading docks, and mail rooms. CC ID 02210 | Physical and Environmental Protection | Preventive | |
Secure the loading dock with physical access controls or security guards. CC ID 06703 | Physical and Environmental Protection | Preventive | |
Isolate loading areas from information processing facilities, if possible. CC ID 12028 | Physical and Environmental Protection | Preventive | |
Screen incoming mail and deliveries. CC ID 06719 | Physical and Environmental Protection | Preventive | |
Protect access to the facility's mechanical systems area. CC ID 02212 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain elevator security guidelines. CC ID 02232 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain stairwell security guidelines. CC ID 02233 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain glass opening security guidelines. CC ID 02234 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain after hours facility access procedures. CC ID 06340 | Establish/Maintain Documentation | Preventive | |
Establish a security room, if necessary. CC ID 00738 | Physical and Environmental Protection | Preventive | |
Implement physical security standards for mainframe rooms or data centers. CC ID 00749 | Physical and Environmental Protection | Preventive | |
Establish and maintain equipment security cages in a shared space environment. CC ID 06711 | Physical and Environmental Protection | Preventive | |
Secure systems in lockable equipment cabinets, as necessary. CC ID 06716 | Physical and Environmental Protection | Preventive | |
Lock all lockable equipment cabinets. CC ID 11673 | Physical and Environmental Protection | Detective | |
Establish, implement, and maintain vault physical security standards. CC ID 02203 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain a guideline for working in a secure area. CC ID 04538 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain emergency re-entry procedures. CC ID 11672 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain emergency exit procedures. CC ID 01252 | Establish/Maintain Documentation | Preventive | |
Establish, Implement, and maintain a camera operating policy. CC ID 15456 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the camera installation policy to interested personnel and affected parties. CC ID 15461 | Communicate | Preventive | |
Monitor for unauthorized physical access at physical entry points and physical exit points. CC ID 01638 | Monitor and Evaluate Occurrences | Detective | |
Establish and maintain a visitor log. CC ID 00715 | Log Management | Preventive | |
Report anomalies in the visitor log to appropriate personnel. CC ID 14755 | Investigate | Detective | |
Require all visitors to sign in to the visitor log before the entrance of a visitor to the facility. CC ID 06700 | Establish/Maintain Documentation | Preventive | |
Require all visitors to sign out of the visitor log before the exit of a visitor from the facility. CC ID 06649 | Behavior | Preventive | |
Record the visitor's name in the visitor log. CC ID 00557 | Log Management | Preventive | |
Record the visitor's organization in the visitor log. CC ID 12121 | Log Management | Preventive | |
Record the visitor's acceptable access areas in the visitor log. CC ID 12237 | Log Management | Preventive | |
Record the date and time of entry in the visitor log. CC ID 13255 | Establish/Maintain Documentation | Preventive | |
Record the onsite personnel authorizing physical access for the visitor in the visitor log. CC ID 12466 | Establish/Maintain Documentation | Preventive | |
Retain all records in the visitor log as prescribed by law. CC ID 00572 | Log Management | Preventive | |
Establish, implement, and maintain a physical access log. CC ID 12080 | Establish/Maintain Documentation | Preventive | |
Log the entrance of a staff member to a facility or designated rooms within the facility. CC ID 01641 | Log Management | Preventive | |
Log when the vault is accessed. CC ID 06725 | Log Management | Detective | |
Log when the cabinet is accessed. CC ID 11674 | Log Management | Detective | |
Store facility access logs in off-site storage. CC ID 06958 | Log Management | Preventive | |
Log the exit of a staff member to a facility or designated rooms within the facility. CC ID 11675 | Monitor and Evaluate Occurrences | Preventive | |
Observe restricted areas with motion detectors or closed-circuit television systems. CC ID 01328 | Monitor and Evaluate Occurrences | Detective | |
Review and correlate all data collected from video cameras and/or access control mechanisms with other entries. CC ID 11609 | Monitor and Evaluate Occurrences | Detective | |
Configure video cameras to cover all physical entry points. CC ID 06302 | Configuration | Preventive | |
Configure video cameras to prevent physical tampering or disablement. CC ID 06303 | Configuration | Preventive | |
Retain video events according to Records Management procedures. CC ID 06304 | Records Management | Preventive | |
Monitor physical entry point alarms. CC ID 01639 | Physical and Environmental Protection | Detective | |
Evaluate and react to when unauthorized access is detected by physical entry point alarms. CC ID 11677 | Monitor and Evaluate Occurrences | Detective | |
Monitor for alarmed security doors being propped open. CC ID 06684 | Monitor and Evaluate Occurrences | Detective | |
Establish, implement, and maintain physical security threat reports. CC ID 02207 | Establish/Maintain Documentation | Preventive | |
Build and maintain fencing, as necessary. CC ID 02235 | Physical and Environmental Protection | Preventive | |
Implement security measures for all interior spaces that allow for any payment transactions. CC ID 06352 | Physical and Environmental Protection | Preventive | |
Physically segregate business areas in accordance with organizational standards. CC ID 16718 | Physical and Environmental Protection | Preventive | |
Employ security guards to provide physical security, as necessary. CC ID 06653 | Establish Roles | Preventive | |
Establish, implement, and maintain a facility wall standard. CC ID 06692 | Establish/Maintain Documentation | Preventive | |
Design interior walls with sound absorbing materials as well as thermal resistant materials. CC ID 06372 | Physical and Environmental Protection | Preventive | |
Design interior walls that provide security to extend from true floor to true ceiling. CC ID 06693 | Configuration | Preventive | |
Refrain from search and seizure inside organizational facilities absent a warrant. CC ID 09980 | Behavior | Preventive | |
Disallow either search or seizure of any person inside organizational facilities absent a warrant. CC ID 09981 | Behavior | Preventive | |
Disallow copying or excerpting from documents, books, or records that are on or in the premises of an organizational facility absent a warrant. CC ID 09982 | Business Processes | Preventive | |
Disallow inspecting computers or searching computer records inside organizational facilities absent a warrant. CC ID 09983 | Behavior | Preventive | |
Do nothing to help during a search and seizure inside organizational facilities absent a warrant and being legally compelled to assist. CC ID 09984 | Behavior | Preventive | |
Establish, implement, and maintain physical security controls for distributed assets. CC ID 00718 | Physical and Environmental Protection | Preventive | |
Control the transiting and internal distribution or external distribution of assets. CC ID 00963 [Review whether management does the following: Maintains the security of physical media, including backup tapes, containing sensitive information while in transit, including to off-site storage, or when shared with third parties. App A Objective 6.18.f {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Records Management | Preventive | |
Log the transiting, internal distribution, and external distribution of restricted storage media. CC ID 12321 | Log Management | Preventive | |
Encrypt digital media containing sensitive information during transport outside controlled areas. CC ID 14258 | Technical Security | Preventive | |
Obtain management authorization for restricted storage media transit or distribution from a controlled access area. CC ID 00964 | Records Management | Preventive | |
Use locked containers to transport non-digital media outside of controlled areas. CC ID 14286 | Physical and Environmental Protection | Preventive | |
Transport restricted media using a delivery method that can be tracked. CC ID 11777 | Business Processes | Preventive | |
Track restricted storage media while it is in transit. CC ID 00967 | Data and Information Management | Detective | |
Restrict physical access to distributed assets. CC ID 11865 | Physical and Environmental Protection | Preventive | |
House network hardware in lockable rooms or lockable equipment cabinets. CC ID 01873 | Physical and Environmental Protection | Preventive | |
Protect electronic storage media with physical access controls. CC ID 00720 | Physical and Environmental Protection | Preventive | |
Protect physical assets with earthquake-resistant mechanisms. CC ID 06360 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain a media protection policy. CC ID 14029 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the media protection policy. CC ID 14185 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the media protection policy. CC ID 14184 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the media protection policy. CC ID 14182 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the media protection policy. CC ID 14180 | Establish/Maintain Documentation | Preventive | |
Include the scope in the media protection policy. CC ID 14167 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the media protection policy. CC ID 14166 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the media protection policy to interested personnel and affected parties. CC ID 14165 | Communicate | Preventive | |
Establish, implement, and maintain media protection procedures. CC ID 14062 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the media protection procedures to interested personnel and affected parties. CC ID 14186 | Communicate | Preventive | |
Establish, implement, and maintain removable storage media controls. CC ID 06680 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Secures or removes external drives and portable media from system consoles, terminals, or PCs running terminal emulations, residing outside of physically secure locations. App A Objective 6.21.d As part of management's process to secure the operating system and all system components, determine whether management does the following: Secures or removes external drives and portable media from system consoles, terminals, or PCs running terminal emulations, residing outside of physically secure locations. App A Objective 6.21.d] | Data and Information Management | Preventive | |
Control access to restricted storage media. CC ID 04889 | Data and Information Management | Preventive | |
Physically secure all electronic storage media that store restricted data or restricted information. CC ID 11664 | Physical and Environmental Protection | Preventive | |
Separate duplicate originals and backup media from the original electronic storage media. CC ID 00961 | Records Management | Preventive | |
Treat archive media as evidence. CC ID 00960 | Records Management | Preventive | |
Log the transfer of removable storage media. CC ID 12322 | Log Management | Preventive | |
Establish, implement, and maintain storage media access control procedures. CC ID 00959 | Establish/Maintain Documentation | Preventive | |
Require removable storage media be in the custody of an authorized individual. CC ID 12319 | Behavior | Preventive | |
Control the storage of restricted storage media. CC ID 00965 | Records Management | Preventive | |
Store removable storage media containing restricted data or restricted information using electronic media storage cabinets or electronic media storage vaults. CC ID 00717 | Physical and Environmental Protection | Preventive | |
Protect the combinations for all combination locks. CC ID 02199 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain electronic media storage container repair guidelines. CC ID 02200 | Establish/Maintain Documentation | Preventive | |
Establish and maintain eavesdropping protection for vaults. CC ID 02231 | Physical and Environmental Protection | Preventive | |
Serialize all removable storage media. CC ID 00949 | Configuration | Preventive | |
Protect distributed assets against theft. CC ID 06799 | Physical and Environmental Protection | Preventive | |
Include Information Technology assets in the asset removal policy. CC ID 13162 | Establish/Maintain Documentation | Preventive | |
Specify the assets to be returned or removed in the asset removal policy. CC ID 13163 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the asset removal policy to interested personnel and affected parties. CC ID 13160 | Communicate | Preventive | |
Establish, implement, and maintain asset removal procedures or asset decommissioning procedures. CC ID 04540 | Establish/Maintain Documentation | Preventive | |
Prohibit assets from being taken off-site absent prior authorization. CC ID 12027 | Process or Activity | Preventive | |
Control the delivery of assets through physical entry points and physical exit points. CC ID 01441 | Physical and Environmental Protection | Preventive | |
Control the removal of assets through physical entry points and physical exit points. CC ID 11681 | Physical and Environmental Protection | Preventive | |
Maintain records of all system components entering and exiting the facility. CC ID 14304 | Log Management | Preventive | |
Establish, implement, and maintain on-site logical controls for all distributed assets. CC ID 11682 | Technical Security | Preventive | |
Establish, implement, and maintain off-site logical controls for all distributed assets. CC ID 11683 | Technical Security | Preventive | |
Establish, implement, and maintain on-site physical controls for all distributed assets. CC ID 04820 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain off-site physical controls for all distributed assets. CC ID 04539 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain missing asset reporting procedures. CC ID 06336 | Establish/Maintain Documentation | Preventive | |
Attach asset location technologies to distributed assets. CC ID 10626 | Physical and Environmental Protection | Detective | |
Employ asset location technologies in accordance with applicable laws and regulations. CC ID 10627 | Physical and Environmental Protection | Preventive | |
Monitor the location of distributed assets. CC ID 11684 | Monitor and Evaluate Occurrences | Detective | |
Remote lock any distributed assets reported lost or stolen. CC ID 14008 | Technical Security | Corrective | |
Remote wipe any distributed asset reported lost or stolen. CC ID 12197 | Process or Activity | Corrective | |
Unpair missing Bluetooth devices. CC ID 12428 | Physical and Environmental Protection | Corrective | |
Establish, implement, and maintain end user computing device security guidelines. CC ID 00719 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a locking screen saver policy. CC ID 06717 | Establish/Maintain Documentation | Preventive | |
Encrypt information stored on devices in publicly accessible areas. CC ID 16410 | Data and Information Management | Preventive | |
Secure workstations to desks with security cables. CC ID 04724 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain a mobile device management program. CC ID 15212 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a mobile device management policy. CC ID 15214 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain mobile device emergency sanitization procedures. CC ID 16454 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain mobile device security guidelines. CC ID 04723 [{information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Establish/Maintain Documentation | Preventive | |
Require users to refrain from leaving mobile devices unattended. CC ID 16446 | Business Processes | Preventive | |
Include the expectation of data loss in the event of sanitizing the mobile device in the mobile device security guidelines. CC ID 12292 | Establish/Maintain Documentation | Preventive | |
Wipe information from mobile devices after a predetermined number of unsuccessful logon attempts. CC ID 14242 | Data and Information Management | Preventive | |
Include legal requirements in the mobile device security guidelines. CC ID 12291 | Establish/Maintain Documentation | Preventive | |
Include the use of privacy filters in the mobile device security guidelines. CC ID 16452 | Physical and Environmental Protection | Preventive | |
Include prohibiting the usage of unapproved application stores in the mobile device security guidelines. CC ID 12290 | Establish/Maintain Documentation | Preventive | |
Include requiring users to create data backups in the mobile device security guidelines. CC ID 12289 | Establish/Maintain Documentation | Preventive | |
Include the definition of mobile devices in the mobile device security guidelines. CC ID 12288 | Establish/Maintain Documentation | Preventive | |
Refrain from responding to unsolicited Personal Identification Number requests. CC ID 12430 | Physical and Environmental Protection | Preventive | |
Refrain from pairing Bluetooth devices in unsecured areas. CC ID 12429 | Physical and Environmental Protection | Preventive | |
Encrypt information stored on mobile devices. CC ID 01422 | Data and Information Management | Preventive | |
Remove dormant systems from the network, as necessary. CC ID 13727 | Process or Activity | Corrective | |
Separate systems that transmit, process, or store restricted data from those that do not by deploying physical access controls. CC ID 00722 | Physical and Environmental Protection | Preventive | |
Secure system components from unauthorized viewing. CC ID 01437 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain asset return procedures. CC ID 04537 | Establish/Maintain Documentation | Preventive | |
Request the return of all appropriate assets upon notification of a personnel status change. CC ID 06678 | Behavior | Preventive | |
Require the return of all assets upon notification an individual is terminated. CC ID 06679 | Behavior | Preventive | |
Prohibit the use of recording devices near restricted data or restricted information, absent authorization. CC ID 04598 | Behavior | Preventive | |
Prohibit usage of cell phones near restricted data or restricted information, absent authorization. CC ID 06354 | Behavior | Preventive | |
Prohibit mobile device usage near restricted data or restricted information, absent authorization. CC ID 04597 | Behavior | Preventive | |
Prohibit wireless technology usage near restricted data or restricted information, absent authorization. CC ID 08706 | Configuration | Preventive | |
Inspect mobile devices for the storage of restricted data or restricted information. CC ID 08707 | Investigate | Detective | |
Log an incident if unauthorized restricted data or unauthorized restricted information is discovered on a mobile device. CC ID 08708 | Monitor and Evaluate Occurrences | Corrective | |
Establish, implement, and maintain open storage container procedures. CC ID 02198 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a clean desk policy. CC ID 06534 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a clear screen policy. CC ID 12436 | Technical Security | Preventive | |
Establish, implement, and maintain contact card reader security guidelines. CC ID 06588 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain contactless card reader security guidelines. CC ID 06589 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain Personal Identification Number input device security guidelines. CC ID 06590 | Establish/Maintain Documentation | Preventive | |
Identify customer property within the organizational facility. CC ID 06612 | Physical and Environmental Protection | Preventive | |
Protect customer property under the care of the organization. CC ID 11685 | Physical and Environmental Protection | Preventive | |
Prohibit the unauthorized remote activation of collaborative computing devices. CC ID 06768 | Technical Security | Preventive | |
Provide a physical disconnect of collaborative computing devices in a way that supports ease of use. CC ID 06769 | Configuration | Preventive | |
Indicate the active use of collaborative computing devices to users physically present at the device. CC ID 10647 | Technical Security | Preventive | |
Provide storage media shelving capable of bearing all potential loads. CC ID 11400 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain proper aircraft security. CC ID 02213 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain a vehicle access program. CC ID 02216 | Establish/Maintain Documentation | Preventive | |
Establish parking requirements for vehicles. CC ID 02218 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain proper container security. CC ID 02208 | Physical and Environmental Protection | Preventive | |
Inspect the physical integrity of all containers before loading the containers. CC ID 02209 | Physical and Environmental Protection | Detective | |
Lock closable storage containers. CC ID 06307 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain returned card procedures. CC ID 13567 | Establish/Maintain Documentation | Preventive | |
Refrain from distributing returned cards to staff with the responsibility for payment card issuance. CC ID 13572 | Business Processes | Preventive | |
Establish and maintain the physical security of non-issued payment cards. CC ID 06402 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain payment card disposal procedures. CC ID 16137 | Establish/Maintain Documentation | Preventive | |
Control the issuance of payment cards. CC ID 06403 | Physical and Environmental Protection | Preventive | |
Establish, implement, and maintain a mailing control log. CC ID 16136 | Establish/Maintain Documentation | Preventive | |
Assign roles and responsibilities for the issuance of payment cards. CC ID 16134 | Establish Roles | Preventive | |
Inventory payment cards, as necessary. CC ID 13547 | Records Management | Preventive | |
Store non-issued payment cards in a lockable cabinet or safe. CC ID 06404 | Physical and Environmental Protection | Preventive | |
Deliver payment cards to customers using secure methods. CC ID 06405 | Physical and Environmental Protection | Preventive | |
Activate payment cards sent to customers upon receiving instructions to activate the payment card. CC ID 13052 | Business Processes | Preventive | |
Establish, implement, and maintain payment card usage security measures. CC ID 06406 | Establish/Maintain Documentation | Preventive | |
Notify customers about payment card usage security measures. CC ID 06407 | Behavior | Preventive | |
Establish, implement, and maintain payment card disposal procedures. CC ID 16135 | Establish/Maintain Documentation | Preventive | |
Establish and maintain physical security of assets used for publicity. CC ID 06724 | Physical and Environmental Protection | Preventive | |
Install and protect network cabling. CC ID 08624 | Physical and Environmental Protection | Preventive | |
Control physical access to network cables. CC ID 00723 | Process or Activity | Preventive | |
Install and protect fiber optic cable, as necessary. CC ID 08625 | Physical and Environmental Protection | Preventive | |
Restrict fiber optic cables to carry only specific security classification traffic. CC ID 08628 | Physical and Environmental Protection | Preventive | |
Restrict the length of fiber optic flying leads to 5 meters. CC ID 08639 | Physical and Environmental Protection | Detective | |
Label fiber optic flying leads according to security classification of data being carried over the fiber optic cables. CC ID 08640 | Physical and Environmental Protection | Preventive | |
Install network cable in a way that allows ease of inspecting. CC ID 08626 | Physical and Environmental Protection | Preventive | |
Inspect network cabling at distances determined by security classification. CC ID 08644 | Physical and Environmental Protection | Detective | |
Bundle network cables together at each inspection point by security classification of data being carried over that cable. CC ID 08649 | Physical and Environmental Protection | Preventive | |
Establish and maintain security classifications for network cabling. CC ID 08627 | Establish/Maintain Documentation | Preventive | |
Label conduit according to security classification of data being carried over the network cable inside the conduit. CC ID 08630 | Physical and Environmental Protection | Preventive | |
Label each end of a network cable run. CC ID 08632 | Physical and Environmental Protection | Preventive | |
Terminate approved network cables on the patch panel. CC ID 08633 | Physical and Environmental Protection | Preventive | |
Color code cables in accordance with organizational standards. CC ID 16422 | Physical and Environmental Protection | Preventive | |
Establish and maintain documentation for network cabling schemes. CC ID 08641 | Establish/Maintain Documentation | Preventive | |
Prevent installing network cabling inside walls shared with third parties. CC ID 08648 | Physical and Environmental Protection | Preventive | |
Install network cabling specifically for maintenance purposes. CC ID 10613 | Physical and Environmental Protection | Preventive | |
Install and maintain network jacks and outlet boxes. CC ID 08635 | Physical and Environmental Protection | Preventive | |
Color code outlet boxes in accordance with organizational standards. CC ID 16451 | Physical and Environmental Protection | Preventive | |
Maintain wiring circuits and outlets that are separate from the computer room. CC ID 16142 | Physical and Environmental Protection | Preventive | |
Implement physical controls to restrict access to publicly accessible network jacks. CC ID 11989 | Physical and Environmental Protection | Preventive | |
Label network cabling outlet boxes. CC ID 08631 | Physical and Environmental Protection | Preventive | |
Enable network jacks at the patch panel, as necessary. CC ID 06305 | Configuration | Preventive | |
Implement logical controls to enable network jacks, as necessary. CC ID 11934 | Physical and Environmental Protection | Preventive | |
Identify network jacks by security classification according to security classification of data being carried over the cable. CC ID 08634 | Physical and Environmental Protection | Preventive | |
Identify network cable faceplates by security classification according to security classification of data being carried over the cable. CC ID 08643 | Physical and Environmental Protection | Preventive | |
Install and maintain network patch panels. CC ID 08636 | Physical and Environmental Protection | Preventive | |
Separate network patch panels in different network cabinets according to security classification of data being carried over the cables. CC ID 08637 | Physical and Environmental Protection | Preventive | |
Assign access to network patch panels on a need to know basis. CC ID 08638 | Physical and Environmental Protection | Preventive | |
Encase network cabling in conduit or closed cable reticulation systems, as necessary. CC ID 08647 | Physical and Environmental Protection | Preventive | |
Install conduit on walls connecting to network cable outlet boxes, as necessary. CC ID 08646 | Physical and Environmental Protection | Preventive | |
Seal data conduit couplings and data conduit fitting bodies. CC ID 08629 | Physical and Environmental Protection | Preventive | |
Install cable reticulation systems as close to the network cabinets as possible. CC ID 08642 | Physical and Environmental Protection | Preventive | |
Partition cable bundles in cable reticulation systems by security classification of data being carried over the network cable. CC ID 08645 | Physical and Environmental Protection | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Privacy protection for information and data CC ID 00008 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain a privacy framework that protects restricted data. CC ID 11850 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a data handling program. CC ID 13427 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain data handling policies. CC ID 00353 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain data and information confidentiality policies. CC ID 00361 [{test data} Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality of test plans and data. App A Objective 10.2.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Establish/Maintain Documentation | Preventive | |
Prohibit personal data from being sent by e-mail or instant messaging. CC ID 00565 | Data and Information Management | Preventive | |
Protect electronic messaging information. CC ID 12022 | Technical Security | Preventive | |
Establish, implement, and maintain record structures to support information confidentiality. CC ID 00360 | Data and Information Management | Preventive | |
Include passwords, Personal Identification Numbers, and card security codes in the personal data definition. CC ID 04699 | Configuration | Preventive | |
Refrain from storing data elements containing payment card full magnetic stripe data. CC ID 04757 | Testing | Detective | |
Store payment card data in secure chips, if possible. CC ID 13065 | Configuration | Preventive | |
Refrain from storing data elements containing sensitive authentication data after authorization is approved. CC ID 04758 | Configuration | Preventive | |
Render unrecoverable sensitive authentication data after authorization is approved. CC ID 11952 | Technical Security | Preventive | |
Automate the disposition process for records that contain "do not store" data or "delete after transaction process" data. CC ID 06083 | Data and Information Management | Preventive | |
Log the disclosure of personal data. CC ID 06628 | Log Management | Preventive | |
Log the modification of personal data. CC ID 11844 | Log Management | Preventive | |
Encrypt, truncate, or tokenize data fields, as necessary. CC ID 06850 | Technical Security | Preventive | |
Implement security measures to protect personal data. CC ID 13606 | Technical Security | Preventive | |
Implement physical controls to protect personal data. CC ID 00355 | Testing | Preventive | |
Limit data leakage. CC ID 00356 | Data and Information Management | Preventive | |
Conduct personal data risk assessments. CC ID 00357 | Testing | Detective | |
Identify potential red flags to alert the organization before a data leakage has occurred. CC ID 04654 | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain Consumer Reporting Agency notification procedures. CC ID 04851 | Business Processes | Preventive | |
Establish, implement, and maintain suspicious document procedures. CC ID 04852 | Establish/Maintain Documentation | Detective | |
Establish, implement, and maintain suspicious personal data procedures. CC ID 04853 | Data and Information Management | Detective | |
Compare certain personal data such as name, date of birth, address, driver's license, or other identification against personal data on file for the applicant. CC ID 04855 | Data and Information Management | Detective | |
Establish, implement, and maintain suspicious user account activity procedures. CC ID 04854 | Monitor and Evaluate Occurrences | Detective | |
Perform an identity check prior to approving an account change request. CC ID 13670 | Investigate | Detective | |
Use the contact information on file to contact the individual identified in an account change request. CC ID 04857 | Behavior | Detective | |
Match consumer reports with current accounts on file to ensure account misuse or information misuse has not occurred. CC ID 04873 | Data and Information Management | Detective | |
Log account access dates and report when dormant accounts suddenly exhibit unusual activity. CC ID 04874 | Log Management | Detective | |
Report fraudulent account activity, unauthorized transactions, or discrepancies with current accounts. CC ID 04875 | Monitor and Evaluate Occurrences | Corrective | |
Log dates for account name changes or address changes. CC ID 04876 | Log Management | Detective | |
Review accounts that are changed for additional user requests. CC ID 11846 | Monitor and Evaluate Occurrences | Detective | |
Send change notices for change of address requests to the old address and the new address. CC ID 04877 | Data and Information Management | Detective | |
Acquire enough insurance to cover the liability for damages due to data leakage. CC ID 06408 | Acquisition/Sale of Assets or Services | Preventive | |
Search the Internet for evidence of data leakage. CC ID 10419 | Process or Activity | Detective | |
Alert appropriate personnel when data leakage is detected. CC ID 14715 | Process or Activity | Preventive | |
Review monitored websites for data leakage. CC ID 10593 | Monitor and Evaluate Occurrences | Detective | |
Take appropriate action when a data leakage is discovered. CC ID 14716 | Process or Activity | Corrective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Records management CC ID 00902 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain records management policies. CC ID 00903 | Establish/Maintain Documentation | Preventive | |
Define each system's preservation requirements for records and logs. CC ID 00904 | Establish/Maintain Documentation | Detective | |
Determine how long to keep records and logs before disposing them. CC ID 11661 | Process or Activity | Preventive | |
Retain records in accordance with applicable requirements. CC ID 00968 [{incident analysis} Review whether management has the following: Log retention policies that meet incident response and analysis needs. App A Objective 6.35.a] | Records Management | Preventive | |
Establish, implement, and maintain storage media disposition and destruction procedures. CC ID 11657 [Review whether the institution's life cycle management includes the following: Outlining procedures for the secure destruction or wiping of hard drives being returned to vendors or donated to prevent the inadvertent disclosure of sensitive information. App A Objective 6.16.e] | Establish/Maintain Documentation | Preventive | |
Supervise media destruction in accordance with organizational standards. CC ID 16456 | Business Processes | Preventive | |
Sanitize electronic storage media in accordance with organizational standards. CC ID 16464 | Data and Information Management | Preventive | |
Sanitize all electronic storage media before disposing a system or redeploying a system. CC ID 01643 | Data and Information Management | Preventive | |
Degauss as a method of sanitizing electronic storage media. CC ID 00973 | Records Management | Preventive | |
Destroy electronic storage media following the storage media disposition and destruction procedures. CC ID 00970 | Testing | Detective | |
Manage waste materials in accordance with the storage media disposition and destruction procedures. CC ID 16485 | Process or Activity | Preventive | |
Maintain media sanitization equipment in operational condition. CC ID 00721 | Testing | Detective | |
Use approved media sanitization equipment for destruction. CC ID 16459 | Business Processes | Preventive | |
Define each system's disposition requirements for records and logs. CC ID 11651 | Process or Activity | Preventive | |
Establish, implement, and maintain records disposition procedures. CC ID 00971 [Review whether management does the following: Has appropriate disposal procedures for both paper-based and electronic information. App A Objective 6.18.e {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Establish/Maintain Documentation | Preventive | |
Manage the disposition status for all records. CC ID 00972 | Records Management | Preventive | |
Use a second person to confirm and sign-off that manually deleted data was deleted. CC ID 12313 | Data and Information Management | Preventive | |
Remove and/or destroy records according to the records' retention event and retention period schedule. CC ID 06621 | Records Management | Preventive | |
Place printed records awaiting destruction into secure containers. CC ID 12464 | Physical and Environmental Protection | Preventive | |
Destroy printed records so they cannot be reconstructed. CC ID 11779 | Physical and Environmental Protection | Preventive | |
Automate a programmatic process to remove stored data and records that exceed retention requirements. CC ID 06082 | Data and Information Management | Preventive | |
Include methods to identify records that meet or exceed the record's retention event in the records disposition procedures. CC ID 11962 | Establish/Maintain Documentation | Preventive | |
Maintain disposal records or redeployment records. CC ID 01644 | Establish/Maintain Documentation | Preventive | |
Include the name of the signing officer in the disposal record. CC ID 15710 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain records management procedures. CC ID 11619 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain data processing integrity controls. CC ID 00923 [{data validation control} Review whether applications in use provide the following capabilities: Use validation controls for data entry and data processing. App A Objective 6.27.e] | Establish Roles | Preventive | |
Compare each record's data input to its final form. CC ID 11813 | Records Management | Detective | |
Sanitize user input in accordance with organizational standards. CC ID 16856 | Process or Activity | Preventive | |
Establish, implement, and maintain Automated Data Processing validation checks and editing checks. CC ID 00924 | Data and Information Management | Preventive | |
Establish, implement, and maintain Automated Data Processing error handling procedures. CC ID 00925 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain Automated Data Processing error handling reporting. CC ID 11659 | Establish/Maintain Documentation | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
System hardening through configuration management CC ID 00860 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain a Configuration Management program. CC ID 00867 [Determine whether appropriate processes exist for configuration management (managing and controlling configurations of systems, applications, and other technology). App A Objective 6.12 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain configuration control and Configuration Status Accounting. CC ID 00863 | Business Processes | Preventive | |
Establish, implement, and maintain appropriate system labeling. CC ID 01900 | Establish/Maintain Documentation | Preventive | |
Include the identification number of the third party who performed the conformity assessment procedures on all promotional materials. CC ID 15041 | Establish/Maintain Documentation | Preventive | |
Include the identification number of the third party who conducted the conformity assessment procedures after the CE marking of conformity. CC ID 15040 | Establish/Maintain Documentation | Preventive | |
Verify configuration files requiring passwords for automation do not contain those passwords after the installation process is complete. CC ID 06555 | Configuration | Preventive | |
Establish, implement, and maintain a configuration management policy. CC ID 14023 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain configuration management procedures. CC ID 14074 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the configuration management procedures to interested personnel and affected parties. CC ID 14139 | Communicate | Preventive | |
Include compliance requirements in the configuration management policy. CC ID 14072 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the configuration management policy. CC ID 14071 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the configuration management policy. CC ID 14070 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the configuration management policy. CC ID 14069 | Establish/Maintain Documentation | Preventive | |
Include the scope in the configuration management policy. CC ID 14068 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the configuration management policy. CC ID 14067 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the configuration management policy to interested personnel and affected parties. CC ID 14066 | Communicate | Preventive | |
Establish, implement, and maintain a configuration management plan. CC ID 01901 | Establish/Maintain Documentation | Preventive | |
Include configuration management procedures in the configuration management plan. CC ID 14248 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the configuration management plan. CC ID 14247 | Establish/Maintain Documentation | Preventive | |
Approve the configuration management plan. CC ID 14717 | Business Processes | Preventive | |
Establish, implement, and maintain system tracking documentation. CC ID 15266 | Establish/Maintain Documentation | Preventive | |
Include prioritization codes in the system tracking documentation. CC ID 15283 | Establish/Maintain Documentation | Preventive | |
Include the type and category of the request in the system tracking documentation. CC ID 15281 | Establish/Maintain Documentation | Preventive | |
Include contact information in the system tracking documentation. CC ID 15280 | Establish/Maintain Documentation | Preventive | |
Include the username in the system tracking documentation. CC ID 15278 | Establish/Maintain Documentation | Preventive | |
Include a problem description in the system tracking documentation. CC ID 15276 | Establish/Maintain Documentation | Preventive | |
Include affected systems in the system tracking documentation. CC ID 15275 | Establish/Maintain Documentation | Preventive | |
Include root causes in the system tracking documentation. CC ID 15274 | Establish/Maintain Documentation | Preventive | |
Include the name of who is responsible for resolution in the system tracking documentation. CC ID 15273 | Establish/Maintain Documentation | Preventive | |
Include current status in the system tracking documentation. CC ID 15272 | Establish/Maintain Documentation | Preventive | |
Employ the Configuration Management program. CC ID 11904 | Configuration | Preventive | |
Record Configuration Management items in the Configuration Management database. CC ID 00861 | Establish/Maintain Documentation | Preventive | |
Test network access controls for proper Configuration Management settings. CC ID 01281 | Testing | Detective | |
Disseminate and communicate the configuration management program to all interested personnel and affected parties. CC ID 11946 | Communicate | Preventive | |
Establish, implement, and maintain a Configuration Management Database with accessible reporting capabilities. CC ID 02132 [{software development} With respect to developed software, determine whether institution management does the following: Collects data to build metrics and reporting of configuration management compliance, and vulnerability management. App A Objective 6.28.f] | Establish/Maintain Documentation | Preventive | |
Document external connections for all systems. CC ID 06415 | Configuration | Preventive | |
Establish, implement, and maintain a configuration baseline based on the least functionality principle. CC ID 00862 [Determine whether management uses standard builds, allowing one documented configuration to be applied to multiple computers in a controlled manner, to create hardware and software inventories, update or patch systems, restore systems, investigate anomalies, and audit configurations. App A Objective 6.14 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Establish/Maintain Documentation | Preventive | |
Include the measures used to account for any differences in operation between the test environments and production environments in the baseline configuration. CC ID 13285 | Establish/Maintain Documentation | Preventive | |
Include the differences between test environments and production environments in the baseline configuration. CC ID 13284 | Establish/Maintain Documentation | Preventive | |
Include the applied security patches in the baseline configuration. CC ID 13271 | Establish/Maintain Documentation | Preventive | |
Include the installed application software and version numbers in the baseline configuration. CC ID 13270 | Establish/Maintain Documentation | Preventive | |
Include installed custom software in the baseline configuration. CC ID 13274 | Establish/Maintain Documentation | Preventive | |
Include network ports in the baseline configuration. CC ID 13273 | Establish/Maintain Documentation | Preventive | |
Include the operating systems and version numbers in the baseline configuration. CC ID 13269 | Establish/Maintain Documentation | Preventive | |
Include backup procedures in the Configuration Management policy. CC ID 01314 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain system hardening procedures. CC ID 12001 [{application hardening process}{system hardening process} Determine whether management has processes to harden applications and systems (e.g., installing minimum services, installing necessary patches, configuring appropriate security settings, enforcing principle of least privilege, changing default passwords, and enabling logging). App A Objective 6.13 {application hardening process}{system hardening process} Determine whether management has processes to harden applications and systems (e.g., installing minimum services, installing necessary patches, configuring appropriate security settings, enforcing principle of least privilege, changing default passwords, and enabling logging). App A Objective 6.13 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Establish/Maintain Documentation | Preventive | |
Configure the Intrusion Detection System and Intrusion Prevention System in accordance with organizational standards. CC ID 04831 | Configuration | Preventive | |
Configure session timeout and reauthentication settings according to organizational standards. CC ID 12460 | Technical Security | Preventive | |
Enable historical logging on the Intrusion Detection System and Intrusion Prevention System. CC ID 04836 | Configuration | Preventive | |
Configure automatic logoff to terminate the sessions based on inactivity according to organizational standards. CC ID 04490 | Configuration | Preventive | |
Configure the Intrusion Detection System and the Intrusion Prevention System to detect rogue devices and unauthorized connections. CC ID 04837 | Configuration | Preventive | |
Display an explicit logout message when disconnecting an authenticated communications session. CC ID 10093 | Configuration | Preventive | |
Configure the Intrusion Detection System and the Intrusion Prevention System to alert upon finding rogue devices and unauthorized connections. CC ID 07062 | Configuration | Preventive | |
Invalidate session identifiers upon session termination. CC ID 10649 | Technical Security | Preventive | |
Configure “Docker” to organizational standards. CC ID 14457 | Configuration | Preventive | |
Configure the "autolock" argument to organizational standards. CC ID 14547 | Configuration | Preventive | |
Configure the "COPY" instruction to organizational standards. CC ID 14515 | Configuration | Preventive | |
Configure the "memory" argument to organizational standards. CC ID 14497 | Configuration | Preventive | |
Configure the "docker0" bridge to organizational standards. CC ID 14504 | Configuration | Preventive | |
Configure the "docker exec commands" to organizational standards. CC ID 14502 | Configuration | Preventive | |
Configure the "health-cmd" argument to organizational standards. CC ID 14527 | Configuration | Preventive | |
Configure the "HEALTHCHECK" to organizational standards. CC ID 14511 | Configuration | Detective | |
Configure the maximum number of images to organizational standards. CC ID 14545 | Configuration | Preventive | |
Configure the minimum number of manager nodes to organizational standards. CC ID 14543 | Configuration | Preventive | |
Configure the "on-failure" restart policy to organizational standards. CC ID 14542 | Configuration | Preventive | |
Configure the maximum number of containers to organizational standards. CC ID 14540 | Configuration | Preventive | |
Configure the "lifetime_minutes" to organizational standards. CC ID 14539 | Configuration | Preventive | |
Configure the "Linux kernel capabilities" to organizational standards. CC ID 14531 | Configuration | Preventive | |
Configure the "Docker socket" to organizational standards. CC ID 14506 | Configuration | Preventive | |
Configure the "read-only" argument to organizational standards. CC ID 14498 | Configuration | Preventive | |
Configure the signed image enforcement to organizational standards. CC ID 14517 | Configuration | Preventive | |
Configure the "storage-opt" argument to organizational standards. CC ID 14658 | Configuration | Preventive | |
Configure the "swarm services" to organizational standards. CC ID 14516 | Configuration | Preventive | |
Configure the "experimental" argument to organizational standards. CC ID 14494 | Configuration | Preventive | |
Configure the cluster role-based access control policies to organizational standards. CC ID 14514 | Configuration | Preventive | |
Configure the "secret management commands" to organizational standards. CC ID 14512 | Configuration | Preventive | |
Configure the "renewal_threshold_minutes" to organizational standards. CC ID 14538 | Configuration | Preventive | |
Configure the "docker swarm unlock-key" command to organizational standards. CC ID 14490 | Configuration | Preventive | |
Configure the "per_user_limit" to organizational standards. CC ID 14523 | Configuration | Preventive | |
Configure the "privileged" argument to organizational standards. CC ID 14510 | Configuration | Preventive | |
Configure the "update instructions" to organizational standards. CC ID 14525 | Configuration | Preventive | |
Configure the "swarm mode" to organizational standards. CC ID 14508 | Configuration | Preventive | |
Configure the "USER" directive to organizational standards. CC ID 14507 | Configuration | Preventive | |
Configure the "DOCKER_CONTENT_TRUST" to organizational standards. CC ID 14488 | Configuration | Preventive | |
Configure the "no-new-privileges" argument to organizational standards. CC ID 14474 | Configuration | Preventive | |
Configure the "seccomp-profile" argument to organizational standards. CC ID 14503 | Configuration | Preventive | |
Configure the "cpu-shares" argument to organizational standards. CC ID 14489 | Configuration | Preventive | |
Configure the "volume" argument to organizational standards. CC ID 14533 | Configuration | Preventive | |
Configure the "cgroup-parent" to organizational standards. CC ID 14466 | Configuration | Preventive | |
Configure the "live-restore" argument to organizational standards. CC ID 14465 | Configuration | Preventive | |
Configure the "userland-proxy" argument to organizational standards. CC ID 14464 | Configuration | Preventive | |
Configure the "user namespace support" to organizational standards. CC ID 14462 | Configuration | Preventive | |
Configure "etcd" to organizational standards. CC ID 14535 | Configuration | Preventive | |
Configure the "auto-tls" argument to organizational standards. CC ID 14621 | Configuration | Preventive | |
Configure the "peer-auto-tls" argument to organizational standards. CC ID 14636 | Configuration | Preventive | |
Configure the "peer-client-cert-auth" argument to organizational standards. CC ID 14614 | Configuration | Preventive | |
Configure the "peer-cert-file" argument to organizational standards. CC ID 14606 | Configuration | Preventive | |
Configure the "key-file" argument to organizational standards. CC ID 14604 | Configuration | Preventive | |
Configure the "cert-file" argument to organizational standards. CC ID 14602 | Configuration | Preventive | |
Configure the "client-cert-auth" argument to organizational standards. CC ID 14596 | Configuration | Preventive | |
Configure the "peer-key-file" argument to organizational standards. CC ID 14595 | Configuration | Preventive | |
Establish, implement, and maintain container orchestration. CC ID 16350 | Technical Security | Preventive | |
Configure "Kubernetes" to organizational standards. CC ID 14528 | Configuration | Preventive | |
Configure the "ImagePolicyWebhook" admission controller to organizational standards. CC ID 14657 | Configuration | Preventive | |
Configure the "allowedCapabilities" to organizational standards. CC ID 14653 | Configuration | Preventive | |
Configure the "allowPrivilegeEscalation" flag to organizational standards. CC ID 14645 | Configuration | Preventive | |
Configure the "Security Context" to organizational standards. CC ID 14656 | Configuration | Preventive | |
Configure the "cluster-admin" role to organizational standards. CC ID 14642 | Configuration | Preventive | |
Configure the "automountServiceAccountToken" to organizational standards. CC ID 14639 | Configuration | Preventive | |
Configure the "audit-log-maxsize" argument to organizational standards. CC ID 14624 | Configuration | Detective | |
Configure the "seccomp" profile to organizational standards. CC ID 14652 | Configuration | Preventive | |
Configure the "securityContext.privileged" flag to organizational standards. CC ID 14641 | Configuration | Preventive | |
Configure the "audit-log-path" argument to organizational standards. CC ID 14622 | Configuration | Detective | |
Configure the "audit-log-maxbackup" argument to organizational standards. CC ID 14613 | Configuration | Detective | |
Configure the "audit-policy-file" to organizational standards. CC ID 14610 | Configuration | Preventive | |
Configure the "audit-log-maxage" argument to organizational standards. CC ID 14605 | Configuration | Detective | |
Configure the "bind-address" argument to organizational standards. CC ID 14601 | Configuration | Preventive | |
Configure the "request-timeout" argument to organizational standards. CC ID 14583 | Configuration | Preventive | |
Configure the "secure-port" argument to organizational standards. CC ID 14582 | Configuration | Preventive | |
Configure the "service-account-key-file" argument to organizational standards. CC ID 14581 | Configuration | Preventive | |
Configure the "insecure-bind-address" argument to organizational standards. CC ID 14580 | Configuration | Preventive | |
Configure the "service-account-lookup" argument to organizational standards. CC ID 14579 | Configuration | Preventive | |
Configure the "admission control plugin PodSecurityPolicy" to organizational standards. CC ID 14578 | Configuration | Preventive | |
Configure the "profiling" argument to organizational standards. CC ID 14577 | Configuration | Preventive | |
Configure the "hostNetwork" flag to organizational standards. CC ID 14649 | Configuration | Preventive | |
Configure the "hostPID" flag to organizational standards. CC ID 14648 | Configuration | Preventive | |
Configure the "etcd-certfile" argument to organizational standards. CC ID 14584 | Configuration | Preventive | |
Configure the "runAsUser.rule" to organizational standards. CC ID 14651 | Configuration | Preventive | |
Configure the "requiredDropCapabilities" to organizational standards. CC ID 14650 | Configuration | Preventive | |
Configure the "hostIPC" flag to organizational standards. CC ID 14643 | Configuration | Preventive | |
Configure the "admission control plugin ServiceAccount" to organizational standards. CC ID 14576 | Configuration | Preventive | |
Configure the "insecure-port" argument to organizational standards. CC ID 14575 | Configuration | Preventive | |
Configure the "admission control plugin AlwaysPullImages" to organizational standards. CC ID 14574 | Configuration | Preventive | |
Configure the "pod" to organizational standards. CC ID 14644 | Configuration | Preventive | |
Configure the "ClusterRoles" to organizational standards. CC ID 14637 | Configuration | Preventive | |
Configure the "event-qps" argument to organizational standards. CC ID 14633 | Configuration | Preventive | |
Configure the "Kubelet" to organizational standards. CC ID 14635 | Configuration | Preventive | |
Configure the "NET_RAW" to organizational standards. CC ID 14647 | Configuration | Preventive | |
Configure the "make-iptables-util-chains" argument to organizational standards. CC ID 14638 | Configuration | Preventive | |
Configure the "hostname-override" argument to organizational standards. CC ID 14631 | Configuration | Preventive | |
Configure the "admission control plugin NodeRestriction" to organizational standards. CC ID 14573 | Configuration | Preventive | |
Configure the "admission control plugin AlwaysAdmit" to organizational standards. CC ID 14572 | Configuration | Preventive | |
Configure the "etcd-cafile" argument to organizational standards. CC ID 14592 | Configuration | Preventive | |
Configure the "encryption-provider-config" argument to organizational standards. CC ID 14587 | Configuration | Preventive | |
Configure the "rotate-certificates" argument to organizational standards. CC ID 14640 | Configuration | Preventive | |
Configure the "etcd-keyfile" argument to organizational standards. CC ID 14586 | Configuration | Preventive | |
Configure the "client-ca-file" argument to organizational standards. CC ID 14585 | Configuration | Preventive | |
Configure the "kube-apiserver" to organizational standards. CC ID 14589 | Configuration | Preventive | |
Configure the "tls-private-key-file" argument to organizational standards. CC ID 14590 | Configuration | Preventive | |
Configure the "streaming-connection-idle-timeout" argument to organizational standards. CC ID 14634 | Configuration | Preventive | |
Configure the "RotateKubeletServerCertificate" argument to organizational standards. CC ID 14626 | Configuration | Preventive | |
Configure the "protect-kernel-defaults" argument to organizational standards. CC ID 14629 | Configuration | Preventive | |
Configure the "read-only-port" argument to organizational standards. CC ID 14627 | Configuration | Preventive | |
Configure the "admission control plugin NamespaceLifecycle" to organizational standards. CC ID 14571 | Configuration | Preventive | |
Configure the "terminated-pod-gc-threshold" argument to organizational standards. CC ID 14593 | Configuration | Preventive | |
Configure the "tls-cert-file" argument to organizational standards. CC ID 14588 | Configuration | Preventive | |
Configure the "kubelet-certificate-authority" argument to organizational standards. CC ID 14570 | Configuration | Preventive | |
Configure the "service-account-private-key-file" argument to organizational standards. CC ID 14607 | Configuration | Preventive | |
Configure the "admission control plugin SecurityContextDeny" to organizational standards. CC ID 14569 | Configuration | Preventive | |
Configure the "kubelet-client-certificate" argument to organizational standards. CC ID 14568 | Configuration | Preventive | |
Configure the "root-ca-file" argument to organizational standards. CC ID 14599 | Configuration | Preventive | |
Configure the "admission control plugin EventRateLimit" to organizational standards. CC ID 14567 | Configuration | Preventive | |
Configure the "use-service-account-credentials" argument to organizational standards. CC ID 14594 | Configuration | Preventive | |
Configure the "token-auth-file" argument to organizational standards. CC ID 14566 | Configuration | Preventive | |
Configure the "authorization-mode" argument to organizational standards. CC ID 14565 | Configuration | Preventive | |
Configure the "anonymous-auth" argument to organizational standards. CC ID 14564 | Configuration | Preventive | |
Configure the "kubelet-client-key" argument to organizational standards. CC ID 14563 | Configuration | Preventive | |
Configure the "kubelet-https" argument to organizational standards. CC ID 14561 | Configuration | Preventive | |
Configure the "basic-auth-file" argument to organizational standards. CC ID 14559 | Configuration | Preventive | |
Configure the Remote Deposit Capture system to organizational standards. CC ID 13569 | Configuration | Preventive | |
Prohibit files from containing wild cards, as necessary. CC ID 16318 | Process or Activity | Preventive | |
Block and/or remove unnecessary software and unauthorized software. CC ID 00865 | Configuration | Preventive | |
Assign system hardening to qualified personnel. CC ID 06813 | Establish Roles | Preventive | |
Use the latest approved version of all software. CC ID 00897 | Technical Security | Preventive | |
Install the most current Windows Service Pack. CC ID 01695 | Configuration | Preventive | |
Install critical security updates and important security updates in a timely manner. CC ID 01696 | Configuration | Preventive | |
Include risk information when communicating critical security updates. CC ID 14948 | Communicate | Preventive | |
Change default configurations, as necessary. CC ID 00877 [Review whether applications in use provide the following capabilities: Provide the ability to change and disable default application accounts upon installation. App A Objective 6.27.c] | Configuration | Preventive | |
Configure custom security parameters for X-Windows. CC ID 02168 | Configuration | Preventive | |
Configure custom security settings for Lotus Domino. CC ID 02171 | Configuration | Preventive | |
Configure custom security settings for the Automated Security Enhancement Tool. CC ID 02177 | Configuration | Preventive | |
Configure custom Security settings for Sun Answerbook2. CC ID 02178 | Configuration | Preventive | |
Configure custom security settings for Command (PROM) Monitor. CC ID 02180 | Configuration | Preventive | |
Configure and secure each interface for Executive Interfaces. CC ID 02182 | Configuration | Preventive | |
Reconfigure the default settings and configure the system security for Site Management Complex. CC ID 02183 | Configuration | Preventive | |
Configure the unisys executive (GENNED) GEN tags. CC ID 02184 | Configuration | Preventive | |
Reconfigure the default Console Mode privileges. CC ID 02189 | Configuration | Preventive | |
Restrict access to security-related Console Mode key-in groups based on the security profiles. CC ID 02190 | Configuration | Preventive | |
Configure security profiles for the various Console Mode levels. CC ID 02191 | Configuration | Preventive | |
Configure custom access privileges for all mapper files. CC ID 02194 | Configuration | Preventive | |
Configure custom access privileges for the PSERVER configuration file. CC ID 02195 | Configuration | Preventive | |
Configure custom access privileges for the DEPCON configuration file. CC ID 02196 | Configuration | Preventive | |
Disable the default NetWare user web page unless absolutely necessary. CC ID 04447 | Configuration | Preventive | |
Enable and reset the primary administrator names, primary administrator passwords, root names, and root passwords. CC ID 04448 | Configuration | Preventive | |
Remove unnecessary documentation or unprotected documentation from installed applications. CC ID 04452 | Configuration | Preventive | |
Complete the NetWare eGuide configuration. CC ID 04449 | Configuration | Preventive | |
Verify the usr/aset/masters/uid_aliases file exists and contains an appropriate aliases list. CC ID 04902 | Configuration | Preventive | |
Set the low security directory list properly. CC ID 04903 | Configuration | Preventive | |
Set the medium security directory list properly. CC ID 04904 | Configuration | Preventive | |
Set the high security directory list properly. CC ID 04905 | Configuration | Preventive | |
Set the UID aliases pointer properly. CC ID 04906 | Configuration | Preventive | |
Verify users are listed in the ASET userlist file. CC ID 04907 | Technical Security | Preventive | |
Verify Automated Security Enhancement Tool checks the NIS+ tables, as appropriate. CC ID 04908 | Testing | Preventive | |
Reconfigure the encryption keys from their default setting or previous setting. CC ID 06079 | Configuration | Preventive | |
Change the default Service Set Identifier for Wireless Access Points and wireless bridges. CC ID 06086 | Configuration | Preventive | |
Revoke public execute privileges for all processes or applications that allow such privileges. CC ID 06568 | Configuration | Preventive | |
Configure the system's booting configuration. CC ID 10656 | Configuration | Preventive | |
Configure the system to boot directly to the correct Operating System. CC ID 04509 | Configuration | Preventive | |
Verify an appropriate bootloader is used. CC ID 04900 | Configuration | Preventive | |
Configure the ability to boot from USB devices, as appropriate. CC ID 04901 | Configuration | Preventive | |
Configure the system to boot from hardware enforced read-only media. CC ID 10657 | Configuration | Preventive | |
Establish, implement, and maintain procedures to standardize operating system software installation. CC ID 00869 | Establish/Maintain Documentation | Preventive | |
Verify operating system installation plans include software security considerations. CC ID 00870 | Establish/Maintain Documentation | Preventive | |
Configure the "Approved Installation Sites for ActiveX Controls" security mechanism properly. CC ID 04909 | Configuration | Preventive | |
Configure Least Functionality and Least Privilege settings to organizational standards. CC ID 07599 | Configuration | Preventive | |
Prohibit directories from having read/write capability, as appropriate. CC ID 16313 | Configuration | Preventive | |
Configure "Block public access (bucket settings)" to organizational standards. CC ID 15444 | Configuration | Preventive | |
Configure S3 Bucket Policies to organizational standards. CC ID 15431 | Configuration | Preventive | |
Configure "Allow suggested apps in Windows Ink Workspace" to organizational standards. CC ID 15417 | Configuration | Preventive | |
Configure "Allow Cloud Search" to organizational standards. CC ID 15416 | Configuration | Preventive | |
Configure "Configure Watson events" to organizational standards. CC ID 15414 | Configuration | Preventive | |
Configure "Allow Clipboard synchronization across devices" to organizational standards. CC ID 15412 | Configuration | Preventive | |
Configure "Prevent users from modifying settings" to organizational standards. CC ID 15411 | Configuration | Preventive | |
Configure "Prevent users from sharing files within their profile" to organizational standards. CC ID 15408 | Configuration | Preventive | |
Configure "Manage preview builds" to organizational standards. CC ID 15405 | Configuration | Preventive | |
Configure "Turn off Help Experience Improvement Program" to organizational standards. CC ID 15403 | Configuration | Preventive | |
Configure "Sign-in and lock last interactive user automatically after a restart" to organizational standards. CC ID 15402 | Configuration | Preventive | |
Configure "Hardened UNC Paths" to organizational standards. CC ID 15400 | Configuration | Preventive | |
Configure "Turn off all Windows spotlight features" to organizational standards. CC ID 15397 | Configuration | Preventive | |
Configure "Allow Message Service Cloud Sync" to organizational standards. CC ID 15396 | Configuration | Preventive | |
Configure "Configure local setting override for reporting to Microsoft MAPS" to organizational standards. CC ID 15394 | Configuration | Preventive | |
Configure "Configure Windows spotlight on lock screen" to organizational standards. CC ID 15391 | Configuration | Preventive | |
Configure "Do not suggest third-party content in Windows spotlight" to organizational standards. CC ID 15389 | Configuration | Preventive | |
Configure "Enable Font Providers" to organizational standards. CC ID 15388 | Configuration | Preventive | |
Configure "Disallow copying of user input methods to the system account for sign-in" to organizational standards. CC ID 15386 | Configuration | Preventive | |
Configure "Do not display network selection UI" to organizational standards. CC ID 15381 | Configuration | Preventive | |
Configure "Turn off KMS Client Online AVS Validation" to organizational standards. CC ID 15380 | Configuration | Preventive | |
Configure "Allow Telemetry" to organizational standards. CC ID 15378 | Configuration | Preventive | |
Configure "Allow users to enable online speech recognition services" to organizational standards. CC ID 15377 | Configuration | Preventive | |
Configure "Prevent enabling lock screen camera" to organizational standards. CC ID 15373 | Configuration | Preventive | |
Configure "Continue experiences on this device" to organizational standards. CC ID 15372 | Configuration | Preventive | |
Configure "Prevent the usage of OneDrive for file storage" to organizational standards. CC ID 15369 | Configuration | Preventive | |
Configure "Do not use diagnostic data for tailored experiences" to organizational standards. CC ID 15367 | Configuration | Preventive | |
Configure "Network access: Restrict clients allowed to make remote calls to SAM" to organizational standards. CC ID 15365 | Configuration | Preventive | |
Configure "Turn off Microsoft consumer experiences" to organizational standards. CC ID 15363 | Configuration | Preventive | |
Configure "Allow Use of Camera" to organizational standards. CC ID 15362 | Configuration | Preventive | |
Configure "Allow Online Tips" to organizational standards. CC ID 15360 | Configuration | Preventive | |
Configure "Turn off cloud optimized content" to organizational standards. CC ID 15357 | Configuration | Preventive | |
Configure "Apply UAC restrictions to local accounts on network logons" to organizational standards. CC ID 15356 | Configuration | Preventive | |
Configure "Toggle user control over Insider builds" to organizational standards. CC ID 15354 | Configuration | Preventive | |
Configure "Allow network connectivity during connected-standby (plugged in)" to organizational standards. CC ID 15353 | Configuration | Preventive | |
Configure "Do not show feedback notifications" to organizational standards. CC ID 15350 | Configuration | Preventive | |
Configure "Prevent enabling lock screen slide show" to organizational standards. CC ID 15349 | Configuration | Preventive | |
Configure "Turn off the advertising ID" to organizational standards. CC ID 15348 | Configuration | Preventive | |
Configure "Allow Windows Ink Workspace" to organizational standards. CC ID 15346 | Configuration | Preventive | |
Configure "Allow a Windows app to share application data between users" to organizational standards. CC ID 15345 | Configuration | Preventive | |
Configure "Turn off handwriting personalization data sharing" to organizational standards. CC ID 15339 | Configuration | Preventive | |
Configure the "Devices: Prevent users from installing printer drivers" to organizational standards. CC ID 07600 | Configuration | Preventive | |
Configure the "Log on as a service" to organizational standards. CC ID 07609 | Configuration | Preventive | |
Configure "Restore files and directories" to organizational standards. CC ID 07610 | Configuration | Preventive | |
Configure the "Back up files and directories" to organizational standards. CC ID 07629 | Configuration | Preventive | |
Configure the "Change the system time" to organizational standards. CC ID 07633 | Configuration | Preventive | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts" to organizational standards. CC ID 07635 | Configuration | Preventive | |
Configure the "Perform volume maintenance tasks" to organizational standards. CC ID 07653 | Configuration | Preventive | |
Configure the "Create global objects" to organizational standards. CC ID 07659 | Configuration | Preventive | |
Configure the "System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies" to organizational standards. CC ID 07660 | Configuration | Preventive | |
Configure the "DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax" to organizational standards. CC ID 07671 | Configuration | Preventive | |
Configure the "Network access: Named Pipes that can be accessed anonymously" to organizational standards. CC ID 07676 | Configuration | Preventive | |
Configure the "Change the time zone" to organizational standards. CC ID 07677 | Configuration | Preventive | |
Configure the "Adjust memory quotas for a process" to organizational standards. CC ID 07685 | Configuration | Preventive | |
Configure the "Add workstations to domain" to organizational standards. CC ID 07689 | Configuration | Preventive | |
Configure the "Take ownership of files or other objects" to organizational standards. CC ID 07691 | Configuration | Preventive | |
Configure the "Access this computer from the network" to organizational standards. CC ID 07706 | Configuration | Preventive | |
Configure the "MSS: (AutoReboot) Allow Windows to automatically restart after a system crash (recommended except for highly secure environments)" to organizational standards. CC ID 07710 | Configuration | Preventive | |
Configure the "Shutdown: Allow system to be shut down without having to log on" to organizational standards. CC ID 07717 | Configuration | Preventive | |
Configure the "System objects: Require case insensitivity for non-Windows subsystems" to organizational standards. CC ID 07718 | Configuration | Preventive | |
Configure the "Domain controller: Allow server operators to schedule tasks" to organizational standards. CC ID 07722 | Configuration | Preventive | |
Configure the "Debug programs" to organizational standards. CC ID 07729 | Configuration | Preventive | |
Configure the "Increase scheduling priority" to organizational standards. CC ID 07739 | Configuration | Preventive | |
Configure the "Load and unload device drivers" to organizational standards. CC ID 07745 | Configuration | Preventive | |
Configure the "Modify an object label" to organizational standards. CC ID 07755 | Configuration | Preventive | |
Configure the "Deny log on as a service" to organizational standards. CC ID 07762 | Configuration | Preventive | |
Configure the "Recovery console: Allow automatic administrative logon" to organizational standards. CC ID 07770 | Configuration | Preventive | |
Configure the "Create a token object" to organizational standards. CC ID 07774 | Configuration | Preventive | |
Configure the "Create symbolic links" to organizational standards. CC ID 07778 | Configuration | Preventive | |
Configure the "Deny access to this computer from the network" to organizational standards. CC ID 07779 | Configuration | Preventive | |
Configure the "Deny log on locally" to organizational standards. CC ID 07781 | Configuration | Preventive | |
Configure the "Manage auditing and security log" to organizational standards. CC ID 07783 | Configuration | Preventive | |
Configure the "Lock pages in memory" to organizational standards. CC ID 07784 | Configuration | Preventive | |
Configure the "Shutdown: Clear virtual memory pagefile" to organizational standards. CC ID 07787 | Configuration | Preventive | |
Configure the "Increase a process working set" to organizational standards. CC ID 07788 | Configuration | Preventive | |
Configure the "Generate security audits" to organizational standards. CC ID 07796 | Configuration | Preventive | |
Configure the "Remove computer from docking station" to organizational standards. CC ID 07802 | Configuration | Preventive | |
Configure the "System settings: Optional subsystems" to organizational standards. CC ID 07804 | Configuration | Preventive | |
Configure the "Shut down the system" to organizational standards. CC ID 07808 | Configuration | Preventive | |
Configure the "Bypass traverse checking" to organizational standards. CC ID 07809 | Configuration | Preventive | |
Configure the "Always install with elevated privileges" to organizational standards. CC ID 07811 | Configuration | Preventive | |
Configure the "Allow log on through Remote Desktop Services" to organizational standards. CC ID 07813 | Configuration | Preventive | |
Configure the "MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)" to organizational standards. CC ID 07814 | Configuration | Preventive | |
Configure the "Create permanent shared objects" to organizational standards. CC ID 07818 | Configuration | Preventive | |
Configure the "Devices: Allow undock without having to log on" to organizational standards. CC ID 07821 | Configuration | Preventive | |
Configure the "Devices: Restrict floppy access to locally logged-on user only" to organizational standards. CC ID 07823 | Configuration | Preventive | |
Configure the "Log on as a batch job" to organizational standards. CC ID 07838 | Configuration | Preventive | |
Configure the "MSS: (AutoShareServer) Enable Administrative Shares (recommended except for highly secure environments)" to organizational standards. CC ID 07841 | Configuration | Preventive | |
Configure the "DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax" to organizational standards. CC ID 07842 | Configuration | Preventive | |
Configure the "Replace a process level token" to organizational standards. CC ID 07845 | Configuration | Preventive | |
Configure the "Modify firmware environment values" to organizational standards. CC ID 07847 | Configuration | Preventive | |
Configure the "Deny log on through Remote Desktop Services" to organizational standards. CC ID 07854 | Configuration | Preventive | |
Configure the "Devices: Allowed to format and eject removable media" to organizational standards. CC ID 07862 | Configuration | Preventive | |
Configure the "Profile single process" to organizational standards. CC ID 07866 | Configuration | Preventive | |
Configure the "Turn off Autoplay" to organizational standards. CC ID 07867 | Configuration | Preventive | |
Configure the "Devices: Restrict CD-ROM access to locally logged-on user only" to organizational standards. CC ID 07871 | Configuration | Preventive | |
Configure the "Deny log on as a batch job" to organizational standards. CC ID 07876 | Configuration | Preventive | |
Configure the "Create a pagefile" to organizational standards. CC ID 07878 | Configuration | Preventive | |
Configure the "Profile system performance" to organizational standards. CC ID 07879 | Configuration | Preventive | |
Configure the "Impersonate a client after authentication" to organizational standards. CC ID 07882 | Configuration | Preventive | |
Configure the "MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)" to organizational standards. CC ID 07886 | Configuration | Preventive | |
Configure the "Force shutdown from a remote system" to organizational standards. CC ID 07889 | Configuration | Preventive | |
Configure the "Act as part of the operating system" to organizational standards. CC ID 07891 | Configuration | Preventive | |
Configure the "Allow log on locally" to organizational standards. CC ID 07894 | Configuration | Preventive | |
Configure the "Synchronize directory service data" to organizational standards. CC ID 07897 | Configuration | Preventive | |
Configure the "Access Credential Manager as a trusted caller" to organizational standards. CC ID 07898 | Configuration | Preventive | |
Configure the "Enable computer and user accounts to be trusted for delegation" to organizational standards. CC ID 07900 | Configuration | Preventive | |
Configure the "Recovery console: Allow floppy copy and access to all drives and all folders" to organizational standards. CC ID 07901 | Configuration | Preventive | |
Configure the "Software channel permissions" to organizational standards. CC ID 07910 | Configuration | Preventive | |
Configure the "Allow drag and drop or copy and paste files" to organizational standards. CC ID 07915 | Configuration | Preventive | |
Configure the "Disable Per-User Installation of ActiveX Controls" to organizational standards. CC ID 07918 | Configuration | Preventive | |
Configure the "Download signed ActiveX controls" to organizational standards. CC ID 07921 | Configuration | Preventive | |
Configure the "Disable "Configuring History"" to organizational standards. CC ID 07922 | Configuration | Preventive | |
Configure the "Turn off ActiveX opt-in prompt" to organizational standards. CC ID 07928 | Configuration | Preventive | |
Configure the "Allow installation of desktop items" to organizational standards. CC ID 07931 | Configuration | Preventive | |
Configure the "Only allow approved domains to use ActiveX controls without prompt" to organizational standards. CC ID 07936 | Configuration | Preventive | |
Configure the "Initialize and script ActiveX controls not marked as safe" to organizational standards. CC ID 07945 | Configuration | Preventive | |
Configure the "Allow file downloads" to organizational standards. CC ID 07960 | Configuration | Preventive | |
Configure the "Turn off the Security Settings Check feature" to organizational standards. CC ID 07979 | Configuration | Preventive | |
Configure the "Disable the Advanced page" to organizational standards. CC ID 07981 | Configuration | Preventive | |
Configure the "Intranet Sites: Include all network paths (UNCs)" to organizational standards. CC ID 07986 | Configuration | Preventive | |
Configure the "Disable changing Automatic Configuration settings" to organizational standards. CC ID 07992 | Configuration | Preventive | |
Configure the "Turn off "Delete Browsing History" functionality" to organizational standards. CC ID 07993 | Configuration | Preventive | |
Configure the "Allow META REFRESH" to organizational standards. CC ID 07998 | Configuration | Preventive | |
Configure the "Prevent Deleting Temporary Internet Files" to organizational standards. CC ID 08000 | Configuration | Preventive | |
Configure the "Security Zones: Do not allow users to change policies" to organizational standards. CC ID 08001 | Configuration | Preventive | |
Configure the "Only use the ActiveX Installer Service for installation of ActiveX Controls" to organizational standards. CC ID 08003 | Configuration | Preventive | |
Configure the "Prevent "Fix settings" functionality" to organizational standards. CC ID 08010 | Configuration | Preventive | |
Configure the "XAML browser applications" to organizational standards. CC ID 08011 | Configuration | Preventive | |
Configure the "Run .NET Framework-reliant components signed with Authenticode" to organizational standards CC ID 08014 | Configuration | Preventive | |
Configure the "Access data sources across domains" to organizational standards. CC ID 08018 | Configuration | Preventive | |
Configure the "Allow script-initiated windows without size or position constraints" to organizational standards. CC ID 08020 | Configuration | Preventive | |
Configure the "Disable Save this program to disk option" to organizational standards. CC ID 08021 | Configuration | Preventive | |
Configure the "Security Zones: Do not allow users to add/delete sites" to organizational standards. CC ID 08061 | Configuration | Preventive | |
Configure the "Script ActiveX controls marked safe for scripting" to organizational standards. CC ID 08067 | Configuration | Preventive | |
Configure the "Prevent Deleting Cookies" to organizational standards. CC ID 08069 | Configuration | Preventive | |
Configure the "Allow binary and script behaviors" to organizational standards. CC ID 08070 | Configuration | Preventive | |
Configure the "Launching applications and files in an IFRAME" to organizational standards. CC ID 08078 | Configuration | Preventive | |
Configure the "Allow status bar updates via script" to organizational standards. CC ID 08081 | Configuration | Preventive | |
Configure the "Turn off Crash Detection" to organizational standards. CC ID 08085 | Configuration | Preventive | |
Configure the "Security Zones: Use only machine settings" to organizational standards. CC ID 08088 | Configuration | Preventive | |
Configure the "Web sites in less privileged Web content zones can navigate into this zone" to organizational standards. CC ID 08089 | Configuration | Preventive | |
Configure the "Disable the Security page" to organizational standards. CC ID 08090 | Configuration | Preventive | |
Configure the "Automatically check for Internet Explorer updates" to organizational standards. CC ID 08094 | Configuration | Preventive | |
Configure the "Navigate windows and frames across different domains" to organizational standards. CC ID 08107 | Configuration | Preventive | |
Configure the "Allow active scripting" setting to organizational standards. CC ID 08115 | Configuration | Preventive | |
Configure the "Allow font downloads" to organizational standards. CC ID 08116 | Configuration | Preventive | |
Configure the "Disable changing proxy settings" to organizational standards. CC ID 08126 | Configuration | Preventive | |
Configure the "Disable changing connection settings" to organizational standards. CC ID 08129 | Configuration | Preventive | |
Configure the "Run .NET Framework-reliant components not signed with Authenticode" to organizational standards CC ID 08130 | Configuration | Preventive | |
Configure the "Turn off printing over HTTP" to organizational standards. CC ID 08162 | Configuration | Preventive | |
Configure the "Registry policy processing" to organizational standards. CC ID 08169 | Configuration | Preventive | |
Configure the "Disable remote Desktop Sharing" to organizational standards. CC ID 08186 | Configuration | Preventive | |
Configure the "Report operating system errors" to organizational standards. CC ID 08187 | Configuration | Preventive | |
Configure the "Enumerate administrator accounts on elevation" to organizational standards. CC ID 08190 | Configuration | Preventive | |
Configure the "Turn off Windows Update device driver searching" to organizational standards. CC ID 08193 | Configuration | Preventive | |
Configure the "Do not allow drive redirection" to organizational standards. CC ID 08199 | Configuration | Preventive | |
Configure the "Turn off the Windows Messenger Customer Experience Improvement Program" to organizational standards. CC ID 08204 | Configuration | Preventive | |
Configure the "Turn off downloading of print drivers over HTTP" to organizational standards. CC ID 08218 | Configuration | Preventive | |
Configure the "Do not process the run once list" to organizational standards. CC ID 08219 | Configuration | Preventive | |
Configure the "Deny log on through Terminal Services" to organizational standards. CC ID 08220 | Configuration | Preventive | |
Configure the "Offer Remote Assistance" to organizational standards. CC ID 08222 | Configuration | Preventive | |
Configure the "Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box" to organizational standards. CC ID 08228 | Configuration | Preventive | |
Configure the "Allow users to connect remotely using Remote Desktop Services" to organizational standards. CC ID 08234 | Configuration | Preventive | |
Configure the "MSS: (AutoShareWks) Enable Administrative Shares (recommended except for highly secure environments)" to organizational standards. CC ID 08247 | Configuration | Preventive | |
Configure the "MSS: (NtfsDisable8dot3NameCreation) Enable the computer to stop generating 8.3 style filenames" to organizational standards. CC ID 08253 | Configuration | Preventive | |
Configure the "Solicited Remote Assistance" to organizational standards. CC ID 08265 | Configuration | Preventive | |
Configure "Turn off the "Publish to Web" task for files and folders" to organizational standards. CC ID 08285 | Configuration | Preventive | |
Configure the "Do not allow Windows Messenger to be run" to organizational standards. CC ID 08288 | Configuration | Preventive | |
Configure the "Allow log on through Terminal Services" to organizational standards. CC ID 08291 | Configuration | Preventive | |
Configure the "Require trusted path for credential entry." to organizational standards CC ID 08293 | Configuration | Preventive | |
Configure the "Turn off Search Companion content file updates" to organizational standards. CC ID 08302 | Configuration | Preventive | |
Configure the "Prevent access to registry editing tools" to organizational standards. CC ID 08331 | Configuration | Preventive | |
Configure the "Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet" to organizational standards. CC ID 08347 | Configuration | Preventive | |
Configure the "Turn on SmartScreen Filter scan" to organizational standards. CC ID 08357 | Configuration | Preventive | |
Configure the "Disallow WinRM from storing RunAs credentials" to organizational standards. CC ID 08362 | Configuration | Preventive | |
Configure the "Turn off URL Suggestions" to organizational standards. CC ID 08372 | Configuration | Preventive | |
Configure the "Prevent users from bypassing SmartScreen Filter's application reputation warnings about files that are not commonly downloaded from the Internet" to organizational standards. CC ID 08385 | Configuration | Preventive | |
Configure the "Prevent access to Delete Browsing History" to organizational standards. CC ID 08387 | Configuration | Preventive | |
Configure the "Turn off InPrivate Browsing" to organizational standards. CC ID 08421 | Configuration | Preventive | |
Configure the "Turn off Windows Location Provider" to organizational standards. CC ID 08427 | Configuration | Preventive | |
Configure the "Turn on Suggested Sites" to organizational standards. CC ID 08434 | Configuration | Preventive | |
Configure the "Turn off access to the Store" to organizational standards. CC ID 08436 | Configuration | Preventive | |
Configure the "Point and Print Restrictions" to organizational standards. CC ID 08441 | Configuration | Preventive | |
Configure the "Prevent changing proxy settings" to organizational standards. CC ID 08447 | Configuration | Preventive | |
Configure the "Allow deleting browsing history on exit" to organizational standards. CC ID 08456 | Configuration | Preventive | |
Configure the "Allow scripting of Internet Explorer WebBrowser controls" to organizational standards. CC ID 08464 | Configuration | Preventive | |
Configure the "Turn off Managing SmartScreen Filter for Internet Explorer 9" to organizational standards. CC ID 08472 | Configuration | Preventive | |
Configure the "Check Administrator Group Membership" to organizational standards. CC ID 08473 | Configuration | Preventive | |
Configure the "Check if AppLocker is Enabled" to organizational standards. CC ID 08475 | Configuration | Preventive | |
Configure the "Prevent the computer from joining a homegroup" to organizational standards. CC ID 08486 | Configuration | Preventive | |
Configure the "Disable Browser Geolocation" to organizational standards. CC ID 08491 | Configuration | Preventive | |
Configure the "Allow Remote Shell Access" to organizational standards. CC ID 08496 | Configuration | Preventive | |
Configure the "Turn Off the Display (Plugged In)" to organizational standards. CC ID 08502 | Configuration | Preventive | |
Configure the "Do not enumerate connected users on domain-joined computers" to organizational standards. CC ID 08507 | Configuration | Preventive | |
Configure the "Enable dragging of content from different domains across windows" to organizational standards. CC ID 08517 | Configuration | Preventive | |
Configure the "Turn off first-run prompt" to organizational standards. CC ID 08521 | Configuration | Preventive | |
Configure the "Allow Scriptlets" to organizational standards. CC ID 08523 | Configuration | Preventive | |
Configure the "Turn on ActiveX Filtering" to organizational standards. CC ID 08524 | Configuration | Preventive | |
Configure the "Userdata persistence" to organizational standards. CC ID 08533 | Configuration | Preventive | |
Configure the "Enable dragging of content from different domains within a window" to organizational standards. CC ID 08535 | Configuration | Preventive | |
Configure the "Turn off app notifications on the lock screen" to organizational standards. CC ID 08536 | Configuration | Preventive | |
Configure the "Allow updates to status bar via script" to organizational standards. CC ID 08540 | Configuration | Preventive | |
Configure the "Enumerate local users on domain-joined computers" to organizational standards. CC ID 08546 | Configuration | Preventive | |
Configure the "Prevent deleting websites that the user has visited" to organizational standards. CC ID 08547 | Configuration | Preventive | |
Configure the "Install new versions of Internet Explorer automatically" to organizational standards. CC ID 08551 | Configuration | Preventive | |
Configure the "Make proxy settings per-machine (rather than per-user)" to organizational standards. CC ID 08553 | Configuration | Preventive | |
Configure the "Disable external branding of Internet Explorer" to organizational standards. CC ID 08555 | Configuration | Preventive | |
Configure the "Include local path when user is uploading files to a server" to organizational standards. CC ID 08557 | Configuration | Preventive | |
Configure the "Configure Solicited Remote Assistance" to organizational standards. CC ID 08561 | Configuration | Preventive | |
Configure the "Allow loading of XAML files" to organizational standards. CC ID 08562 | Configuration | Preventive | |
Configure the "Do not display the password reveal button" to organizational standards. CC ID 08567 | Configuration | Preventive | |
Configure the "Prevent running First Run wizard" to organizational standards. CC ID 08572 | Configuration | Preventive | |
Configure the "Turn off location" to organizational standards. CC ID 08575 | Configuration | Preventive | |
Configure the "Turn on Enhanced Protected Mode" to organizational standards. CC ID 08577 | Configuration | Preventive | |
Configure the "Turn off browser geolocation" to organizational standards. CC ID 08580 | Configuration | Preventive | |
Configure the "Do not display the reveal password button" to organizational standards. CC ID 08583 | Configuration | Preventive | |
Configure the "Include updated website lists from Microsoft" to organizational standards. CC ID 08593 | Configuration | Preventive | |
Configure the "Turn off Event Viewer "Events.asp" links" to organizational standards. CC ID 08604 | Configuration | Preventive | |
Configure the "Configure Offer Remote Assistance" to organizational standards. CC ID 08605 | Configuration | Preventive | |
Configure the "Prevent specifying the update check interval (in days)" to organizational standards. CC ID 08608 | Configuration | Preventive | |
Configure the "Turn Off the Display (On Battery)" to organizational standards. CC ID 08609 | Configuration | Preventive | |
Configure the "Prevent participation in the Customer Experience Improvement Program" to organizational standards. CC ID 08611 | Configuration | Preventive | |
Configure the "Add a specific list of search providers to the user's search provider list" setting to organizational standards. CC ID 10420 | Configuration | Preventive | |
Configure the "Admin-approved behaviors" setting to organizational standards. CC ID 10421 | Configuration | Preventive | |
Configure the "Allow the display of image download placeholders" setting to organizational standards. CC ID 10422 | Configuration | Preventive | |
Configure the "Allow the printing of background colors and images" setting to organizational standards. CC ID 10423 | Configuration | Preventive | |
Configure the "Audio/Video Player" setting to organizational standards. CC ID 10424 | Configuration | Preventive | |
Configure the "Auto-hide the Toolbars" setting to organizational standards. CC ID 10425 | Configuration | Preventive | |
Configure the "Binary Behavior Security Restriction: All Processes" setting to organizational standards. CC ID 10426 | Configuration | Preventive | |
Configure the "Binary Behavior Security Restriction: Internet Explorer Processes" setting to organizational standards. CC ID 10427 | Configuration | Preventive | |
Configure the "Binary Behavior Security Restriction: Process List" setting to organizational standards. CC ID 10428 | Configuration | Preventive | |
Configure the "Carpoint" setting to organizational standards. CC ID 10429 | Configuration | Preventive | |
Configure the "Configure new tab page default behavior" setting to organizational standards. CC ID 10430 | Configuration | Preventive | |
Configure the "Customize Command Labels" setting to organizational standards. CC ID 10431 | Configuration | Preventive | |
Configure the "Customize User Agent String" setting to organizational standards. CC ID 10432 | Configuration | Preventive | |
Configure the "Deploy default Accelerators" setting to organizational standards. CC ID 10433 | Configuration | Preventive | |
Configure the "Deploy non-default Accelerators" setting to organizational standards. CC ID 10434 | Configuration | Preventive | |
Configure the "DHTML Edit Control" setting to organizational standards. CC ID 10435 | Configuration | Preventive | |
Configure the "Disable caching of Auto-Proxy scripts" setting to organizational standards. CC ID 10436 | Configuration | Preventive | |
Configure the "Disable changing accessibility settings" setting to organizational standards. CC ID 10437 | Configuration | Preventive | |
Configure the "Disable changing Calendar and Contact settings" setting to organizational standards. CC ID 10438 | Configuration | Preventive | |
Configure the "Disable changing color settings" setting to organizational standards. CC ID 10439 | Configuration | Preventive | |
Configure the "Disable changing default browser check" setting to organizational standards. CC ID 10440 | Configuration | Preventive | |
Configure the "Disable changing font settings" setting to organizational standards. CC ID 10441 | Configuration | Preventive | |
Configure the "Disable changing home page settings" setting to organizational standards. CC ID 10442 | Configuration | Preventive | |
Configure the "Disable changing language settings" setting to organizational standards. CC ID 10443 | Configuration | Preventive | |
Configure the "Disable changing link color settings" setting to organizational standards. CC ID 10444 | Configuration | Preventive | |
Configure the "Disable changing Messaging settings" setting to organizational standards. CC ID 10445 | Configuration | Preventive | |
Configure the "Disable changing ratings settings" setting to organizational standards. CC ID 10446 | Configuration | Preventive | |
Configure the "Disable changing secondary home page settings" setting to organizational standards. CC ID 10447 | Configuration | Preventive | |
Configure the "Disable changing Temporary Internet files settings" setting to organizational standards. CC ID 10448 | Configuration | Preventive | |
Configure the "Disable Context menu" setting to organizational standards. CC ID 10449 | Configuration | Preventive | |
Configure the "Disable customizing browser toolbar buttons" setting to organizational standards. CC ID 10450 | Configuration | Preventive | |
Configure the "Disable customizing browser toolbars" setting to organizational standards. CC ID 10451 | Configuration | Preventive | |
Configure the "Disable Import/Export Settings wizard" setting to organizational standards. CC ID 10452 | Configuration | Preventive | |
Configure the "Disable Open in New Window menu option" setting to organizational standards. CC ID 10453 | Configuration | Preventive | |
Configure the "Disable the Connections page" setting to organizational standards. CC ID 10454 | Configuration | Preventive | |
Configure the "Disable the Content page" setting to organizational standards. CC ID 10455 | Configuration | Preventive | |
Configure the "Disable the General page" setting to organizational standards. CC ID 10456 | Configuration | Preventive | |
Configure the "Disable the Programs page" setting to organizational standards. CC ID 10457 | Configuration | Preventive | |
Configure the "Disable toolbars and extensions when InPrivate Browsing starts" setting to organizational standards. CC ID 10458 | Configuration | Preventive | |
Configure the "Display error message on proxy script download failure" setting to organizational standards. CC ID 10459 | Configuration | Preventive | |
Configure the "Do not collect InPrivate Filtering data" setting to organizational standards. CC ID 10460 | Configuration | Preventive | |
Configure the "Do not save encrypted pages to disk" setting to organizational standards. CC ID 10461 | Configuration | Preventive | |
Configure the "Empty Temporary Internet Files folder when browser is closed" setting to organizational standards. CC ID 10462 | Configuration | Preventive | |
Configure the "Enforce Full Screen Mode" setting to organizational standards. CC ID 10463 | Configuration | Preventive | |
Configure the "File menu: Disable closing the browser and Explorer windows" setting to organizational standards. CC ID 10464 | Configuration | Preventive | |
Configure the "File menu: Disable New menu option" setting to organizational standards. CC ID 10465 | Configuration | Preventive | |
Configure the "File menu: Disable Open menu option" setting to organizational standards. CC ID 10466 | Configuration | Preventive | |
Configure the "File menu: Disable Save As Web Page Complete" setting to organizational standards. CC ID 10467 | Configuration | Preventive | |
Configure the "File menu: Disable Save As.. menu option" setting to organizational standards. CC ID 10468 | Configuration | Preventive | |
Configure the "File size limits for Internet zone" setting to organizational standards. CC ID 10469 | Configuration | Preventive | |
Configure the "File size limits for Intranet zone" setting to organizational standards. CC ID 10470 | Configuration | Preventive | |
Configure the "File size limits for Local Machine zone" setting to organizational standards. CC ID 10471 | Configuration | Preventive | |
Configure the "File size limits for Restricted Sites zone" setting to organizational standards. CC ID 10472 | Configuration | Preventive | |
Configure the "File size limits for Trusted Sites zone" setting to organizational standards. CC ID 10473 | Configuration | Preventive | |
Configure the "Help menu: Remove 'Send Feedback' menu option" setting to organizational standards. CC ID 10474 | Configuration | Preventive | |
Configure the "Help menu: Remove 'Tour' menu option" setting to organizational standards. CC ID 10475 | Configuration | Preventive | |
Configure the "Hide Favorites menu" setting to organizational standards. CC ID 10476 | Configuration | Preventive | |
Configure the "Hide the Command Bar" setting to organizational standards. CC ID 10477 | Configuration | Preventive | |
Configure the "Hide the Status Bar" setting to organizational standards. CC ID 10478 | Configuration | Preventive | |
Configure the "InPrivate Filtering Threshold" setting to organizational standards. CC ID 10479 | Configuration | Preventive | |
Configure the "Internet Zone Restricted Protocols" setting to organizational standards. CC ID 10480 | Configuration | Preventive | |
Configure the "Internet Zone Template" setting to organizational standards. CC ID 10481 | Configuration | Preventive | |
Configure the "Intranet Sites: Include all local (intranet) sites not listed in other zones" setting to organizational standards. CC ID 10482 | Configuration | Preventive | |
Configure the "Intranet Sites: Include all sites that bypass the proxy server" setting to organizational standards. CC ID 10483 | Configuration | Preventive | |
Configure the "Intranet Zone Restricted Protocols" setting to organizational standards. CC ID 10484 | Configuration | Preventive | |
Configure the "Intranet Zone Template" setting to organizational standards. CC ID 10485 | Configuration | Preventive | |
Configure the "Investor" setting to organizational standards. CC ID 10486 | Configuration | Preventive | |
Configure the "Local Machine Zone Restricted Protocols" setting to organizational standards. CC ID 10487 | Configuration | Preventive | |
Configure the "Local Machine Zone Template" setting to organizational standards. CC ID 10488 | Configuration | Preventive | |
Configure the "Lock all Toolbars" setting to organizational standards. CC ID 10489 | Configuration | Preventive | |
Configure the "Locked-Down Internet Zone Template" setting to organizational standards. CC ID 10490 | Configuration | Preventive | |
Configure the "Locked-Down Intranet Zone Template" setting to organizational standards. CC ID 10491 | Configuration | Preventive | |
Configure the "Locked-Down Local Machine Zone Template" setting to organizational standards. CC ID 10492 | Configuration | Preventive | |
Configure the "Locked-Down Restricted Sites Zone Template" setting to organizational standards. CC ID 10493 | Configuration | Preventive | |
Configure the "Locked-Down Trusted Sites Zone Template" setting to organizational standards. CC ID 10494 | Configuration | Preventive | |
Configure the "Maximum number of connections per server (HTTP 1.0)" setting to organizational standards. CC ID 10495 | Configuration | Preventive | |
Configure the "Maximum number of connections per server (HTTP 1.1)" setting to organizational standards. CC ID 10496 | Configuration | Preventive | |
Configure the "Menu Controls" setting to organizational standards. CC ID 10497 | Configuration | Preventive | |
Configure the "Microsoft Agent" setting to organizational standards. CC ID 10498 | Configuration | Preventive | |
Configure the "Microsoft Chat" setting to organizational standards. CC ID 10499 | Configuration | Preventive | |
Configure the "Microsoft Scriptlet Component" setting to organizational standards. CC ID 10500 | Configuration | Preventive | |
Configure the "Microsoft Survey Control" setting to organizational standards. CC ID 10501 | Configuration | Preventive | |
Configure the "Moving the menu bar above the navigation bar" setting to organizational standards. CC ID 10502 | Configuration | Preventive | |
Configure the "MSNBC" setting to organizational standards. CC ID 10503 | Configuration | Preventive | |
Configure the "NetShow File Transfer Control" setting to organizational standards. CC ID 10504 | Configuration | Preventive | |
Configure the "Network Protocol Lockdown: All Processes" setting to organizational standards. CC ID 10505 | Configuration | Preventive | |
Configure the "Network Protocol Lockdown: Internet Explorer Processes" setting to organizational standards. CC ID 10506 | Configuration | Preventive | |
Configure the "Network Protocol Lockdown: Process List" setting to organizational standards. CC ID 10507 | Configuration | Preventive | |
Configure the "Play animations in web pages" setting to organizational standards. CC ID 10508 | Configuration | Preventive | |
Configure the "Play sounds in web pages" setting to organizational standards. CC ID 10509 | Configuration | Preventive | |
Configure the "Pop-up allow list" setting to organizational standards. CC ID 10510 | Configuration | Preventive | |
Configure the "Prevent configuration of search from the Address bar" setting to organizational standards. CC ID 10511 | Configuration | Preventive | |
Configure the "Prevent Deleting Favorites Site Data" setting to organizational standards. CC ID 10512 | Configuration | Preventive | |
Configure the "Prevent Deleting Form Data" setting to organizational standards. CC ID 10513 | Configuration | Preventive | |
Configure the "Prevent Deleting InPrivate Filtering data" setting to organizational standards. CC ID 10514 | Configuration | Preventive | |
Configure the "Prevent Deleting Passwords" setting to organizational standards. CC ID 10515 | Configuration | Preventive | |
Configure the "Prevent Internet Explorer Search box from displaying" setting to organizational standards. CC ID 10516 | Configuration | Preventive | |
Configure the "Prevent setting of the code download path for each machine" setting to organizational standards. CC ID 10517 | Configuration | Preventive | |
Configure the "Prevent the configuration of cipher strength update information URLs" setting to organizational standards. CC ID 10518 | Configuration | Preventive | |
Configure the "Prevent the use of Windows colors" setting to organizational standards. CC ID 10519 | Configuration | Preventive | |
Configure the "Prevent users from choosing default text size" setting to organizational standards. CC ID 10520 | Configuration | Preventive | |
Configure the "Prevent users from configuring background color" setting to organizational standards. CC ID 10521 | Configuration | Preventive | |
Configure the "Prevent users from configuring text color" setting to organizational standards. CC ID 10522 | Configuration | Preventive | |
Configure the "Prevent users from configuring the color of links that have already been clicked" setting to organizational standards. CC ID 10523 | Configuration | Preventive | |
Configure the "Prevent users from configuring the color of links that have not yet been clicked" setting to organizational standards. CC ID 10524 | Configuration | Preventive | |
Configure the "Prevent users from configuring the hover color" setting to organizational standards. CC ID 10525 | Configuration | Preventive | |
Configure the "Restrict changing the default search provider" setting to organizational standards. CC ID 10526 | Configuration | Preventive | |
Configure the "Restrict search providers to a specific list of providers" setting to organizational standards. CC ID 10527 | Configuration | Preventive | |
Configure the "Restricted Sites Zone Restricted Protocols" setting to organizational standards. CC ID 10528 | Configuration | Preventive | |
Configure the "Restricted Sites Zone Template" setting to organizational standards. CC ID 10529 | Configuration | Preventive | |
Configure the "Send internationalized domain names" setting to organizational standards. CC ID 10530 | Configuration | Preventive | |
Configure the "Set location of Stop and Refresh buttons" setting to organizational standards. CC ID 10531 | Configuration | Preventive | |
Configure the "Set tab process growth" setting to organizational standards. CC ID 10532 | Configuration | Preventive | |
Configure the "Flash" setting to organizational standards. CC ID 10533 | Configuration | Preventive | |
Configure the "Tools menu: Disable Internet Options.. menu option" setting to organizational standards. CC ID 10534 | Configuration | Preventive | |
Configure the "Trusted Sites Zone Restricted Protocols" setting to organizational standards. CC ID 10535 | Configuration | Preventive | |
Configure the "Trusted Sites Zone Template" setting to organizational standards. CC ID 10536 | Configuration | Preventive | |
Configure the "Turn off Accelerators" setting to organizational standards. CC ID 10537 | Configuration | Preventive | |
Configure the "Turn off Automatic Crash Recovery Prompt" setting to organizational standards. CC ID 10538 | Configuration | Preventive | |
Configure the "Turn off automatic image resizing" setting to organizational standards. CC ID 10539 | Configuration | Preventive | |
Configure the "Turn off ClearType" setting to organizational standards. CC ID 10540 | Configuration | Preventive | |
Configure the "Turn off Compatibility View button" setting to organizational standards. CC ID 10541 | Configuration | Preventive | |
Configure the "Turn off Compatibility View" setting to organizational standards. CC ID 10542 | Configuration | Preventive | |
Configure the "Turn off configuration of default behavior of new tab creation" setting to organizational standards. CC ID 10543 | Configuration | Preventive | |
Configure the "Turn off configuration of tabbed browsing pop-up behavior" setting to organizational standards. CC ID 10544 | Configuration | Preventive | |
Configure the "Turn off configuration of window reuse" setting to organizational standards. CC ID 10545 | Configuration | Preventive | |
Configure the "Turn off configuring underline links" setting to organizational standards. CC ID 10546 | Configuration | Preventive | |
Configure the "Turn off Cross Document Messaging" setting to organizational standards. CC ID 10547 | Configuration | Preventive | |
Configure the "Turn off Data URI Support" setting to organizational standards. CC ID 10548 | Configuration | Preventive | |
Configure the "Turn off Developer Tools" setting to organizational standards. CC ID 10549 | Configuration | Preventive | |
Configure the "Turn off displaying the Internet Explorer Help Menu" setting to organizational standards. CC ID 10550 | Configuration | Preventive | |
Configure the "Turn off Favorites bar" setting to organizational standards. CC ID 10551 | Configuration | Preventive | |
Configure the "Turn off friendly http error messages" setting to organizational standards. CC ID 10552 | Configuration | Preventive | |
Configure the "Turn off InPrivate Filtering" setting to organizational standards. CC ID 10553 | Configuration | Preventive | |
Configure the "Turn off Managing Pop-up Allow list" setting to organizational standards. CC ID 10554 | Configuration | Preventive | |
Configure the "Turn off managing Pop-up filter level" setting to organizational standards. CC ID 10555 | Configuration | Preventive | |
Configure the "Turn off page zooming functionality" setting to organizational standards. CC ID 10556 | Configuration | Preventive | |
Configure the "Turn off picture display" setting to organizational standards. CC ID 10557 | Configuration | Preventive | |
Configure the "Turn off pop-up management" setting to organizational standards. CC ID 10558 | Configuration | Preventive | |
Configure the "Turn off Print Menu" setting to organizational standards. CC ID 10559 | Configuration | Preventive | |
Configure the "Turn off Quick Tabs functionality" setting to organizational standards. CC ID 10560 | Configuration | Preventive | |
Configure the "Turn off Reopen Last Browsing Session" setting to organizational standards. CC ID 10561 | Configuration | Preventive | |
Configure the "Turn off sending URLs as UTF-8 (requires restart)" setting to organizational standards. CC ID 10562 | Configuration | Preventive | |
Configure the "Turn off smart image dithering" setting to organizational standards. CC ID 10563 | Configuration | Preventive | |
Configure the "Turn off smooth scrolling" setting to organizational standards. CC ID 10564 | Configuration | Preventive | |
Configure the "Turn off suggestions for all user-installed providers" setting to organizational standards. CC ID 10565 | Configuration | Preventive | |
Configure the "Turn off Tab Grouping" setting to organizational standards. CC ID 10566 | Configuration | Preventive | |
Configure the "Turn off tabbed browsing" setting to organizational standards. CC ID 10567 | Configuration | Preventive | |
Configure the "Turn off the activation of the quick pick menu" setting to organizational standards. CC ID 10568 | Configuration | Preventive | |
Configure the "Turn off the auto-complete feature for web addresses" setting to organizational standards. CC ID 10569 | Configuration | Preventive | |
Configure the "Turn off the XDomainRequest Object" setting to organizational standards. CC ID 10570 | Configuration | Preventive | |
Configure the "Turn off toolbar upgrade tool" setting to organizational standards. CC ID 10571 | Configuration | Preventive | |
Configure the "Turn off Windows Search AutoComplete" setting to organizational standards. CC ID 10572 | Configuration | Preventive | |
Configure the "Turn on automatic detection of the intranet" setting to organizational standards. CC ID 10573 | Configuration | Preventive | |
Configure the "Turn on Automatic Signup" setting to organizational standards. CC ID 10574 | Configuration | Preventive | |
Configure the "Turn on Caret Browsing support" setting to organizational standards. CC ID 10575 | Configuration | Preventive | |
Configure the "Turn on Compatibility Logging" setting to organizational standards. CC ID 10576 | Configuration | Preventive | |
Configure the "Turn on Information bar notification for intranet content" setting to organizational standards. CC ID 10577 | Configuration | Preventive | |
Configure the "Turn on inline AutoComplete for Web addresses" setting to organizational standards. CC ID 10578 | Configuration | Preventive | |
Configure the "Turn on Internet Explorer 7 Standards Mode" setting to organizational standards. CC ID 10579 | Configuration | Preventive | |
Configure the "Turn on Internet Explorer Standards Mode for Local Intranet" setting to organizational standards. CC ID 10580 | Configuration | Preventive | |
Configure the "Turn on menu bar by default" setting to organizational standards. CC ID 10581 | Configuration | Preventive | |
Configure the "Turn on the display of a notification about every script error" setting to organizational standards. CC ID 10582 | Configuration | Preventive | |
Configure the "Turn on the hover color option" setting to organizational standards. CC ID 10583 | Configuration | Preventive | |
Configure the "Use Automatic Detection for dial-up connections" setting to organizational standards. CC ID 10584 | Configuration | Preventive | |
Configure the "Use HTTP 1.1 through proxy connections" setting to organizational standards. CC ID 10585 | Configuration | Preventive | |
Configure the "Use HTTP 1.1" setting to organizational standards. CC ID 10586 | Configuration | Preventive | |
Configure the "Use large Icons for Command Buttons" setting to organizational standards. CC ID 10587 | Configuration | Preventive | |
Configure the "Use Policy Accelerators" setting to organizational standards. CC ID 10588 | Configuration | Preventive | |
Configure the "Use Policy List of Internet Explorer 7 sites" setting to organizational standards. CC ID 10589 | Configuration | Preventive | |
Configure the "Use UTF-8 for mailto links" setting to organizational standards. CC ID 10590 | Configuration | Preventive | |
Configure the "View menu: Disable Full Screen menu option" setting to organizational standards. CC ID 10591 | Configuration | Preventive | |
Configure the "View menu: Disable Source menu option" setting to organizational standards. CC ID 10592 | Configuration | Preventive | |
Configure the "MSS: (NoDriveTypeAutoRun) Disable Autorun for all drives (recommended)" setting to organizational standards. CC ID 10607 | Configuration | Preventive | |
Configure the "AutoRun" setting to organizational standards. CC ID 10608 | Configuration | Preventive | |
Implement hardware-based write-protect for system firmware components. CC ID 10659 | Technical Security | Preventive | |
Implement procedures to manually disable hardware-based write-protect to change computer firmware. CC ID 10660 | Technical Security | Preventive | |
Configure the "Disable binding directly to IPropertySetStorage without intermediate layers." setting to organizational standards. CC ID 10861 | Configuration | Preventive | |
Configure the "Disable delete notifications on all volumes" setting to organizational standards. CC ID 10862 | Configuration | Preventive | |
Configure the "Disable IE security prompt for Windows Installer scripts" setting to organizational standards. CC ID 10863 | Configuration | Preventive | |
Configure the "Disable or enable software Secure Attention Sequence" setting to organizational standards. CC ID 10865 | Configuration | Preventive | |
Configure the "Disable text prediction" setting to organizational standards. CC ID 10867 | Configuration | Preventive | |
Configure the "Disable Windows Error Reporting" machine setting should be configured correctly. to organizational standards. CC ID 10868 | Configuration | Preventive | |
Configure the "Disable Windows Installer" setting to organizational standards. CC ID 10869 | Configuration | Preventive | |
Configure the "Display a custom message when installation is prevented by a policy setting" setting to organizational standards. CC ID 10886 | Configuration | Preventive | |
Configure the "Enable/Disable PerfTrack" setting to organizational standards. CC ID 10953 | Configuration | Preventive | |
Configure the "Enforce disk quota limit" setting to organizational standards. CC ID 10956 | Configuration | Preventive | |
Configure the "Limit audio playback quality" setting to organizational standards. CC ID 11006 | Configuration | Preventive | |
Configure the "Limit disk space used by offline files" setting to organizational standards. CC ID 11007 | Configuration | Preventive | |
Configure the "Limit maximum color depth" setting to organizational standards. CC ID 11008 | Configuration | Preventive | |
Configure the "Limit maximum display resolution" setting to organizational standards. CC ID 11009 | Configuration | Preventive | |
Configure the "Limit maximum number of monitors" setting to organizational standards. CC ID 11010 | Configuration | Preventive | |
Configure the "Limit outstanding packets" setting to organizational standards. CC ID 11012 | Configuration | Preventive | |
Configure the "Limit reservable bandwidth" setting to organizational standards. CC ID 11013 | Configuration | Preventive | |
Configure the "Limit the age of files in the BITS Peercache" setting to organizational standards. CC ID 11014 | Configuration | Preventive | |
Configure the "Limit the BITS Peercache size" setting to organizational standards. CC ID 11015 | Configuration | Preventive | |
Configure the "Limit the maximum BITS job download time" setting to organizational standards. CC ID 11016 | Configuration | Preventive | |
Configure the "Limit the maximum number of BITS jobs for each user" setting to organizational standards. CC ID 11018 | Configuration | Preventive | |
Configure the "Limit the maximum number of BITS jobs for this computer" setting to organizational standards. CC ID 11019 | Configuration | Preventive | |
Configure the "Limit the maximum number of ranges that can be added to the file in a BITS job" setting to organizational standards. CC ID 11021 | Configuration | Preventive | |
Configure the "Limit the size of the entire roaming user profile cache" setting to organizational standards. CC ID 11022 | Configuration | Preventive | |
Configure the "Microsoft Support Diagnostic Tool: Restrict tool download" setting to organizational standards. CC ID 11044 | Configuration | Preventive | |
Configure the "Prevent access to 16-bit applications" setting to organizational standards. CC ID 11066 | Configuration | Preventive | |
Configure the "Prevent Automatic Updates" setting to organizational standards. CC ID 11067 | Configuration | Preventive | |
Configure the "Prevent Back-ESC mapping" setting to organizational standards. CC ID 11068 | Configuration | Preventive | |
Configure the "Prevent backing up to local disks" setting to organizational standards. CC ID 11069 | Configuration | Preventive | |
Configure the "Prevent backing up to optical media (CD/DVD)" setting to organizational standards. CC ID 11071 | Configuration | Preventive | |
Configure the "Prevent display of the user interface for critical errors" setting to organizational standards. CC ID 11074 | Configuration | Preventive | |
Configure the "Prevent flicks" setting to organizational standards. CC ID 11075 | Configuration | Preventive | |
Configure the "Prevent Flicks Learning Mode" setting to organizational standards. CC ID 11076 | Configuration | Preventive | |
Configure the "Prevent Input Panel tab from appearing" setting to organizational standards. CC ID 11077 | Configuration | Preventive | |
Configure the "Prevent launch an application" setting to organizational standards. CC ID 11081 | Configuration | Preventive | |
Configure the "Prevent license upgrade" setting to organizational standards. CC ID 11082 | Configuration | Preventive | |
Configure the "Prevent Media Sharing" setting to organizational standards. CC ID 11083 | Configuration | Preventive | |
Configure the "Prevent plaintext PINs from being returned by Credential Manager" setting to organizational standards. CC ID 11084 | Configuration | Preventive | |
Configure the "Prevent press and hold" setting to organizational standards. CC ID 11085 | Configuration | Preventive | |
Configure the "Prevent Quick Launch Toolbar Shortcut Creation" setting to organizational standards. CC ID 11086 | Configuration | Preventive | |
Configure the "Prevent restoring local previous versions" setting to organizational standards. CC ID 11087 | Configuration | Preventive | |
Configure the "Prevent restoring previous versions from backups" setting to organizational standards. CC ID 11088 | Configuration | Preventive | |
Configure the "Prevent Roaming Profile changes from propagating to the server" setting to organizational standards. CC ID 11090 | Configuration | Preventive | |
Configure the "Prevent Video Smoothing" setting to organizational standards. CC ID 11091 | Configuration | Preventive | |
Configure the "Prevent Windows Anytime Upgrade from running." setting to organizational standards. CC ID 11092 | Configuration | Preventive | |
Configure the "Prohibit Access of the Windows Connect Now wizards" setting to organizational standards. CC ID 11100 | Configuration | Preventive | |
Configure the "Prohibit Flyweight Patching" setting to organizational standards. CC ID 11101 | Configuration | Preventive | |
Configure the "Prohibit installing or uninstalling color profiles" setting to organizational standards. CC ID 11103 | Configuration | Preventive | |
Configure the "Prohibit patching" setting to organizational standards. CC ID 11104 | Configuration | Preventive | |
Configure the "Prohibit removal of updates" setting to organizational standards. CC ID 11105 | Configuration | Preventive | |
Configure the "Prohibit rollback" setting to organizational standards. CC ID 11106 | Configuration | Preventive | |
Configure the "Prohibit Use of Restart Manager" setting to organizational standards. CC ID 11107 | Configuration | Preventive | |
Configure the "Restrict Internet communication" setting to organizational standards. CC ID 11140 | Configuration | Preventive | |
Configure the "Restrict potentially unsafe HTML Help functions to specified folders" setting to organizational standards. CC ID 11141 | Configuration | Preventive | |
Configure the "Restrict system locales" setting to organizational standards. CC ID 11143 | Configuration | Preventive | |
Configure the "Restrict these programs from being launched from Help" setting to organizational standards. CC ID 11144 | Configuration | Preventive | |
Configure the "Restrict unpacking and installation of gadgets that are not digitally signed." setting to organizational standards. CC ID 11145 | Configuration | Preventive | |
Configure the "Restrict user locales" setting to organizational standards. CC ID 11146 | Configuration | Preventive | |
Configure the "Terminate session when time limits are reached" setting to organizational standards. CC ID 11241 | Configuration | Preventive | |
Configure the "Turn off access to all Windows Update features" setting to organizational standards. CC ID 11254 | Configuration | Preventive | |
Configure the "Turn off access to the OEM and Microsoft branding section" setting to organizational standards. CC ID 11255 | Configuration | Preventive | |
Configure the "Turn off access to the performance center core section" setting to organizational standards. CC ID 11256 | Configuration | Preventive | |
Configure the "Turn off access to the solutions to performance problems section" setting to organizational standards. CC ID 11257 | Configuration | Preventive | |
Configure the "Turn off Active Help" setting to organizational standards. CC ID 11258 | Configuration | Preventive | |
Configure the "Turn off Application Compatibility Engine" setting to organizational standards. CC ID 11261 | Configuration | Preventive | |
Configure the "Turn off Application Telemetry" setting to organizational standards. CC ID 11262 | Configuration | Preventive | |
Configure the "Turn off AutoComplete integration with Input Panel" setting to organizational standards. CC ID 11263 | Configuration | Preventive | |
Configure the "Turn off automatic learning" setting to organizational standards. CC ID 11264 | Configuration | Preventive | |
Configure the "Turn off Automatic Root Certificates Update" setting to organizational standards. CC ID 11265 | Configuration | Preventive | |
Configure the "Turn off automatic termination of applications that block or cancel shutdown" setting to organizational standards. CC ID 11266 | Configuration | Preventive | |
Configure the "Turn off automatic wake" setting to organizational standards. CC ID 11267 | Configuration | Preventive | |
Configure the "Turn Off Boot and Resume Optimizations" setting to organizational standards. CC ID 11269 | Configuration | Preventive | |
Configure the "Turn off Configuration" setting to organizational standards. CC ID 11271 | Configuration | Preventive | |
Configure the "Turn off creation of System Restore Checkpoints" setting to organizational standards. CC ID 11273 | Configuration | Preventive | |
Configure the "Turn off Data Execution Prevention for HTML Help Executible" setting to organizational standards. CC ID 11274 | Configuration | Preventive | |
Configure the "Turn off downloading of game information" setting to organizational standards. CC ID 11276 | Configuration | Preventive | |
Configure the "Turn off Fair Share CPU Scheduling" setting to organizational standards. CC ID 11277 | Configuration | Preventive | |
Configure the "Turn off game updates" setting to organizational standards. CC ID 11279 | Configuration | Preventive | |
Configure the "Turn off hardware buttons" setting to organizational standards. CC ID 11280 | Configuration | Preventive | |
Configure the "Turn off location scripting" setting to organizational standards. CC ID 11287 | Configuration | Preventive | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Global" to organizational standards. CC ID 11290 | Configuration | Preventive | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Site Local" to organizational standards. CC ID 11292 | Configuration | Preventive | |
Configure the "Turn off Multicast Name Resolution" setting to organizational standards. CC ID 11293 | Configuration | Preventive | |
Configure the "Turn Off Non Volatile Cache Feature" setting to organizational standards. CC ID 11294 | Configuration | Preventive | |
Configure the "Turn off numerical sorting in Windows Explorer" setting to organizational standards. CC ID 11295 | Configuration | Preventive | |
Configure the "Turn off pen feedback" setting to organizational standards. CC ID 11297 | Configuration | Preventive | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Global" to organizational standards. CC ID 11298 | Configuration | Preventive | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Site Local" to organizational standards. CC ID 11300 | Configuration | Preventive | |
Configure the "Turn off Problem Steps Recorder" setting to organizational standards. CC ID 11301 | Configuration | Preventive | |
Configure the "Turn off Program Compatibility Assistant" setting to organizational standards. CC ID 11302 | Configuration | Preventive | |
Configure the "Turn off Program Inventory" setting to organizational standards. CC ID 11303 | Configuration | Preventive | |
Configure the "Turn off Real-Time Monitoring" setting to organizational standards. CC ID 11304 | Configuration | Preventive | |
Configure the "Turn off restore functionality" setting to organizational standards. CC ID 11306 | Configuration | Preventive | |
Configure the "Turn off Routinely Taking Action" setting to organizational standards. CC ID 11308 | Configuration | Preventive | |
Configure the "Turn off sensors" setting to organizational standards. CC ID 11309 | Configuration | Preventive | |
Configure the "Turn Off Solid State Mode" setting to organizational standards. CC ID 11310 | Configuration | Preventive | |
Configure the "Turn off SwitchBack Compatibility Engine" setting to organizational standards. CC ID 11311 | Configuration | Preventive | |
Configure the "Turn off System Restore" setting to organizational standards. CC ID 11312 | Configuration | Preventive | |
Configure the "Turn off Tablet PC touch input" setting to organizational standards. CC ID 11313 | Configuration | Preventive | |
Configure the "Turn off the ability to back up data files" setting to organizational standards. CC ID 11315 | Configuration | Preventive | |
Configure the "Turn off the ability to create a system image" setting to organizational standards. CC ID 11316 | Configuration | Preventive | |
Configure the "Turn off the communities features" setting to organizational standards. CC ID 11317 | Configuration | Preventive | |
Configure the "Turn off Touch Panning" setting to organizational standards. CC ID 11320 | Configuration | Preventive | |
Configure the "Turn off tracking of last play time of games in the Games folder" setting to organizational standards. CC ID 11321 | Configuration | Preventive | |
Configure the "Turn off Windows Customer Experience Improvement Program" setting to organizational standards. CC ID 11323 | Configuration | Preventive | |
Configure the "Turn off Windows Defender" setting to organizational standards. CC ID 11324 | Configuration | Preventive | |
Configure the "Turn off Windows HotStart" setting to organizational standards. CC ID 11325 | Configuration | Preventive | |
Configure the "Turn off Windows Installer RDS Compatibility" setting to organizational standards. CC ID 11326 | Configuration | Preventive | |
Configure the "Turn off Windows Mobility Center" setting to organizational standards. CC ID 11327 | Configuration | Preventive | |
Configure the "Turn off Windows presentation settings" setting to organizational standards. CC ID 11329 | Configuration | Preventive | |
Configure the "Turn off Windows SideShow" setting to organizational standards. CC ID 11330 | Configuration | Preventive | |
Configure the "Turn off Windows Startup Sound" setting to organizational standards. CC ID 11331 | Configuration | Preventive | |
Establish, implement, and maintain idle session termination and logout capabilities. CC ID 01418 | Configuration | Preventive | |
Refrain from using assertion lifetimes to limit each session. CC ID 13871 | Technical Security | Preventive | |
Configure Session Configuration settings in accordance with organizational standards. CC ID 07698 | Configuration | Preventive | |
Invalidate unexpected session identifiers. CC ID 15307 | Configuration | Preventive | |
Configure the "MaxStartups" settings to organizational standards. CC ID 15329 | Configuration | Preventive | |
Reject session identifiers that are not valid. CC ID 15306 | Configuration | Preventive | |
Configure the "MaxSessions" settings to organizational standards. CC ID 15330 | Configuration | Preventive | |
Configure the "Interactive logon: Message title for users attempting to log on" to organizational standards. CC ID 07699 | Configuration | Preventive | |
Configure the "LoginGraceTime" settings to organizational standards. CC ID 15328 | Configuration | Preventive | |
Configure the "Network security: Force logoff when logon hours expire" to organizational standards. CC ID 07738 | Configuration | Preventive | |
Configure the "MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)" to organizational standards. CC ID 07758 | Configuration | Preventive | |
Configure the "Microsoft network server: Disconnect clients when logon hours expire" to organizational standards. CC ID 07824 | Configuration | Preventive | |
Configure the "Microsoft network server: Amount of idle time required before suspending session" to organizational standards. CC ID 07826 | Configuration | Preventive | |
Configure the "Interactive logon: Do not display last user name" to organizational standards. CC ID 07832 | Configuration | Preventive | |
Configure the "Interactive logon: Display user information when the session is locked" to organizational standards. CC ID 07848 | Configuration | Preventive | |
Configure the "Interactive logon: Message text for users attempting to log on" to organizational standards. CC ID 07870 | Configuration | Preventive | |
Configure the "Always prompt for password upon connection" to organizational standards. CC ID 08229 | Configuration | Preventive | |
Configure the "Interactive logon: Machine inactivity limit" to organizational standards. CC ID 08350 | Configuration | Preventive | |
Install custom applications, only if they are trusted. CC ID 04822 | Configuration | Preventive | |
Configure virtual networks in accordance with the information security policy. CC ID 13165 | Configuration | Preventive | |
Configure Simple Network Management Protocol (SNMP) to organizational standards. CC ID 12423 | Configuration | Preventive | |
Establish access requirements for SNMP community strings. CC ID 16357 | Technical Security | Preventive | |
Configure Simple Network Management Protocol to enable authentication and privacy. CC ID 12427 | Configuration | Preventive | |
Change the community string for Simple Network Management Protocol, as necessary. CC ID 01872 | Configuration | Preventive | |
Configure the system's storage media. CC ID 10618 | Configuration | Preventive | |
Configure the system's electronic storage media's encryption settings. CC ID 11927 | Configuration | Preventive | |
Prohibit the use of sanitization-resistant media in Information Systems. CC ID 10617 | Configuration | Preventive | |
Configure Internet Browser security options according to organizational standards. CC ID 02166 | Configuration | Preventive | |
Configure the "Internet Explorer Maintenance Policy Processing - Allow processing across a slow network connection" setting. CC ID 04910 | Configuration | Preventive | |
Configure the "Disable Internet Connection wizard" setting. CC ID 02242 | Configuration | Preventive | |
Configure the "Disable Automatic Install of Internet Explorer components" setting. CC ID 04337 | Configuration | Preventive | |
Configure the "Disable Periodic Check for Internet Explorer software updates" setting. CC ID 04338 | Configuration | Preventive | |
Configure the "Do not allow users to enable or disable add-ons" setting in Internet Explorer properly. CC ID 04340 | Configuration | Preventive | |
Configure the "Turn off Crash Detection" setting in Internet Explorer properly. CC ID 04345 | Configuration | Preventive | |
Configure the "internet explorer processes (mk protocol)" setting. CC ID 04347 | Configuration | Preventive | |
Configure the "internet explorer processes (consistent MIME handling)" setting. CC ID 04348 | Configuration | Preventive | |
Configure the "internet explorer processes (MIME sniffing)" setting. CC ID 04349 | Configuration | Preventive | |
Configure the "Internet Explorer Processes (Restrict ActiveX Install)" setting. CC ID 04352 | Configuration | Preventive | |
Configure the "internet explorer processes (restrict file download)" setting. CC ID 04353 | Configuration | Preventive | |
Configure the "Deny all add-ons unless specifically allowed in the Add-on List" setting. CC ID 04354 | Configuration | Preventive | |
Configure the "Disable Save this program to disk option" setting in limited functionality environments properly. CC ID 04366 | Configuration | Preventive | |
Configure the "Disable the Advanced Page" setting in limited functionality environments. CC ID 04367 | Configuration | Preventive | |
Configure the "Disable the Security Page" setting in limited functionality environments properly. CC ID 04368 | Configuration | Preventive | |
Configure the "Disable adding channels" setting in Internet Explorer properly. CC ID 04369 | Configuration | Preventive | |
Configure the "Disable adding schedules for offline pages" setting. CC ID 04370 | Configuration | Preventive | |
Configure the "Disable all scheduled offline pages" setting. CC ID 04371 | Configuration | Preventive | |
Configure the "Disable channel user interface completely" setting. CC ID 04372 | Configuration | Preventive | |
Configure the "Disable downloading of site subscription content" setting. CC ID 04373 | Configuration | Preventive | |
Configure the "Disable editing and creating of schedule groups" setting. CC ID 04374 | Configuration | Preventive | |
Configure the "Disable editing schedules for offline pages" setting. CC ID 04375 | Configuration | Preventive | |
Configure the "Disable offline page hit logging" setting. CC ID 04376 | Configuration | Preventive | |
Configure the "Disable removing channels" setting. CC ID 04377 | Configuration | Preventive | |
Configure the "Disable removing schedules for offline pages" setting. CC ID 04378 | Configuration | Preventive | |
Configure the "Disable 'Configuring History'" setting in specialized security environments properly. CC ID 04405 | Configuration | Preventive | |
Configure the "Disable AutoComplete for forms" setting in limited functionality environments properly. CC ID 04406 | Configuration | Preventive | |
Configure the "Prevent 'fix settings' functionality" setting in limited functionality environments properly. CC ID 04407 | Configuration | Preventive | |
Configure the "Prevent deletion of 'Temporary Internet Files and Cookies'" setting in limited functionality environments properly. CC ID 04408 | Configuration | Preventive | |
Configure the "Turn Off 'Delete Browsing History' Functionality" setting in limited functionality environments properly. CC ID 04409 | Configuration | Preventive | |
Configure the "Turn off the Security Settings Check feature" setting in limited functionality environments properly. CC ID 04410 | Configuration | Preventive | |
Configure the "Prevent ignoring certificate errors" setting in limited functionality environments properly. CC ID 04411 | Configuration | Preventive | |
Configure the "allow install on demand (Internet Explorer)" setting in limited functionality environments properly. CC ID 04412 | Configuration | Preventive | |
Configure the "Check for server certificate revocation" setting in limited functionality environments properly. CC ID 04413 | Configuration | Preventive | |
Configure the "Access data sources across domains" setting. CC ID 04415 | Configuration | Preventive | |
Configure the "Allow active scripting" setting in limited functionality environments properly. CC ID 04416 | Configuration | Preventive | |
Configure the "Allow binary and script behaviors" setting in limited functionality environments properly. CC ID 04417 | Configuration | Preventive | |
Configure the "Allow cut, copy, or paste operations from the clipboard via script" setting. CC ID 04418 | Configuration | Preventive | |
Configure the "Allow drag and drop or copy and paste files" setting. CC ID 04419 | Configuration | Preventive | |
Configure the "Allow file downloads" setting in limited functionality environments properly. CC ID 04420 | Configuration | Preventive | |
Configure the "Allow font downloads" setting in limited functionality environments properly. CC ID 04421 | Configuration | Preventive | |
Configure the "Allow installation of desktop items" setting in limited functionality environments properly. CC ID 04422 | Configuration | Preventive | |
Configure the "Allow META REFRESH" setting in limited functionality environments properly. CC ID 04423 | Configuration | Preventive | |
Configure the "Allow script-initiated windows without size or position constraints" setting in limited functionality environments properly. CC ID 04424 | Configuration | Preventive | |
Configure the "Allow status bar updates via script" setting in limited functionality environments properly. CC ID 04425 | Configuration | Preventive | |
Configure the "Automatic prompting for file downloads" setting in limited functionality environments properly. CC ID 04426 | Configuration | Preventive | |
Configure the "Download signed ActiveX controls" setting in limited functionality environments properly. CC ID 04427 | Configuration | Preventive | |
Configure the "Download unsigned ActiveX controls" setting in limited functionality environments properly. CC ID 04428 | Configuration | Preventive | |
Configure the "Initialize and script ActiveX controls not marked as safe" setting in limited functionality environments properly. CC ID 04429 | Configuration | Preventive | |
Configure the "Java permissions" setting in limited functionality environments properly. CC ID 04430 | Configuration | Preventive | |
Configure the "Launching applications and files in an IFRAME" setting in limited functionality environments properly. CC ID 04431 | Configuration | Preventive | |
Configure the "Logon Options" setting in limited functionality environments. CC ID 04432 | Configuration | Preventive | |
Configure the "Navigate sub-frames across different domains" setting in limited functionality environments properly. CC ID 04433 | Configuration | Preventive | |
Configure the "Open file based on content, not on file extension" setting in limited functionality environments properly. CC ID 04434 | Configuration | Preventive | |
Configure the "Run.NET Framework-reliant components not signed with Authenticode" setting in limited functionality environments properly. CC ID 04435 | Configuration | Preventive | |
Configure the "Run.NET Framework-reliant components signed with Authenticode" setting in limited functionality environments properly. CC ID 04436 | Configuration | Preventive | |
Configure the "Run ActiveX controls and plugins" setting in limited functionality environments properly. CC ID 04437 | Configuration | Preventive | |
Configure the "Script ActiveX controls marked safe for scripting" setting in limited functionality environments properly. CC ID 04438 | Configuration | Preventive | |
Configure the "Scripting of Java applets" setting in limited functionality environments properly. CC ID 04439 | Configuration | Preventive | |
Configure the "Software channel permissions" setting in limited functionality environments properly. CC ID 04440 | Configuration | Preventive | |
Configure the "Use Pop-up Blocker" setting in limited functionality environments properly. CC ID 04441 | Configuration | Preventive | |
Configure the "Web sites in less privileged Web content zones could navigate into this zone" setting in limited functionality environments properly. CC ID 04442 | Configuration | Preventive | |
Configure the .NET Framework to prevent unauthorized mobile code from executing. CC ID 04531 | Configuration | Preventive | |
Configure the "Turn off changing the URL to be displayed for checking updates to Internet Explorer and Internet Tools" setting. CC ID 04644 | Configuration | Preventive | |
Configure the "Prevent performance of first run customize settings" setting. CC ID 04645 | Configuration | Preventive | |
Configure the "Allow Scriptlets" setting in limited functionality environments properly. CC ID 02237 | Configuration | Preventive | |
Configure the "Disable showing the splash screen" setting. CC ID 02238 | Configuration | Preventive | |
Configure the "Add-on List" setting. CC ID 02239 | Configuration | Preventive | |
Configure the "Loose XAML" setting in limited functionality environments properly. CC ID 02240 | Configuration | Preventive | |
Configure the "Disable the Privacy page" setting. CC ID 02241 | Configuration | Preventive | |
Configure the "XPS documents" setting in limited functionality environments properly. CC ID 02243 | Configuration | Preventive | |
Configure the "Turn off Managing Phishing filter" setting. CC ID 02244 | Configuration | Preventive | |
Configure the "Turn on Protected Mode" setting in limited functionality environments properly. CC ID 02245 | Configuration | Preventive | |
Configure the "Userdata persistence" setting in limited functionality environments properly. CC ID 02246 | Configuration | Preventive | |
Configure the "Display mixed content" setting in limited functionality environments properly. CC ID 02247 | Configuration | Preventive | |
Configure the "Check for signature on download programs" setting. CC ID 02250 | Configuration | Preventive | |
Configure the "Turn on the Internet Connection Wizard Auto Detect" setting. CC ID 02252 | Configuration | Preventive | |
Configure the "Web Browser Applications" setting for the Restricted Sites Zone properly. CC ID 02254 | Configuration | Preventive | |
Configure the "Turn off page transitions" setting. CC ID 02255 | Configuration | Preventive | |
Configure the "Turn off configuring the update check interval (in days)" setting. CC ID 02257 | Configuration | Preventive | |
Configure the "Web Browser Applications" setting for the Internet Zone properly. CC ID 02259 | Configuration | Preventive | |
Configure the "Turn Off First-Run Opt-In" setting in limited functionality environments properly. CC ID 02261 | Configuration | Preventive | |
Configure the "Do not allow resetting Internet Explorer settings" setting. CC ID 02262 | Configuration | Preventive | |
Configure the "Enable third-party browser extensions" setting. CC ID 02263 | Configuration | Preventive | |
Configure the "Disable the reset Web settings feature" setting. CC ID 02264 | Configuration | Preventive | |
Configure the "Disable external branding of Internet Explorer" setting. CC ID 02266 | Configuration | Preventive | |
Configure the "Enable Native XMLHttp Support" setting. CC ID 02267 | Configuration | Preventive | |
Configure the "Site to Zone Assignment List" to organizational standards. CC ID 08650 | Configuration | Preventive | |
Configure the "Notification bar" setting to organizational standards. CC ID 10008 | Configuration | Preventive | |
Implement only one application or primary function per network component or server. CC ID 00879 | Systems Design, Build, and Implementation | Preventive | |
Remove all unnecessary functionality. CC ID 00882 | Configuration | Preventive | |
Document that all enabled functions support secure configurations. CC ID 11985 | Establish/Maintain Documentation | Preventive | |
Find and eradicate unauthorized world writable files. CC ID 01541 | Configuration | Preventive | |
Strip dangerous/unneeded SUID/SGID system executables. CC ID 01542 | Configuration | Preventive | |
Find and eradicate unauthorized SUID/SGID system executables. CC ID 01543 | Configuration | Preventive | |
Find and eradicate unowned files and unowned directories. CC ID 01544 | Configuration | Preventive | |
Disable logon prompts on serial ports. CC ID 01553 | Configuration | Preventive | |
Disable "nobody" access for Secure RPC. CC ID 01554 | Configuration | Preventive | |
Disable all unnecessary interfaces. CC ID 04826 | Configuration | Preventive | |
Enable or disable all unused USB ports as appropriate. CC ID 06042 | Configuration | Preventive | |
Disable all user-mounted removable file systems. CC ID 01536 | Configuration | Preventive | |
Set the Bluetooth Security Mode to the organizational standard. CC ID 00587 | Configuration | Preventive | |
Secure the Bluetooth headset connections. CC ID 00593 | Configuration | Preventive | |
Verify wireless peripherals meet organizational security requirements. CC ID 00657 | Testing | Detective | |
Disable automatic dial-in access to computers that have installed modems. CC ID 02036 | Configuration | Preventive | |
Configure the "Turn off AutoPlay" setting. CC ID 01787 | Configuration | Preventive | |
Configure the "Devices: Restrict floppy access to locally logged on users only" setting. CC ID 01732 | Configuration | Preventive | |
Configure the "Devices: Restrict CD-ROM access to locally logged on users" setting. CC ID 01731 | Configuration | Preventive | |
Configure the "Remove CD Burning features" setting. CC ID 04379 | Configuration | Preventive | |
Disable Autorun. CC ID 01790 | Configuration | Preventive | |
Disable USB devices (aka hotplugger). CC ID 01545 | Configuration | Preventive | |
Enable or disable all unused auxiliary ports as appropriate. CC ID 06414 | Configuration | Preventive | |
Remove rhosts support unless absolutely necessary. CC ID 01555 | Configuration | Preventive | |
Remove weak authentication services from Pluggable Authentication Modules. CC ID 01556 | Configuration | Preventive | |
Remove the /etc/hosts.equiv file. CC ID 01559 | Configuration | Preventive | |
Create the /etc/ftpd/ftpusers file. CC ID 01560 | Configuration | Preventive | |
Remove the X Wrapper and enable the X Display Manager. CC ID 01564 | Configuration | Preventive | |
Remove empty crontab files and restrict file permissions to the file. CC ID 01571 | Configuration | Preventive | |
Remove all compilers and assemblers from the system. CC ID 01594 | Configuration | Preventive | |
Disable all unnecessary applications unless otherwise noted in a policy exception. CC ID 04827 | Configuration | Preventive | |
Restrict and control the use of privileged utility programs. CC ID 12030 | Technical Security | Preventive | |
Disable the storing of movies in cache in Apple's QuickTime. CC ID 04489 | Configuration | Preventive | |
Install and enable file sharing utilities, as necessary. CC ID 02174 | Configuration | Preventive | |
Disable boot services unless boot services are absolutely necessary. CC ID 01481 | Configuration | Preventive | |
Disable File Services for Macintosh unless File Services for Macintosh are absolutely necessary. CC ID 04279 | Configuration | Preventive | |
Configure the Trivial FTP Daemon service to organizational standards. CC ID 01484 | Configuration | Preventive | |
Disable printer daemons or the printer service unless printer daemons or the printer service is absolutely necessary. CC ID 01487 | Configuration | Preventive | |
Disable web server unless web server is absolutely necessary. CC ID 01490 | Configuration | Preventive | |
Disable portmapper unless portmapper is absolutely necessary. CC ID 01492 | Configuration | Preventive | |
Disable writesrv, pmd, and httpdlite unless writesrv, pmd, and httpdlite are absolutely necessary. CC ID 01498 | Configuration | Preventive | |
Disable hwscan hardware detection unless hwscan hardware detection is absolutely necessary. CC ID 01504 | Configuration | Preventive | |
Configure the “xinetd” service to organizational standards. CC ID 01509 | Configuration | Preventive | |
Configure the /etc/xinetd.conf file permissions as appropriate. CC ID 01568 | Configuration | Preventive | |
Disable inetd unless inetd is absolutely necessary. CC ID 01508 | Configuration | Preventive | |
Disable Network Computing System unless it is absolutely necessary. CC ID 01497 | Configuration | Preventive | |
Disable print server for macintosh unless print server for macintosh is absolutely necessary. CC ID 04284 | Configuration | Preventive | |
Disable Print Server unless Print Server is absolutely necessary. CC ID 01488 | Configuration | Preventive | |
Disable ruser/remote login/remote shell/rcp command, unless it is absolutely necessary. CC ID 01480 | Configuration | Preventive | |
Disable xfsmd unless xfsmd is absolutely necessary. CC ID 02179 | Configuration | Preventive | |
Disable RPC-based services unless RPC-based services are absolutely necessary. CC ID 01455 | Configuration | Preventive | |
Disable netfs script unless netfs script is absolutely necessary. CC ID 01495 | Configuration | Preventive | |
Disable Remote Procedure Calls unless Remote Procedure Calls are absolutely necessary and if enabled, set restrictions. CC ID 01456 | Configuration | Preventive | |
Configure the "RPC Endpoint Mapper Client Authentication" setting. CC ID 04327 | Configuration | Preventive | |
Disable ncpfs Script unless ncpfs Script is absolutely necessary. CC ID 01494 | Configuration | Preventive | |
Disable sendmail server unless sendmail server is absolutely necessary. CC ID 01511 | Configuration | Preventive | |
Disable postfix unless postfix is absolutely necessary. CC ID 01512 | Configuration | Preventive | |
Disable directory server unless directory server is absolutely necessary. CC ID 01464 | Configuration | Preventive | |
Disable Windows-compatibility client processes unless Windows-compatibility client processes are absolutely necessary. CC ID 01471 | Configuration | Preventive | |
Disable Windows-compatibility servers unless Windows-compatibility servers are absolutely necessary. CC ID 01470 | Configuration | Preventive | |
Configure the “Network File System” server to organizational standards CC ID 01472 | Configuration | Preventive | |
Configure NFS to respond or not as appropriate to NFS client requests that do not include a User ID. CC ID 05981 | Configuration | Preventive | |
Configure NFS with appropriate authentication methods. CC ID 05982 | Configuration | Preventive | |
Configure the "AUTH_DES authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08971 | Configuration | Preventive | |
Configure the "AUTH_KERB authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08972 | Configuration | Preventive | |
Configure the "AUTH_NONE authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08973 | Configuration | Preventive | |
Configure the "AUTH_UNIX authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08974 | Configuration | Preventive | |
Disable webmin processes unless the webmin process is absolutely necessary. CC ID 01501 | Configuration | Preventive | |
Disable automount daemon unless automount daemon is absolutely necessary. CC ID 01476 | Configuration | Preventive | |
Disable CDE-related daemons unless CDE-related daemons are absolutely necessary. CC ID 01474 | Configuration | Preventive | |
Disable finger unless finger is absolutely necessary. CC ID 01505 | Configuration | Preventive | |
Disable Rexec unless Rexec is absolutely necessary. CC ID 02164 | Configuration | Preventive | |
Disable Squid cache server unless Squid cache server is absolutely necessary. CC ID 01502 | Configuration | Preventive | |
Disable Kudzu hardware detection unless Kudzu hardware detection is absolutely necessary. CC ID 01503 | Configuration | Preventive | |
Install and enable public Instant Messaging clients as necessary. CC ID 02173 | Configuration | Preventive | |
Disable x font server unless x font server is absolutely necessary. CC ID 01499 | Configuration | Preventive | |
Validate, approve, and document all UNIX shells prior to use. CC ID 02161 | Establish/Maintain Documentation | Preventive | |
Disable NFS client processes unless NFS client processes are absolutely necessary. CC ID 01475 | Configuration | Preventive | |
Disable the use of removable storage media for systems that process restricted data or restricted information, as necessary. CC ID 06681 | Data and Information Management | Preventive | |
Disable removable storage media daemon unless the removable storage media daemon is absolutely necessary. CC ID 01477 | Configuration | Preventive | |
Disable GSS daemon unless GSS daemon is absolutely necessary. CC ID 01465 | Configuration | Preventive | |
Disable Computer Browser unless Computer Browser is absolutely necessary. CC ID 01814 | Configuration | Preventive | |
Configure the Computer Browser ResetBrowser Frames as appropriate. CC ID 05984 | Configuration | Preventive | |
Configure the /etc/samba/smb.conf file file permissions as appropriate. CC ID 05989 | Configuration | Preventive | |
Disable NetMeeting remote desktop sharing unless NetMeeting remote desktop sharing is absolutely necessary. CC ID 01821 | Configuration | Preventive | |
Disable web directory browsing on all web-enabled devices. CC ID 01874 | Configuration | Preventive | |
Disable WWW publishing services unless WWW publishing services are absolutely necessary. CC ID 01833 | Configuration | Preventive | |
Install and enable samba, as necessary. CC ID 02175 | Configuration | Preventive | |
Configure the samba hosts allow option with an appropriate set of networks. CC ID 05985 | Configuration | Preventive | |
Configure the samba security option option as appropriate. CC ID 05986 | Configuration | Preventive | |
Configure the samba encrypt passwords option as appropriate. CC ID 05987 | Configuration | Preventive | |
Configure the Samba 'smb passwd file' option with an appropriate password file or no password file. CC ID 05988 | Configuration | Preventive | |
Disable Usenet Internet news package file capabilities unless Usenet Internet news package file capabilities are absolutely necessary. CC ID 02176 | Configuration | Preventive | |
Disable iPlanet Web Server unless iPlanet Web Server is absolutely necessary. CC ID 02172 | Configuration | Preventive | |
Disable volume manager unless volume manager is absolutely necessary. CC ID 01469 | Configuration | Preventive | |
Disable Solaris Management Console unless Solaris Management Console is absolutely necessary. CC ID 01468 | Configuration | Preventive | |
Disable the Graphical User Interface unless it is absolutely necessary. CC ID 01466 | Configuration | Preventive | |
Disable help and support unless help and support is absolutely necessary. CC ID 04280 | Configuration | Preventive | |
Disable speech recognition unless speech recognition is absolutely necessary. CC ID 04491 | Configuration | Preventive | |
Disable or secure the NetWare QuickFinder search engine. CC ID 04453 | Configuration | Preventive | |
Disable messenger unless messenger is absolutely necessary. CC ID 01819 | Configuration | Preventive | |
Configure the "Do not allow Windows Messenger to be run" setting. CC ID 04516 | Configuration | Preventive | |
Configure the "Do not automatically start Windows Messenger initially" setting. CC ID 04517 | Configuration | Preventive | |
Configure the "Turn off the Windows Messenger Customer Experience Improvement Program" setting. CC ID 04330 | Configuration | Preventive | |
Disable automatic updates unless automatic updates are absolutely necessary. CC ID 01811 | Configuration | Preventive | |
Configure automatic update installation and shutdown/restart options and shutdown/restart procedures to organizational standards. CC ID 05979 | Configuration | Preventive | |
Disable Name Service Cache Daemon unless Name Service Cache Daemon is absolutely necessary. CC ID 04846 | Configuration | Preventive | |
Prohibit R-command files from existing for root or administrator. CC ID 16322 | Configuration | Preventive | |
Verify the /bin/rsh file exists or not, as appropriate. CC ID 05101 | Configuration | Preventive | |
Verify the /sbin/rsh file exists or not, as appropriate. CC ID 05102 | Configuration | Preventive | |
Verify the /usr/bin/rsh file exists or not, as appropriate. CC ID 05103 | Configuration | Preventive | |
Verify the /etc/ftpusers file exists or not, as appropriate. CC ID 05104 | Configuration | Preventive | |
Verify the /etc/rsh file exists or not, as appropriate. CC ID 05105 | Configuration | Preventive | |
Install or uninstall the AIDE package, as appropriate. CC ID 05106 | Configuration | Preventive | |
Enable the GNOME automounter (gnome-volume-manager) as necessary. CC ID 05107 | Configuration | Preventive | |
Install or uninstall the setroubleshoot package, as appropriate. CC ID 05108 | Configuration | Preventive | |
Configure Avahi properly. CC ID 05109 | Configuration | Preventive | |
Install or uninstall OpenNTPD, as appropriate. CC ID 05110 | Configuration | Preventive | |
Configure the "httpd" service to organizational standards. CC ID 05111 | Configuration | Preventive | |
Install or uninstall the net-smtp package properly. CC ID 05112 | Configuration | Preventive | |
Configure the apache web service properly. CC ID 05113 | Configuration | Preventive | |
Configure the vlock package properly. CC ID 05114 | Configuration | Preventive | |
Establish, implement, and maintain service accounts. CC ID 13861 | Technical Security | Preventive | |
Review the ownership of service accounts, as necessary. CC ID 13863 | Technical Security | Detective | |
Manage access credentials for service accounts. CC ID 13862 | Technical Security | Preventive | |
Configure the daemon account properly. CC ID 05115 | Configuration | Preventive | |
Configure the bin account properly. CC ID 05116 | Configuration | Preventive | |
Configure the nuucp account properly. CC ID 05117 | Configuration | Preventive | |
Configure the smmsp account properly. CC ID 05118 | Configuration | Preventive | |
Configure the listen account properly. CC ID 05119 | Configuration | Preventive | |
Configure the gdm account properly. CC ID 05120 | Configuration | Preventive | |
Configure the webservd account properly. CC ID 05121 | Configuration | Preventive | |
Configure the nobody account properly. CC ID 05122 | Configuration | Preventive | |
Configure the noaccess account properly. CC ID 05123 | Configuration | Preventive | |
Configure the nobody4 account properly. CC ID 05124 | Configuration | Preventive | |
Configure the sys account properly. CC ID 05125 | Configuration | Preventive | |
Configure the adm account properly. CC ID 05126 | Configuration | Preventive | |
Configure the lp account properly. CC ID 05127 | Configuration | Preventive | |
Configure the uucp account properly. CC ID 05128 | Configuration | Preventive | |
Install or uninstall the tftp-server package, as appropriate. CC ID 05130 | Configuration | Preventive | |
Enable the web console as necessary. CC ID 05131 | Configuration | Preventive | |
Enable rlogin auth by Pluggable Authentication Modules or pam.d properly. CC ID 05132 | Configuration | Preventive | |
Enable rsh auth by Pluggable Authentication Modules properly. CC ID 05133 | Configuration | Preventive | |
Enable the listening sendmail daemon, as appropriate. CC ID 05134 | Configuration | Preventive | |
Configure Squid properly. CC ID 05135 | Configuration | Preventive | |
Configure the "global Package signature checking" setting to organizational standards. CC ID 08735 | Establish/Maintain Documentation | Preventive | |
Configure the "Package signature checking" setting for "all configured repositories" to organizational standards. CC ID 08736 | Establish/Maintain Documentation | Preventive | |
Configure the "verify against the package database" setting for "all installed software packages" to organizational standards. CC ID 08737 | Establish/Maintain Documentation | Preventive | |
Configure the "isdn4k-utils" package to organizational standards. CC ID 08738 | Establish/Maintain Documentation | Preventive | |
Configure the "postfix" package to organizational standards. CC ID 08739 | Establish/Maintain Documentation | Preventive | |
Configure the "vsftpd" package to organizational standards. CC ID 08740 | Establish/Maintain Documentation | Preventive | |
Configure the "net-snmpd" package to organizational standards. CC ID 08741 | Establish/Maintain Documentation | Preventive | |
Configure the "rsyslog" package to organizational standards. CC ID 08742 | Establish/Maintain Documentation | Preventive | |
Configure the "ipsec-tools" package to organizational standards. CC ID 08743 | Establish/Maintain Documentation | Preventive | |
Configure the "pam_ccreds" package to organizational standards. CC ID 08744 | Establish/Maintain Documentation | Preventive | |
Configure the "talk-server" package to organizational standards. CC ID 08745 | Establish/Maintain Documentation | Preventive | |
Configure the "talk" package to organizational standards. CC ID 08746 | Establish/Maintain Documentation | Preventive | |
Configure the "irda-utils" package to organizational standards. CC ID 08747 | Establish/Maintain Documentation | Preventive | |
Configure the "/etc/shells" file to organizational standards. CC ID 08978 | Configuration | Preventive | |
Configure the LDAP package to organizational standards. CC ID 09937 | Configuration | Preventive | |
Configure the "FTP server" package to organizational standards. CC ID 09938 | Configuration | Preventive | |
Configure the "HTTP Proxy Server" package to organizational standards. CC ID 09939 | Configuration | Preventive | |
Configure the "prelink" package to organizational standards. CC ID 11379 | Configuration | Preventive | |
Configure the Network Information Service (NIS) package to organizational standards. CC ID 11380 | Configuration | Preventive | |
Configure the "time" setting to organizational standards. CC ID 11381 | Configuration | Preventive | |
Configure the "biosdevname" package to organizational standards. CC ID 11383 | Configuration | Preventive | |
Configure the "ufw" setting to organizational standards. CC ID 11384 | Configuration | Preventive | |
Configure the "Devices: Allow undock without having to log on" setting. CC ID 01728 | Configuration | Preventive | |
Limit the user roles that are allowed to format and eject removable storage media. CC ID 01729 | Configuration | Preventive | |
Prevent users from installing printer drivers. CC ID 01730 | Configuration | Preventive | |
Minimize the inetd.conf file and set the file to the appropriate permissions. CC ID 01506 | Configuration | Preventive | |
Configure the unsigned driver installation behavior. CC ID 01733 | Configuration | Preventive | |
Configure the unsigned non-driver installation behavior. CC ID 02038 | Configuration | Preventive | |
Remove all demonstration applications on the system. CC ID 01875 | Configuration | Preventive | |
Configure the system to disallow optional Subsystems. CC ID 04265 | Configuration | Preventive | |
Configure the "Remove Security tab" setting. CC ID 04380 | Configuration | Preventive | |
Disable all unnecessary services unless otherwise noted in a policy exception. CC ID 00880 | Configuration | Preventive | |
Disable rquotad unless rquotad is absolutely necessary. CC ID 01473 | Configuration | Preventive | |
Configure the rquotad service to use a static port or a dynamic portmapper port as appropriate. CC ID 05983 | Configuration | Preventive | |
Disable telnet unless telnet use is absolutely necessary. CC ID 01478 | Configuration | Preventive | |
Disable File Transfer Protocol unless File Transfer Protocol use is absolutely necessary. CC ID 01479 | Configuration | Preventive | |
Configure anonymous FTP to restrict the use of restricted data. CC ID 16314 | Configuration | Preventive | |
Disable anonymous access to File Transfer Protocol. CC ID 06739 | Configuration | Preventive | |
Disable Internet Message Access Protocol unless Internet Message Access Protocol use is absolutely necessary. CC ID 01485 | Configuration | Preventive | |
Disable Post Office Protocol unless its use is absolutely necessary. CC ID 01486 | Configuration | Preventive | |
Disable SQLServer processes unless SQLServer processes use is absolutely necessary. CC ID 01500 | Configuration | Preventive | |
Disable alerter unless alerter use is absolutely necessary. CC ID 01810 | Configuration | Preventive | |
Disable Background Intelligent Transfer Service unless Background Intelligent Transfer Service use is absolutely necessary. CC ID 01812 | Configuration | Preventive | |
Disable ClipBook unless ClipBook use is absolutely necessary. CC ID 01813 | Configuration | Preventive | |
Disable Fax Service unless Fax Service use is absolutely necessary. CC ID 01815 | Configuration | Preventive | |
Disable IIS admin service unless IIS admin service use is absolutely necessary. CC ID 01817 | Configuration | Preventive | |
Disable indexing service unless indexing service use is absolutely necessary. CC ID 01818 | Configuration | Preventive | |
Disable net logon unless net logon use is absolutely necessary. CC ID 01820 | Configuration | Preventive | |
Disable Remote Desktop Help Session Manager unless Remote Desktop Help Session Manager use is absolutely necessary. CC ID 01822 | Configuration | Preventive | |
Disable the "Offer Remote Assistance" setting. CC ID 04325 | Configuration | Preventive | |
Disable the "Solicited Remote Assistance" setting. CC ID 04326 | Configuration | Preventive | |
Disable Remote Registry Service unless Remote Registry Service use is absolutely necessary. CC ID 01823 | Configuration | Preventive | |
Disable Routing and Remote Access unless Routing and Remote Access use is necessary. CC ID 01824 | Configuration | Preventive | |
Disable task scheduler unless task scheduler use is absolutely necessary. CC ID 01829 | Configuration | Preventive | |
Disable Terminal Services unless Terminal Services use is absolutely necessary. CC ID 01831 | Configuration | Preventive | |
Disable Universal Plug and Play device host unless Universal Plug and Play device host use is absolutely necessary. CC ID 01832 | Configuration | Preventive | |
Disable File Service Protocol. CC ID 02167 | Configuration | Preventive | |
Disable the License Logging Service unless unless it is absolutely necessary. CC ID 04282 | Configuration | Preventive | |
Disable Remote Access Auto Connection Manager unless Remote Access Auto Connection Manager use is absolutely necessary. CC ID 04285 | Configuration | Preventive | |
Disable Remote Access Connection Manager unless Remote Access Connection Manager use is absolutely necessary. CC ID 04286 | Configuration | Preventive | |
Disable Remote Administration Service unless remote administration management is absolutely necessary. CC ID 04287 | Configuration | Preventive | |
Disable remote installation unless remote installation is absolutely necessary. CC ID 04288 | Configuration | Preventive | |
Disable Remote Server Manager unless Remote Server Manager is absolutely necessary. CC ID 04289 | Configuration | Preventive | |
Disable Remote Server Monitor unless Remote Server Monitor use is absolutely necessary. CC ID 04290 | Configuration | Preventive | |
Disable Remote Storage Notification unless Remote Storage Notification use is absolutely necessary. CC ID 04291 | Configuration | Preventive | |
Disable Remote Storage Server unless Remote Storage Server use is absolutely necessary. CC ID 04292 | Configuration | Preventive | |
Disable telephony services unless telephony services use is absolutely necessary. CC ID 04293 | Configuration | Preventive | |
Disable Wireless Zero Configuration service unless Wireless Zero Configuration service use is absolutely necessary. CC ID 04294 | Configuration | Preventive | |
Disable SSDP/UPnp unless SSDP/UPnP is absolutely necessary. CC ID 04315 | Configuration | Preventive | |
Configure the "ntpd service" setting to organizational standards. CC ID 04911 | Configuration | Preventive | |
Configure the "echo service" setting to organizational standards. CC ID 04912 | Configuration | Preventive | |
Configure the "echo-dgram service" setting to organizational standards. CC ID 09927 | Configuration | Preventive | |
Configure the "echo-stream service" setting to organizational standards. CC ID 09928 | Configuration | Preventive | |
Configure the "AllowTcpForwarding" to organizational standards. CC ID 15327 | Configuration | Preventive | |
Configure the "tcpmux-server" setting to organizational standards. CC ID 09929 | Configuration | Preventive | |
Configure the "netstat service" setting to organizational standards. CC ID 04913 | Configuration | Preventive | |
Configure the "character generator protocol (chargen)" setting to organizational standards. CC ID 04914 | Configuration | Preventive | |
Configure the "tftpd service" setting to organizational standards. CC ID 04915 | Configuration | Preventive | |
Configure the "walld service" setting to organizational standards. CC ID 04916 | Configuration | Preventive | |
Configure the "rstatd service" setting to organizational standards. CC ID 04917 | Configuration | Preventive | |
Configure the "sprayd service" setting to organizational standards. CC ID 04918 | Configuration | Preventive | |
Configure the "rusersd service" setting to organizational standards. CC ID 04919 | Configuration | Preventive | |
Configure the "inn service" setting to organizational standards. CC ID 04920 | Configuration | Preventive | |
Configure the "font service" setting to organizational standards. CC ID 04921 | Configuration | Preventive | |
Configure the "ident service" setting to organizational standards. CC ID 04922 | Configuration | Preventive | |
Configure the "rexd service" setting to organizational standards. CC ID 04923 | Configuration | Preventive | |
Configure the "daytime service" setting to organizational standards. CC ID 04924 | Configuration | Preventive | |
Configure the "dtspc (cde-spc) service" setting to organizational standards. CC ID 04925 | Configuration | Preventive | |
Configure the "cmsd service" setting to organizational standards. CC ID 04926 | Configuration | Preventive | |
Configure the "ToolTalk service" setting to organizational standards. CC ID 04927 | Configuration | Preventive | |
Configure the "discard service" setting to organizational standards. CC ID 04928 | Configuration | Preventive | |
Configure the "vino-server service" setting to organizational standards. CC ID 04929 | Configuration | Preventive | |
Configure the "bind service" setting to organizational standards. CC ID 04930 | Configuration | Preventive | |
Configure the "nfsd service" setting to organizational standards. CC ID 04931 | Configuration | Preventive | |
Configure the "mountd service" setting to organizational standards. CC ID 04932 | Configuration | Preventive | |
Configure the "statd service" setting to organizational standards. CC ID 04933 | Configuration | Preventive | |
Configure the "lockd service" setting to organizational standards. CC ID 04934 | Configuration | Preventive | |
Configure the lockd service to use a static port or a dynamic portmapper port for User Datagram Protocol as appropriate. CC ID 05980 | Configuration | Preventive | |
Configure the "decode sendmail alias" setting to organizational standards. CC ID 04935 | Configuration | Preventive | |
Configure the sendmail vrfy command, as appropriate. CC ID 04936 | Configuration | Preventive | |
Configure the sendmail expn command, as appropriate. CC ID 04937 | Configuration | Preventive | |
Configure .netrc with an appropriate set of services. CC ID 04938 | Configuration | Preventive | |
Enable NFS insecure locks as necessary. CC ID 04939 | Configuration | Preventive | |
Configure the "X server ac" setting to organizational standards. CC ID 04940 | Configuration | Preventive | |
Configure the "X server core" setting to organizational standards. CC ID 04941 | Configuration | Preventive | |
Enable or disable the setroubleshoot service, as appropriate. CC ID 05540 | Configuration | Preventive | |
Configure the "X server nolock" setting to organizational standards. CC ID 04942 | Configuration | Preventive | |
Enable or disable the mcstrans service, as appropriate. CC ID 05541 | Configuration | Preventive | |
Configure the "PAM console" setting to organizational standards. CC ID 04943 | Configuration | Preventive | |
Enable or disable the restorecond service, as appropriate. CC ID 05542 | Configuration | Preventive | |
Enable the rhnsd service as necessary. CC ID 04944 | Configuration | Preventive | |
Enable the yum-updatesd service as necessary. CC ID 04945 | Configuration | Preventive | |
Enable the autofs service as necessary. CC ID 04946 | Configuration | Preventive | |
Enable the ip6tables service as necessary. CC ID 04947 | Configuration | Preventive | |
Configure syslog to organizational standards. CC ID 04949 | Configuration | Preventive | |
Enable the auditd service as necessary. CC ID 04950 | Configuration | Preventive | |
Enable the logwatch service as necessary. CC ID 04951 | Configuration | Preventive | |
Enable the logrotate (syslog rotator) service as necessary. CC ID 04952 | Configuration | Preventive | |
Install or uninstall the telnet server package, only if absolutely necessary. CC ID 04953 | Configuration | Preventive | |
Enable the ypbind service as necessary. CC ID 04954 | Configuration | Preventive | |
Enable the ypserv service as necessary. CC ID 04955 | Configuration | Preventive | |
Enable the firstboot service as necessary. CC ID 04956 | Configuration | Preventive | |
Enable the gpm service as necessary. CC ID 04957 | Configuration | Preventive | |
Enable the irqbalance service as necessary. CC ID 04958 | Configuration | Preventive | |
Enable the isdn service as necessary. CC ID 04959 | Configuration | Preventive | |
Enable the kdump service as necessary. CC ID 04960 | Configuration | Preventive | |
Enable the mdmonitor service as necessary. CC ID 04961 | Configuration | Preventive | |
Enable the microcode_ctl service as necessary. CC ID 04962 | Configuration | Preventive | |
Enable the pcscd service as necessary. CC ID 04963 | Configuration | Preventive | |
Enable the smartd service as necessary. CC ID 04964 | Configuration | Preventive | |
Enable the readahead_early service as necessary. CC ID 04965 | Configuration | Preventive | |
Enable the readahead_later service as necessary. CC ID 04966 | Configuration | Preventive | |
Enable the messagebus service as necessary. CC ID 04967 | Configuration | Preventive | |
Enable the haldaemon service as necessary. CC ID 04968 | Configuration | Preventive | |
Enable the apmd service as necessary. CC ID 04969 | Configuration | Preventive | |
Enable the acpid service as necessary. CC ID 04970 | Configuration | Preventive | |
Enable the cpuspeed service as necessary. CC ID 04971 | Configuration | Preventive | |
Enable the network service as necessary. CC ID 04972 | Configuration | Preventive | |
Enable the hidd service as necessary. CC ID 04973 | Configuration | Preventive | |
Enable the crond service as necessary. CC ID 04974 | Configuration | Preventive | |
Install and enable the anacron service as necessary. CC ID 04975 | Configuration | Preventive | |
Enable the xfs service as necessary. CC ID 04976 | Configuration | Preventive | |
Install and enable the Avahi daemon service, as necessary. CC ID 04977 | Configuration | Preventive | |
Enable the CUPS service, as necessary. CC ID 04978 | Configuration | Preventive | |
Enable the hplip service as necessary. CC ID 04979 | Configuration | Preventive | |
Enable the dhcpd service as necessary. CC ID 04980 | Configuration | Preventive | |
Enable the nfslock service as necessary. CC ID 04981 | Configuration | Preventive | |
Enable the rpcgssd service as necessary. CC ID 04982 | Configuration | Preventive | |
Enable the rpcidmapd service as necessary. CC ID 04983 | Configuration | Preventive | |
Enable the rpcsvcgssd service as necessary. CC ID 04985 | Configuration | Preventive | |
Configure root squashing for all NFS shares, as appropriate. CC ID 04986 | Configuration | Preventive | |
Configure write access to NFS shares, as appropriate. CC ID 04987 | Configuration | Preventive | |
Configure the named service, as appropriate. CC ID 04988 | Configuration | Preventive | |
Configure the vsftpd service, as appropriate. CC ID 04989 | Configuration | Preventive | |
Configure the “dovecot” service to organizational standards. CC ID 04990 | Configuration | Preventive | |
Configure Server Message Block (SMB) to organizational standards. CC ID 04991 | Configuration | Preventive | |
Enable the snmpd service as necessary. CC ID 04992 | Configuration | Preventive | |
Enable the calendar manager as necessary. CC ID 04993 | Configuration | Preventive | |
Enable the GNOME logon service as necessary. CC ID 04994 | Configuration | Preventive | |
Enable the WBEM services as necessary. CC ID 04995 | Configuration | Preventive | |
Enable the keyserv service as necessary. CC ID 04996 | Configuration | Preventive | |
Enable the Generic Security Service daemon as necessary. CC ID 04997 | Configuration | Preventive | |
Enable the volfs service as necessary. CC ID 04998 | Configuration | Preventive | |
Enable the smserver service as necessary. CC ID 04999 | Configuration | Preventive | |
Enable the mpxio-upgrade service as necessary. CC ID 05000 | Configuration | Preventive | |
Enable the metainit service as necessary. CC ID 05001 | Configuration | Preventive | |
Enable the meta service as necessary. CC ID 05003 | Configuration | Preventive | |
Enable the metaed service as necessary. CC ID 05004 | Configuration | Preventive | |
Enable the metamh service as necessary. CC ID 05005 | Configuration | Preventive | |
Enable the Local RPC Port Mapping Service as necessary. CC ID 05006 | Configuration | Preventive | |
Enable the Kerberos kadmind service as necessary. CC ID 05007 | Configuration | Preventive | |
Enable the Kerberos krb5kdc service as necessary. CC ID 05008 | Configuration | Preventive | |
Enable the Kerberos kpropd service as necessary. CC ID 05009 | Configuration | Preventive | |
Enable the Kerberos ktkt_warnd service as necessary. CC ID 05010 | Configuration | Preventive | |
Enable the sadmin service as necessary. CC ID 05011 | Configuration | Preventive | |
Enable the IPP listener as necessary. CC ID 05012 | Configuration | Preventive | |
Enable the serial port listener as necessary. CC ID 05013 | Configuration | Preventive | |
Enable the Smart Card Helper service as necessary. CC ID 05014 | Configuration | Preventive | |
Enable the Application Management service as necessary. CC ID 05015 | Configuration | Preventive | |
Enable the Resultant Set of Policy (RSoP) Provider service as necessary. CC ID 05016 | Configuration | Preventive | |
Enable the Network News Transport Protocol service as necessary. CC ID 05017 | Configuration | Preventive | |
Enable the network Dynamic Data Exchange service as necessary. CC ID 05018 | Configuration | Preventive | |
Enable the Distributed Link Tracking Server service as necessary. CC ID 05019 | Configuration | Preventive | |
Enable the RARP service as necessary. CC ID 05020 | Configuration | Preventive | |
Configure the ".NET Framework service" setting to organizational standards. CC ID 05021 | Configuration | Preventive | |
Enable the Network DDE Share Database Manager service as necessary. CC ID 05022 | Configuration | Preventive | |
Enable the Certificate Services service as necessary. CC ID 05023 | Configuration | Preventive | |
Configure the ATI hotkey poller service properly. CC ID 05024 | Configuration | Preventive | |
Configure the Interix Subsystem Startup service properly. CC ID 05025 | Configuration | Preventive | |
Configure the Cluster Service service properly. CC ID 05026 | Configuration | Preventive | |
Configure the IAS Jet Database Access service properly. CC ID 05027 | Configuration | Preventive | |
Configure the IAS service properly. CC ID 05028 | Configuration | Preventive | |
Configure the IP Version 6 Helper service properly. CC ID 05029 | Configuration | Preventive | |
Configure "Message Queuing service" to organizational standards. CC ID 05030 | Configuration | Preventive | |
Configure the Message Queuing Down Level Clients service properly. CC ID 05031 | Configuration | Preventive | |
Configure the Windows Management Instrumentation Driver Extensions service properly. CC ID 05033 | Configuration | Preventive | |
Configure the TCP/IP NetBIOS Helper Service properly. CC ID 05034 | Configuration | Preventive | |
Configure the Utility Manager service properly. CC ID 05035 | Configuration | Preventive | |
Configure the secondary logon service properly. CC ID 05036 | Configuration | Preventive | |
Configure the Windows Management Instrumentation service properly. CC ID 05037 | Configuration | Preventive | |
Configure the Workstation service properly. CC ID 05038 | Configuration | Preventive | |
Configure the Windows Installer service properly. CC ID 05039 | Configuration | Preventive | |
Configure the Windows System Resource Manager service properly. CC ID 05040 | Configuration | Preventive | |
Configure the WinHTTP Web Proxy Auto-Discovery Service properly. CC ID 05041 | Configuration | Preventive | |
Configure the Services for Unix Client for NFS service properly. CC ID 05042 | Configuration | Preventive | |
Configure the Services for Unix Server for PCNFS service properly. CC ID 05043 | Configuration | Preventive | |
Configure the Services for Unix Perl Socket service properly. CC ID 05044 | Configuration | Preventive | |
Configure the Services for Unix User Name Mapping service properly. CC ID 05045 | Configuration | Preventive | |
Configure the Services for Unix Windows Cron service properly. CC ID 05046 | Configuration | Preventive | |
Configure the Windows Media Services service properly. CC ID 05047 | Configuration | Preventive | |
Configure the Services for Netware Service Advertising Protocol (SAP) Agent properly. CC ID 05048 | Configuration | Preventive | |
Configure the Web Element Manager service properly. CC ID 05049 | Configuration | Preventive | |
Configure the Remote Installation Services Single Instance Storage (SIS) Groveler service properly. CC ID 05050 | Configuration | Preventive | |
Configure the Terminal Services Licensing service properly. CC ID 05051 | Configuration | Preventive | |
Configure the COM+ Event System service properly. CC ID 05052 | Configuration | Preventive | |
Configure the Event Log service properly. CC ID 05053 | Configuration | Preventive | |
Configure the Infrared Monitor service properly. CC ID 05054 | Configuration | Preventive | |
Configure the Services for Unix Server for NFS service properly. CC ID 05055 | Configuration | Preventive | |
Configure the System Event Notification Service properly. CC ID 05056 | Configuration | Preventive | |
Configure the NTLM Security Support Provider service properly. CC ID 05057 | Configuration | Preventive | |
Configure the Performance Logs and Alerts service properly. CC ID 05058 | Configuration | Preventive | |
Configure the Protected Storage service properly. CC ID 05059 | Configuration | Preventive | |
Configure the QoS Admission Control (RSVP) service properly. CC ID 05060 | Configuration | Preventive | |
Configure the Remote Procedure Call service properly. CC ID 05061 | Configuration | Preventive | |
Configure the Removable Storage service properly. CC ID 05062 | Configuration | Preventive | |
Configure the Server service properly. CC ID 05063 | Configuration | Preventive | |
Configure the Security Accounts Manager service properly. CC ID 05064 | Configuration | Preventive | |
Configure the “Network Connections” service to organizational standards. CC ID 05065 | Configuration | Preventive | |
Configure the Logical Disk Manager service properly. CC ID 05066 | Configuration | Preventive | |
Configure the Logical Disk Manager Administrative Service properly. CC ID 05067 | Configuration | Preventive | |
Configure the File Replication service properly. CC ID 05068 | Configuration | Preventive | |
Configure the Kerberos Key Distribution Center service properly. CC ID 05069 | Configuration | Preventive | |
Configure the Intersite Messaging service properly. CC ID 05070 | Configuration | Preventive | |
Configure the Remote Procedure Call locator service properly. CC ID 05071 | Configuration | Preventive | |
Configure the Distributed File System service properly. CC ID 05072 | Configuration | Preventive | |
Configure the Windows Internet Name Service service properly. CC ID 05073 | Configuration | Preventive | |
Configure the FTP Publishing Service properly. CC ID 05074 | Configuration | Preventive | |
Configure the Windows Search service properly. CC ID 05075 | Configuration | Preventive | |
Configure the Microsoft Peer-to-Peer Networking Services service properly. CC ID 05076 | Configuration | Preventive | |
Configure the Remote Shell service properly. CC ID 05077 | Configuration | Preventive | |
Configure Simple TCP/IP services to organizational standards. CC ID 05078 | Configuration | Preventive | |
Configure the Print Services for Unix service properly. CC ID 05079 | Configuration | Preventive | |
Configure the File Shares service to organizational standards. CC ID 05080 | Configuration | Preventive | |
Configure the NetMeeting service properly. CC ID 05081 | Configuration | Preventive | |
Configure the Application Layer Gateway service properly. CC ID 05082 | Configuration | Preventive | |
Configure the Cryptographic Services service properly. CC ID 05083 | Configuration | Preventive | |
Configure the Help and Support Service properly. CC ID 05084 | Configuration | Preventive | |
Configure the Human Interface Device Access service properly. CC ID 05085 | Configuration | Preventive | |
Configure the IMAPI CD-Burning COM service properly. CC ID 05086 | Configuration | Preventive | |
Configure the MS Software Shadow Copy Provider service properly. CC ID 05087 | Configuration | Preventive | |
Configure the Network Location Awareness service properly. CC ID 05088 | Configuration | Preventive | |
Configure the Portable Media Serial Number Service service properly. CC ID 05089 | Configuration | Preventive | |
Configure the System Restore Service service properly. CC ID 05090 | Configuration | Preventive | |
Configure the Themes service properly. CC ID 05091 | Configuration | Preventive | |
Configure the Uninterruptible Power Supply service properly. CC ID 05092 | Configuration | Preventive | |
Configure the Upload Manager service properly. CC ID 05093 | Configuration | Preventive | |
Configure the Volume Shadow Copy Service properly. CC ID 05094 | Configuration | Preventive | |
Configure the WebClient service properly. CC ID 05095 | Configuration | Preventive | |
Configure the Windows Audio service properly. CC ID 05096 | Configuration | Preventive | |
Configure the Windows Image Acquisition service properly. CC ID 05097 | Configuration | Preventive | |
Configure the WMI Performance Adapter service properly. CC ID 05098 | Configuration | Preventive | |
Enable file uploads via vsftpd service, as appropriate. CC ID 05100 | Configuration | Preventive | |
Disable or remove sadmind unless use of sadmind is absolutely necessary. CC ID 06885 | Configuration | Preventive | |
Configure the "SNMP version 1" setting to organizational standards. CC ID 08976 | Configuration | Preventive | |
Configure the "xdmcp service" setting to organizational standards. CC ID 08985 | Configuration | Preventive | |
Disable the automatic display of remote images in HTML-formatted e-mail. CC ID 04494 | Configuration | Preventive | |
Disable Remote Apply Events unless Remote Apply Events are absolutely necessary. CC ID 04495 | Configuration | Preventive | |
Disable Xgrid unless Xgrid is absolutely necessary. CC ID 04496 | Configuration | Preventive | |
Configure the "Do Not Show First Use Dialog Boxes" setting for Windows Media Player properly. CC ID 05136 | Configuration | Preventive | |
Disable Core dumps unless absolutely necessary. CC ID 01507 | Configuration | Preventive | |
Set hard core dump size limits, as appropriate. CC ID 05990 | Configuration | Preventive | |
Configure the "Prevent Desktop Shortcut Creation" setting for Windows Media Player properly. CC ID 05137 | Configuration | Preventive | |
Set the Squid EUID and Squid GUID to an appropriate user and group. CC ID 05138 | Configuration | Preventive | |
Verify groups referenced in /etc/passwd are included in /etc/group, as appropriate. CC ID 05139 | Configuration | Preventive | |
Use of the cron.allow file should be enabled or disabled as appropriate. CC ID 06014 | Configuration | Preventive | |
Use of the at.allow file should be enabled or disabled as appropriate. CC ID 06015 | Configuration | Preventive | |
Enable or disable the Dynamic DNS feature of the DHCP Server as appropriate. CC ID 06039 | Configuration | Preventive | |
Enable or disable each user's Screen saver software, as necessary. CC ID 06050 | Configuration | Preventive | |
Disable any unnecessary scripting languages, as necessary. CC ID 12137 | Configuration | Preventive | |
Establish, implement, and maintain the interactive logon settings. CC ID 01739 | Establish/Maintain Documentation | Preventive | |
Configure the system to refrain from completing authentication methods when a security breach is detected. CC ID 13790 | Configuration | Preventive | |
Allow logon to privileged accounts, as appropriate. CC ID 05281 | Configuration | Preventive | |
Verify the logon accounts include an appropriate GECOS identifier, as appropriate. CC ID 05280 | Configuration | Preventive | |
Configure the "/etc/shadow" settings to organizational standards. CC ID 15332 | Configuration | Preventive | |
Set the default su console properly. CC ID 05279 | Configuration | Preventive | |
Set the default logon console properly. CC ID 05278 | Configuration | Preventive | |
Enable or disable local user logon to the vsftpd service, as appropriate. CC ID 05277 | Configuration | Preventive | |
Enable or disable anonymous root logons, as appropriate. CC ID 05276 | Configuration | Preventive | |
Enable or disable interactive logon to non-root system accounts, as necessary. CC ID 05275 | Configuration | Preventive | |
Enable or disable logins through the primary console device, as appropriate. CC ID 05274 | Configuration | Preventive | |
Enable or disable logins through the named virtual console device, as appropriate. CC ID 05273 | Configuration | Preventive | |
Enable or disable logons through the named virtual console interface, as appropriate. CC ID 05272 | Configuration | Preventive | |
Configure the "Interactive logon: Do not display last user name" setting to organizational standards. CC ID 01740 | Configuration | Preventive | |
Configure the "Interactive logon: Do not require CTRL+ALT+DEL" setting. CC ID 01741 | Configuration | Preventive | |
Configure the system logon banner. CC ID 01742 | Configuration | Preventive | |
Configure the system logon banner message title. CC ID 01743 | Configuration | Preventive | |
Configure the "interactive logon: number of previous logons to cache (in case domain controller is not available" setting. CC ID 01744 | Configuration | Preventive | |
Configure the "Interactive logon: Require Domain Controller authentication to unlock workstation" setting. CC ID 01746 | Configuration | Preventive | |
Configure the Prompt for password on resume from hibernate / suspend setting. CC ID 04356 | Configuration | Preventive | |
Configure the "Interactive logon: Smart card removal behavior" setting. CC ID 01747 | Configuration | Preventive | |
Configure the "Recovery console: Allow automatic administrative logon" setting. CC ID 01776 | Configuration | Preventive | |
Configure the "Recovery console: Allow floppy copy and access to all drivers and all folders" setting. CC ID 01777 | Configuration | Preventive | |
Configure the system to require an Open Firmware password on system startup. CC ID 04479 | Configuration | Preventive | |
Configure the "Interactive logon: Require removal card" setting. CC ID 06053 | Configuration | Preventive | |
Configure the settings of the system registry and the systems objects (for Windows OS only). CC ID 01781 | Configuration | Preventive | |
Configure ICMP timestamp request responses properly. CC ID 05150 | Configuration | Preventive | |
Configure the Administrators group as the default owner for all new objects. CC ID 01782 | Configuration | Preventive | |
Configure the "System objects: Require case-insensitivity for non-Windows systems" setting. CC ID 01783 | Configuration | Preventive | |
Configure the "System objects: Strengthen default permissions of internal system objects" setting. CC ID 01784 | Configuration | Preventive | |
Configure the system to suppress Dr. Watson Crash dumps. CC ID 01785 | Configuration | Preventive | |
Disable automatic execution of the system debugger. CC ID 01786 | Configuration | Preventive | |
Disable automatic logon. CC ID 01788 | Configuration | Preventive | |
Disable automatic reboots after a Blue Screen of Death. CC ID 01789 | Configuration | Preventive | |
Remove administrative shares on workstations. CC ID 01791 | Configuration | Preventive | |
Configure the system to protect against Browser Spoofing attacks. CC ID 01792 | Configuration | Preventive | |
Configure the system to protect against source-routing spoofing. CC ID 01793 | Configuration | Preventive | |
Configure the system to protect the default gateway network setting. CC ID 01794 | Configuration | Preventive | |
Configure the TCP/IP Dead Gateway Detection as appropriate. CC ID 06025 | Configuration | Preventive | |
Configure the system to ensure ICMP routing via the shortest path first. CC ID 01795 | Configuration | Preventive | |
Configure the system to protect against packet fragmentation. CC ID 01796 | Configuration | Preventive | |
Configure the keep-alive times. CC ID 01797 | Configuration | Preventive | |
Configure the system to protect against malicious Name-Release Attacks. CC ID 01798 | Configuration | Preventive | |
Disable Internet Router Discovery Protocol. CC ID 01799 | Configuration | Preventive | |
Configure the system to protect against SYN Flood attacks. CC ID 01800 | Configuration | Preventive | |
Configure the TCP Maximum half-open sockets. CC ID 01801 | Configuration | Preventive | |
Configure the TCP Maximum half-open retired sockets. CC ID 01802 | Configuration | Preventive | |
Configure the number of dropped connect requests to a set maximum. CC ID 04272 | Configuration | Preventive | |
Enable Internet Protocol Security to protect Kerberos RSVP communication. CC ID 01803 | Configuration | Preventive | |
Configure the system to hide workstations from the network browser listing. CC ID 01804 | Configuration | Preventive | |
Enable the safe DSS search mode. CC ID 01805 | Configuration | Preventive | |
Disable WebDAV basic authentication (sp 2 only). CC ID 01806 | Configuration | Preventive | |
Disable basic authentication over a clear channel (sp 2 only). CC ID 01807 | Configuration | Preventive | |
Enable the usb block storage device policy (sp 2 only). CC ID 01808 | Configuration | Preventive | |
Block the Distributed Transaction Coordinator service and set additional Distributed Transaction Coordinator parameters, if necessary. CC ID 01809 | Configuration | Preventive | |
Set the registry permission for HKLM\Software\Classes. CC ID 02010 | Configuration | Preventive | |
Set the registry permission for HKLM\Software. CC ID 02011 | Configuration | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\NetDDE. CC ID 02012 | Configuration | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\OS/2 Subsystem for NT. CC ID 02013 | Configuration | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows NT\CurrentVersion\AsrCommands. CC ID 02014 | Configuration | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib. CC ID 02015 | Configuration | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Group Policy. CC ID 02016 | Configuration | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Installer. CC ID 02017 | Configuration | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Policies. CC ID 02018 | Configuration | Preventive | |
Set the registry permission for HKLM\System. CC ID 02019 | Configuration | Preventive | |
Set the registry permission for HKLM\System\Clone. CC ID 02020 | Configuration | Preventive | |
Set the registry permission for HKLM\System\ControlSet001. CC ID 02021 | Configuration | Preventive | |
Set the registry permission for HKLM\System\ControlSet00x. CC ID 02022 | Configuration | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Control\SecurePipeServers\WinReg. CC ID 02023 | Configuration | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Control\WMI\Security. CC ID 02024 | Configuration | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Enum. CC ID 02025 | Configuration | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Hardware Profiles. CC ID 02026 | Configuration | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Services\SNMP\Parameters\PermittedManagers. CC ID 02027 | Configuration | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Services\SNMP\Parameters\ValidCommunities. CC ID 02028 | Configuration | Preventive | |
Set the registry permission for HKU\.Default. CC ID 02029 | Configuration | Preventive | |
Set the registry permission for HKU\.Default\Software\Microsoft\NetDDE. CC ID 02030 | Configuration | Preventive | |
Set the registry permission for HKU\.Default\Software\Microsoft\Protected Storage System Provider. CC ID 02031 | Configuration | Preventive | |
Set the registry permission for %SystemDrive%. CC ID 02032 | Configuration | Preventive | |
Enable auditing for HKLM\Software and set its registry permission. CC ID 02033 | Configuration | Preventive | |
Enable auditing for HKLM\System and set its registry permission. CC ID 02034 | Configuration | Preventive | |
Configure the system to a set number of unacknowledged data retransmissions. CC ID 04271 | Configuration | Preventive | |
Configure the system to remap folder types to Notepad. CC ID 04312 | Configuration | Preventive | |
Configure the system to show hidden file types. CC ID 04313 | Configuration | Preventive | |
Configure the "Do not process the legacy run list" setting. CC ID 04322 | Configuration | Preventive | |
Configure the "Do not process the run once list" setting. CC ID 04323 | Configuration | Preventive | |
Configure "Registry policy processing" to organizational standards. CC ID 04324 | Configuration | Preventive | |
Configure the "Restrict Terminal Server users to a single remote session" setting to organizational standards. CC ID 04510 | Configuration | Preventive | |
Configure the "Do not use temporary folders per session" setting to organizational standards. CC ID 04513 | Configuration | Preventive | |
Configure the "Do not delete temp folder upon exit" setting to organizational standards. CC ID 04514 | Configuration | Preventive | |
Configure the "Turn off background refresh of Group Policy" setting to organizational standards. CC ID 04520 | Configuration | Preventive | |
Configure the "Configure Windows NTP Client" setting. CC ID 04522 | Configuration | Preventive | |
Configure the "Disallow installation of printers using kernel-mode drivers" setting to organizational standards. CC ID 04523 | Configuration | Preventive | |
Configure the "Prevent codec download" setting to organizational standards. CC ID 04524 | Configuration | Preventive | |
Verify the Posix registry key does not exist. CC ID 04525 | Configuration | Preventive | |
Configure the Recycle Bin to delete files on assets running Windows Server 2003. CC ID 04526 | Configuration | Preventive | |
Configure the system to allow only administrators with permissions to change the security settings of Distributed Component Object Model objects. CC ID 04529 | Configuration | Preventive | |
Configure the system to allow Distributed Component Object Model calls to be executed only under the calling user's security context. CC ID 04530 | Configuration | Preventive | |
Configure the version string reported by the bind service properly. CC ID 05140 | Configuration | Preventive | |
Enable or disable performing source validation by reverse path, as appropriate. CC ID 05141 | Configuration | Preventive | |
Verify the environment variable "Os2LibPath" exists, as appropriate. CC ID 05142 | Configuration | Preventive | |
Define the path to the Microsoft OS/2 version 1.x library properly. CC ID 05143 | Configuration | Preventive | |
Set the "Specify intranet Microsoft update service location" properly. CC ID 05144 | Configuration | Preventive | |
Set the path to the debugger used for Just-In-Time debugging properly. CC ID 05145 | Configuration | Preventive | |
Set the OS/2 Subsystem location properly. CC ID 05146 | Configuration | Preventive | |
Configure extended TCP reserved ports properly. CC ID 05147 | Configuration | Preventive | |
Enable or disable ICMPv4 redirects, as appropriate. CC ID 05148 | Configuration | Preventive | |
Enable or disable ICMPv6 redirects, as appropriate. CC ID 05149 | Configuration | Preventive | |
Configure ICMP timestamp broadcast request responses properly. CC ID 05151 | Configuration | Preventive | |
Configure Internet Control Message Protocol echo (ping) request responses properly. CC ID 05152 | Configuration | Preventive | |
Configure ICMP netmask request responses properly. CC ID 05153 | Configuration | Preventive | |
Set the registry permission for HKEY_CLASSES_ROOT properly. CC ID 05154 | Configuration | Preventive | |
Set the registry key HKLM\System\CurrentControlSet\Control\Session Manager\SubSystems\Os2 properly. CC ID 05155 | Configuration | Preventive | |
Set the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AEDebug\Debugger properly. CC ID 05156 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Regfile\Shell\Open\Command properly. CC ID 05157 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography properly. CC ID 05158 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.hlp properly. CC ID 05159 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\helpfile properly. CC ID 05160 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing properly. CC ID 05161 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais properly. CC ID 05162 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell properly. CC ID 05163 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Telephony properly. CC ID 05164 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability properly. CC ID 05165 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell properly. CC ID 05166 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion properly. CC ID 05167 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech properly. CC ID 05168 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC properly. CC ID 05169 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EventSystem properly. CC ID 05170 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates properly. CC ID 05171 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports properly. CC ID 05172 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Driver Signing properly. CC ID 05173 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Policies properly. CC ID 05174 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor properly. CC ID 05175 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ads\Providers\WinNT properly. CC ID 05176 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\NWCOMPAT properly. CC ID 05177 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\NDS properly. CC ID 05178 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\LDAP\Extensions properly. CC ID 05179 | Configuration | Preventive | |
Set the registry permission for HKEY_USERS\.DEFAULT\Software\Microsoft\SystemCertificates\Root\ProtectedRoots properly. CC ID 05180 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager properly. CC ID 05181 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Help properly. CC ID 05182 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip properly. CC ID 05183 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Non-Driver Signing properly. CC ID 05184 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DeviceManager properly. CC ID 05185 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSrv\Security properly. CC ID 05186 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCP properly. CC ID 05187 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent properly. CC ID 05188 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security properly. CC ID 05189 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMI\Security properly. CC ID 05190 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Security properly. CC ID 05191 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TapiSrv\Security properly. CC ID 05192 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SCardSvr\Security properly. CC ID 05193 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Samss\Security properly. CC ID 05194 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Security properly. CC ID 05195 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetDDEdsdm\Security properly. CC ID 05196 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility properly. CC ID 05197 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kdc\Security properly. CC ID 05198 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AppMgmt\Security properly. CC ID 05199 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services properly. CC ID 05200 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers properly. CC ID 05201 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network properly. CC ID 05202 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\LSA\Data properly. CC ID 05203 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\GBG properly. CC ID 05204 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Skew1 properly. CC ID 05205 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\JD properly. CC ID 05206 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control properly. CC ID 05207 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\wbem properly. CC ID 05208 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetDDE\Security properly. CC ID 05209 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Font properly. CC ID 05210 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog properly. CC ID 05211 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares properly. CC ID 05212 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Windows 3.1 Migration Status properly. CC ID 05213 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Secure properly. CC ID 05214 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups properly. CC ID 05215 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon properly. CC ID 05216 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones properly. CC ID 05217 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping properly. CC ID 05218 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPS properly. CC ID 05219 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontMapper properly. CC ID 05220 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Compatibility properly. CC ID 05221 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AEDebug properly. CC ID 05222 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx properly. CC ID 05223 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce properly. CC ID 05224 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run properly. CC ID 05225 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows properly. CC ID 05226 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Secure properly. CC ID 05227 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RPC properly. CC ID 05228 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options properly. CC ID 05229 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole properly. CC ID 05230 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ProductOptions properly. CC ID 05231 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout properly. CC ID 05232 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex properly. CC ID 05233 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName properly. CC ID 05234 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy properly. CC ID 05235 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Schedule properly. CC ID 05236 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost properly. CC ID 05237 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SecEdit properly. CC ID 05238 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList properly. CC ID 05239 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\EFS properly. CC ID 05240 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32 properly. CC ID 05241 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Classes properly. CC ID 05242 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion properly. CC ID 05243 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates properly. CC ID 05244 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows properly. CC ID 05245 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole properly. CC ID 05246 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Printers properly. CC ID 05247 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies properly. CC ID 05248 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security\XAKey properly. CC ID 05249 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UPnP Device Host properly. CC ID 05250 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings properly. CC ID 05251 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class properly. CC ID 05252 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Security properly. CC ID 05253 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNSCache properly. CC ID 05254 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ersvc\Security properly. CC ID 05255 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IRENUM\Security properly. CC ID 05256 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netbt properly. CC ID 05257 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess properly. CC ID 05259 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Scarddrv\Security properly. CC ID 05260 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Stisvc\Security properly. CC ID 05261 | Configuration | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysmonLog\Log Queries properly. CC ID 05262 | Configuration | Preventive | |
Configure the "audit the %SystemDrive% directory" setting to organizational standards. CC ID 10099 | Configuration | Preventive | |
Configure the "audit the HKEY_LOCAL_MACHINESOFTWARE registry key" setting to organizational standards. CC ID 10100 | Configuration | Preventive | |
Configure the "audit the HKEY_LOCAL_MACHINESYSTEM registry key" setting to organizational standards. CC ID 10101 | Configuration | Preventive | |
Configure the "%ProgramFiles%" directory permissions to organizational standards. CC ID 10102 | Configuration | Preventive | |
Configure the "%ProgramFiles%Resource Kit" directory permissions to organizational standards. CC ID 10103 | Configuration | Preventive | |
Configure the "%ProgramFiles%Resource Pro Kit" directory permissions to organizational standards. CC ID 10104 | Configuration | Preventive | |
Configure the "%SystemDrive%" directory permissions to organizational standards. CC ID 10105 | Configuration | Preventive | |
Configure the "%SystemDrive%AUTOEXEC.BAT" file permissions to organizational standards. CC ID 10106 | Configuration | Preventive | |
Configure the "%SystemDrive%BOOT.INI" file permissions to organizational standards. CC ID 10107 | Configuration | Preventive | |
Configure the "%SystemDrive%CONFIG.SYS" file permissions to organizational standards. CC ID 10108 | Configuration | Preventive | |
Configure the "%SystemDrive%Documents and Settings" file permissions to organizational standards. CC ID 10109 | Configuration | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAdministrator" directory permissions to organizational standards. CC ID 10110 | Configuration | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAll Users" directory permissions to organizational standards. CC ID 10111 | Configuration | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAll UsersDocumentsDrWatson" directory permissions to organizational standards. CC ID 10112 | Configuration | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAll UsersDocumentsDrWatsondrwtsn32.log" file permissions to organizational standards. CC ID 10113 | Configuration | Preventive | |
Configure the "%SystemDrive%Documents and SettingsDefault User" directory permissions to organizational standards. CC ID 10114 | Configuration | Preventive | |
Configure the "%SystemDrive%IO.SYS" file permissions to organizational standards. CC ID 10115 | Configuration | Preventive | |
Configure the "%SystemDrive%MSDOS.SYS" file permissions to organizational standards. CC ID 10116 | Configuration | Preventive | |
Configure the "%SystemDrive%NTBOOTDD.SYS" file permissions to organizational standards. CC ID 10117 | Configuration | Preventive | |
Configure the "%SystemDrive%NTDETECT.COM" file permissions to organizational standards. CC ID 10118 | Configuration | Preventive | |
Configure the "%SystemDrive%NTLDR" file permissions to organizational standards. CC ID 10119 | Configuration | Preventive | |
Configure the "%SystemDrive%Temp" directory permissions to organizational standards. CC ID 10120 | Configuration | Preventive | |
Configure the "%SystemDrive%My Download Files" directory permissions to organizational standards. CC ID 10121 | Configuration | Preventive | |
Configure the "%SystemDrive%System Volume Information" file permissions to organizational standards. CC ID 10122 | Configuration | Preventive | |
Configure the "%SystemRoot%" directory permissions to organizational standards. CC ID 10123 | Configuration | Preventive | |
Configure the "%SystemRoot%Driver CacheI386Driver.cab" directory permissions to organizational standards. CC ID 10124 | Configuration | Preventive | |
Configure the "%SystemRoot%$NtServicePackUninstall$" directory permissions to organizational standards. CC ID 10125 | Configuration | Preventive | |
Configure the "%SystemRoot%$NtServicePackUninstall$" directory permissions to organizational standards. CC ID 10126 | Configuration | Preventive | |
Configure the "%SystemRoot%$NtUninstall*" directories permissions to organizational standards. CC ID 10127 | Configuration | Preventive | |
Configure the "%SystemRoot%CSC" directory permissions to organizational standards. CC ID 10128 | Configuration | Preventive | |
Configure the "%SystemRoot%Debug" directory permissions to organizational standards. CC ID 10129 | Configuration | Preventive | |
Configure the "%SystemRoot%DebugUserMode" directory permissions to organizational standards. CC ID 10130 | Configuration | Preventive | |
Configure the "%SystemRoot% egedit.exe" file permissions to organizational standards. CC ID 10131 | Configuration | Preventive | |
Configure the "%SystemDrive%NTDS" directory permissions to organizational standards. CC ID 10132 | Configuration | Preventive | |
Configure the "%SystemRoot%Offline Web Pages" directory permissions to organizational standards. CC ID 10133 | Configuration | Preventive | |
Configure the "%SystemRoot%Registration" directory permissions to organizational standards. CC ID 10134 | Configuration | Preventive | |
Configure the "%SystemRoot% epair" directory permissions to organizational standards. CC ID 10135 | Configuration | Preventive | |
Configure the "%SystemRoot%security" directory permissions to organizational standards. CC ID 10136 | Configuration | Preventive | |
Configure the "%SystemRoot%SYSVOL" directory permissions to organizational standards. CC ID 10137 | Configuration | Preventive | |
Configure the "%SystemRoot%SYSVOLdomainPolicies" directory permissions to organizational standards. CC ID 10138 | Configuration | Preventive | |
Configure the "%SystemRoot%Temp" directory permissions to organizational standards. CC ID 10139 | Configuration | Preventive | |
Configure the "%SystemRoot%System32" directory permissions to organizational standards. CC ID 10140 | Configuration | Preventive | |
Configure the "%SystemRoot%System32arp.exe" directory permissions to organizational standards. CC ID 10141 | Configuration | Preventive | |
Configure the "%SystemRoot%System32at.exe" file permissions to organizational standards. CC ID 10142 | Configuration | Preventive | |
Configure the "%SystemRoot%System32CONFIG" file permissions to organizational standards. CC ID 10143 | Configuration | Preventive | |
Configure the "%SystemRoot%System32CONFIGAppEvent.evt" file permissions to organizational standards. CC ID 10144 | Configuration | Preventive | |
Configure the "%SystemRoot%System32CONFIG*.evt" file permissions to organizational standards. CC ID 10145 | Configuration | Preventive | |
Configure the "%SystemRoot%System32dllcache" directory permissions to organizational standards. CC ID 10146 | Configuration | Preventive | |
Configure the "%SystemRoot%System32DTCLog" directory permissions to organizational standards. CC ID 10147 | Configuration | Preventive | |
Configure the "%SystemRoot%System32GroupPolicy" directory permissions to organizational standards. CC ID 10148 | Configuration | Preventive | |
Configure the "%SystemRoot%System32ias" directory permissions to organizational standards. CC ID 10149 | Configuration | Preventive | |
Configure the "%SystemRoot%System32Ntbackup.exe" file permissions to organizational standards. CC ID 10150 | Configuration | Preventive | |
Configure the "%SystemRoot%System32NTMSData" directory permissions to organizational standards. CC ID 10151 | Configuration | Preventive | |
Configure the "%SystemRoot%System32Rcp.exe" file permissions to organizational standards. CC ID 10152 | Configuration | Preventive | |
Configure the "%SystemRoot%System32Regedt32.exe" file permissions to organizational standards. CC ID 10153 | Configuration | Preventive | |
Configure the "%SystemRoot%system32ReinstallBackups" directory permissions to organizational standards. CC ID 10154 | Configuration | Preventive | |
Configure the "%SystemRoot%System32Rexec.exe" file permissions to organizational standards. CC ID 10155 | Configuration | Preventive | |
Configure the "%SystemRoot%System32Rsh.exe" file permissions to organizational standards. CC ID 10156 | Configuration | Preventive | |
Configure the "%SystemRoot%System32Secedit.exe" file permissions to organizational standards. CC ID 10157 | Configuration | Preventive | |
Configure the "%SystemRoot%System32Setup" directory permissions to organizational standards. CC ID 10158 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 epl" directory permissions to organizational standards. CC ID 10159 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 eplexport" directory permissions to organizational standards. CC ID 10160 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 eplimport" directory permissions to organizational standards. CC ID 10161 | Configuration | Preventive | |
Configure the "%SystemRoot%System32spoolPrinters" directory permissions to organizational standards. CC ID 10162 | Configuration | Preventive | |
Configure the "%SystemRoot%Tasks" directory permissions to organizational standards. CC ID 10163 | Configuration | Preventive | |
Configure the "%ALL%Program FilesMQSeries" directory permissions to organizational standards. CC ID 10164 | Configuration | Preventive | |
Configure the "%ALL%Program FilesMQSeriesqmggr" directory permissions to organizational standards. CC ID 10165 | Configuration | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAll UsersApplication DataMicrosoftHTML Help ACL" directory permissions to organizational standards. CC ID 10166 | Configuration | Preventive | |
Configure the "%SystemDrive%WINNTSECURITYDatabaseSECEDIT.SDB ACL" directory permissions to organizational standards. CC ID 10167 | Configuration | Preventive | |
Configure the "HKEY_CLASSES_ROOT" registry key permissions to organizational standards. CC ID 10168 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWARE" registry key permissions to organizational standards. CC ID 10169 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasses" registry key permissions to organizational standards. CC ID 10170 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClassesRegfileShellOpenCommand" registry key permissions to organizational standards. CC ID 10171 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftNetDDE" registry key permissions to organizational standards. CC ID 10172 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftOS/2 Subsystem for NT" registry key permissions to organizational standards. CC ID 10173 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAsrCommands" registry key permissions to organizational standards. CC ID 10174 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionPerflib" registry key permissions to organizational standards. CC ID 10175 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionGroup Policy" registry key permissions to organizational standards. CC ID 10176 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInstaller" registry key permissions to organizational standards. CC ID 10177 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPolicies" registry key permissions to organizational standards. CC ID 10178 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEM" registry key permissions to organizational standards. CC ID 10179 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMclone" registry key permissions to organizational standards. CC ID 10180 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset001" registry key permissions to organizational standards. CC ID 10181 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset002" registry key permissions to organizational standards. CC ID 10182 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset003" registry key permissions to organizational standards. CC ID 10183 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset004" registry key permissions to organizational standards. CC ID 10184 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset005" registry key permissions to organizational standards. CC ID 10185 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset006" registry key permissions to organizational standards. CC ID 10186 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset007" registry key permissions to organizational standards. CC ID 10187 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset008" registry key permissions to organizational standards. CC ID 10188 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset009" registry key permissions to organizational standards. CC ID 10189 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset010" registry key permissions to organizational standards. CC ID 10190 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurePipeServerswinreg" registry key permissions to organizational standards. CC ID 10191 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlWmiSecurity" registry key permissions to organizational standards. CC ID 10192 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnum" registry key permissions to organizational standards. CC ID 10193 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetHardware Profiles" registry key permissions to organizational standards. CC ID 10194 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSNMPParametersPermittedManagers" registry key permissions to organizational standards. CC ID 10195 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSNMPParametersValidCommunities" registry key permissions to organizational standards. CC ID 10196 | Configuration | Preventive | |
Configure the "HKEY_USERS.DEFAULT " registry key permissions to organizational standards. CC ID 10197 | Configuration | Preventive | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftNetDDE" registry key permissions to organizational standards. CC ID 10198 | Configuration | Preventive | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftProtected Storage System Provider" registry key permissions to organizational standards. CC ID 10199 | Configuration | Preventive | |
Configure the "HKEY_CLASSES_ROOT" registry key permissions to organizational standards. CC ID 10200 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 unas.exe" file permissions to organizational standards. CC ID 10222 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAEDebugDebugger" registry key to organizational standards. CC ID 10233 | Configuration | Preventive | |
Configure the "%SystemDrive%perflogs" directory permissions to organizational standards. CC ID 10266 | Configuration | Preventive | |
Configure the "%SystemDrive%i386" directory permissions to organizational standards. CC ID 10267 | Configuration | Preventive | |
Configure the "%ProgramFiles%Common FilesSpeechEnginesTTS" directory permissions to organizational standards. CC ID 10268 | Configuration | Preventive | |
Configure the "%SystemRoot%\_default.plf" file permissions to organizational standards. CC ID 10269 | Configuration | Preventive | |
Configure the "%SystemRoot%addins" directory permissions to organizational standards. CC ID 10270 | Configuration | Preventive | |
Configure the "%SystemRoot%appPatch" directory permissions to organizational standards. CC ID 10271 | Configuration | Preventive | |
Configure the "%SystemRoot%clock.avi" file permissions to organizational standards. CC ID 10272 | Configuration | Preventive | |
Configure the "%SystemRoot%Connection Wizard" directory permissions to organizational standards. CC ID 10273 | Configuration | Preventive | |
Configure the "%SystemRoot%Driver Cache" file permissions to organizational standards. CC ID 10274 | Configuration | Preventive | |
Configure the "%SystemRoot%explorer.scf" file permissions to organizational standards. CC ID 10275 | Configuration | Preventive | |
Configure the "%SystemRoot%explorer.exe" file permissions to organizational standards. CC ID 10276 | Configuration | Preventive | |
Configure the "%SystemRoot%Help" directory permissions to organizational standards. CC ID 10277 | Configuration | Preventive | |
Configure the "%SystemRoot%infunregmp2.exe" file permissions to organizational standards. CC ID 10278 | Configuration | Preventive | |
Configure the "%SystemRoot%Java" directory permissions to organizational standards. CC ID 10279 | Configuration | Preventive | |
Configure the "%SystemRoot%mib.bin" file permissions to organizational standards. CC ID 10280 | Configuration | Preventive | |
Configure the "%SystemRoot%msagent" directory permissions to organizational standards. CC ID 10281 | Configuration | Preventive | |
Configure the "%SystemRoot%msdfmap.ini" file permissions to organizational standards. CC ID 10282 | Configuration | Preventive | |
Configure the "%SystemRoot%mui" directory permissions to organizational standards. CC ID 10283 | Configuration | Preventive | |
Configure the "%SystemRoot%security emplates" directory permissions to organizational standards. CC ID 10284 | Configuration | Preventive | |
Configure the "%SystemRoot%speech" directory permissions to organizational standards. CC ID 10285 | Configuration | Preventive | |
Configure the "%SystemRoot%system.ini" file permissions to organizational standards. CC ID 10286 | Configuration | Preventive | |
Configure the "%SystemRoot%systemsetup.inf" file permissions to organizational standards. CC ID 10287 | Configuration | Preventive | |
Configure the "%SystemRoot%systemstdole.tlb" file permissions to organizational standards. CC ID 10288 | Configuration | Preventive | |
Configure the "%SystemRoot% wain_32" directory permissions to organizational standards. CC ID 10289 | Configuration | Preventive | |
Configure the "%SystemRoot%System32cacls.exe" directory permissions to organizational standards. CC ID 10290 | Configuration | Preventive | |
Configure the "%SystemRoot%System32attrib.exe" directory permissions to organizational standards. CC ID 10291 | Configuration | Preventive | |
Configure the "%SystemRoot%System32CatRoot" directory permissions to organizational standards. CC ID 10292 | Configuration | Preventive | |
Configure the "%SystemRoot%System32configsystemprofile" directory permissions to organizational standards. CC ID 10293 | Configuration | Preventive | |
Configure the "%SystemRoot%System32debug.exe" file permissions to organizational standards. CC ID 10294 | Configuration | Preventive | |
Configure the "%SystemRoot%System32dhcp" directory permissions to organizational standards. CC ID 10295 | Configuration | Preventive | |
Configure the "%SystemRoot%System32drivers" directory permissions to organizational standards. CC ID 10296 | Configuration | Preventive | |
Configure the "%SystemRoot%System32eventtriggers.exe" file permissions to organizational standards. CC ID 10297 | Configuration | Preventive | |
Configure the "%SystemRoot%System32edlin.exe" file permissions to organizational standards. CC ID 10298 | Configuration | Preventive | |
Configure the "%SystemRoot%System32eventcreate.exe" file permissions to organizational standards. CC ID 10299 | Configuration | Preventive | |
Configure the "%SystemRoot%System32Export" directory permissions to organizational standards. CC ID 10300 | Configuration | Preventive | |
Configure the "%SystemRoot%System32ipconfig.exe" file permissions to organizational standards. CC ID 10301 | Configuration | Preventive | |
Configure the "%SystemRoot%System32\nslookup.exe" file permissions to organizational standards CC ID 10302 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 etstat.exe" file permissions to organizational standards. CC ID 10303 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 btstat.exe" file permissions to organizational standards. CC ID 10304 | Configuration | Preventive | |
Configure the "%SystemRoot%System32ftp.exe" file permissions to organizational standards. CC ID 10305 | Configuration | Preventive | |
Configure the "%SystemRoot%System32LogFiles" directory permissions to organizational standards. CC ID 10306 | Configuration | Preventive | |
Configure the "%SystemRoot%System32mshta.exe" file permissions to organizational standards. CC ID 10307 | Configuration | Preventive | |
Configure the "%SystemRoot%System32mui" directory permissions to organizational standards. CC ID 10308 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 et.exe" file permissions to organizational standards. CC ID 10309 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 etsh.exe" file permissions to organizational standards. CC ID 10310 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 et1.exe" file permissions to organizational standards. CC ID 10311 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 eg.exe" file permissions to organizational standards. CC ID 10312 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 egini.exe" file permissions to organizational standards. CC ID 10313 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 egsvr32.exe" file permissions to organizational standards. CC ID 10314 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 oute.exe" file permissions to organizational standards. CC ID 10315 | Configuration | Preventive | |
Configure the "%SystemRoot%System32sc.exe" file permissions to organizational standards. CC ID 10316 | Configuration | Preventive | |
Configure the "%SystemRoot%System32ShellExt" directory permissions to organizational standards. CC ID 10317 | Configuration | Preventive | |
Configure the "%SystemRoot%System32subst.exe" file permissions to organizational standards. CC ID 10318 | Configuration | Preventive | |
Configure the "%SystemRoot%System32systeminfo.exe" file permissions to organizational standards. CC ID 10319 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 elnet.exe" file permissions to organizational standards. CC ID 10320 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 ftp.exe" file permissions to organizational standards. CC ID 10321 | Configuration | Preventive | |
Configure the "%SystemRoot%System32wbem" directory permissions to organizational standards. CC ID 10322 | Configuration | Preventive | |
Configure the "%SystemRoot%System32 lntsvr.exe" file permissions to organizational standards. CC ID 10323 | Configuration | Preventive | |
Configure the "%SystemRoot%System32wbemmof" directory permissions to organizational standards. CC ID 10324 | Configuration | Preventive | |
Configure the "%SystemRoot%System32wbem epository" directory permissions to organizational standards. CC ID 10325 | Configuration | Preventive | |
Configure the "%SystemRoot%System32wbemlogs" directory permissions to organizational standards. CC ID 10326 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptography" registry key permissions to organizational standards. CC ID 10327 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasses.hlp" registry key permissions to organizational standards. CC ID 10328 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasseshelpfile" registry key permissions to organizational standards. CC ID 10329 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftTracing" registry key permissions to organizational standards. CC ID 10330 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyCalais" registry key permissions to organizational standards. CC ID 10331 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionShell" registry key permissions to organizational standards. CC ID 10332 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionTelephony" registry key permissions to organizational standards. CC ID 10333 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionReliability" registry key permissions to organizational standards. CC ID 10334 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerUser Shell" registry key permissions to organizational standards. CC ID 10335 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion" registry key permissions to organizational standards. CC ID 10336 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSpeech" registry key permissions to organizational standards. CC ID 10337 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftMSDTC" registry key permissions to organizational standards. CC ID 10338 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftEventSystem" registry key permissions to organizational standards. CC ID 10339 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftEnterpriseCertificates" registry key permissions to organizational standards. CC ID 10340 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionPorts" registry key permissions to organizational standards. CC ID 10341 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftDriver Signing" registry key permissions to organizational standards. CC ID 10342 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREPolicies" registry key permissions to organizational standards. CC ID 10343 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor" registry key permissions to organizational standards. CC ID 10344 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftAdsProvidersWinNT" registry key permissions to organizational standards. CC ID 10345 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersNWCOMPAT" registry key permissions to organizational standards. CC ID 10346 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersNDS" registry key permissions to organizational standards. CC ID 10347 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersLDAPExtensions" registry key permissions to organizational standards. CC ID 10348 | Configuration | Preventive | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftSystemCertificatesRootProtectedRoots" registry key permissions to organizational standards. CC ID 10349 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession Manager" registry key permissions to organizational standards. CC ID 10350 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsHelp" registry key permissions to organizational standards. CC ID 10351 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpip" registry key permissions to organizational standards. CC ID 10352 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftNon-Driver Signing" registry key permissions to organizational standards. CC ID 10353 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftDeviceManager" registry key permissions to organizational standards. CC ID 10354 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesClipSrvSecurity" registry key permissions to organizational standards. CC ID 10355 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesDHCP" registry key permissions to organizational standards. CC ID 10356 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlServiceCurrent" registry key permissions to organizational standards. CC ID 10357 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLogSecurity" registry key permissions to organizational standards. CC ID 10358 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWMISecurity" registry key permissions to organizational standards. CC ID 10359 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeSecurity" registry key permissions to organizational standards. CC ID 10360 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTapiSrvSecurity" registry key permissions to organizational standards. CC ID 10361 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSCardSvrSecurity" registry key permissions to organizational standards. CC ID 10362 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSamssSecurity" registry key permissions to organizational standards. CC ID 10363 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesRpcSsSecurity" registry key permissions to organizational standards. CC ID 10364 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNetDDEdsdmSecurity" registry key permissions to organizational standards. CC ID 10365 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAccessibility" registry key permissions to organizational standards. CC ID 10366 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServiceskdcSecurity" registry key permissions to organizational standards. CC ID 10367 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesAppMgmtSecurity" registry key permissions to organizational standards. CC ID 10368 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices" registry key permissions to organizational standards. CC ID 10369 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurePipeServers" registry key permissions to organizational standards. CC ID 10370 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlNetwork" registry key permissions to organizational standards. CC ID 10371 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAData" registry key permissions to organizational standards. CC ID 10372 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAGBG" registry key permissions to organizational standards. CC ID 10373 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSASkew1" registry key permissions to organizational standards. CC ID 10374 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAJD" registry key permissions to organizational standards. CC ID 10375 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControl" registry key permissions to organizational standards. CC ID 10376 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftwbem" registry key permissions to organizational standards. CC ID 10377 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNetDDESecurity" registry key permissions to organizational standards. CC ID 10378 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionFont" registry key permissions to organizational standards. CC ID 10379 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLog" registry key permissions to organizational standards. CC ID 10380 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerShares" registry key permissions to organizational standards. CC ID 10381 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREWindows 3.1 Migration Status" registry key permissions to organizational standards. CC ID 10382 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWARESecure" registry key permissions to organizational standards. CC ID 10383 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREProgram Groups" registry key permissions to organizational standards. CC ID 10384 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon" registry key permissions to organizational standards. CC ID 10385 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTime Zones" registry key permissions to organizational standards. CC ID 10386 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIniFileMapping" registry key permissions to organizational standards. CC ID 10387 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUPS" registry key permissions to organizational standards. CC ID 10388 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionFontMapper" registry key permissions to organizational standards. CC ID 10389 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionCompatibility" registry key permissions to organizational standards. CC ID 10390 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAEDebug" registry key permissions to organizational standards. CC ID 10391 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunOnceEx" registry key permissions to organizational standards. CC ID 10392 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunOnce" registry key permissions to organizational standards. CC ID 10393 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun" registry key permissions to organizational standards. CC ID 10394 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows" registry key permissions to organizational standards. CC ID 10395 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecure" registry key permissions to organizational standards. CC ID 10396 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftRPC" registry key permissions to organizational standards. CC ID 10397 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options" registry key permissions to organizational standards. CC ID 10398 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSetupRecoveryConsole" registry key permissions to organizational standards. CC ID 10399 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlProductOptions" registry key permissions to organizational standards. CC ID 10400 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlKeyboard Layout" registry key permissions to organizational standards. CC ID 10401 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlContentIndex" registry key permissions to organizational standards. CC ID 10402 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlComputerName" registry key permissions to organizational standards. CC ID 10403 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionGroup Policy" registry key permissions to organizational standards. CC ID 10404 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSchedule" registry key permissions to organizational standards. CC ID 10405 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSvchost" registry key permissions to organizational standards. CC ID 10406 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSecEdit" registry key permissions to organizational standards. CC ID 10407 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionProfileList" registry key permissions to organizational standards. CC ID 10408 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionEFS" registry key permissions to organizational standards. CC ID 10409 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionDrivers32" registry key permissions to organizational standards. CC ID 10410 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionClasses" registry key permissions to organizational standards. CC ID 10411 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion" registry key permissions to organizational standards. CC ID 10412 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSystemCertificates" registry key permissions to organizational standards. CC ID 10413 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows" registry key permissions to organizational standards. CC ID 10414 | Configuration | Preventive | |
Configure the "%SystemRoot%Web" directory permissions to organizational standards. CC ID 10415 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle" registry key permissions to organizational standards. CC ID 10416 | Configuration | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlPrintPrinters" registry key permissions to organizational standards. CC ID 10417 | Configuration | Preventive | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftWindowsCurrentVersionPolicies" registry key permissions to organizational standards. CC ID 10418 | Configuration | Preventive | |
Apply the appropriate warning message to systems. CC ID 01596 | Configuration | Preventive | |
Create a warning message for standard logon services. CC ID 01597 | Configuration | Preventive | |
Create a warning message for graphical logons. CC ID 01598 | Configuration | Preventive | |
Create a warning message for terminal session logons. CC ID 06564 | Configuration | Preventive | |
Create a warning message for FTP daemon. CC ID 01599 | Configuration | Preventive | |
Create a warning message for telnet daemon. CC ID 01600 | Configuration | Preventive | |
Create a power on warning message. CC ID 01601 | Configuration | Preventive | |
Enable the Kerberos TGT expiration warning, as appropriate. CC ID 05263 | Configuration | Preventive | |
Configure the sendmail greeting properly. CC ID 05264 | Configuration | Preventive | |
Set the Electrically-Erasable Programmable Read-Only Memory warning message properly. CC ID 05265 | Configuration | Preventive | |
Set the warning messages switchpoint distance to an appropriate value. CC ID 05266 | Configuration | Preventive | |
Enable logon authentication management techniques. CC ID 00553 | Configuration | Preventive | |
Configure the system to log all access attempts to all systems. CC ID 00554 | Configuration | Preventive | |
Include the date and time that access was granted in the system record. CC ID 15174 | Establish/Maintain Documentation | Preventive | |
Include the access level granted in the system record. CC ID 15173 | Establish/Maintain Documentation | Preventive | |
Include when access is withdrawn in the system record. CC ID 15172 | Establish/Maintain Documentation | Preventive | |
Configure devices and users to re-authenticate, as necessary. CC ID 10609 | Configuration | Preventive | |
Restrict logons by specified source addresses. CC ID 16394 | Technical Security | Preventive | |
Configure the "Lockout Enabled" setting to organizational standards. CC ID 09859 | Configuration | Preventive | |
Prohibit the use of cached authenticators and credentials after a defined period of time. CC ID 10610 | Configuration | Preventive | |
Establish, implement, and maintain authenticators. CC ID 15305 | Technical Security | Preventive | |
Establish, implement, and maintain an authenticator standard. CC ID 01702 | Establish/Maintain Documentation | Preventive | |
Disallow personal data in authenticators. CC ID 13864 | Technical Security | Preventive | |
Establish, implement, and maintain an authenticator management system. CC ID 12031 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a repository of authenticators. CC ID 16372 | Data and Information Management | Preventive | |
Establish, implement, and maintain authenticator procedures. CC ID 12002 | Establish/Maintain Documentation | Preventive | |
Restrict access to authentication files to authorized personnel, as necessary. CC ID 12127 | Technical Security | Preventive | |
Configure authenticators to comply with organizational standards. CC ID 06412 | Configuration | Preventive | |
Configure the system to require new users to change their authenticator on first use. CC ID 05268 | Configuration | Preventive | |
Configure authenticators so that group authenticators or shared authenticators are prohibited. CC ID 00519 | Configuration | Preventive | |
Change the authenticator for shared accounts when the group membership changes. CC ID 14249 | Business Processes | Corrective | |
Configure the system to prevent unencrypted authenticator use. CC ID 04457 | Configuration | Preventive | |
Disable store passwords using reversible encryption. CC ID 01708 | Configuration | Preventive | |
Configure the system to encrypt authenticators. CC ID 06735 | Configuration | Preventive | |
Configure the system to mask authenticators. CC ID 02037 | Configuration | Preventive | |
Configure the authenticator policy to ban the use of usernames or user identifiers in authenticators. CC ID 05992 | Configuration | Preventive | |
Configure the "minimum number of digits required for new passwords" setting to organizational standards. CC ID 08717 | Establish/Maintain Documentation | Preventive | |
Configure the "minimum number of upper case characters required for new passwords" setting to organizational standards. CC ID 08718 | Establish/Maintain Documentation | Preventive | |
Configure the system to refrain from specifying the type of information used as password hints. CC ID 13783 | Configuration | Preventive | |
Configure the "minimum number of lower case characters required for new passwords" setting to organizational standards. CC ID 08719 | Establish/Maintain Documentation | Preventive | |
Disable machine account password changes. CC ID 01737 | Configuration | Preventive | |
Configure the "minimum number of special characters required for new passwords" setting to organizational standards. CC ID 08720 | Establish/Maintain Documentation | Preventive | |
Configure the "require new passwords to differ from old ones by the appropriate minimum number of characters" setting to organizational standards. CC ID 08722 | Establish/Maintain Documentation | Preventive | |
Configure the "password reuse" setting to organizational standards. CC ID 08724 | Establish/Maintain Documentation | Preventive | |
Configure the "Disable Remember Password" setting. CC ID 05270 | Configuration | Preventive | |
Configure the "Minimum password age" to organizational standards. CC ID 01703 | Configuration | Preventive | |
Configure the LILO/GRUB password. CC ID 01576 | Configuration | Preventive | |
Configure the system to use Apple's Keychain Access to store passwords and certificates. CC ID 04481 | Configuration | Preventive | |
Change the default password to Apple's Keychain. CC ID 04482 | Configuration | Preventive | |
Configure Apple's Keychain items to ask for the Keychain password. CC ID 04483 | Configuration | Preventive | |
Configure the Syskey Encryption Key and associated password. CC ID 05978 | Configuration | Preventive | |
Configure the "Accounts: Limit local account use of blank passwords to console logon only" setting. CC ID 04505 | Configuration | Preventive | |
Configure the "System cryptography: Force strong key protection for user keys stored in the computer" setting. CC ID 04534 | Configuration | Preventive | |
Configure interactive logon for accounts that do not have assigned authenticators in accordance with organizational standards. CC ID 05267 | Configuration | Preventive | |
Enable or disable remote connections from accounts with empty authenticators, as appropriate. CC ID 05269 | Configuration | Preventive | |
Configure the "Send LanMan compatible password" setting. CC ID 05271 | Configuration | Preventive | |
Configure the authenticator policy to ban or allow authenticators as words found in dictionaries, as appropriate. CC ID 05993 | Configuration | Preventive | |
Set the most number of characters required for the BitLocker Startup PIN correctly. CC ID 06054 | Configuration | Preventive | |
Set the default folder for BitLocker recovery passwords correctly. CC ID 06055 | Configuration | Preventive | |
Notify affected parties to keep authenticators confidential. CC ID 06787 | Behavior | Preventive | |
Discourage affected parties from recording authenticators. CC ID 06788 | Behavior | Preventive | |
Ensure the root account is the first entry in password files. CC ID 16323 | Data and Information Management | Detective | |
Configure the "shadow password for all accounts in /etc/passwd" setting to organizational standards. CC ID 08721 | Establish/Maintain Documentation | Preventive | |
Configure the "password hashing algorithm" setting to organizational standards. CC ID 08723 | Establish/Maintain Documentation | Preventive | |
Configure the "Disable password strength validation for Peer Grouping" setting to organizational standards. CC ID 10866 | Configuration | Preventive | |
Configure the "Set the interval between synchronization retries for Password Synchronization" setting to organizational standards. CC ID 11185 | Configuration | Preventive | |
Configure the "Set the number of synchronization retries for servers running Password Synchronization" setting to organizational standards. CC ID 11187 | Configuration | Preventive | |
Configure the "Turn off password security in Input Panel" setting to organizational standards. CC ID 11296 | Configuration | Preventive | |
Configure the "Turn on the Windows to NIS password synchronization for users that have been migrated to Active Directory" setting to organizational standards. CC ID 11355 | Configuration | Preventive | |
Configure the authenticator display screen to organizational standards. CC ID 13794 | Configuration | Preventive | |
Configure the authenticator field to disallow memorized secrets found in the memorized secret list. CC ID 13808 | Configuration | Preventive | |
Configure the authenticator display screen to display the memorized secret as an option. CC ID 13806 | Configuration | Preventive | |
Disseminate and communicate with the end user when a memorized secret entered into an authenticator field matches one found in the memorized secret list. CC ID 13807 | Communicate | Preventive | |
Configure the look-up secret authenticator to dispose of memorized secrets after their use. CC ID 13817 | Configuration | Corrective | |
Configure the memorized secret verifiers to refrain from allowing anonymous users to access memorized secret hints. CC ID 13823 | Configuration | Preventive | |
Configure the system to allow paste functionality for the authenticator field. CC ID 13819 | Configuration | Preventive | |
Configure the system to require successful authentication before an authenticator for a user account is changed. CC ID 13821 | Configuration | Preventive | |
Protect authenticators or authentication factors from unauthorized modification and disclosure. CC ID 15317 | Technical Security | Preventive | |
Obscure authentication information during the login process. CC ID 15316 | Configuration | Preventive | |
Change authenticators, as necessary. CC ID 15315 | Configuration | Preventive | |
Implement safeguards to protect authenticators from unauthorized access. CC ID 15310 | Technical Security | Preventive | |
Change all default authenticators. CC ID 15309 [{default password} {default account} Review whether management has the following: A process to change or disable default user accounts and passwords. App A Objective 6.20.e Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Configuration | Preventive | |
Configure each system's security alerts to organizational standards. CC ID 12113 | Technical Security | Preventive | |
Configure the system to issue a security alert when an administrator account is created. CC ID 12122 | Configuration | Preventive | |
Configure the system security parameters to prevent system misuse or information misappropriation. CC ID 00881 | Configuration | Preventive | |
Configure Hypertext Transfer Protocol headers in accordance with organizational standards. CC ID 16851 | Configuration | Preventive | |
Configure Hypertext Transfer Protocol security headers in accordance with organizational standards. CC ID 16488 | Configuration | Preventive | |
Configure "Enable Structured Exception Handling Overwrite Protection (SEHOP)" to organizational standards. CC ID 15385 | Configuration | Preventive | |
Configure Microsoft Attack Surface Reduction rules in accordance with organizational standards. CC ID 16478 | Configuration | Preventive | |
Configure "Remote host allows delegation of non-exportable credentials" to organizational standards. CC ID 15379 | Configuration | Preventive | |
Configure "Configure enhanced anti-spoofing" to organizational standards. CC ID 15376 | Configuration | Preventive | |
Configure "Block user from showing account details on sign-in" to organizational standards. CC ID 15374 | Configuration | Preventive | |
Configure "Configure Attack Surface Reduction rules" to organizational standards. CC ID 15370 | Configuration | Preventive | |
Configure "Turn on e-mail scanning" to organizational standards. CC ID 15361 | Configuration | Preventive | |
Configure "Prevent users and apps from accessing dangerous websites" to organizational standards. CC ID 15359 | Configuration | Preventive | |
Configure "Enumeration policy for external devices incompatible with Kernel DMA Protection" to organizational standards. CC ID 15352 | Configuration | Preventive | |
Configure "Prevent Internet Explorer security prompt for Windows Installer scripts" to organizational standards. CC ID 15351 | Configuration | Preventive | |
Store state information from applications and software separately. CC ID 14767 | Configuration | Preventive | |
Configure the "aufs storage" to organizational standards. CC ID 14461 | Configuration | Preventive | |
Configure the "AppArmor Profile" to organizational standards. CC ID 14496 | Configuration | Preventive | |
Configure the "device" argument to organizational standards. CC ID 14536 | Configuration | Preventive | |
Configure the "Docker" group ownership to organizational standards. CC ID 14495 | Configuration | Preventive | |
Configure the "Docker" user ownership to organizational standards. CC ID 14505 | Configuration | Preventive | |
Configure "Allow upload of User Activities" to organizational standards. CC ID 15338 | Configuration | Preventive | |
Configure the system to restrict Core dumps to a protected directory. CC ID 01513 | Configuration | Preventive | |
Configure the system to enable Stack protection. CC ID 01514 | Configuration | Preventive | |
Configure the system to restrict NFS client requests to privileged ports. CC ID 01515 | Configuration | Preventive | |
Configure the system to use better TCP Sequence Numbers. CC ID 01516 | Configuration | Preventive | |
Configure the system to a default secure level. CC ID 01519 | Configuration | Preventive | |
Configure the system to block users from viewing un-owned processes. CC ID 01520 | Configuration | Preventive | |
Configure the system to block users from viewing processes in other groups. CC ID 01521 | Configuration | Preventive | |
Add the "nosuid" option to /etc/rmmount.conf. CC ID 01532 | Configuration | Preventive | |
Configure the system to block non-privileged mountd requests. CC ID 01533 | Configuration | Preventive | |
Use host-based or Internet Protocol-based export lists for mountd. CC ID 06887 | Configuration | Preventive | |
Add the "nodev" option to the appropriate partitions in /etc/fstab. CC ID 01534 | Configuration | Preventive | |
Add the "nosuid" option and "nodev" option for removable storage media in the /etc/fstab file. CC ID 01535 | Configuration | Preventive | |
Configure the sticky bit on world-writable directories. CC ID 01540 | Configuration | Preventive | |
Verify system files are not world-writable. CC ID 01546 | Technical Security | Preventive | |
Verify backup directories containing patches are not accessible. CC ID 01547 | Technical Security | Preventive | |
Run hp_checkperms. CC ID 01548 | Configuration | Preventive | |
Run fix-modes. CC ID 01549 | Configuration | Preventive | |
Convert the system to "Trusted Mode", if possible. CC ID 01550 | Configuration | Preventive | |
Configure the sadmind service to a higher Security level. CC ID 01551 | Configuration | Preventive | |
Use host-based or Internet Protocol-based export lists for sadmind. CC ID 06886 | Configuration | Preventive | |
Find files and directories with extended attributes. CC ID 01552 | Technical Security | Detective | |
Configure all.rhosts files to be readable only by their owners. CC ID 01557 | Configuration | Preventive | |
Set the symlink /etc/hosts.equiv file to /dev/null. CC ID 01558 | Configuration | Preventive | |
Configure the default locking Screen saver timeout to a predetermined time period. CC ID 01570 | Configuration | Preventive | |
Configure the Security Center (Domain PCs only). CC ID 01967 | Configuration | Preventive | |
Configure the system to immediately protect the computer after the Screen saver is activated by setting the time before the Screen saver grace period expires to a predefined amount. CC ID 04276 | Configuration | Preventive | |
Configure the system to require a password before it unlocks the Screen saver software. CC ID 04443 | Configuration | Preventive | |
Enable the safe DLL search mode. CC ID 04273 | Configuration | Preventive | |
Configure the computer to stop generating 8.3 filename formats. CC ID 04274 | Configuration | Preventive | |
Configure the system to use certificate rules for software restriction policies. CC ID 04266 | Configuration | Preventive | |
Configure the "Do not allow drive redirection" setting. CC ID 04316 | Configuration | Preventive | |
Configure the "Turn off the 'Publish to Web' task for files and folders" setting. CC ID 04328 | Configuration | Preventive | |
Configure the "Turn off Internet download for Web publishing and online ordering wizards" setting. CC ID 04329 | Configuration | Preventive | |
Configure the "Turn off Search Companion content file updates" setting. CC ID 04331 | Configuration | Preventive | |
Configure the "Turn off printing over HTTP" setting. CC ID 04332 | Configuration | Preventive | |
Configure the "Turn off downloading of print drivers over HTTP" setting. CC ID 04333 | Configuration | Preventive | |
Configure the "Turn off Windows Update device driver searching" setting. CC ID 04334 | Configuration | Preventive | |
Configure the "Display Error Notification" setting to organizational standards. CC ID 04335 | Configuration | Preventive | |
Configure the "Turn off Windows error reporting" setting to organizational standards. CC ID 04336 | Configuration | Preventive | |
Configure the "Disable software update shell notifications on program launch" setting. CC ID 04339 | Configuration | Preventive | |
Configure the "Make proxy settings per-machine (rather than per-user)" setting. CC ID 04341 | Configuration | Preventive | |
Configure the "Security Zones: Do not allow users to add/delete sites" setting. CC ID 04342 | Configuration | Preventive | |
Configure the "Security Zones: Do not allow users to change policies" setting. CC ID 04343 | Configuration | Preventive | |
Configure the "Security Zones: Use only machine settings" setting. CC ID 04344 | Configuration | Preventive | |
Configure the "Allow software to run or install even if the signature is invalid" setting. CC ID 04346 | Configuration | Preventive | |
Configure the "internet explorer processes (scripted window security restrictions)" setting. CC ID 04350 | Configuration | Preventive | |
Configure the "internet explorer processes (zone elevation protection)" setting. CC ID 04351 | Configuration | Preventive | |
Configure the "Prevent access to registry editing tools" setting. CC ID 04355 | Configuration | Preventive | |
Configure the "Do not preserve zone information in file attachments" setting. CC ID 04357 | Configuration | Preventive | |
Configure the "Hide mechanisms to remove zone information" setting. CC ID 04358 | Configuration | Preventive | |
Configure the "Notify antivirus programs when opening attachments" setting. CC ID 04359 | Configuration | Preventive | |
Configure the "Configure Outlook Express" setting. CC ID 04360 | Configuration | Preventive | |
Configure the "Disable Changing Automatic Configuration settings" setting. CC ID 04361 | Configuration | Preventive | |
Configure the "Disable changing certificate settings" setting. CC ID 04362 | Configuration | Preventive | |
Configure the "Disable changing connection settings" setting. CC ID 04363 | Configuration | Preventive | |
Configure the "Disable changing proxy settings" setting. CC ID 04364 | Configuration | Preventive | |
Configure the "Turn on the auto-complete feature for user names and passwords on forms" setting. CC ID 04365 | Configuration | Preventive | |
Configure the NetWare bindery contexts. CC ID 04444 | Configuration | Preventive | |
Configure the NetWare console's SECURE.NCF settings. CC ID 04445 | Configuration | Preventive | |
Configure the CPU Hog Timeout setting. CC ID 04446 | Configuration | Preventive | |
Configure the "Check Equivalent to Me" setting. CC ID 04463 | Configuration | Preventive | |
Configure the /etc/sshd_config file. CC ID 04475 | Configuration | Preventive | |
Configure the .Mac preferences. CC ID 04484 | Configuration | Preventive | |
Configure the Fast User Switching setting. CC ID 04485 | Configuration | Preventive | |
Configure the Recent Items List (servers, applications, documents) setting. CC ID 04486 | Configuration | Preventive | |
Configure Apple's Dock preferences. CC ID 04487 | Configuration | Preventive | |
Configure the "ulimit" to organizational standards. CC ID 14499 | Configuration | Preventive | |
Configure the Energy Saver preferences. CC ID 04488 | Configuration | Preventive | |
Configure the local system search preferences to directories that do not contain restricted data or restricted information. CC ID 04492 | Configuration | Preventive | |
Digitally sign and encrypt e-mail, as necessary. CC ID 04493 | Technical Security | Preventive | |
Manage temporary files, as necessary. CC ID 04847 | Technical Security | Preventive | |
Configure the computer-wide, rather than per-user, use of Microsoft Spynet Reporting for Windows Defender properly. CC ID 05282 | Configuration | Preventive | |
Enable or disable the ability of users to perform interactive startups, as appropriate. CC ID 05283 | Configuration | Preventive | |
Set the /etc/passwd file's NIS file inclusions properly. CC ID 05284 | Configuration | Preventive | |
Configure the "Turn off Help Ratings" setting. CC ID 05285 | Configuration | Preventive | |
Configure the "Decoy Admin Account Not Disabled" policy properly. CC ID 05286 | Configuration | Preventive | |
Configure the "Additional restrictions for anonymous connections" policy properly. CC ID 05287 | Configuration | Preventive | |
Configure the "Anonymous access to the registry" policy properly. CC ID 05288 | Configuration | Preventive | |
Configure the File System Checker and Popups setting. CC ID 05289 | Configuration | Preventive | |
Configure the System File Checker setting. CC ID 05290 | Configuration | Preventive | |
Configure the System File Checker Progress Meter setting. CC ID 05291 | Configuration | Preventive | |
Configure the Protect Kernel object attributes properly. CC ID 05292 | Configuration | Preventive | |
Configure the "Deleted Cached Copies of Roaming Profiles" policy properly. CC ID 05293 | Configuration | Preventive | |
Verify that the X*.hosts file lists all authorized X-clients. CC ID 05294 | Configuration | Preventive | |
Verify all files are owned by an existing account and group. CC ID 05295 | Configuration | Preventive | |
Verify programs executed through the aliases file are owned by an appropriate user or group. CC ID 05296 | Configuration | Preventive | |
Verify programs executed through the aliases file are stored in a directory with an appropriate owner. CC ID 05297 | Configuration | Preventive | |
Verify the at directory is owned by an appropriate user or group. CC ID 05298 | Configuration | Preventive | |
Verify the at.allow file is owned by an appropriate user or group. CC ID 05299 | Configuration | Preventive | |
Verify the at.deny file is owned by an appropriate user or group. CC ID 05300 | Configuration | Preventive | |
Verify the crontab directories are owned by an appropriate user or group. CC ID 05302 | Configuration | Preventive | |
Verify the cron.allow file is owned by an appropriate user or group. CC ID 05303 | Configuration | Preventive | |
Verify the cron.deny file is owned by an appropriate user or group. CC ID 05304 | Configuration | Preventive | |
Verify crontab files are owned by an appropriate user or group. CC ID 05305 | Configuration | Preventive | |
Verify the /etc/resolv.conf file is owned by an appropriate user or group. CC ID 05306 | Configuration | Preventive | |
Verify the /etc/named.boot file is owned by an appropriate user or group. CC ID 05307 | Configuration | Preventive | |
Verify the /etc/named.conf file is owned by an appropriate user or group. CC ID 05308 | Configuration | Preventive | |
Verify the /var/named/chroot/etc/named.conf file is owned by an appropriate user or group. CC ID 05309 | Configuration | Preventive | |
Verify home directories are owned by an appropriate user or group. CC ID 05310 | Configuration | Preventive | |
Verify the inetd.conf file is owned by an appropriate user or group. CC ID 05311 | Configuration | Preventive | |
Verify /etc/exports are owned by an appropriate user or group. CC ID 05312 | Configuration | Preventive | |
Verify exported files and exported directories are owned by an appropriate user or group. CC ID 05313 | Configuration | Preventive | |
Restrict the exporting of files and directories, as necessary. CC ID 16315 | Technical Security | Preventive | |
Verify the /etc/services file is owned by an appropriate user or group. CC ID 05314 | Configuration | Preventive | |
Verify the /etc/notrouter file is owned by an appropriate user or group. CC ID 05315 | Configuration | Preventive | |
Verify the /etc/samba/smb.conf file is owned by an appropriate user or group. CC ID 05316 | Configuration | Preventive | |
Verify the smbpasswd file and smbpasswd executable are owned by an appropriate user or group. CC ID 05317 | Configuration | Preventive | |
Verify the aliases file is owned by an appropriate user or group. CC ID 05318 | Configuration | Preventive | |
Verify the log file configured to capture critical sendmail messages is owned by an appropriate user or group. CC ID 05319 | Log Management | Preventive | |
Verify Shell files are owned by an appropriate user or group. CC ID 05320 | Configuration | Preventive | |
Verify the snmpd.conf file is owned by an appropriate user or group. CC ID 05321 | Configuration | Preventive | |
Verify the /etc/syslog.conf file is owned by an appropriate user or group. CC ID 05322 | Configuration | Preventive | |
Verify the traceroute executable is owned by an appropriate user or group. CC ID 05323 | Configuration | Preventive | |
Verify the /usr/lib/sendmail file is owned by an appropriate user or group. CC ID 05324 | Technical Security | Preventive | |
Verify the /etc/passwd file is owned by an appropriate user or group. CC ID 05325 | Configuration | Preventive | |
Verify the /etc/shadow file is owned by an appropriate user or group. CC ID 05326 | Configuration | Preventive | |
Verify the /etc/security/audit/config file is owned by an appropriate user or group. CC ID 05327 | Configuration | Preventive | |
Verify the /etc/securit/audit/events file is owned by an appropriate user or group. CC ID 05328 | Configuration | Preventive | |
Verify the /etc/security/audit/objects file is owned by an appropriate user or group. CC ID 05329 | Configuration | Preventive | |
Verify the /usr/lib/trcload file is owned by an appropriate user or group. CC ID 05330 | Configuration | Preventive | |
Verify the /usr/lib/semutil file is owned by an appropriate user or group. CC ID 05331 | Configuration | Preventive | |
Verify system files are owned by an appropriate user or group. CC ID 05332 | Configuration | Preventive | |
Verify the default/skeleton dot files are owned by an appropriate user or group. CC ID 05333 | Configuration | Preventive | |
Verify the global initialization files are owned by an appropriate user or group. CC ID 05334 | Configuration | Preventive | |
Verify the /etc/rc.config.d/auditing file is owned by an appropriate user or group. CC ID 05335 | Configuration | Preventive | |
Verify the /etc/init.d file is owned by an appropriate user or group. CC ID 05336 | Configuration | Preventive | |
Verify the /etc/hosts.lpd file is owned by an appropriate user or group. CC ID 05337 | Configuration | Preventive | |
Verify the /etc/auto.master file is owned by an appropriate user or group. CC ID 05338 | Configuration | Preventive | |
Verify the /etc/auto.misc file is owned by an appropriate user or group. CC ID 05339 | Configuration | Preventive | |
Verify the /etc/auto.net file is owned by an appropriate user or group. CC ID 05340 | Configuration | Preventive | |
Verify the boot/grub/grub.conf file is owned by an appropriate user or group. CC ID 05341 | Configuration | Preventive | |
Verify the /etc/lilo.conf file is owned by an appropriate user or group. CC ID 05342 | Configuration | Preventive | |
Verify the /etc/login.access file is owned by an appropriate user or group. CC ID 05343 | Configuration | Preventive | |
Verify the /etc/security/access.conf file is owned by an appropriate user or group. CC ID 05344 | Configuration | Preventive | |
Verify the /etc/sysctl.conf file is owned by an appropriate user or group. CC ID 05345 | Configuration | Preventive | |
Configure the "secure_redirects" setting to organizational standards. CC ID 09941 | Configuration | Preventive | |
Configure the "icmp_ignore_bogus_error_responses" setting to organizational standards. CC ID 09942 | Configuration | Preventive | |
Configure the "rp_filter" setting to organizational standards. CC ID 09943 | Configuration | Preventive | |
Verify the /etc/securetty file is owned by an appropriate user or group. CC ID 05346 | Configuration | Preventive | |
Verify the /etc/audit/auditd.conf file is owned by an appropriate user or group. CC ID 05347 | Configuration | Preventive | |
Verify the audit.rules file is owned by an appropriate user or group. CC ID 05348 | Configuration | Preventive | |
Verify the /etc/group file is owned by an appropriate user or group. CC ID 05349 | Configuration | Preventive | |
Verify the /etc/gshadow file is owned by an appropriate user or group. CC ID 05350 | Configuration | Preventive | |
Verify the /usr/sbin/userhelper file is owned by an appropriate user or group. CC ID 05351 | Configuration | Preventive | |
Verify all syslog log files are owned by an appropriate user or group. CC ID 05352 | Configuration | Preventive | |
Verify the /etc/anacrontab file is owned by an appropriate user or group. CC ID 05353 | Configuration | Preventive | |
Verify the /etc/pki/tls/ldap file is owned by an appropriate user or group. CC ID 05354 | Configuration | Preventive | |
Verify the /etc/pki/tls/ldap/serverkey.pem file is owned by an appropriate user or group. CC ID 05355 | Configuration | Preventive | |
Verify the /etc/pki/tls/CA/cacert.pem file is owned by an appropriate user or group. CC ID 05356 | Configuration | Preventive | |
Verify the /etc/pki/tls/ldap/servercert.pem file is owned by an appropriate user or group. CC ID 05357 | Configuration | Preventive | |
Verify the var/lib/ldap/* files are owned by an appropriate user or group. CC ID 05358 | Configuration | Preventive | |
Verify the /etc/httpd/conf/* files are owned by an appropriate user or group. CC ID 05359 | Configuration | Preventive | |
Verify the /etc/auto_* file is owned by an appropriate user. CC ID 05360 | Configuration | Preventive | |
Verify the /etc/rmmount.conf file is owned by an appropriate user or group. CC ID 05361 | Configuration | Preventive | |
Verify the /var/log/pamlog log is owned by an appropriate user or group. CC ID 05362 | Configuration | Preventive | |
Verify the /etc/security/audit_control file is owned by an appropriate user or group. CC ID 05363 | Configuration | Preventive | |
Verify the /etc/security/audit_class file is owned by an appropriate user or group. CC ID 05364 | Configuration | Preventive | |
Verify the /etc/security/audit_event file is owned by an appropriate user or group. CC ID 05365 | Configuration | Preventive | |
Verify the ASET userlist file is owned by an appropriate user or group. CC ID 05366 | Configuration | Preventive | |
Verify the /var directory is owned by an appropriate user. CC ID 05367 | Configuration | Preventive | |
Verify the /var/log directory is owned by an appropriate user. CC ID 05368 | Configuration | Preventive | |
Verify the /var/adm directory is owned by an appropriate user. CC ID 05369 | Configuration | Preventive | |
Restrict the debug level daemon logging file owner and daemon debug group owner. CC ID 05370 | Configuration | Preventive | |
Restrict the Cron log file owner and Cron group owner. CC ID 05371 | Configuration | Preventive | |
Restrict the system accounting file owner and system accounting group owner. CC ID 05372 | Configuration | Preventive | |
Restrict audit log file ownership and audit group ownership. CC ID 05373 | Configuration | Preventive | |
Set the X server timeout properly. CC ID 05374 | Configuration | Preventive | |
Configure each user's authentication mechanism (system attribute) properly. CC ID 05375 | Configuration | Preventive | |
Enable or disable SeLinux, as appropriate. CC ID 05376 | Configuration | Preventive | |
Set the SELinux state properly. CC ID 05377 | Configuration | Preventive | |
Set the SELinux policy properly. CC ID 05378 | Configuration | Preventive | |
Configure Dovecot properly. CC ID 05379 | Configuration | Preventive | |
Configure the "Prohibit Access of the Windows Connect Now Wizards" setting. CC ID 05380 | Configuration | Preventive | |
Configure the "Allow remote access to the PnP interface" setting. CC ID 05381 | Configuration | Preventive | |
Configure the "Do not create system restore point when new device driver installed" setting. CC ID 05382 | Configuration | Preventive | |
Configure the "Turn Off Access to All Windows Update Feature" setting. CC ID 05383 | Configuration | Preventive | |
Configure the "Turn Off Automatic Root Certificates Update" setting. CC ID 05384 | Configuration | Preventive | |
Configure the "Turn Off Event Views 'Events.asp' Links" setting. CC ID 05385 | Configuration | Preventive | |
Configure "Turn Off Handwriting Recognition Error Reporting" to organizational standards. CC ID 05386 | Configuration | Preventive | |
Configure the "Turn off Help and Support Center 'Did You Know?' content" setting. CC ID 05387 | Configuration | Preventive | |
Configure the "Turn Off Help and Support Center Microsoft Knowledge Base Search" setting. CC ID 05388 | Configuration | Preventive | |
Configure the "Turn Off Internet File Association Service" setting. CC ID 05389 | Configuration | Preventive | |
Configure the "Turn Off Registration if URL Connection is Referring to Microsoft.com" setting. CC ID 05390 | Configuration | Preventive | |
Configure the "Turn off the 'Order Prints' Picture task" setting. CC ID 05391 | Configuration | Preventive | |
Configure the "Turn Off Windows Movie Maker Online Web Links" setting. CC ID 05392 | Configuration | Preventive | |
Configure the "Turn Off Windows Movie Maker Saving to Online Video Hosting Provider" setting. CC ID 05393 | Configuration | Preventive | |
Configure the "Don't Display the Getting Started Welcome Screen at Logon" setting. CC ID 05394 | Configuration | Preventive | |
Configure the "Turn off Windows Startup Sound" setting. CC ID 05395 | Configuration | Preventive | |
Configure the "Allow only Vista or later connections" setting. CC ID 05396 | Configuration | Preventive | |
Configure the "Turn on bandwidth optimization" setting. CC ID 05397 | Configuration | Preventive | |
Configure the "Prevent IIS Installation" setting. CC ID 05398 | Configuration | Preventive | |
Configure the "Turn off Active Help" setting. CC ID 05399 | Configuration | Preventive | |
Configure the "Turn off Untrusted Content" setting. CC ID 05400 | Configuration | Preventive | |
Configure the "Turn off downloading of enclosures" setting. CC ID 05401 | Configuration | Preventive | |
Configure "Allow indexing of encrypted files" to organizational standards. CC ID 05402 | Configuration | Preventive | |
Configure the "Prevent indexing uncached Exchange folders" setting. CC ID 05403 | Configuration | Preventive | |
Configure the "Turn off Windows Calendar" setting. CC ID 05404 | Configuration | Preventive | |
Configure the "Turn off Windows Defender" setting. CC ID 05405 | Configuration | Preventive | |
Configure the "Turn off Heap termination on corruption" setting to organizational standards. CC ID 05406 | Configuration | Preventive | |
Configure the "Turn off shell protocol protected mode" setting to organizational standards. CC ID 05407 | Configuration | Preventive | |
Configure the "Prohibit non-administrators from applying vendor signed updates" setting. CC ID 05408 | Configuration | Preventive | |
Configure the "Report when logon server was not available during user logon" setting. CC ID 05409 | Configuration | Preventive | |
Configure the "Turn off the communication features" setting. CC ID 05410 | Configuration | Preventive | |
Configure the "Turn off Windows Mail application" setting. CC ID 05411 | Configuration | Preventive | |
Configure the "Prevent Windows Media DRM Internet Access" setting. CC ID 05412 | Configuration | Preventive | |
Configure the "Turn off Windows Meeting Space" setting. CC ID 05413 | Configuration | Preventive | |
Configure the "Turn on Windows Meeting Space auditing" setting. CC ID 05414 | Configuration | Preventive | |
Configure the "Disable unpacking and installation of gadgets that are not digitally signed" setting. CC ID 05415 | Configuration | Preventive | |
Configure the "Override the More Gadgets Link" setting. CC ID 05416 | Configuration | Preventive | |
Configure the "Turn Off User Installed Windows Sidebar Gadgets" setting. CC ID 05417 | Configuration | Preventive | |
Configure the "Do not allow Digital Locker to run" setting. CC ID 05418 | Configuration | Preventive | |
Configure the "Turn off Downloading of Game Information" setting. CC ID 05419 | Configuration | Preventive | |
Configure "Turn on Responder (RSPNDR) driver" to organizational standards. CC ID 05420 | Configuration | Preventive | |
Verify ExecShield has been randomly placed in Virtual Memory regions. CC ID 05436 | Configuration | Preventive | |
Enable the ExecShield, as appropriate. CC ID 05421 | Configuration | Preventive | |
Configure Kernel support for the XD/NX processor feature, as appropriate. CC ID 05422 | Configuration | Preventive | |
Configure the XD/NX processor feature in the BIOS, as appropriate. CC ID 05423 | Configuration | Preventive | |
Configure the Shell for the bin account properly. CC ID 05424 | Configuration | Preventive | |
Configure the Shell for the nuucp account properly. CC ID 05425 | Configuration | Preventive | |
Configure the Shell for the smmsp account properly. CC ID 05426 | Configuration | Preventive | |
Configure the Shell for the listen account properly. CC ID 05427 | Configuration | Preventive | |
Configure the Shell for the gdm account properly. CC ID 05428 | Configuration | Preventive | |
Configure the Shell for the webservd account properly. CC ID 05429 | Configuration | Preventive | |
Configure the Shell for the nobody account properly. CC ID 05430 | Configuration | Preventive | |
Configure the Shell for the noaccess account properly. CC ID 05431 | Configuration | Preventive | |
Configure the Shell for the nobody4 account properly. CC ID 05432 | Configuration | Preventive | |
Configure the Shell for the adm account properly. CC ID 05433 | Configuration | Preventive | |
Configure the Shell for the lp account properly. CC ID 05434 | Configuration | Preventive | |
Configure the Shell for the uucp account properly. CC ID 05435 | Configuration | Preventive | |
Set the noexec_user_stack parameter properly. CC ID 05437 | Configuration | Preventive | |
Set the no_exec_user_stack_log parameter properly. CC ID 05438 | Configuration | Preventive | |
Set the noexec_user_stack flag on the user stack properly. CC ID 05439 | Configuration | Preventive | |
Set the TCP max connection limit properly. CC ID 05440 | Configuration | Preventive | |
Set the TCP abort interval properly. CC ID 05441 | Configuration | Preventive | |
Enable or disable the GNOME screenlock, as appropriate. CC ID 05442 | Configuration | Preventive | |
Set the ARP cache cleanup interval properly. CC ID 05443 | Configuration | Preventive | |
Set the ARP IRE scan rate properly. CC ID 05444 | Configuration | Preventive | |
Disable proxy ARP on all interfaces. CC ID 06570 | Configuration | Preventive | |
Set the FileSpaceSwitch variable to an appropriate value. CC ID 05445 | Configuration | Preventive | |
Set the wakeup switchpoint frequency to an appropriate time interval. CC ID 05446 | Configuration | Preventive | |
Enable or disable the setuid option on removable storage media, as appropriate. CC ID 05447 | Configuration | Preventive | |
Configure TCP/IP PMTU Discovery, as appropriate. CC ID 05991 | Configuration | Preventive | |
Configure Secure Shell to enable or disable empty passwords, as appropriate. CC ID 06016 | Configuration | Preventive | |
Configure each user's Screen Saver Executable Name. CC ID 06027 | Configuration | Preventive | |
Configure the NIS+ server to operate at an appropriate security level. CC ID 06038 | Configuration | Preventive | |
Configure the "restrict guest access to system log" policy, as appropriate. CC ID 06047 | Configuration | Preventive | |
Configure the "Block saving of Open XML file types" setting, as appropriate. CC ID 06048 | Configuration | Preventive | |
Enable or disable user-initiated system crashes via the CTRL+SCROLL LOCK+SCROLL LOCK sequence for keyboards. CC ID 06051 | Configuration | Preventive | |
Configure the "Syskey mode" to organizational standards. CC ID 06052 | Configuration | Preventive | |
Configure the Trusted Platform Module (TPM) platform validation profile, as appropriate. CC ID 06056 | Configuration | Preventive | |
Configure the "Allow Remote Shell Access" setting, as appropriate. CC ID 06057 | Configuration | Preventive | |
Configure the "Prevent the computer from joining a homegroup" setting, as appropriate. CC ID 06058 | Configuration | Preventive | |
Enable or disable the authenticator requirement after waking, as appropriate. CC ID 06059 | Configuration | Preventive | |
Enable or disable the standby states, as appropriate. CC ID 06060 | Configuration | Preventive | |
Configure the Trusted Platform Module startup options properly. CC ID 06061 | Configuration | Preventive | |
Configure the system to purge Policy Caches. CC ID 06569 | Configuration | Preventive | |
Separate authenticator files and application system data on different file systems. CC ID 06790 | Configuration | Preventive | |
Configure Application Programming Interfaces to limit or shut down interactivity based upon a rate limit. CC ID 06811 | Configuration | Preventive | |
Configure the "all world-writable directories" user ownership to organizational standards. CC ID 08714 | Establish/Maintain Documentation | Preventive | |
Configure the "all rsyslog log" files group ownership to organizational standards. CC ID 08715 | Establish/Maintain Documentation | Preventive | |
Configure the "all rsyslog log" files user ownership to organizational standards. CC ID 08716 | Establish/Maintain Documentation | Preventive | |
Configure the "Executable stack" setting to organizational standards. CC ID 08969 | Configuration | Preventive | |
Configure the "smbpasswd executable" user ownership to organizational standards. CC ID 08975 | Configuration | Preventive | |
Configure the "traceroute executable" group ownership to organizational standards. CC ID 08980 | Configuration | Preventive | |
Configure the "traceroute executable" user ownership to organizational standards. CC ID 08981 | Configuration | Preventive | |
Configure the "Apache configuration" directory group ownership to organizational standards. CC ID 08991 | Configuration | Preventive | |
Configure the "Apache configuration" directory user ownership to organizational standards. CC ID 08992 | Configuration | Preventive | |
Configure the "/var/log/httpd/" file group ownership to organizational standards. CC ID 09027 | Configuration | Preventive | |
Configure the "/etc/httpd/conf.d" file group ownership to organizational standards. CC ID 09028 | Configuration | Preventive | |
Configure the "/etc/httpd/conf/passwd" file group ownership to organizational standards. CC ID 09029 | Configuration | Preventive | |
Configure the "/usr/sbin/apachectl" file group ownership to organizational standards. CC ID 09030 | Configuration | Preventive | |
Configure the "/usr/sbin/httpd" file group ownership to organizational standards. CC ID 09031 | Configuration | Preventive | |
Configure the "/var/www/html" file group ownership to organizational standards. CC ID 09032 | Configuration | Preventive | |
Configure the "log files" the "/var/log/httpd/" directory user ownership to organizational standards. CC ID 09034 | Configuration | Preventive | |
Configure the "/etc/httpd/conf.d" file ownership to organizational standards. CC ID 09035 | Configuration | Preventive | |
Configure the "/etc/httpd/conf/passwd" file ownership to organizational standards. CC ID 09036 | Configuration | Preventive | |
Configure the "/usr/sbin/apachectl" file ownership to organizational standards. CC ID 09037 | Configuration | Preventive | |
Configure the "/usr/sbin/httpd" file ownership to organizational standards. CC ID 09038 | Configuration | Preventive | |
Configure the "/var/www/html" file ownership to organizational standards. CC ID 09039 | Configuration | Preventive | |
Configure the "httpd.conf" file user ownership to organizational standards. CC ID 09055 | Configuration | Preventive | |
Configure the "httpd.conf" group ownership to organizational standards. CC ID 09056 | Configuration | Preventive | |
Configure the "htpasswd" file user ownership to organizational standards. CC ID 09058 | Configuration | Preventive | |
Configure the "htpasswd" file group ownership to organizational standards. CC ID 09059 | Configuration | Preventive | |
Configure the "files specified by CustomLog" user ownership to organizational standards. CC ID 09074 | Configuration | Preventive | |
Configure the "files specified by CustomLog" group ownership to organizational standards. CC ID 09075 | Configuration | Preventive | |
Configure the "files specified by ErrorLog" user ownership to organizational standards. CC ID 09076 | Configuration | Preventive | |
Configure the "files specified by ErrorLog" group ownership to organizational standards. CC ID 09077 | Configuration | Preventive | |
Configure the "directories specified by ScriptAlias" user ownership to organizational standards. CC ID 09079 | Configuration | Preventive | |
Configure the "directories specified by ScriptAlias" group ownership to organizational standards. CC ID 09080 | Configuration | Preventive | |
Configure the "directories specified by ScriptAliasMatch" user ownership to organizational standards. CC ID 09082 | Configuration | Preventive | |
Configure the "directories specified by ScriptAliasMatch" group ownership to organizational standards. CC ID 09083 | Configuration | Preventive | |
Configure the "directories specified by DocumentRoot" user ownership to organizational standards. CC ID 09085 | Configuration | Preventive | |
Configure the "directories specified by DocumentRoot" group ownership to organizational standards. CC ID 09086 | Configuration | Preventive | |
Configure the "directories specified by Alias" user ownership to organizational standards. CC ID 09088 | Configuration | Preventive | |
Configure the "directories specified by Alias" group ownership to organizational standards. CC ID 09089 | Configuration | Preventive | |
Configure the "directories specified by ServerRoot" user ownership to organizational standards. CC ID 09091 | Configuration | Preventive | |
Configure the "directories specified by ServerRoot" group ownership to organizational standards. CC ID 09092 | Configuration | Preventive | |
Configure the "apache /bin" directory user ownership to organizational standards. CC ID 09094 | Configuration | Preventive | |
Configure the "apache /bin" directory group ownership to organizational standards. CC ID 09095 | Configuration | Preventive | |
Configure the "apache /logs" directory user ownership to organizational standards. CC ID 09097 | Configuration | Preventive | |
Configure the "apache /logs" directory group ownership to organizational standards. CC ID 09098 | Configuration | Preventive | |
Configure the "apache /htdocs" directory user ownership to organizational standards. CC ID 09100 | Configuration | Preventive | |
Configure the "apache /htdocs" directory group ownership to organizational standards. CC ID 09101 | Configuration | Preventive | |
Configure the "apache /cgi-bin" directory group ownership to organizational standards. CC ID 09104 | Configuration | Preventive | |
Configure the "User-specific directories" setting to organizational standards. CC ID 09123 | Configuration | Preventive | |
Configure the "apache process ID" file user ownership to organizational standards. CC ID 09125 | Configuration | Preventive | |
Configure the "apache process ID" file group ownership to organizational standards. CC ID 09126 | Configuration | Preventive | |
Configure the "apache scoreboard" file user ownership to organizational standards. CC ID 09128 | Configuration | Preventive | |
Configure the "apache scoreboard" file group ownership to organizational standards. CC ID 09129 | Configuration | Preventive | |
Configure the "Ownership of the asymmetric keys" setting to organizational standards. CC ID 09289 | Configuration | Preventive | |
Configure the "SQLServer2005ReportServerUser" registry key permissions to organizational standards. CC ID 09326 | Configuration | Preventive | |
Configure the "SQLServerADHelperUser" registry key permissions to organizational standards. CC ID 09329 | Configuration | Preventive | |
Configure the "Tomcat home" directory user ownership to organizational standards. CC ID 09772 | Configuration | Preventive | |
Configure the "group" setting for the "Tomcat installation" to organizational standards. CC ID 09773 | Configuration | Preventive | |
Configure the "tomcat conf/" directory user ownership to organizational standards. CC ID 09774 | Configuration | Preventive | |
Configure the "tomcat conf/" directory group ownership to organizational standards. CC ID 09775 | Configuration | Preventive | |
Configure the "tomcat-users.xml" file user ownership to organizational standards. CC ID 09776 | Configuration | Preventive | |
Configure the "tomcat-users.xml" file group ownership to organizational standards. CC ID 09777 | Configuration | Preventive | |
Configure the "group membership" setting for "Tomcat" to organizational standards. CC ID 09793 | Configuration | Preventive | |
Configure the "Tomcat home" directory group ownership to organizational standards. CC ID 09798 | Configuration | Preventive | |
Configure the "Tomcat home/conf/" directory user ownership to organizational standards. CC ID 09800 | Configuration | Preventive | |
Configure the "Tomcat home/conf/" directory group ownership to organizational standards. CC ID 09801 | Configuration | Preventive | |
Configure the "system" files permissions to organizational standards. CC ID 09922 | Configuration | Preventive | |
Configure the "size limit" setting for the "application log" to organizational standards. CC ID 10063 | Configuration | Preventive | |
Configure the "restrict guest access to security log" setting to organizational standards. CC ID 10064 | Configuration | Preventive | |
Configure the "size limit" setting for the "system log" to organizational standards. CC ID 10065 | Configuration | Preventive | |
Configure the "Automatic Update service" setting to organizational standards. CC ID 10066 | Configuration | Preventive | |
Configure the "Safe DLL Search Mode" setting to organizational standards. CC ID 10067 | Configuration | Preventive | |
Configure the "screensaver" setting to organizational standards. CC ID 10068 | Configuration | Preventive | |
Configure the "screensaver" setting for the "default" user to organizational standards. CC ID 10069 | Configuration | Preventive | |
Configure the "Enable User Control Over Installs" setting to organizational standards. CC ID 10070 | Configuration | Preventive | |
Configure the "Enable User to Browser for Source While Elevated" setting to organizational standards. CC ID 10071 | Configuration | Preventive | |
Configure the "Enable User to Use Media Source While Elevated" setting to organizational standards. CC ID 10072 | Configuration | Preventive | |
Configure the "Allow Administrator to Install from Terminal Services Session" setting to organizational standards. CC ID 10073 | Configuration | Preventive | |
Configure the "Enable User to Patch Elevated Products" setting to organizational standards. CC ID 10074 | Configuration | Preventive | |
Configure the "Cache Transforms in Secure Location" setting to organizational standards. CC ID 10075 | Configuration | Preventive | |
Configure the "Disable Media Player for automatic updates" setting to organizational standards. CC ID 10076 | Configuration | Preventive | |
Configure the "Internet access for Windows Messenger" setting to organizational standards. CC ID 10077 | Configuration | Preventive | |
Configure the "Do Not Automatically Start Windows Messenger" setting to organizational standards. CC ID 10078 | Configuration | Preventive | |
Configure the "Hide Property Pages" setting for the "task scheduler" to organizational standards. CC ID 10079 | Configuration | Preventive | |
Configure the "Prohibit New Task Creation" setting for the "task scheduler" to organizational standards. CC ID 10080 | Configuration | Preventive | |
Configure "Set time limit for disconnected sessions" to organizational standards. CC ID 10081 | Configuration | Preventive | |
Configure the "Set time limit for idle sessions" setting to organizational standards. CC ID 10082 | Configuration | Preventive | |
Configure the "Enable Keep-Alive Messages" setting to organizational standards. CC ID 10083 | Configuration | Preventive | |
Configure the "Automatic Updates detection frequency" setting to organizational standards. CC ID 10084 | Configuration | Preventive | |
Configure the "TCPMaxPortsExhausted" setting to organizational standards. CC ID 10085 | Configuration | Preventive | |
Configure the "built-in Administrator" account to organizational standards. CC ID 10086 | Configuration | Preventive | |
Configure the "Prevent System Maintenance of Computer Account Password" setting to organizational standards. CC ID 10087 | Configuration | Preventive | |
Configure the "Digitally Sign Client Communication (When Possible)" setting to organizational standards. CC ID 10088 | Configuration | Preventive | |
Configure the "number of SYN-ACK retransmissions sent when attempting to respond to a SYN request" setting to organizational standards. CC ID 10089 | Configuration | Preventive | |
Configure the "warning level" setting for the "audit log" to organizational standards. CC ID 10090 | Configuration | Preventive | |
Configure the "Change Password" setting for the "Ctrl+Alt+Del dialog" to organizational standards. CC ID 10091 | Configuration | Preventive | |
Configure the "account description" setting for the "built-in Administrator" account to organizational standards. CC ID 10092 | Configuration | Preventive | |
Configure the "Decoy Admin Account Not Disabled" setting to organizational standards. CC ID 10201 | Configuration | Preventive | |
Configure the "when maximum log size is reached" setting for the "Application log" to organizational standards. CC ID 10202 | Configuration | Preventive | |
Configure the "password filtering DLL" setting to organizational standards. CC ID 10203 | Configuration | Preventive | |
Configure the "Anonymous access to the registry" setting to organizational standards. CC ID 10204 | Configuration | Preventive | |
Configure the "Automatic Execution" setting for the "System Debugger" to organizational standards. CC ID 10205 | Configuration | Preventive | |
Configure the "CD-ROM Autorun" setting to organizational standards. CC ID 10206 | Configuration | Preventive | |
Configure the "ResetBrowser Frames" setting to organizational standards. CC ID 10207 | Configuration | Preventive | |
Configure the "Dr. Watson Crash Dumps" setting to organizational standards. CC ID 10208 | Configuration | Preventive | |
Configure the "File System Checker and Popups" setting to organizational standards. CC ID 10209 | Configuration | Preventive | |
Configure the "System File Checker" setting to organizational standards. CC ID 10210 | Configuration | Preventive | |
Configure the "System File Checker Progress Meter" setting to organizational standards. CC ID 10211 | Configuration | Preventive | |
Configure the "number of TCP/IP Maximum Half-open Sockets" setting to organizational standards. CC ID 10212 | Configuration | Preventive | |
Configure the "number of TCP/IP Maximum Retried Half-open Sockets" setting to organizational standards. CC ID 10213 | Configuration | Preventive | |
Configure the "Protect Kernel object attributes" setting to organizational standards. CC ID 10214 | Configuration | Preventive | |
Configure the "Unsigned Non-Driver Installation Behavior" setting to organizational standards. CC ID 10215 | Configuration | Preventive | |
Configure the "Automatically Log Off Users When Logon Time Expires (local)" setting to organizational standards. CC ID 10216 | Configuration | Preventive | |
Configure the "Local volumes" setting to organizational standards. CC ID 10217 | Configuration | Preventive | |
Configure the "Unused USB Ports" setting to organizational standards. CC ID 10218 | Configuration | Preventive | |
Configure the "Set Safe for Scripting" setting to organizational standards. CC ID 10219 | Configuration | Preventive | |
Configure the "Use of the Recycle Bin on file deletion" setting to organizational standards. CC ID 10220 | Configuration | Preventive | |
Configure the "Membership in the Power Users group" setting to organizational standards. CC ID 10224 | Configuration | Preventive | |
Configure the "AutoBackupLogFiles" setting for the "security log" to organizational standards. CC ID 10225 | Configuration | Preventive | |
Configure the "AutoBackupLogFiles" setting for the "application log" to organizational standards. CC ID 10226 | Configuration | Preventive | |
Configure the "AutoBackupLogFiles" setting for the "system log" to organizational standards. CC ID 10227 | Configuration | Preventive | |
Configure the "Syskey Encryption Key location and password method" setting to organizational standards. CC ID 10228 | Configuration | Preventive | |
Configure the "Os2LibPath environmental variable" setting to organizational standards. CC ID 10229 | Configuration | Preventive | |
Configure the "path to the Microsoft OS/2 version 1.x library" setting to organizational standards. CC ID 10230 | Configuration | Preventive | |
Configure the "location of the OS/2 subsystem" setting to organizational standards. CC ID 10231 | Configuration | Preventive | |
Configure the "location of the POSIX subsystem" setting to organizational standards. CC ID 10232 | Configuration | Preventive | |
Configure the "path to the debugger used for Just-In-Time debugging" setting to organizational standards. CC ID 10234 | Configuration | Preventive | |
Configure the "Distributed Component Object Model (DCOM)" setting to organizational standards. CC ID 10235 | Configuration | Preventive | |
Configure the "The "encryption algorithm" setting for "EFS"" setting to organizational standards. CC ID 10236 | Configuration | Preventive | |
Configure the "Interix Subsystem Startup service startup type" setting to organizational standards. CC ID 10238 | Configuration | Preventive | |
Configure the "Services for Unix Perl Socket service startup type" setting to organizational standards. CC ID 10247 | Configuration | Preventive | |
Configure the "Services for Unix Windows Cron service startup type" setting to organizational standards. CC ID 10248 | Configuration | Preventive | |
Configure the "fDisableCdm" setting to organizational standards. CC ID 10259 | Configuration | Preventive | |
Configure the "fDisableClip" setting to organizational standards. CC ID 10260 | Configuration | Preventive | |
Configure the "Inheritance of the shadow setting" setting to organizational standards. CC ID 10261 | Configuration | Preventive | |
Configure the "remote control configuration" setting to organizational standards. CC ID 10262 | Configuration | Preventive | |
Configure the "fDisableCam" setting to organizational standards. CC ID 10263 | Configuration | Preventive | |
Configure the "fDisableCcm" setting to organizational standards. CC ID 10264 | Configuration | Preventive | |
Configure the "fDisableLPT" setting to organizational standards. CC ID 10265 | Configuration | Preventive | |
Configure the "ActiveX installation policy for sites in Trusted zones" setting to organizational standards. CC ID 10691 | Configuration | Preventive | |
Configure the "Add the Administrators security group to roaming user profiles" setting to organizational standards. CC ID 10694 | Configuration | Preventive | |
Configure the "Administratively assigned offline files" setting to organizational standards. CC ID 10695 | Configuration | Preventive | |
Configure the "Apply policy to removable media" setting to organizational standards. CC ID 10756 | Configuration | Preventive | |
Configure the "Baseline file cache maximum size" setting to organizational standards. CC ID 10763 | Configuration | Preventive | |
Configure the "Check for New Signatures Before Scheduled Scans" setting to organizational standards. CC ID 10770 | Configuration | Preventive | |
Configure the "Check published state" setting to organizational standards. CC ID 10771 | Configuration | Preventive | |
Configure the "Communities" setting to organizational standards. CC ID 10772 | Configuration | Preventive | |
Configure the "Computer location" setting to organizational standards. CC ID 10773 | Configuration | Preventive | |
Configure the "Background Sync" setting to organizational standards. CC ID 10775 | Configuration | Preventive | |
Configure the "Corporate Windows Error Reporting" setting to organizational standards. CC ID 10777 | Configuration | Preventive | |
Configure the "Corrupted File Recovery Behavior" setting to organizational standards. CC ID 10778 | Configuration | Preventive | |
Configure the "Default consent" setting to organizational standards. CC ID 10780 | Configuration | Preventive | |
Configure the "list of IEEE 1667 silos usable on your computer" setting to organizational standards. CC ID 10792 | Configuration | Preventive | |
Configure the "Microsoft SpyNet Reporting" setting to organizational standards. CC ID 10794 | Configuration | Preventive | |
Configure the "MSI Corrupted File Recovery Behavior" setting to organizational standards. CC ID 10795 | Configuration | Preventive | |
Configure the "Reliability WMI Providers" setting to organizational standards. CC ID 10804 | Configuration | Preventive | |
Configure the "Report Archive" setting to organizational standards. CC ID 10805 | Configuration | Preventive | |
Configure the "Report Queue" setting to organizational standards. CC ID 10806 | Configuration | Preventive | |
Configure the "root certificate clean up" setting to organizational standards. CC ID 10807 | Configuration | Preventive | |
Configure the "Security Policy for Scripted Diagnostics" setting to organizational standards. CC ID 10816 | Configuration | Preventive | |
Configure the "list of blocked TPM commands" setting to organizational standards. CC ID 10822 | Configuration | Preventive | |
Configure the "refresh interval for Server Manager" setting to organizational standards. CC ID 10823 | Configuration | Preventive | |
Configure the "server address, refresh interval, and issuer certificate authority of a target Subscription Manager" setting to organizational standards. CC ID 10824 | Configuration | Preventive | |
Configure the "Customize consent settings" setting to organizational standards. CC ID 10837 | Configuration | Preventive | |
Configure the "Default behavior for AutoRun" setting to organizational standards. CC ID 10839 | Configuration | Preventive | |
Configure the "Define Activation Security Check exemptions" setting to organizational standards. CC ID 10841 | Configuration | Preventive | |
Configure the "Define host name-to-Kerberos realm mappings" setting to organizational standards. CC ID 10842 | Configuration | Preventive | |
Configure the "Define interoperable Kerberos V5 realm settings" setting to organizational standards. CC ID 10843 | Configuration | Preventive | |
Configure the "Delay Restart for scheduled installations" setting to organizational standards. CC ID 10844 | Configuration | Preventive | |
Configure the "Delete cached copies of roaming profiles" setting to organizational standards. CC ID 10845 | Configuration | Preventive | |
Configure the "Delete user profiles older than a specified number of days on system restart" setting to organizational standards. CC ID 10847 | Configuration | Preventive | |
Configure the "Diagnostics: Configure scenario retention" setting to organizational standards. CC ID 10857 | Configuration | Preventive | |
Configure the "Directory pruning interval" setting to organizational standards. CC ID 10858 | Configuration | Preventive | |
Configure the "Directory pruning priority" setting to organizational standards. CC ID 10859 | Configuration | Preventive | |
Configure the "Directory pruning retry" setting to organizational standards. CC ID 10860 | Configuration | Preventive | |
Configure the "Disk Diagnostic: Configure custom alert text" setting to organizational standards. CC ID 10882 | Configuration | Preventive | |
Configure the "Display Shutdown Event Tracker" setting to organizational standards. CC ID 10888 | Configuration | Preventive | |
Configure the "Display string when smart card is blocked" setting to organizational standards. CC ID 10889 | Configuration | Preventive | |
Configure the "Do not automatically encrypt files moved to encrypted folders" setting to organizational standards. CC ID 10924 | Configuration | Preventive | |
Configure the "Do not check for user ownership of Roaming Profile Folders" setting to organizational standards. CC ID 10925 | Configuration | Preventive | |
Configure the "Do not process incoming mailslot messages used for domain controller location based on NetBIOS domain names" setting to organizational standards. CC ID 10932 | Configuration | Preventive | |
Configure the "Do not send additional data" machine setting should be configured correctly. to organizational standards. CC ID 10934 | Configuration | Preventive | |
Configure the "Domain Controller Address Type Returned" setting to organizational standards. CC ID 10939 | Configuration | Preventive | |
Configure the "Domain Location Determination URL" setting to organizational standards. CC ID 10940 | Configuration | Preventive | |
Configure the "Don't set the always do this checkbox" setting to organizational standards. CC ID 10941 | Configuration | Preventive | |
Configure the "Download missing COM components" setting to organizational standards. CC ID 10942 | Configuration | Preventive | |
Configure the "Dynamic Update" setting to organizational standards. CC ID 10944 | Configuration | Preventive | |
Configure the "Enable client-side targeting" setting to organizational standards. CC ID 10946 | Configuration | Preventive | |
Configure the "Enable NTFS pagefile encryption" setting to organizational standards. CC ID 10948 | Configuration | Preventive | |
Configure the "Enable Persistent Time Stamp" setting to organizational standards. CC ID 10949 | Configuration | Preventive | |
Configure the "Enable Transparent Caching" setting to organizational standards. CC ID 10950 | Configuration | Preventive | |
Configure the "Enable Windows NTP Client" setting to organizational standards. CC ID 10951 | Configuration | Preventive | |
Configure the "Enable Windows NTP Server" setting to organizational standards. CC ID 10952 | Configuration | Preventive | |
Configure the "Encrypt the Offline Files cache" setting to organizational standards. CC ID 10955 | Configuration | Preventive | |
Configure the "Enforce upgrade component rules" setting to organizational standards. CC ID 10958 | Configuration | Preventive | |
Configure the "Events.asp program" setting to organizational standards. CC ID 10959 | Configuration | Preventive | |
Configure the "Events.asp program command line parameters" setting to organizational standards. CC ID 10960 | Configuration | Preventive | |
Configure the "Events.asp URL" setting to organizational standards. CC ID 10961 | Configuration | Preventive | |
Configure the "Exclude credential providers" setting to organizational standards. CC ID 10962 | Configuration | Preventive | |
Configure the "Exclude files from being cached" setting to organizational standards. CC ID 10963 | Configuration | Preventive | |
Configure the "Final DC Discovery Retry Setting for Background Callers" setting to organizational standards. CC ID 10968 | Configuration | Preventive | |
Configure the "For tablet pen input, don't show the Input Panel icon" setting to organizational standards. CC ID 10973 | Configuration | Preventive | |
Configure the "For touch input, don't show the Input Panel icon" setting to organizational standards. CC ID 10974 | Configuration | Preventive | |
Configure the "Force Rediscovery Interval" setting to organizational standards. CC ID 10975 | Configuration | Preventive | |
Configure the "Force selected system UI language to overwrite the user UI language" setting to organizational standards. CC ID 10976 | Configuration | Preventive | |
Configure the "Force the reading of all certificates from the smart card" setting to organizational standards. CC ID 10977 | Configuration | Preventive | |
Configure the "ForwarderResourceUsage" setting to organizational standards. CC ID 10978 | Configuration | Preventive | |
Configure the "Global Configuration Settings" setting to organizational standards. CC ID 10979 | Configuration | Preventive | |
Configure the "Hash Publication for BranchCache" setting to organizational standards. CC ID 10986 | Configuration | Preventive | |
Configure the "Hide entry points for Fast User Switching" setting to organizational standards. CC ID 10987 | Configuration | Preventive | |
Configure the "Hide notifications about RD Licensing problems that affect the RD Session Host server" setting to organizational standards. CC ID 10988 | Configuration | Preventive | |
Configure the "Hide previous versions list for local files" setting to organizational standards. CC ID 10989 | Configuration | Preventive | |
Configure the "Hide previous versions of files on backup location" setting to organizational standards. CC ID 10991 | Configuration | Preventive | |
Configure the "Ignore custom consent settings" setting to organizational standards. CC ID 10992 | Configuration | Preventive | |
Configure the "Ignore Delegation Failure" setting to organizational standards. CC ID 10993 | Configuration | Preventive | |
Configure the "Ignore the default list of blocked TPM commands" setting to organizational standards. CC ID 10994 | Configuration | Preventive | |
Configure the "Ignore the local list of blocked TPM commands" setting to organizational standards. CC ID 10995 | Configuration | Preventive | |
Configure the "Include rarely used Chinese, Kanji, or Hanja characters" setting to organizational standards. CC ID 10996 | Configuration | Preventive | |
Configure the "Initial DC Discovery Retry Setting for Background Callers" setting to organizational standards. CC ID 10997 | Configuration | Preventive | |
Configure the "IP-HTTPS State" setting to organizational standards. CC ID 11000 | Configuration | Preventive | |
Configure the "ISATAP Router Name" setting to organizational standards. CC ID 11001 | Configuration | Preventive | |
Configure the "ISATAP State" setting to organizational standards. CC ID 11002 | Configuration | Preventive | |
Configure the "License server security group" setting to organizational standards. CC ID 11005 | Configuration | Preventive | |
Configure the "List of applications to be excluded" setting to organizational standards. CC ID 11023 | Configuration | Preventive | |
Configure the "Lock Enhanced Storage when the computer is locked" setting to organizational standards. CC ID 11025 | Configuration | Preventive | |
Configure the "Make Parental Controls control panel visible on a Domain" setting to organizational standards. CC ID 11039 | Configuration | Preventive | |
Configure the "MaxConcurrentUsers" setting to organizational standards. CC ID 11040 | Configuration | Preventive | |
Configure the "Maximum DC Discovery Retry Interval Setting for Background Callers" setting to organizational standards. CC ID 11041 | Configuration | Preventive | |
Configure the "Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with Support Provider" setting to organizational standards. CC ID 11045 | Configuration | Preventive | |
Configure the "Negative DC Discovery Cache Setting" setting to organizational standards. CC ID 11047 | Configuration | Preventive | |
Configure the "Non-conforming packets" setting to organizational standards. CC ID 11053 | Configuration | Preventive | |
Configure the "Notify blocked drivers" setting to organizational standards. CC ID 11054 | Configuration | Preventive | |
Configure the "Notify user of successful smart card driver installation" setting to organizational standards. CC ID 11055 | Configuration | Preventive | |
Configure the "Permitted Managers" setting to organizational standards. CC ID 11062 | Configuration | Preventive | |
Configure the "Positive Periodic DC Cache Refresh for Background Callers" setting to organizational standards. CC ID 11063 | Configuration | Preventive | |
Configure the "Positive Periodic DC Cache Refresh for Non-Background Callers" setting to organizational standards. CC ID 11064 | Configuration | Preventive | |
Configure the "Prioritize all digitally signed drivers equally during the driver ranking and selection process" setting to organizational standards. CC ID 11098 | Configuration | Preventive | |
Configure the "Prompt for credentials on the client computer" setting to organizational standards. CC ID 11108 | Configuration | Preventive | |
Configure the "Propagation of extended error information" setting to organizational standards. CC ID 11110 | Configuration | Preventive | |
Configure the "Register PTR Records" setting to organizational standards. CC ID 11121 | Configuration | Preventive | |
Configure the "Registration Refresh Interval" setting to organizational standards. CC ID 11122 | Configuration | Preventive | |
Configure the "Remove Program Compatibility Property Page" setting to organizational standards. CC ID 11128 | Configuration | Preventive | |
Configure the "Remove users ability to invoke machine policy refresh" setting to organizational standards. CC ID 11129 | Configuration | Preventive | |
Configure the "Remove Windows Security item from Start menu" setting to organizational standards. CC ID 11130 | Configuration | Preventive | |
Configure the "Re-prompt for restart with scheduled installations" setting to organizational standards. CC ID 11131 | Configuration | Preventive | |
Configure the "Require secure RPC communication" setting to organizational standards. CC ID 11134 | Configuration | Preventive | |
Configure the "Require strict KDC validation" setting to organizational standards. CC ID 11135 | Configuration | Preventive | |
Configure the "Reverse the subject name stored in a certificate when displaying" setting to organizational standards. CC ID 11148 | Configuration | Preventive | |
Configure the "RPC Troubleshooting State Information" setting to organizational standards. CC ID 11150 | Configuration | Preventive | |
Configure the "Run shutdown scripts visible" setting to organizational standards. CC ID 11152 | Configuration | Preventive | |
Configure the "Run startup scripts asynchronously" setting to organizational standards. CC ID 11153 | Configuration | Preventive | |
Configure the "Run startup scripts visible" setting to organizational standards. CC ID 11154 | Configuration | Preventive | |
Configure the "Scavenge Interval" setting to organizational standards. CC ID 11158 | Configuration | Preventive | |
Configure the "Server Authentication Certificate Template" setting to organizational standards. CC ID 11170 | Configuration | Preventive | |
Configure the "Set BranchCache Distributed Cache mode" setting to organizational standards. CC ID 11172 | Configuration | Preventive | |
Configure the "Set BranchCache Hosted Cache mode" setting to organizational standards. CC ID 11173 | Configuration | Preventive | |
Configure the "Set compression algorithm for RDP data" setting to organizational standards. CC ID 11174 | Configuration | Preventive | |
Configure the "Set percentage of disk space used for client computer cache" setting to organizational standards. CC ID 11177 | Configuration | Preventive | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Global" to organizational standards. CC ID 11178 | Configuration | Preventive | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Site Local" to organizational standards. CC ID 11180 | Configuration | Preventive | |
Configure the "Set the Email IDs to which notifications are to be sent" setting to organizational standards. CC ID 11184 | Configuration | Preventive | |
Configure the "Set the map update interval for NIS subordinate servers" setting to organizational standards. CC ID 11186 | Configuration | Preventive | |
Configure the "Set the Seed Server" setting for "IPv6 Global" to organizational standards. CC ID 11189 | Configuration | Preventive | |
Configure the "Set the Seed Server" setting for "IPv6 Site Local" to organizational standards. CC ID 11191 | Configuration | Preventive | |
Configure the "Set the SMTP Server used to send notifications" setting to organizational standards. CC ID 11192 | Configuration | Preventive | |
Configure the "Set timer resolution" setting to organizational standards. CC ID 11196 | Configuration | Preventive | |
Configure the "Sets how often a DFS Client discovers DC's" setting to organizational standards. CC ID 11199 | Configuration | Preventive | |
Configure the "Short name creation options" setting to organizational standards. CC ID 11200 | Configuration | Preventive | |
Configure the "Site Name" setting to organizational standards. CC ID 11201 | Configuration | Preventive | |
Configure the "Specify a default color" setting to organizational standards. CC ID 11208 | Configuration | Preventive | |
Configure the "Specify idle Timeout" setting to organizational standards. CC ID 11210 | Configuration | Preventive | |
Configure the "Specify maximum amount of memory in MB per Shell" setting to organizational standards. CC ID 11211 | Configuration | Preventive | |
Configure the "Specify maximum number of processes per Shell" setting to organizational standards. CC ID 11212 | Configuration | Preventive | |
Configure the "Specify Shell Timeout" setting to organizational standards. CC ID 11216 | Configuration | Preventive | |
Configure the "Specify Windows installation file location" setting to organizational standards. CC ID 11225 | Configuration | Preventive | |
Configure the "Specify Windows Service Pack installation file location" setting to organizational standards. CC ID 11226 | Configuration | Preventive | |
Configure the "SSL Cipher Suite Order" setting to organizational standards. CC ID 11227 | Configuration | Preventive | |
Configure the "Switch to the Simplified Chinese (PRC) gestures" setting to organizational standards. CC ID 11230 | Configuration | Preventive | |
Configure the "Sysvol share compatibility" setting to organizational standards. CC ID 11231 | Configuration | Preventive | |
Configure the "Tag Windows Customer Experience Improvement data with Study Identifier" setting to organizational standards. CC ID 11232 | Configuration | Preventive | |
Configure the "Teredo Client Port" setting to organizational standards. CC ID 11236 | Configuration | Preventive | |
Configure the "Teredo Default Qualified" setting to organizational standards. CC ID 11237 | Configuration | Preventive | |
Configure the "Teredo Refresh Rate" setting to organizational standards. CC ID 11238 | Configuration | Preventive | |
Configure the "Teredo Server Name" setting to organizational standards. CC ID 11239 | Configuration | Preventive | |
Configure the "Teredo State" setting to organizational standards. CC ID 11240 | Configuration | Preventive | |
Configure the "Time (in seconds) to force reboot" setting to organizational standards. CC ID 11242 | Configuration | Preventive | |
Configure the "Time (in seconds) to force reboot when required for policy changes to take effect" setting to organizational standards. CC ID 11243 | Configuration | Preventive | |
Configure the "Timeout for fast user switching events" setting to organizational standards. CC ID 11244 | Configuration | Preventive | |
Configure the "Traps for public community" setting to organizational standards. CC ID 11246 | Configuration | Preventive | |
Configure the "Trusted Hosts" setting to organizational standards. CC ID 11249 | Configuration | Preventive | |
Configure the "Try Next Closest Site" setting to organizational standards. CC ID 11250 | Configuration | Preventive | |
Configure the "TTL Set in the A and PTR records" setting to organizational standards. CC ID 11251 | Configuration | Preventive | |
Configure the "Turn on Accounting for WSRM" setting to organizational standards. CC ID 11333 | Configuration | Preventive | |
Configure the "Turn on BranchCache" setting to organizational standards. CC ID 11334 | Configuration | Preventive | |
Configure the "Turn on certificate propagation from smart card" setting to organizational standards. CC ID 11335 | Configuration | Preventive | |
Configure the "Turn On Compatibility HTTP Listener" setting to organizational standards. CC ID 11336 | Configuration | Preventive | |
Configure the "Turn On Compatibility HTTPS Listener" setting to organizational standards. CC ID 11337 | Configuration | Preventive | |
Configure the "Turn on definition updates through both WSUS and the Microsoft Malware Protection Center" setting to organizational standards. CC ID 11338 | Configuration | Preventive | |
Configure the "Turn on definition updates through both WSUS and Windows Update" setting to organizational standards. CC ID 11339 | Configuration | Preventive | |
Configure the "Turn on economical application of administratively assigned Offline Files" setting to organizational standards. CC ID 11342 | Configuration | Preventive | |
Configure the "Turn on Mapper I/O (LLTDIO) driver" setting to organizational standards. CC ID 11346 | Configuration | Preventive | |
Configure the "Turn on recommended updates via Automatic Updates" setting to organizational standards. CC ID 11347 | Configuration | Preventive | |
Configure the "Turn on root certificate propagation from smart card" setting to organizational standards. CC ID 11349 | Configuration | Preventive | |
Configure the "Turn on Software Notifications" setting to organizational standards. CC ID 11352 | Configuration | Preventive | |
Configure the "Turn on TPM backup to Active Directory Domain Services" setting to organizational standards. CC ID 11356 | Configuration | Preventive | |
Configure the "Use forest search order" setting for "Key Distribution Center (KDC) searches" to organizational standards. CC ID 11359 | Configuration | Preventive | |
Configure the "Use forest search order" setting for "Kerberos client searches" to organizational standards. CC ID 11360 | Configuration | Preventive | |
Configure the "Use IP Address Redirection" setting to organizational standards. CC ID 11361 | Configuration | Preventive | |
Configure the "Use localized subfolder names when redirecting Start Menu and My Documents" setting to organizational standards. CC ID 11362 | Configuration | Preventive | |
Configure the "Use mandatory profiles on the RD Session Host server" setting to organizational standards. CC ID 11363 | Configuration | Preventive | |
Configure the "Verbose vs normal status messages" setting to organizational standards. CC ID 11368 | Configuration | Preventive | |
Configure the "Verify old and new Folder Redirection targets point to the same share before redirecting" setting to organizational standards. CC ID 11369 | Configuration | Preventive | |
Configure the "Windows Scaling Heuristics State" setting to organizational standards. CC ID 11372 | Configuration | Preventive | |
Configure the "Obtain Software Package Updates with apt-get" setting to organizational standards. CC ID 11375 | Configuration | Preventive | |
Configure the "display a banner before authentication" setting for "LightDM" to organizational standards. CC ID 11385 | Configuration | Preventive | |
Configure the "shadow" group to organizational standards. CC ID 11386 | Configuration | Preventive | |
Configure the "AppArmor" setting to organizational standards. CC ID 11387 | Configuration | Preventive | |
Configure knowledge-based authentication tools in accordance with organizational standards. CC ID 13740 | Configuration | Preventive | |
Configure the session timeout for the knowledge-based authentication tool used for the identity proofing process according to organizational standards. CC ID 13754 | Configuration | Preventive | |
Configure the knowledge-based authentication tool to restart after a session timeout. CC ID 13753 | Configuration | Preventive | |
Configure the number of attempts allowed to complete the knowledge-based authentication in the knowledge-based authentication tool. CC ID 13751 | Configuration | Preventive | |
Disable or configure the e-mail server, as necessary. CC ID 06563 | Configuration | Preventive | |
Configure e-mail servers to enable receiver-side verification. CC ID 12223 | Configuration | Preventive | |
Configure the e-mail server to prevent it from listening to external interfaces. CC ID 01561 | Configuration | Preventive | |
Configure the "Local-Only Mode" setting for the "Mail Transfer Agent" to organizational standards. CC ID 09940 | Configuration | Preventive | |
Configure the system account settings and the permission settings in accordance with the organizational standards. CC ID 01538 | Configuration | Preventive | |
Configure Windows User Account Control in accordance with organizational standards. CC ID 16437 | Configuration | Preventive | |
Configure the at.allow file with the users who are permitted to use the at facility, as appropriate. CC ID 06005 | Configuration | Preventive | |
Configure the /etc/xinetd.conf file group permissions, as appropriate. CC ID 05994 | Configuration | Preventive | |
Create the default adduser.conf file. CC ID 01581 | Configuration | Preventive | |
Remove unnecessary accounts. CC ID 16476 | Technical Security | Corrective | |
Configure user accounts. CC ID 07036 | Configuration | Preventive | |
Configure account expiration parameters on active accounts. CC ID 01580 | Configuration | Preventive | |
Change default usernames, as necessary. CC ID 14661 | Configuration | Corrective | |
Remove unnecessary default accounts. CC ID 01539 | Configuration | Preventive | |
Disable or delete shared User IDs. CC ID 12478 | Configuration | Corrective | |
Verify that no UID 0 accounts exist other than root. CC ID 01585 | Configuration | Detective | |
Disable or delete generic user IDs. CC ID 12479 | Configuration | Corrective | |
Disable all unnecessary user identifiers. CC ID 02185 | Configuration | Preventive | |
Remove unnecessary user credentials. CC ID 16409 | Configuration | Preventive | |
Remove the root user as appropriate. CC ID 01582 | Configuration | Preventive | |
Disable or remove the null account. CC ID 06572 | Configuration | Preventive | |
Change default accounts. CC ID 16468 | Process or Activity | Preventive | |
Configure accounts with administrative privilege. CC ID 07033 | Configuration | Preventive | |
Employ multifactor authentication for accounts with administrative privilege. CC ID 12496 | Technical Security | Preventive | |
Disable root logons or limit the logons to the system console. CC ID 01573 | Configuration | Preventive | |
Encrypt non-console administrative access. CC ID 00883 | Configuration | Preventive | |
Invoke a strong encryption method before requesting an authenticator. CC ID 11986 | Technical Security | Preventive | |
Configure the default group for the root user. CC ID 01586 | Configuration | Preventive | |
Rename or disable the Administrator Account. CC ID 01721 | Configuration | Preventive | |
Create a backup administrator account. CC ID 04497 | Configuration | Preventive | |
Configure the general user ID parameters. CC ID 02186 | Configuration | Preventive | |
Configure the Master user ID parameters inside the Site Management Complex. CC ID 02187 | Configuration | Preventive | |
Configure the subadministrators user ID parameters. CC ID 02188 | Configuration | Preventive | |
Configure the user account expiration date. CC ID 07101 | Configuration | Preventive | |
Configure User Rights. CC ID 07034 | Configuration | Preventive | |
Configure the "Access this computer from the network" User Right. CC ID 01834 | Configuration | Preventive | |
Configure the "Act as a part of the operating system" User Right. CC ID 01835 | Configuration | Preventive | |
Configure the "Add workstations to domain" User Right setting to organizational standards. CC ID 01836 | Configuration | Preventive | |
Configure the "Adjust memory quotas for a process" User Right. CC ID 01837 | Configuration | Preventive | |
Configure the "Allow log on through Terminal Services" User Right setting to organizational standards. CC ID 01838 | Configuration | Preventive | |
Configure the "Back up files and directories" User Right. CC ID 01839 | Configuration | Preventive | |
Configure the "Bypass traverse checking" User Right. CC ID 01840 | Configuration | Preventive | |
Configure the "Change the system time" User Right. CC ID 01841 | Configuration | Preventive | |
Configure the "Change the time zone" User Right. CC ID 04382 | Configuration | Preventive | |
Configure the "Create a pagefile" User Right. CC ID 01842 | Configuration | Preventive | |
Configure the "Create a token object" User Right. CC ID 01843 | Configuration | Preventive | |
Configure the "Create permanent shared objects" User Right. CC ID 01844 | Configuration | Preventive | |
Configure the "Debug programs" User Right. CC ID 01845 | Configuration | Preventive | |
Configure the "Deny access to this computer from the network" User Right. CC ID 01846 | Configuration | Preventive | |
Configure the "Deny log on as a batch job" User Right setting to organizational standards. CC ID 01847 | Configuration | Preventive | |
Configure the "Deny log on as a service" User Right setting to organizational standards. CC ID 01848 | Configuration | Preventive | |
Configure the "Deny log on locally" User Right setting to organizational standards. CC ID 01849 | Configuration | Preventive | |
Configure the "Deny log on through Terminal Service" User Right setting to organizational standards. CC ID 01850 | Configuration | Preventive | |
Configure the "Enable computer and user accounts to be trusted for delegation" User Right. CC ID 01851 | Configuration | Preventive | |
Configure the "Force shutdown from a remote system" User Right. CC ID 01852 | Configuration | Preventive | |
Configure the "Generate security audits" User Right. CC ID 01853 | Configuration | Preventive | |
Configure the "Increase scheduling priority" User Right. CC ID 01854 | Configuration | Preventive | |
Configure the "Load and unload device drivers" User Right. CC ID 01855 | Configuration | Preventive | |
Configure the "Lock pages in memory" User Right. CC ID 01856 | Configuration | Preventive | |
Configure the "Lock Inactive User Accounts" setting to organizational standards. CC ID 09921 | Configuration | Preventive | |
Configure the "Log on as a batch job" User Right. CC ID 01857 | Configuration | Preventive | |
Configure the "Log on as a service" User Right. CC ID 01858 | Configuration | Preventive | |
Configure the "Allow log on locally" User Right setting to organizational standards. CC ID 01859 | Configuration | Preventive | |
Configure the "Manage auditing and security log" User Right. CC ID 01860 | Configuration | Preventive | |
Configure the "Modify firmware environment values" User Right. CC ID 01861 | Configuration | Preventive | |
Configure the "Perform volume maintenance tasks" User Right. CC ID 01862 | Configuration | Preventive | |
Configure the "Profile single process" User Right. CC ID 01863 | Configuration | Preventive | |
Configure the "Profile system performance" User Right. CC ID 01864 | Configuration | Preventive | |
Configure the "Remove computer from docking station" User Right. CC ID 01865 | Configuration | Preventive | |
Configure the "Replace a process level token" User Right. CC ID 01866 | Configuration | Preventive | |
Configure the "Restore files and directories" User Right. CC ID 01867 | Configuration | Preventive | |
Configure the "Shut down the system" User Right. CC ID 01868 | Configuration | Preventive | |
Configure the "Synchronize directory service data" User Right setting to organizational standards. CC ID 01869 | Configuration | Preventive | |
Configure the "Take ownership of files or other objects" User Right. CC ID 01870 | Configuration | Preventive | |
Configure the "Create global objects" User Right. CC ID 04383 | Configuration | Preventive | |
Configure the "Create symbolic links" User Right. CC ID 04384 | Configuration | Preventive | |
Configure the "Impersonate a client after authentication" User Right. CC ID 04385 | Configuration | Preventive | |
Configure the "Increase a process working set" User Right. CC ID 04386 | Configuration | Preventive | |
Configure file permissions and directory permissions to organizational standards. CC ID 07035 | Configuration | Preventive | |
Configure "SYSVOL" to organizational standards. CC ID 15398 | Configuration | Preventive | |
Configure the Cron log file permissions, as appropriate. CC ID 05998 | Configuration | Preventive | |
Configure the "docker.service" file ownership to organizational standards. CC ID 14477 | Configuration | Preventive | |
Establish and verify the file permissions for the passwd files, the shadow files, and the group files. CC ID 01537 | Technical Security | Preventive | |
Verify uneven file permissions and uneven directory permissions do not occur, except on the WWW directory. CC ID 02159 | Configuration | Preventive | |
Configure the "/dev/kmem" file permissions to organizational standards. CC ID 05449 | Configuration | Preventive | |
Configure the "/dev/mem" file permissions to organizational standards. CC ID 05450 | Configuration | Preventive | |
Configure the "/dev/null" file permissions to organizational standards. CC ID 05451 | Configuration | Preventive | |
Configure the "resolv.conf" file permissions to organizational standards. CC ID 05452 | Configuration | Preventive | |
Configure the "/etc/named.conf" file permissions to organizational standards. CC ID 05453 | Configuration | Preventive | |
Configure the "/etc/group" file permissions to organizational standards. CC ID 05454 | Configuration | Preventive | |
Set the /etc/exports file file permissions properly. CC ID 05455 | Configuration | Preventive | |
Set the /usr/bin/at file file permissions properly. CC ID 05456 | Configuration | Preventive | |
Configure the "/usr/bin/rdist" file permissions to organizational standards. CC ID 05457 | Configuration | Preventive | |
Configure the "/usr/sbin/sync" file permissions to organizational standards. CC ID 05458 | Configuration | Preventive | |
Configure the "aliases" file permissions to organizational standards. CC ID 05460 | Configuration | Preventive | |
Set the file permissions for log file that is configured to capture critical sendmail messages properly. CC ID 05461 | Log Management | Preventive | |
Set the file permissions for all files executed through /etc/aliases file entries properly. CC ID 05462 | Configuration | Preventive | |
Configure the "/bin/csh" file permissions to organizational standards. CC ID 05463 | Configuration | Preventive | |
Configure the "/bin/jsh" file permissions to organizational standards. CC ID 05464 | Configuration | Preventive | |
Configure the "/bin/ksh" file permissions to organizational standards. CC ID 05465 | Configuration | Preventive | |
Configure the "/bin/sh" file permissions to organizational standards. CC ID 05466 | Configuration | Preventive | |
Configure the "/bin/bash" file permissions to organizational standards. CC ID 05467 | Configuration | Preventive | |
Configure the "/sbin/csh" file permissions to organizational standards. CC ID 05468 | Configuration | Preventive | |
Configure the "/sbin/jsh" file permissions to organizational standards. CC ID 05469 | Configuration | Preventive | |
Configure the "/sbin/ksh" file permissions to organizational standards. CC ID 05470 | Configuration | Preventive | |
Configure the "/sbin/sh" file permissions to organizational standards. CC ID 05471 | Configuration | Preventive | |
Configure the "/sbin/bash" file permissions to organizational standards. CC ID 05472 | Configuration | Preventive | |
Configure the "/usr/bin/csh" file permissions to organizational standards. CC ID 05473 | Configuration | Preventive | |
Configure the "/usr/bin/jsh" file permissions to organizational standards. CC ID 05474 | Configuration | Preventive | |
Configure the "/usr/bin/ksh" file permissions to organizational standards. CC ID 05475 | Configuration | Preventive | |
Configure the "/usr/bin/sh" file permissions to organizational standards. CC ID 05476 | Configuration | Preventive | |
Configure the "/usr/bin/bash" file permissions to organizational standards. CC ID 05477 | Configuration | Preventive | |
Configure the "snmpd.conf" file permissions to organizational standards. CC ID 05478 | Configuration | Preventive | |
Configure the "/tmp" file permissions to organizational standards. CC ID 05479 | Configuration | Preventive | |
Configure the "/usr/tmp" file permissions to organizational standards. CC ID 05480 | Configuration | Preventive | |
Configure the ".Xauthority" file permissions to organizational standards. CC ID 05481 | Configuration | Preventive | |
Configure the "/etc/aliases" file permissions to organizational standards. CC ID 05482 | Configuration | Preventive | |
Configure the "/etc/csh" file permissions to organizational standards. CC ID 05483 | Configuration | Preventive | |
Configure the "/etc/default/docker" file permissions to organizational standards. CC ID 14487 | Configuration | Preventive | |
Configure the "/etc/default/docker" file ownership to organizational standards. CC ID 14484 | Configuration | Preventive | |
Configure the "/etc/default/*" file permissions to organizational standards. CC ID 05484 | Configuration | Preventive | |
Configure the "/etc/docker" directory permissions to organizational standards. CC ID 14470 | Configuration | Preventive | |
Configure the "/etc/docker" directory ownership to organizational standards. CC ID 14469 | Configuration | Preventive | |
Set the file permissions for /etc/default/login properly. CC ID 05485 | Configuration | Preventive | |
Configure the "/etc/gshadow" file permissions to organizational standards. CC ID 05486 | Configuration | Preventive | |
Configure the "/etc/host.lpd" file permissions to organizational standards. CC ID 05487 | Configuration | Preventive | |
Configure the "/etc/hostname*" file permissions to organizational standards. CC ID 05488 | Configuration | Preventive | |
Configure the "/etc/hosts" file permissions to organizational standards. CC ID 05489 | Configuration | Preventive | |
Set the /etc/inetd.conf file file permissions properly. CC ID 05490 | Configuration | Preventive | |
Configure the "/etc/issue" file permissions to organizational standards. CC ID 05491 | Configuration | Preventive | |
Configure the "/etc/jsh" file permissions to organizational standards. CC ID 05492 | Configuration | Preventive | |
Configure the "/etc/kubernetes/pki/*.crt" file permissions to organizational standards. CC ID 14562 | Configuration | Preventive | |
Configure the "/etc/kubernetes/pki/*.key" file permissions to organizational standards. CC ID 14557 | Configuration | Preventive | |
Configure the "/etc/kubernetes/pki" file ownership to organizational standards. CC ID 14555 | Configuration | Preventive | |
Configure the "/etc/ksh" file permissions to organizational standards. CC ID 05493 | Configuration | Preventive | |
Configure the "/etc/mail/aliases" file permissions to organizational standards. CC ID 05494 | Configuration | Preventive | |
Configure the "/etc/motd" file permissions to organizational standards. CC ID 05495 | Configuration | Preventive | |
Configure the "/etc/netconfig" file permissions to organizational standards. CC ID 05496 | Configuration | Preventive | |
Configure the "/etc/notrouter" file permissions to organizational standards. CC ID 05497 | Configuration | Preventive | |
Configure the "/etc/passwd" file permissions to organizational standards. CC ID 05498 | Configuration | Preventive | |
Configure the "/etc/security" file permissions to organizational standards. CC ID 05499 | Configuration | Preventive | |
Configure the "/etc/services" file permissions to organizational standards. CC ID 05500 | Configuration | Preventive | |
Configure the "/etc/sysconfig/docker" file ownership to organizational standards. CC ID 14491 | Configuration | Preventive | |
Configure the "/etc/sh" file permissions to organizational standards. CC ID 05501 | Configuration | Preventive | |
Configure the "/etc/sysconfig/docker" file permissions to organizational standards. CC ID 14486 | Configuration | Preventive | |
Configure the "/etc/shadow" file permissions to organizational standards. CC ID 05502 | Configuration | Preventive | |
Configure the "docker.socket" file ownership to organizational standards. CC ID 14472 | Configuration | Preventive | |
Configure the "/etc/syslog.conf" file permissions to organizational standards. CC ID 05503 | Configuration | Preventive | |
Configure the "/etc/fstab" file permissions to organizational standards. CC ID 05504 | Configuration | Preventive | |
Configure the "docker.socket" file permissions to organizational standards. CC ID 14468 | Configuration | Preventive | |
Configure the "/var/adm/messages" file permissions to organizational standards. CC ID 05505 | Configuration | Preventive | |
Configure the "/var/adm/sulog" file permissions to organizational standards. CC ID 05506 | Configuration | Preventive | |
Configure the "/var/adm/utmp" file permissions to organizational standards. CC ID 05507 | Configuration | Preventive | |
Configure the "/var/adm/wtmp" file permissions to organizational standards. CC ID 05508 | Configuration | Preventive | |
Configure the "/var/adm/authlog" file permissions to organizational standards. CC ID 05509 | Configuration | Preventive | |
Configure the "/var/adm/syslog" file permissions to organizational standards. CC ID 05510 | Configuration | Preventive | |
Configure the "/var/mail" file permissions to organizational standards. CC ID 05511 | Configuration | Preventive | |
Configure the "/var/tmp" file permissions to organizational standards. CC ID 05512 | Configuration | Preventive | |
Configure the "/usr/lib/pt_chmod" file permissions to organizational standards. CC ID 05513 | Configuration | Preventive | |
Configure the "/usr/lib/embedded_us" file permissions to organizational standards. CC ID 05514 | Configuration | Preventive | |
Configure the "/usr/kerberos/bin/rsh" file permissions to organizational standards. CC ID 05515 | Configuration | Preventive | |
Configure the "/var/spool/mail" file permissions to organizational standards. CC ID 05516 | Configuration | Preventive | |
Configure the "smbpasswd" file permissions to organizational standards. CC ID 05517 | Configuration | Preventive | |
Configure the "/usr/lib/sendmail" file permissions to organizational standards. CC ID 05518 | Configuration | Preventive | |
Set the /etc/security/audit/config file file permissions properly. CC ID 05519 | Configuration | Preventive | |
Set the /etc/security/audit/events file file permissions properly. CC ID 05520 | Configuration | Preventive | |
Set the /etc/security/audit/objects file file permissions properly. CC ID 05521 | Configuration | Preventive | |
Set the /usr/lib/trcload file file permissions properly. CC ID 05522 | Configuration | Preventive | |
Set the /usr/lib/semutil file file permissions properly. CC ID 05523 | Configuration | Preventive | |
Set the /etc/rc.config.d/auditing file file permissions properly. CC ID 05524 | Configuration | Preventive | |
Configure the "/etc/init.d" file permissions to organizational standards. CC ID 05525 | Configuration | Preventive | |
Set the /etc/hosts.lpd file file permissions properly. CC ID 05526 | Configuration | Preventive | |
Configure the "/etc/pam.conf" file permissions to organizational standards. CC ID 05527 | Configuration | Preventive | |
Configure the "/boot/grub/grub.conf" file permissions to organizational standards. CC ID 05528 | Configuration | Preventive | |
Configure the "/etc/grub.conf" file permissions to organizational standards. CC ID 05529 | Configuration | Preventive | |
Configure the "/etc/lilo.conf" file permissions to organizational standards. CC ID 05530 | Configuration | Preventive | |
Set the file permissions for /etc/login.access properly. CC ID 05531 | Configuration | Preventive | |
Configure the "docker.service" file permissions to organizational standards. CC ID 14479 | Configuration | Preventive | |
Configure the "/etc/security/access.conf" file permissions to organizational standards. CC ID 05532 | Configuration | Preventive | |
Configure the "/etc/sysctl.conf" file permissions to organizational standards. CC ID 05533 | Configuration | Preventive | |
Configure the "/etc/securetty" file permissions to organizational standards. CC ID 05534 | Configuration | Preventive | |
Configure the "/etc/audit/auditd.conf" file permissions to organizational standards. CC ID 05535 | Configuration | Preventive | |
Configure the "audit.rules" file permissions to organizational standards. CC ID 05536 | Configuration | Preventive | |
Set the /usr/sbin/userhelper file file permissions properly. CC ID 05537 | Configuration | Preventive | |
Set the file permissions for all syslog log files properly. CC ID 05538 | Configuration | Preventive | |
Set the /etc/anacrontab file file permissions properly. CC ID 05543 | Configuration | Preventive | |
Set the /etc/pki/tls/CA/cacert.pem file file permissions properly. CC ID 05544 | Configuration | Preventive | |
Set the /etc/pki/tls/ldap/serverkey.pem file file permissions properly. CC ID 05545 | Configuration | Preventive | |
Set the /etc/pki/tls/ldap/servercert.pem file file permissions properly. CC ID 05546 | Configuration | Preventive | |
Set the /etc/pki/tls/ldap file file permissions properly. CC ID 05547 | Configuration | Preventive | |
Set the /etc/httpd/conf file file permissions properly. CC ID 05548 | Configuration | Preventive | |
Set the /etc/httpd/conf/* file file permissions properly. CC ID 05549 | Configuration | Preventive | |
Set the /usr/sbin/httpd file file permissions properly. CC ID 05550 | Configuration | Preventive | |
Set the /var/log/httpd file file permissions properly. CC ID 05551 | Configuration | Preventive | |
Set the daemon debug log file file permissions properly. CC ID 05552 | Configuration | Preventive | |
Set the Cron log file file permissions properly. CC ID 05553 | Configuration | Preventive | |
Set the file permissions for system accounting properly. CC ID 05554 | Configuration | Preventive | |
Set the /etc/dfs file file permissions properly. CC ID 05555 | Configuration | Preventive | |
Set the /etc/fs file permissions properly. CC ID 05556 | Configuration | Preventive | |
Set the /etc/ufs file file permissions properly. CC ID 05557 | Configuration | Preventive | |
Set the /etc/vfstab file file permissions properly. CC ID 05558 | Configuration | Preventive | |
Set the vold.conf file permissions properly. CC ID 05559 | Configuration | Preventive | |
Configure the "Docker socket" file ownership to organizational standards. CC ID 14493 | Configuration | Preventive | |
Configure the "daemon.json" file permissions to organizational standards. CC ID 14492 | Configuration | Preventive | |
Set the ASET userlist file permissions properly. CC ID 05560 | Configuration | Preventive | |
Set the /etc/rmmount.conf file file permissions properly. CC ID 05561 | Configuration | Preventive | |
Configure the "Docker server certificate" file ownership to organizational standards. CC ID 14471 | Configuration | Preventive | |
Configure the "Docker server certificate key" file permissions to organizational standards. CC ID 14485 | Configuration | Preventive | |
Set the /etc/security/audit_control file file permissions properly. CC ID 05563 | Configuration | Preventive | |
Configure the "daemon.json" file ownership to organizational standards. CC ID 14482 | Configuration | Preventive | |
Configure the "Docker socket" file permissions to organizational standards. CC ID 14480 | Configuration | Preventive | |
Set the /etc/security/audit_class file file permissions properly. CC ID 05564 | Configuration | Preventive | |
Configure the "Docker server certificate key" file ownership to organizational standards. CC ID 14478 | Configuration | Preventive | |
Configure the "admin.conf" file ownership to organizational standards. CC ID 14556 | Configuration | Preventive | |
Set the /etc/security/audit_event file file permissions properly. CC ID 05565 | Configuration | Preventive | |
Configure the "admin.conf" file permissions to organizational standards. CC ID 14554 | Configuration | Preventive | |
Configure the "Certificate Authority" file ownership to organizational standards. CC ID 14630 | Configuration | Preventive | |
Configure the "Docker server certificate" file permissions to organizational standards. CC ID 14476 | Configuration | Preventive | |
Configure the "etcd" data directory ownership to organizational standards. CC ID 14620 | Configuration | Preventive | |
Configure the "etcd" data directory permissions to organizational standards. CC ID 14618 | Configuration | Preventive | |
Configure the "etcd.yaml" file ownership to organizational standards. CC ID 14615 | Configuration | Preventive | |
Configure the "etcd.yaml" file permissions to organizational standards. CC ID 14609 | Configuration | Preventive | |
Configure the file permissions for at.allow, as appropriate. CC ID 05995 | Configuration | Preventive | |
Configure the file permissions for at.deny, as appropriate. CC ID 05996 | Configuration | Preventive | |
Configure the file permissions for cron.allow, as appropriate. CC ID 05999 | Configuration | Preventive | |
Configure the file permissions for cron.deny, as appropriate. CC ID 06000 | Configuration | Preventive | |
Configure the "Certificate Authority" file permissions to organizational standards. CC ID 14623 | Configuration | Preventive | |
Configure the file permissions for /usr/bin/at file, as appropriate. CC ID 06001 | Configuration | Preventive | |
Configure the "kubelet --config" file ownership to organizational standards. CC ID 14632 | Configuration | Preventive | |
Configure the file permissions for the /etc/cron.daily file, as appropriate. CC ID 06008 | Configuration | Preventive | |
Configure the "kubelet.conf" file ownership to organizational standards. CC ID 14628 | Configuration | Preventive | |
Configure the "kubelet --config" file permissions to organizational standards. CC ID 14625 | Configuration | Preventive | |
Configure the file permissions for the /etc/cron.weekly file, as appropriate. CC ID 06009 | Configuration | Preventive | |
Configure the file permissions for the /etc/cron.hourly file, as appropriate. CC ID 06010 | Configuration | Preventive | |
Configure the "kubelet service" file permissions to organizational standards. CC ID 14660 | Configuration | Preventive | |
Configure the "kubelet.conf" file permissions to organizational standards. CC ID 14619 | Configuration | Preventive | |
Configure the "controller-manager.conf" file ownership to organizational standards. CC ID 14560 | Configuration | Preventive | |
Configure the "kubeconfig" file ownership to organizational standards. CC ID 14617 | Configuration | Preventive | |
Configure the "kubeconfig" file permissions to organizational standards. CC ID 14616 | Configuration | Preventive | |
Configure the file permissions for the /etc/cron.monthly file, as appropriate. CC ID 06013 | Configuration | Preventive | |
Configure the "kubelet service" file ownership to organizational standards. CC ID 14612 | Configuration | Preventive | |
Configure the "kube-scheduler.yaml" file ownership to organizational standards. CC ID 14611 | Configuration | Preventive | |
Configure the file permissions for all user home directories, as appropriate. CC ID 06019 | Configuration | Preventive | |
Configure the "kube-scheduler.yaml" file permissions to organizational standards. CC ID 14603 | Configuration | Preventive | |
Configure the "kube-controller-manager.yaml" file ownership to organizational standards. CC ID 14600 | Configuration | Preventive | |
Configure the "kube-controller-manager.yaml" file permissions to organizational standards. CC ID 14598 | Configuration | Preventive | |
Configure the "kube-apiserver.yaml" file ownership to organizational standards. CC ID 14597 | Configuration | Preventive | |
Configure the "scheduler.conf" file ownership to organizational standards. CC ID 14558 | Configuration | Preventive | |
Configure the .netrc file permissions, as necessary. CC ID 06022 | Configuration | Preventive | |
Configure the "all rsyslog log files" permissions to organizational standards. CC ID 08748 | Establish/Maintain Documentation | Preventive | |
Configure the "controller-manager.conf" file permissions to organizational standards. CC ID 14553 | Configuration | Preventive | |
Configure the "Container Network Interface" file ownership to organizational standards. CC ID 14552 | Configuration | Preventive | |
Configure the "Container Network Interface" file permissions to organizational standards. CC ID 14550 | Configuration | Preventive | |
Configure the "crontab" directory permissions to organizational standards. CC ID 08967 | Configuration | Preventive | |
Configure the "scheduler.conf" file permissions to organizational standards. CC ID 14551 | Configuration | Preventive | |
Configure the "crontab" file permissions to organizational standards. CC ID 08968 | Configuration | Preventive | |
Configure the "kube-apiserver.yaml" file permissions to organizational standards. CC ID 14549 | Configuration | Preventive | |
Configure the "traceroute executable" file permissions to organizational standards. CC ID 08979 | Configuration | Preventive | |
Configure the "httpd.conf" file permissions to organizational standards. CC ID 09041 | Configuration | Preventive | |
Configure the "/etc/httpd/conf/passwd" file permissions to organizational standards. CC ID 09042 | Configuration | Preventive | |
Configure the "/usr/sbin/apachectl" file permissions to organizational standards. CC ID 09043 | Configuration | Preventive | |
Configure the "/var/www/html" file permissions to organizational standards. CC ID 09044 | Configuration | Preventive | |
Configure the "apache configuration" directory permissions to organizational standards. CC ID 09045 | Configuration | Preventive | |
Configure the "htpasswd" file permissions to organizational standards. CC ID 09057 | Configuration | Preventive | |
Configure all "files specified by CustomLogs" file permissions to organizational standards. CC ID 09073 | Configuration | Preventive | |
Configure the "apache /bin" directory permissions to organizational standards. CC ID 09093 | Configuration | Preventive | |
Configure the "apache /logs" directory permissions to organizational standards. CC ID 09096 | Configuration | Preventive | |
Configure the "registry certificate" file permissions to organizational standards. CC ID 14483 | Configuration | Preventive | |
Configure the "apache /htdocs" directory permissions to organizational standards. CC ID 09099 | Configuration | Preventive | |
Configure the "registry certificate" file ownership to organizational standards. CC ID 14481 | Configuration | Preventive | |
Configure the "apache /cgi-bin" directory permissions to organizational standards. CC ID 09102 | Configuration | Preventive | |
Configure the "cgi-bin" directory permissions to organizational standards. CC ID 09103 | Configuration | Preventive | |
Configure the "apache process ID" file permissions to organizational standards. CC ID 09124 | Configuration | Preventive | |
Configure the "apache scoreboard" file permissions to organizational standards. CC ID 09127 | Configuration | Preventive | |
Configure the "htpasswd.exe" file permissions to organizational standards. CC ID 09143 | Configuration | Preventive | |
Configure the "setgid" permissions to organizational standards. CC ID 14513 | Configuration | Preventive | |
Configure the "TLS CA certificate" file permissions to organizational standards. CC ID 14475 | Configuration | Preventive | |
Configure the "TLS CA certificate" file ownership to organizational standards. CC ID 14473 | Configuration | Preventive | |
Configure the "apache /config" directory permissions to organizational standards. CC ID 09144 | Configuration | Preventive | |
Configure the "%SystemRoot%System32wscript.exe" file permissions to organizational standards. CC ID 09145 | Configuration | Preventive | |
Configure the "%SystemRoot%System32cscript.exe" file permissions to organizational standards. CC ID 09146 | Configuration | Preventive | |
Configure the "apache's process ID" file permissions to organizational standards. CC ID 09148 | Configuration | Preventive | |
Configure the "/etc/httpd/conf.d" file permissions to organizational standards. CC ID 09149 | Configuration | Preventive | |
Configure the "setuid" permissions to organizational standards. CC ID 14509 | Configuration | Preventive | |
Configure the "Web Root 'Images'" directory permissions to organizational standards. CC ID 09191 | Configuration | Preventive | |
Configure the "Web Root 'scripts'" directory permissions to organizational standards. CC ID 09192 | Configuration | Preventive | |
Configure the "Web Root 'executables'" directory permissions to organizational standards. CC ID 09193 | Configuration | Preventive | |
Configure the "Web Root 'docs'" directory permissions to organizational standards. CC ID 09194 | Configuration | Preventive | |
Configure the "Web Root 'home'" directory permissions to organizational standards. CC ID 09195 | Configuration | Preventive | |
Configure the "Web Root 'include'" directory permissions to organizational standards. CC ID 09196 | Configuration | Preventive | |
Configure the "default Logfiles" directory permissions to organizational standards. CC ID 09197 | Configuration | Preventive | |
Configure the "Inetpub" directory permissions to organizational standards. CC ID 09221 | Configuration | Preventive | |
Configure the "inetsrv" directory permissions to organizational standards. CC ID 09222 | Configuration | Preventive | |
Configure the "inetsrvasp.dll" file permissions to organizational standards. CC ID 09223 | Configuration | Preventive | |
Configure the "Web Root" directory permissions . to organizational standards CC ID 09224 | Configuration | Preventive | |
Configure the "files located in the folder specified by the Logger component (server.xml)" file permissions to organizational standards. CC ID 09733 | Configuration | Preventive | |
Configure the "webapps" directory permissions to organizational standards. CC ID 09734 | Configuration | Preventive | |
Configure the "tomcat installation" directory permissions to organizational standards. CC ID 09735 | Configuration | Preventive | |
Configure the "tomcat /bin" directory permissions to organizational standards. CC ID 09736 | Configuration | Preventive | |
Configure the "tomcat /common" directory permissions to organizational standards. CC ID 09737 | Configuration | Preventive | |
Configure the "tomcat /conf" directory permissions to organizational standards. CC ID 09738 | Configuration | Preventive | |
Configure the "tomcat /logs" directory permissions to organizational standards. CC ID 09739 | Configuration | Preventive | |
Configure the "tomcat /server" directory permissions to organizational standards. CC ID 09740 | Configuration | Preventive | |
Configure the "tomcat /shared" directory permissions to organizational standards. CC ID 09741 | Configuration | Preventive | |
Configure the "tomcat /webapps" directory permissions to organizational standards. CC ID 09742 | Configuration | Preventive | |
Configure the "tomcat /work" directory permissions to organizational standards. CC ID 09743 | Configuration | Preventive | |
Configure the "tomcat /temp" directory permissions to organizational standards. CC ID 09744 | Configuration | Preventive | |
Configure the "tomcat-users.xml" file permissions to organizational standards. CC ID 09778 | Configuration | Preventive | |
Configure the "Tomcat home" directory permissions to organizational standards. CC ID 09799 | Configuration | Preventive | |
Configure the "Tomcat home/conf/" directory permissions to organizational standards. CC ID 09802 | Configuration | Preventive | |
Configure the "SerializedSystemIni.dat" file permissions to organizational standards. CC ID 09860 | Configuration | Preventive | |
Configure the "Keystore" file permissions to organizational standards. CC ID 09900 | Configuration | Preventive | |
Configure the "Weblogic Server Product Installation" directory permissions to organizational standards. CC ID 09902 | Configuration | Preventive | |
Configure the "Domain Home" directory permissions to organizational standards. CC ID 09903 | Configuration | Preventive | |
Configure the "Middleware Home" directory permissions to organizational standards. CC ID 09907 | Configuration | Preventive | |
Restrict at/cron to authorized users. CC ID 01572 | Configuration | Preventive | |
Configure the system to need authentication for single user mode. CC ID 01577 | Configuration | Preventive | |
Configure the system to block certain system accounts. CC ID 01578 | Configuration | Preventive | |
Verify that there are no accounts with empty password fields. CC ID 01579 | Configuration | Preventive | |
Use standards-based encryption for encryption, hashing, and signing. CC ID 01583 | Configuration | Preventive | |
Configure symbolic permissions for the passwd file, shadow file, and group files to organizational standards. CC ID 01584 | Configuration | Detective | |
Configure the "dCOM: Machine access restrictions in Security Descriptor Definition Language (sddl)" setting. CC ID 01726 | Configuration | Preventive | |
Configure the "dCOM: Machine launch restrictions in Security Descriptor Definition Language (sddl)" setting to organizational standards. CC ID 01727 | Configuration | Preventive | |
Configure the root $PATH to not have any "." directories, group directories or world writable directories. CC ID 01587 | Configuration | Preventive | |
Configure user home directories to be mode 750 or more restrictive. CC ID 01588 | Configuration | Preventive | |
Configure user dot-files to not be group or world-writable. CC ID 01589 | Configuration | Preventive | |
Remove .netrc files. CC ID 01590 | Configuration | Preventive | |
Configure default UMASK for users. CC ID 01591 | Configuration | Preventive | |
Configure the default UMASK for FTP users. CC ID 01592 | Configuration | Preventive | |
Configure the "mesg n" as default for all users. CC ID 01593 | Configuration | Preventive | |
Configure the system to restrict access to the root user from the su command. CC ID 01595 | Configuration | Preventive | |
Establish, implement, and maintain an account lockout policy. CC ID 01709 | Establish/Maintain Documentation | Preventive | |
Configure Restricted groups. CC ID 01928 | Configuration | Preventive | |
Configure the run control scripts permissions. CC ID 02160 | Configuration | Preventive | |
Configure root to be the Traceroute command owner. CC ID 02165 | Configuration | Preventive | |
Coordinate the User ID access restrictions with the site-unique configuration file, the UOSS control file, and the Tape File Configuration Transfer file. CC ID 02192 | Configuration | Preventive | |
Refrain from displaying user information when the system is locked. CC ID 04302 | Configuration | Preventive | |
Configure systems to prevent dial-up passwords from being saved. CC ID 04303 | Configuration | Preventive | |
Configure the "Always prompt client for password upon connection" setting. CC ID 04317 | Configuration | Preventive | |
Configure the "Do not allow passwords to be saved" setting. CC ID 04320 | Configuration | Preventive | |
Configure the "User Account Control: Admin Approval Mode for the Built-in Administrator account" setting. CC ID 04388 | Configuration | Preventive | |
Configure the "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" setting. CC ID 04389 | Configuration | Preventive | |
Configure the "User Account Control: Behavior of the elevation prompt for standard users" setting. CC ID 04390 | Configuration | Preventive | |
Configure the "User Account Control: Detect application installations and prompt for elevation" setting. CC ID 04391 | Configuration | Preventive | |
Configure the "User Account Control: Only elevate executables that are signed and validated" setting. CC ID 04392 | Configuration | Preventive | |
Configure the "User Account Control: Only elevate UIAccess applications that are installed in secure locations" setting. CC ID 04393 | Configuration | Preventive | |
Configure the "User Account Control: Run all administrators in Admin Approval Mode" setting. CC ID 04394 | Configuration | Preventive | |
Configure the "User Account Control: Switch to the secure desktop when prompting for elevation" setting. CC ID 04395 | Configuration | Preventive | |
Configure the "User Account Control: Virtualize file and registry write failures to per-user locations" setting. CC ID 04396 | Configuration | Preventive | |
Configure the "Enumerate administrator accounts on elevation" setting. CC ID 04403 | Configuration | Preventive | |
Configure the "Required trusted path for credential entry" setting. CC ID 04404 | Configuration | Preventive | |
Require proper authentication prior to accessing NetWare's eGuide. CC ID 04450 | Configuration | Preventive | |
Disable the SAdmin account and SDebug account in NetWare. CC ID 04458 | Configuration | Preventive | |
Configure the system to prevent helper applications from changing client rights. CC ID 04464 | Configuration | Preventive | |
Delete authenticator hint field contents or authenticator hint field files. CC ID 04477 | Configuration | Preventive | |
Configure the "Limit number of simultaneous connections" setting to organizational standards. CC ID 04511 | Configuration | Preventive | |
Configure the "Do not allow local administrators to customize permissions" setting to organizational standards. CC ID 04512 | Configuration | Preventive | |
Configure the default Distributed Component Object Model authorization level to 'connect' or higher. CC ID 04528 | Configuration | Preventive | |
Configure the "Network access: Shares that can be accessed anonymously" setting. CC ID 04533 | Configuration | Preventive | |
Configure domain-connected workstations to not have any local user accounts. CC ID 04535 | Configuration | Preventive | |
Configure printers to only accept print jobs from known print spoolers. CC ID 04812 | Configuration | Preventive | |
Configure print spoolers to accept jobs from authorized users only. CC ID 04813 | Configuration | Preventive | |
Prevent Multi-Function Devices from connecting to networks routing restricted data, unless authorized. CC ID 04815 | Configuration | Preventive | |
Restrict access to remote file shares. CC ID 04817 | Configuration | Preventive | |
Configure Multi-Function Devices to prevent non-printer administrators from altering the global configuration file. CC ID 04818 | Configuration | Preventive | |
Configure the user's .forward file to mode 600. CC ID 04848 | Configuration | Preventive | |
Configure the GID of accounts other than root and locked system accounts properly. CC ID 05448 | Configuration | Preventive | |
Set the smbpasswd executable permissions properly. CC ID 05459 | Configuration | Preventive | |
Grant or reject sudo privileges to the wheel group, as appropriate. CC ID 05539 | Configuration | Preventive | |
Set the /var/log/pamlog log permissions properly. CC ID 05562 | Configuration | Preventive | |
Restrict the audit log permissions. CC ID 05566 | Configuration | Preventive | |
Use the pkgchk utility to force default settings and to verify the ownership, group ownership, and access permissions for installed packages. CC ID 05567 | Configuration | Preventive | |
Configure role-based access control (RBAC) caching elements to organizational standards. CC ID 05568 | Configuration | Preventive | |
Verify all device files are located in an appropriate directory. CC ID 05571 | Records Management | Preventive | |
Configure the read-only option for all NFS exports. CC ID 05572 | Configuration | Preventive | |
Configure access controls through /etc/login.access and access.conf for non-superusers. CC ID 05573 | Configuration | Preventive | |
Enable or disable root login via Secure Shell, as appropriate. CC ID 05574 | Configuration | Preventive | |
Verify the ftpusers file restricts access to certain accounts. CC ID 05575 | Configuration | Preventive | |
Enable or disable SSH host-based authentication, as appropriate. CC ID 05576 | Configuration | Preventive | |
Configure the environmental variable path properly. CC ID 05577 | Configuration | Preventive | |
Configure local initialization files and global initialization files to allow or deny write access to the terminal, as appropriate. CC ID 05578 | Configuration | Preventive | |
Verify user .shosts files exist or not, as appropriate. CC ID 05579 | Configuration | Preventive | |
Set the default umask for the bash shell properly for all users. CC ID 05580 | Configuration | Preventive | |
Set the default umask for the csh shell properly for all users. CC ID 05581 | Configuration | Preventive | |
Configure the system umask properly. CC ID 05582 | Configuration | Preventive | |
Verify console device ownership is restricted to root-only, as appropriate. CC ID 05583 | Configuration | Preventive | |
Configure the "Access credential Manager as a trusted caller" User Right properly. CC ID 05584 | Configuration | Preventive | |
Restrict the right of modifying an Object label. CC ID 05585 | Configuration | Preventive | |
Configure the "User Account Control: Allow UIAccess applications to prompt for elevation" setting. CC ID 05586 | Configuration | Preventive | |
Configure the "Do Not Allow New Client Connections" policy for Terminal Services properly. CC ID 05587 | Configuration | Preventive | |
Configure the "Remote Control Settings" policy for Terminal Services properly. CC ID 05588 | Configuration | Preventive | |
Configure the Cron directory permissions to organizational standards. CC ID 05997 | Configuration | Preventive | |
Configure the cron.allow file with the user group permitted to use the cron facility, as appropriate. CC ID 06002 | Configuration | Preventive | |
Configure the cron.deny file with the user set permitted to use the cron facility, as appropriate. CC ID 06003 | Configuration | Preventive | |
Configure the Cron directories to be owned by an appropriate user and group. CC ID 06004 | Configuration | Preventive | |
Configure the at.deny file with the user set permitted to use the at facility, as appropriate. CC ID 06006 | Configuration | Preventive | |
Configure the /etc/cron.monthly file to be owned by an appropriate user or group. CC ID 06007 | Configuration | Preventive | |
Configure /etc/cron.hourly to be owned by an appropriate user or group. CC ID 06011 | Configuration | Preventive | |
Configure /etc/cron.daily to be owned by an appropriate user or group. CC ID 06012 | Configuration | Preventive | |
Configure the home directory for the root user, as appropriate. CC ID 06017 | Configuration | Preventive | |
Configure the home directory for each user account, as appropriate. CC ID 06018 | Configuration | Preventive | |
Configure the home directory permissions for the Superuser account, as appropriate. CC ID 06020 | Configuration | Preventive | |
Configure each user home directory to be owned by an appropriate user or group. CC ID 06021 | Configuration | Preventive | |
Configure the world-write permissions for all files, as appropriate. CC ID 06026 | Configuration | Preventive | |
Configure and assign the correct service permissions for the SNMP Service. CC ID 06041 | Configuration | Preventive | |
Configure the service permissions for NetMeeting, as appropriate. CC ID 06045 | Configuration | Preventive | |
Configure the "Allow log on through Remote Desktop Services" User Right properly. CC ID 06062 | Configuration | Preventive | |
Configure the "Deny log on through Remote Desktop Services" User Right properly. CC ID 06063 | Configuration | Preventive | |
Remove all members found in the Windows OS Power Users Group. CC ID 06573 | Configuration | Preventive | |
Configure the "sudo" to organizational standards. CC ID 15325 | Configuration | Preventive | |
Require users to use the 'sudo' command when accessing the root account. CC ID 06736 | Configuration | Preventive | |
Configure the "log all su (switch user) activity" setting to organizational standards. CC ID 08965 | Configuration | Preventive | |
Configure the "status" of the "apache" account to organizational standards. CC ID 09018 | Configuration | Preventive | |
Configure the "apache" account group membership to organizational standards. CC ID 09033 | Configuration | Preventive | |
Configure the "CustomLog" files permissions to organizational standards. CC ID 09051 | Configuration | Preventive | |
Configure the "ErrorLog" files permissions to organizational standards. CC ID 09052 | Configuration | Preventive | |
Configure the "default webpage" for "all readable apache web document directories" to organizational standards. CC ID 09071 | Configuration | Preventive | |
Configure the "ScriptAlias" directories permissions to organizational standards. CC ID 09078 | Configuration | Preventive | |
Configure the "ScriptAliasMatch" directories permissions to organizational standards. CC ID 09081 | Configuration | Preventive | |
Configure the "DocumentRoot" directories permissions to organizational standards. CC ID 09084 | Configuration | Preventive | |
Configure the "Alias" directories permissions to organizational standards. CC ID 09087 | Configuration | Preventive | |
Configure the "ServerRoot" directories permissions to organizational standards. CC ID 09090 | Configuration | Preventive | |
Configure the "Enable Logging" setting for the "master home directory" to organizational standards. CC ID 09156 | Configuration | Preventive | |
Configure the "Read" permission for the "master home directory" to organizational standards. CC ID 09157 | Configuration | Preventive | |
Configure the "Write" permission for the "master home directory" to organizational standards. CC ID 09158 | Configuration | Preventive | |
Configure the "Script Source Access" permission for the "master home directory" to organizational standards. CC ID 09159 | Configuration | Preventive | |
Configure the "Directory Browsing" permission for the "master home directory" to organizational standards. CC ID 09160 | Configuration | Preventive | |
Configure the "Log Visits" permission for the "master home directory" to organizational standards. CC ID 09161 | Configuration | Preventive | |
Configure the "Index this resource" permission for the "master home directory" to organizational standards. CC ID 09162 | Configuration | Preventive | |
Configure the "Execute Permissions" permission for the "master home directory" to organizational standards. CC ID 09163 | Configuration | Preventive | |
Configure the "Anonymous Access" permission for the "master home directory" to organizational standards. CC ID 09164 | Configuration | Preventive | |
Configure the "Basic Authentication" setting for the "master home directory" to organizational standards. CC ID 09165 | Configuration | Preventive | |
Configure the "Integrated Windows Authentication" setting for the "master home directory" to organizational standards. CC ID 09166 | Configuration | Preventive | |
Configure the "Read" permission" for the "website home directory" to organizational standards. CC ID 09168 | Configuration | Preventive | |
Configure the "Write" privilege for the "website home directory" to organizational standards. CC ID 09169 | Configuration | Preventive | |
Configure the "Script Source Access" permission for the "website home directory" to organizational standards. CC ID 09170 | Configuration | Preventive | |
Configure the "Directory Browsing" permission for the "website home directory" to organizational standards. CC ID 09171 | Configuration | Preventive | |
Configure the "Log Visits" permission for the "website home directory" to organizational standards. CC ID 09172 | Configuration | Preventive | |
Configure the "Index this resource" permission for the "website home directory" to organizational standards. CC ID 09173 | Configuration | Preventive | |
Configure the "Execute Permissions" permission to organizational standards. CC ID 09174 | Configuration | Preventive | |
Configure the "Anonymous Access" permission for the "website home directory" to organizational standards. CC ID 09175 | Configuration | Preventive | |
Configure the "file auditing" setting for the "\%SystemRoot%System32Inetsrv" directory to organizational standards. CC ID 09198 | Configuration | Preventive | |
Configure the "membership" of the "IUSR" account to organizational standards. CC ID 09213 | Configuration | Preventive | |
Configure the "IUSR" account to organizational standards. CC ID 09214 | Configuration | Preventive | |
Configure the "file auditing" setting for the "Inetpub" directory to organizational standards. CC ID 09225 | Configuration | Preventive | |
Configure the "file auditing" setting for the "Web Root" directory to organizational standards. CC ID 09226 | Configuration | Preventive | |
Configure the "file auditing" setting for the "Metaback" directory to organizational standards. CC ID 09227 | Configuration | Preventive | |
Configure the "IWAM" account to organizational standards. CC ID 09228 | Configuration | Preventive | |
Configure the "Application object owner" accounts to organizational standards. CC ID 09257 | Configuration | Preventive | |
Configure the "system tables" permissions to organizational standards. CC ID 09260 | Configuration | Preventive | |
Configure the "DDL" permissions to organizational standards. CC ID 09261 | Configuration | Preventive | |
Configure the "WITH GRANT OPTION" permissions to organizational standards. CC ID 09262 | Configuration | Preventive | |
Configure the "Object" permissions for the "PUBLIC or GUEST" account to organizational standards. CC ID 09263 | Configuration | Preventive | |
Configure the "restore database data or other DBMS configurations, features or objects" permissions to organizational standards. CC ID 09267 | Configuration | Preventive | |
Configure the "SQL Server Database Service" account to organizational standards. CC ID 09273 | Configuration | Preventive | |
Configure the "SQL Server Agent" account to organizational standards. CC ID 09274 | Configuration | Preventive | |
Configure the "SQL Server registry keys and sub-keys" permissions to organizational standards. CC ID 09276 | Configuration | Preventive | |
Configure the "built-in sa" account to organizational standards. CC ID 09298 | Configuration | Preventive | |
Configure the "audit access" setting for the "ErrorDumpDir" directory to organizational standards. CC ID 09299 | Configuration | Preventive | |
Configure the "audit access" setting for the "DefaultLog " file to organizational standards. CC ID 09300 | Configuration | Preventive | |
Configure the "audit access" setting for the "ErrorLog" File to organizational standards. CC ID 09301 | Configuration | Preventive | |
Configure the "audit access" setting for the "SQLPath " directory to organizational standards. CC ID 09302 | Configuration | Preventive | |
Configure the "audit access" setting for the " BackupDirectory " directory to organizational standards. CC ID 09303 | Configuration | Preventive | |
Configure the "audit access" setting for the "FullTextDefaultPath " directory to organizational standards. CC ID 09304 | Configuration | Preventive | |
Configure the "audit access" setting for the "WorkingDirectory " directory to organizational standards. CC ID 09305 | Configuration | Preventive | |
Configure the "audit access" setting for the "SQLBinRoot " directory to organizational standards. CC ID 09306 | Configuration | Preventive | |
Configure the "audit access" setting for the "SQLDataRoot " directory to organizational standards. CC ID 09307 | Configuration | Preventive | |
Configure the "audit access" setting for the "SQLProgramDir " directory to organizational standards. CC ID 09308 | Configuration | Preventive | |
Configure the "audit access" setting for the "DataDir " directory to organizational standards. CC ID 09309 | Configuration | Preventive | |
Configure the "Analysis Services" account to organizational standards. CC ID 09318 | Configuration | Preventive | |
Configure the "Integration Services" account to organizational standards. CC ID 09319 | Configuration | Preventive | |
Configure the "Reporting Services" account to organizational standards. CC ID 09320 | Configuration | Preventive | |
Configure the "Notification Services" account to organizational standards. CC ID 09321 | Configuration | Preventive | |
Configure the "Full Text Search" account to organizational standards. CC ID 09322 | Configuration | Preventive | |
Configure the "SQL Server Browser" account to organizational standards. CC ID 09323 | Configuration | Preventive | |
Configure the "SQL Server Active Directory Helper" account to organizational standards. CC ID 09324 | Configuration | Preventive | |
Configure the "SQL Writer" account to organizational standards. CC ID 09325 | Configuration | Preventive | |
Configure the "SQL Server MSSearch" registry key permissions to organizational standards. CC ID 09327 | Configuration | Preventive | |
Configure the "SQL Server Agent" registry key permissions to organizational standards. CC ID 09328 | Configuration | Preventive | |
Configure the "SQL Server RS" registry key permissions to organizational standards. CC ID 09330 | Configuration | Preventive | |
Configure the "Reporting Services Windows Integrated Security" accounts to organizational standards. CC ID 09347 | Configuration | Preventive | |
Configure the "permissions" of the "SQL Server Agent proxy" accounts to organizational standards. CC ID 09352 | Configuration | Preventive | |
Configure the "default webpage" for "all readable Tomcat Apache web document" directories to organizational standards. CC ID 09729 | Configuration | Preventive | |
Configure the "account" setting for "Tomcat" to organizational standards. CC ID 09792 | Configuration | Preventive | |
Configure the "specified codebase" permissions to organizational standards. CC ID 09796 | Configuration | Preventive | |
Configure the "property read permission" for the "Tomcat web application JVM" to organizational standards. CC ID 09813 | Configuration | Preventive | |
Configure the "property write permission" for the "Tomcat web application JVM" to organizational standards. CC ID 09814 | Configuration | Preventive | |
Configure the "status of the "Tomcat" account to organizational standards. CC ID 09815 | Configuration | Preventive | |
Configure the "user account" for "Oracle WebLogic Server" to organizational standards. CC ID 09823 | Configuration | Preventive | |
Configure the "Keystores" permission in "directories" to organizational standards. CC ID 09901 | Configuration | Preventive | |
Implement a reference monitor to implement the Access Control policies. CC ID 10096 | Configuration | Preventive | |
Configure the "Add Printer wizard - Network scan page (Managed network)" setting to organizational standards. CC ID 10692 | Configuration | Preventive | |
Configure the "Add Printer wizard - Network scan page (Unmanaged network)" setting to organizational standards. CC ID 10693 | Configuration | Preventive | |
Configure the "All Removable Storage classes: Deny all access" setting to organizational standards. CC ID 10696 | Configuration | Preventive | |
Configure the "All Removable Storage: Allow direct access in remote sessions" setting to organizational standards. CC ID 10697 | Configuration | Preventive | |
Configure the "Allowrdp files from unknown publishers" setting to organizational standards. CC ID 10698 | Configuration | Preventive | |
Configure the "Allowrdp files from valid publishers and user's defaultrdp settings" setting to organizational standards. CC ID 10699 | Configuration | Preventive | |
Configure the "Allow admin to install from Remote Desktop Services session" setting to organizational standards. CC ID 10700 | Configuration | Preventive | |
Configure the "Allow administrators to override Device Installation Restriction policies" setting to organizational standards. CC ID 10701 | Configuration | Preventive | |
Configure the "Allow Applications to Prevent Automatic Sleep (On Battery)" setting to organizational standards. CC ID 10702 | Configuration | Preventive | |
Configure the "Allow asynchronous user Group Policy processing when logging on through Remote Desktop Services" setting to organizational standards. CC ID 10704 | Configuration | Preventive | |
Configure the "Allow audio and video playback redirection" setting to organizational standards. CC ID 10705 | Configuration | Preventive | |
Configure the "Allow audio recording redirection" setting to organizational standards. CC ID 10706 | Configuration | Preventive | |
Configure the "Allow automatic configuration of listeners" setting to organizational standards. CC ID 10707 | Configuration | Preventive | |
Configure the "Allow Automatic Sleep with Open Network Files (On Battery)" setting to organizational standards. CC ID 10708 | Configuration | Preventive | |
Configure the "Allow Automatic Updates immediate installation" setting to organizational standards. CC ID 10710 | Configuration | Preventive | |
Configure the "Allow BITS Peercaching" setting to organizational standards. CC ID 10711 | Configuration | Preventive | |
Configure the "Allow certificates with no extended key usage certificate attribute" setting to organizational standards. CC ID 10712 | Configuration | Preventive | |
Configure the "Allow Corporate redirection of Customer Experience Improvement uploads" setting to organizational standards. CC ID 10713 | Configuration | Preventive | |
Configure the "Allow CredSSP authentication" setting for the "WinRM client" to organizational standards. CC ID 10714 | Configuration | Preventive | |
Configure the "Allow Cross-Forest User Policy and Roaming User Profiles" setting to organizational standards. CC ID 10716 | Configuration | Preventive | |
Configure the "Allow cryptography algorithms compatible with Windows NT 4.0" setting to organizational standards. CC ID 10717 | Configuration | Preventive | |
Configure the "Allow Delegating Default Credentials" setting to organizational standards. CC ID 10718 | Configuration | Preventive | |
Configure the "Allow Delegating Default Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10719 | Configuration | Preventive | |
Configure the "Allow Delegating Fresh Credentials" setting to organizational standards. CC ID 10720 | Configuration | Preventive | |
Configure the "Allow Delegating Fresh Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10721 | Configuration | Preventive | |
Configure the "Allow Delegating Saved Credentials" setting to organizational standards. CC ID 10722 | Configuration | Preventive | |
Configure the "Allow Delegating Saved Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10723 | Configuration | Preventive | |
Configure the "Allow desktop composition for remote desktop sessions" setting to organizational standards. CC ID 10724 | Configuration | Preventive | |
Configure the "Allow DNS Suffix Appending to Unqualified Multi-Label Name Queries" setting to organizational standards. CC ID 10725 | Configuration | Preventive | |
Configure the "Allow domain users to log on using biometrics" setting to organizational standards. CC ID 10726 | Configuration | Preventive | |
Configure the "Allow ECC certificates to be used for logon and authentication" setting to organizational standards. CC ID 10727 | Configuration | Preventive | |
Configure the "Allow Enhanced Storage certificate provisioning" setting to organizational standards. CC ID 10728 | Configuration | Preventive | |
Configure the "Allow installation of devices that match any of these device IDs" setting to organizational standards. CC ID 10729 | Configuration | Preventive | |
Configure the "Allow installation of devices using drivers that match these device setup classes" setting to organizational standards. CC ID 10730 | Configuration | Preventive | |
Configure the "Allow Integrated Unblock screen to be displayed at the time of logon" setting to organizational standards. CC ID 10731 | Configuration | Preventive | |
Configure the "Allow local activation security check exemptions" setting to organizational standards. CC ID 10732 | Configuration | Preventive | |
Configure the "Allow logon scripts when NetBIOS or WINS is disabled" setting to organizational standards. CC ID 10733 | Configuration | Preventive | |
Configure the "Allow non-administrators to install drivers for these device setup classes" setting to organizational standards. CC ID 10734 | Configuration | Preventive | |
Configure the "Allow non-administrators to receive update notifications" setting to organizational standards. CC ID 10735 | Configuration | Preventive | |
Configure the "Allow only system backup" setting to organizational standards. CC ID 10736 | Configuration | Preventive | |
Configure the "Allow only USB root hub connected Enhanced Storage devices" setting to organizational standards. CC ID 10737 | Configuration | Preventive | |
Configure the "Allow or Disallow use of the Offline Files feature" setting to organizational standards. CC ID 10738 | Configuration | Preventive | |
Configure the "Allow Print Spooler to accept client connections" setting to organizational standards. CC ID 10739 | Configuration | Preventive | |
Configure the "Allow printers to be published" setting to organizational standards. CC ID 10740 | Configuration | Preventive | |
Configure the "Allow pruning of published printers" setting to organizational standards. CC ID 10741 | Configuration | Preventive | |
Configure the "Allow remote start of unlisted programs" setting to organizational standards. CC ID 10743 | Configuration | Preventive | |
Configure the "Allow restore of system to default state" setting to organizational standards. CC ID 10744 | Configuration | Preventive | |
Configure the "Allow signature keys valid for Logon" setting to organizational standards. CC ID 10745 | Configuration | Preventive | |
Configure the "Allow signed updates from an intranet Microsoft update service location" setting to organizational standards. CC ID 10746 | Configuration | Preventive | |
Configure the "Allow the Network Access Protection client to support the 802.1x Enforcement Client component" setting to organizational standards. CC ID 10747 | Configuration | Preventive | |
Configure the "Allow time invalid certificates" setting to organizational standards. CC ID 10748 | Configuration | Preventive | |
Configure the "Allow time zone redirection" setting to organizational standards. CC ID 10749 | Configuration | Preventive | |
Configure the "Allow user name hint" setting to organizational standards. CC ID 10750 | Configuration | Preventive | |
Configure the "Allow users to log on using biometrics" setting to organizational standards. CC ID 10751 | Configuration | Preventive | |
Configure the "Always render print jobs on the server" setting to organizational standards. CC ID 10752 | Configuration | Preventive | |
Configure the "Always use classic logon" setting to organizational standards. CC ID 10754 | Configuration | Preventive | |
Configure the "Always use custom logon background" setting to organizational standards. CC ID 10755 | Configuration | Preventive | |
Configure the "Apply the default user logon picture to all users" setting to organizational standards. CC ID 10757 | Configuration | Preventive | |
Configure the "Assign a default domain for logon" setting to organizational standards. CC ID 10758 | Configuration | Preventive | |
Configure the "CD and DVD: Deny execute access" setting to organizational standards. CC ID 10767 | Configuration | Preventive | |
Configure the "CD and DVD: Deny read access" setting to organizational standards. CC ID 10768 | Configuration | Preventive | |
Configure the "CD and DVD: Deny write access" setting to organizational standards. CC ID 10769 | Configuration | Preventive | |
Configure the "Printers preference logging and tracing" setting to organizational standards. CC ID 10799 | Configuration | Preventive | |
Configure the "Contact PDC on logon failure" setting to organizational standards. CC ID 10825 | Configuration | Preventive | |
Configure the "Custom Classes: Deny read access" setting to organizational standards. CC ID 10835 | Configuration | Preventive | |
Configure the "Custom Classes: Deny write access" setting to organizational standards. CC ID 10836 | Configuration | Preventive | |
Configure the "Deny Delegating Default Credentials" setting to organizational standards. CC ID 10848 | Configuration | Preventive | |
Configure the "Deny Delegating Fresh Credentials" setting to organizational standards. CC ID 10849 | Configuration | Preventive | |
Configure the "Deny Delegating Saved Credentials" setting to organizational standards. CC ID 10850 | Configuration | Preventive | |
Configure the "Disallow changing of geographic location" setting to organizational standards. CC ID 10870 | Configuration | Preventive | |
Configure the "Disallow Interactive Users from generating Resultant Set of Policy data" setting to organizational standards. CC ID 10871 | Configuration | Preventive | |
Configure the "Disallow Kerberos authentication" setting for the "WinRM client" to organizational standards. CC ID 10872 | Configuration | Preventive | |
Configure the "Disallow locally attached storage as backup target" setting to organizational standards. CC ID 10874 | Configuration | Preventive | |
Configure the "Disallow Negotiate authentication" setting for the "WinRM client" to organizational standards. CC ID 10875 | Configuration | Preventive | |
Configure the "Disallow network as backup target" setting to organizational standards. CC ID 10877 | Configuration | Preventive | |
Configure the "Disallow optical media as backup target" setting to organizational standards. CC ID 10878 | Configuration | Preventive | |
Configure the "Disallow run-once backups" setting to organizational standards. CC ID 10879 | Configuration | Preventive | |
Configure the "Disallow selection of Custom Locales" setting to organizational standards. CC ID 10880 | Configuration | Preventive | |
Configure the "Disallow user override of locale settings" setting to organizational standards. CC ID 10881 | Configuration | Preventive | |
Configure the "Display information about previous logons during user logon" setting to organizational standards. CC ID 10887 | Configuration | Preventive | |
Configure the "Do not allow adding new targets via manual configuration" setting to organizational standards. CC ID 10891 | Configuration | Preventive | |
Configure the "Do not allow additional session logins" setting to organizational standards. CC ID 10892 | Configuration | Preventive | |
Configure the "Do not allow changes to initiator CHAP secret" setting to organizational standards. CC ID 10893 | Configuration | Preventive | |
Configure the "Do not allow changes to initiator iqn name" setting to organizational standards. CC ID 10894 | Configuration | Preventive | |
Configure the "Do not allow client printer redirection" setting to organizational standards. CC ID 10895 | Configuration | Preventive | |
Configure the "Do not allow clipboard redirection" setting to organizational standards. CC ID 10896 | Configuration | Preventive | |
Configure the "Do not allow color changes" setting to organizational standards. CC ID 10897 | Configuration | Preventive | |
Configure the "Do not allow COM port redirection" setting to organizational standards. CC ID 10898 | Configuration | Preventive | |
Configure the "Do not allow compression on all NTFS volumes" setting to organizational standards. CC ID 10899 | Configuration | Preventive | |
Configure the "Do not allow connections without IPSec" setting to organizational standards. CC ID 10900 | Configuration | Preventive | |
Configure the "Do not allow desktop composition" setting to organizational standards. CC ID 10901 | Configuration | Preventive | |
Configure the "Do not allow encryption on all NTFS volumes" setting to organizational standards. CC ID 10902 | Configuration | Preventive | |
Configure the "Do not allow Flip3D invocation" setting to organizational standards. CC ID 10903 | Configuration | Preventive | |
Configure the "Do not allow font smoothing" setting to organizational standards. CC ID 10904 | Configuration | Preventive | |
Configure the "Do not allow LPT port redirection" setting to organizational standards. CC ID 10905 | Configuration | Preventive | |
Configure the "Do not allow manual configuration of discovered targets" setting to organizational standards. CC ID 10906 | Configuration | Preventive | |
Configure the "Do not allow manual configuration of iSNS servers" setting to organizational standards. CC ID 10907 | Configuration | Preventive | |
Configure the "Do not allow manual configuration of target portals" setting to organizational standards. CC ID 10908 | Configuration | Preventive | |
Configure the "Do not allow non-Enhanced Storage removable devices" setting to organizational standards. CC ID 10909 | Configuration | Preventive | |
Configure the "Do not allow password authentication of Enhanced Storage devices" setting to organizational standards. CC ID 10910 | Configuration | Preventive | |
Configure the "Do not allow sessions without mutual CHAP" setting to organizational standards. CC ID 10912 | Configuration | Preventive | |
Configure the "Do not allow sessions without one way CHAP" setting to organizational standards. CC ID 10913 | Configuration | Preventive | |
Configure the "Do not allow smart card device redirection" setting to organizational standards. CC ID 10914 | Configuration | Preventive | |
Configure the "Do not allow Snipping Tool to run" setting to organizational standards. CC ID 10915 | Configuration | Preventive | |
Configure the "Do not allow Sound Recorder to run" setting to organizational standards. CC ID 10916 | Configuration | Preventive | |
Configure the "Do not allow the BITS client to use Windows Branch Cache" setting to organizational standards. CC ID 10918 | Configuration | Preventive | |
Configure the "Do not allow the computer to act as a BITS Peercaching client" setting to organizational standards. CC ID 10919 | Configuration | Preventive | |
Configure the "Do not allow the computer to act as a BITS Peercaching server" setting to organizational standards. CC ID 10920 | Configuration | Preventive | |
Configure the "Do not allow window animations" setting to organizational standards. CC ID 10921 | Configuration | Preventive | |
Configure the "Do not allow Windows Media Center to run" setting to organizational standards. CC ID 10923 | Configuration | Preventive | |
Configure the "Do not display Initial Configuration Tasks window automatically at logon" setting to organizational standards. CC ID 10927 | Configuration | Preventive | |
Configure the "Do not display Manage Your Server page at logon" setting to organizational standards. CC ID 10928 | Configuration | Preventive | |
Configure the "Do not display Server Manager automatically at logon" setting to organizational standards. CC ID 10929 | Configuration | Preventive | |
Configure the "Do not set default client printer to be default printer in a session" setting to organizational standards. CC ID 10935 | Configuration | Preventive | |
Configure the "Execute print drivers in isolated processes" setting to organizational standards. CC ID 10964 | Configuration | Preventive | |
Configure the "Expected dial-up delay on logon" setting to organizational standards. CC ID 10965 | Configuration | Preventive | |
Configure the "Extend Point and Print connection to search Windows Update" setting to organizational standards. CC ID 10966 | Configuration | Preventive | |
Configure the "Filter duplicate logon certificates" setting to organizational standards. CC ID 10967 | Configuration | Preventive | |
Configure the "Floppy Drives: Deny execute access" setting to organizational standards. CC ID 10969 | Configuration | Preventive | |
Configure the "Floppy Drives: Deny read access" setting to organizational standards. CC ID 10970 | Configuration | Preventive | |
Configure the "Floppy Drives: Deny write access" setting to organizational standards. CC ID 10971 | Configuration | Preventive | |
Configure the "Limit the maximum number of files allowed in a BITS job" setting to organizational standards. CC ID 11020 | Configuration | Preventive | |
Configure the "Netlogon share compatibility" setting to organizational standards. CC ID 11048 | Configuration | Preventive | |
Configure the "Only allow local user profiles" setting to organizational standards. CC ID 11056 | Configuration | Preventive | |
Configure the "Only use Package Point and print" setting to organizational standards. CC ID 11057 | Configuration | Preventive | |
Configure the "Override print driver execution compatibility setting reported by print driver" setting to organizational standards. CC ID 11059 | Configuration | Preventive | |
Configure the "Package Point and print - Approved servers" setting to organizational standards. CC ID 11061 | Configuration | Preventive | |
Configure the "Pre-populate printer search location text" setting to organizational standards. CC ID 11065 | Configuration | Preventive | |
Configure the "Printer browsing" setting to organizational standards. CC ID 11097 | Configuration | Preventive | |
Configure the "Provide information about previous logons to client computers" setting to organizational standards. CC ID 11111 | Configuration | Preventive | |
Configure the "Prune printers that are not automatically republished" setting to organizational standards. CC ID 11112 | Configuration | Preventive | |
Configure the "Redirect only the default client printer" setting to organizational standards. CC ID 11116 | Configuration | Preventive | |
Configure the "Removable Disks: Deny execute access" setting to organizational standards. CC ID 11123 | Configuration | Preventive | |
Configure the "Removable Disks: Deny read access" setting to organizational standards. CC ID 11124 | Configuration | Preventive | |
Configure the "Removable Disks: Deny write access" setting to organizational standards. CC ID 11125 | Configuration | Preventive | |
Configure the "Run logon scripts synchronously" setting to organizational standards. CC ID 11151 | Configuration | Preventive | |
Configure the "Run these programs at user logon" setting to organizational standards. CC ID 11155 | Configuration | Preventive | |
Configure the "Selectively allow the evaluation of a symbolic link" setting to organizational standards. CC ID 11169 | Configuration | Preventive | |
Configure the "Specify SHA1 thumbprints of certificates representing trustedrdp publishers" setting to organizational standards. CC ID 11215 | Configuration | Preventive | |
Configure the "Tape Drives: Deny execute access" setting to organizational standards. CC ID 11233 | Configuration | Preventive | |
Configure the "Tape Drives: Deny read access" setting to organizational standards. CC ID 11234 | Configuration | Preventive | |
Configure the "Tape Drives: Deny write access" setting to organizational standards. CC ID 11235 | Configuration | Preventive | |
Configure the "Timeout for hung logon sessions during shutdown" setting to organizational standards. CC ID 11245 | Configuration | Preventive | |
Configure the "Troubleshooting: Allow users to access and run Troubleshooting Wizards" setting to organizational standards. CC ID 11247 | Configuration | Preventive | |
Configure the "Troubleshooting: Allow users to access online troubleshooting content on Microsoft servers from the Troubleshooting Control Panel (via the Windows Online Troubleshooting Service - WOTS)" setting to organizational standards. CC ID 11248 | Configuration | Preventive | |
Configure the "Turn off the "Order Prints" picture task" setting to organizational standards. CC ID 11314 | Configuration | Preventive | |
Configure the "Use Remote Desktop Easy Print printer driver first" setting to organizational standards. CC ID 11365 | Configuration | Preventive | |
Establish and maintain specific directory installation rules and domain controller installation rules. CC ID 01734 | Establish/Maintain Documentation | Preventive | |
Configure the "Domain controller: Allow server operators to schedule tasks" setting. CC ID 01735 | Configuration | Preventive | |
Configure the "domain member: require strong (Windows 2000 or later) session key" setting. CC ID 01738 | Configuration | Preventive | |
Configure the "Enforce user logon restrictions" setting. CC ID 04500 | Configuration | Preventive | |
Configure the "Maximum lifetime for service ticket" setting. CC ID 04501 | Configuration | Preventive | |
Configure the "Maximum lifetime for user ticket" setting. CC ID 04502 | Configuration | Preventive | |
Configure the "Maximum lifetime for user ticket renewal" setting. CC ID 04503 | Configuration | Preventive | |
Configure the "Maximum tolerance for computer clock synchronization" setting. CC ID 04504 | Configuration | Preventive | |
Verify the Trusted Computing Base is installed, as appropriate. CC ID 05589 | Configuration | Preventive | |
Establish, implement, and maintain appropriate shutdown procedures. CC ID 01778 | Establish/Maintain Documentation | Preventive | |
Configure the "Shutdown: Allow system to be shut down without having to log on" setting. CC ID 01779 | Configuration | Preventive | |
Configure the "Shutdown: Clear virtual memory pagefile" setting. CC ID 01780 | Configuration | Preventive | |
Configure Multi-Function Devices to clear their hard drives in between jobs. CC ID 04816 | Configuration | Preventive | |
Configure shared volumes to use the appropriate file system for the network protocols being operated (NT File System in Windows OS or Netware SS), and configure the security parameters. CC ID 01927 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\at.exe. CC ID 01929 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\attrib.exe. CC ID 01930 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\cacls.exe. CC ID 01931 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\debug.exe. CC ID 01932 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\drwatson.exe. CC ID 01933 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\drwtsn32.exe. CC ID 01934 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\edlin.exe. CC ID 01935 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\eventcreate.exe. CC ID 01936 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\eventtriggers.exe. CC ID 01937 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\ftp.exe. CC ID 01938 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\net.exe. CC ID 01939 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\net1.exe. CC ID 01940 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\netsh.exe. CC ID 01941 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\rcp.exe. CC ID 01942 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\reg.exe. CC ID 01943 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\regedit.exe. CC ID 01944 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\regedt32.exe. CC ID 01945 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\regsvr32.exe. CC ID 01946 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\rexec.exe. CC ID 01947 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\rsh.exe. CC ID 01948 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\runas.exe. CC ID 01949 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\sc.exe. CC ID 01950 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\subst.exe. CC ID 01951 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\telnet.exe. CC ID 01952 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\tftp.exe. CC ID 01953 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\tlntsvr.exe. CC ID 01954 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\. CC ID 01968 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\autoexec.bat. CC ID 01969 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\boot.ini. CC ID 01970 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\config.sys. CC ID 01971 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\io.sys. CC ID 01972 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\msdos.sys. CC ID 01973 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\ntbootdd.sys. CC ID 01974 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\ntdetect.com. CC ID 01975 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\ntldr. CC ID 01976 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings. CC ID 01977 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings\Administrator. CC ID 01978 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users. CC ID 01979 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson. CC ID 01980 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Setting\Default User. CC ID 01981 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\System Volume Information. CC ID 01982 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Temp. CC ID 01983 | Configuration | Preventive | |
Configure the file permissions for %ProgramFiles%. CC ID 01984 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Program Files\Resource Kit. CC ID 01985 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%. CC ID 01986 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\$NTServicePackUninstall$. CC ID 01987 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\CSC. CC ID 01988 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Debug. CC ID 01989 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Debug\UserMode. CC ID 01990 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Offline Web Pages. CC ID 01991 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Registration. CC ID 01992 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Repair. CC ID 01993 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\security. CC ID 01994 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32. CC ID 01995 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\Ntbackup.exe. CC ID 01996 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\secedit.exe. CC ID 01997 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\appmgmt. CC ID 01998 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\config. CC ID 01999 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\dllcache. CC ID 02000 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\DTCLog. CC ID 02001 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\GroupPolicy. CC ID 02002 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\ias. CC ID 02003 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\NTMSData. CC ID 02004 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\reinstallbackups. CC ID 02005 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\Setup. CC ID 02006 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\spool\printers. CC ID 02007 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Tasks. CC ID 02008 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Temp. CC ID 02009 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Program Files\Resource Pro Kit. CC ID 04301 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\arp.exe. CC ID 04304 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\nbstat.exe. CC ID 04305 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\netstat.exe. CC ID 04306 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\nslookup.exe. CC ID 04307 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\regini.exe. CC ID 04308 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\route.exe. CC ID 04310 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\systeminfo.exe. CC ID 04311 | Configuration | Preventive | |
Disable DOSFAT.NSS. CC ID 04462 | Configuration | Preventive | |
Enable user directory data encryption. CC ID 04467 | Configuration | Preventive | |
Verify iPrint/NDPS are not on the system volume (sys). CC ID 04468 | Technical Security | Preventive | |
Purge files immediately after deletion. CC ID 04469 | Technical Security | Preventive | |
Remove the SYS:Mail directory. CC ID 04470 | Configuration | Preventive | |
Configure the largest folder size (storage capacity) restrictions for user directories. CC ID 04471 | Configuration | Preventive | |
Verify only necessary system files are located on the server's system volume (sys) or boot volume. CC ID 04472 | Testing | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config\AppEvent.evt. CC ID 04506 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config\SecEvent.evt. CC ID 04507 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config\SysEvent.evt. CC ID 04508 | Configuration | Preventive | |
Configure the file permissions for %SystemDirectory%. CC ID 04532 | Configuration | Preventive | |
Configure the file permissions appropriately for all shell executables. CC ID 05619 | Configuration | Preventive | |
Configure the file permissions for the remote copy (rcp) binary properly. CC ID 05620 | Configuration | Preventive | |
Configure the file permissions for the remote login (rlogin) binary properly. CC ID 05621 | Configuration | Preventive | |
Configure the file permissions for the rlogind binary properly. CC ID 05622 | Configuration | Preventive | |
Configure the file permissions for the remote shell (rsh) binary properly. CC ID 05623 | Configuration | Preventive | |
Configure the file permissions for the rshd binary properly. CC ID 05624 | Configuration | Preventive | |
Configure the file permissions for the tftp binary properly. CC ID 05625 | Configuration | Preventive | |
Configure the file permissions for the tftpd binary properly. CC ID 05626 | Configuration | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwts32.log properly. CC ID 05627 | Configuration | Preventive | |
Configure the directory permissions for %SystemDrive%\My Download Files properly. CC ID 05628 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\Driver Cache\I386\Driver.cab properly. CC ID 05629 | Configuration | Preventive | |
Configure the permissions for the %SystemRoot%\$NtUninstall* directories properly. CC ID 05630 | Configuration | Preventive | |
Configure the directory permissions for %SystemDrive%\NTDS properly. CC ID 05631 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\SYSVOL properly. CC ID 05632 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\SYSVOL\domain\Policies properly. CC ID 05633 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\repl properly. CC ID 05634 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\repl\export properly. CC ID 05635 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\repl\import properly. CC ID 05636 | Configuration | Preventive | |
Configure the directory permissions for %ALL% properly. CC ID 05637 | Configuration | Preventive | |
Configure the directory permissions for %ALL%\Program Files\MQSeries properly. CC ID 05638 | Configuration | Preventive | |
Configure the directory permissions for %ALL%\Program Files\MQSeries\qmggr properly. CC ID 05639 | Configuration | Preventive | |
Configure the directory permissions for %SystemDrive%\Documents and Settings\All Users\Application Data\Microsoft\HTML Help ACL properly. CC ID 05640 | Configuration | Preventive | |
Configure the directory permissions for %SystemDrive%\WINNT\SECURITY\Database\SECEDIT.SDB ACL properly. CC ID 05641 | Configuration | Preventive | |
Configure the directory permissions for %SystemDrive%\perflogs properly. CC ID 05642 | Configuration | Preventive | |
Configure the directory permissions for %SystemDrive%\i386 properly. CC ID 05643 | Configuration | Preventive | |
Configure the directory permissions for %ProgramFiles%\Common Files\SpeechEngines\TTS properly. CC ID 05644 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\_default.plf properly. CC ID 05645 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\addins properly. CC ID 05646 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\appPatch properly. CC ID 05647 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\clock.avi properly. CC ID 05648 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\Connection Wizard properly. CC ID 05649 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Driver Cache properly. CC ID 05650 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\explorer.scf properly. CC ID 05651 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\explorer.exe properly. CC ID 05652 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\Help properly. CC ID 05653 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\inf\unregmp2.exe properly. CC ID 05654 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\Java properly. CC ID 05655 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\mib.bin properly. CC ID 05656 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\msagent properly. CC ID 05657 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\msdfmap.ini properly. CC ID 05658 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\mui properly. CC ID 05659 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\security\templates properly. CC ID 05660 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\speech properly. CC ID 05661 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system.ini properly. CC ID 05662 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system\setup.inf properly. CC ID 05663 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system\stdole.tlb properly. CC ID 05664 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\twain_32 properly. CC ID 05665 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\CatRoot properly. CC ID 05666 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\configf\systemprofile properly. CC ID 05667 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\dhcp properly. CC ID 05668 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\drivers properly. CC ID 05669 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\Export properly. CC ID 05670 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\ipconfig.exe properly. CC ID 05671 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\LogFiles properly. CC ID 05672 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\mshta.exe properly. CC ID 05673 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\mui properly. CC ID 05674 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\ShellExt properly. CC ID 05675 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\wbem properly. CC ID 05676 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\wbem\mof properly. CC ID 05677 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\wbem\repository properly. CC ID 05678 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\wbem\logs properly. CC ID 05679 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile% properly. CC ID 05680 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data properly. CC ID 05681 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft properly. CC ID 05682 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Crypto\DSSHKLMKeys properly. CC ID 05683 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Crypto\RSAHKLMKeys properly. CC ID 05684 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Dr Watson properly. CC ID 05685 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Dr Watson\drwtsn32.log properly. CC ID 05686 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\HTML Help properly. CC ID 05687 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\MediaIndex properly. CC ID 05688 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Documents\desktop.ini properly. CC ID 05689 | Configuration | Preventive | |
Configure the directory permissions for %AllUsersProfile%\DRM properly. CC ID 05690 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\Debug\UserMode\userenv.log properly. CC ID 05691 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Installer properly. CC ID 05692 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\Prefetch properly. CC ID 05693 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\Registration\CRMLog properly. CC ID 05694 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\ciadv.msc properly. CC ID 05695 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Com\comexp.msc properly. CC ID 05696 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\compmgmt.msc properly. CC ID 05697 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config properly. CC ID 05698 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config\*.evt properly. CC ID 05699 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\devmgmt.msc properly. CC ID 05700 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\dfrg.msc properly. CC ID 05701 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\diskmgmt.msc properly. CC ID 05702 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\system32\eventvwr.msc properly. CC ID 05703 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\fsmgmt.msc properly. CC ID 05704 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\gpedit.msc properly. CC ID 05705 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\lusrmgr.msg properly. CC ID 05706 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\MSDTC properly. CC ID 05707 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\ntmsoprq.msc properly. CC ID 05708 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\ntmsmgr.msc properly. CC ID 05709 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\perfmon.msc properly. CC ID 05710 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\RSoP.msc properly. CC ID 05711 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\secpol.msc properly. CC ID 05712 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\services.msc properly. CC ID 05713 | Configuration | Preventive | |
Configure the file permissions for %SystemRoot%\System32\wmimgmt.msc properly. CC ID 05714 | Configuration | Preventive | |
Configure the directory permissions for %SystemRoot%\Web properly. CC ID 05715 | Configuration | Preventive | |
Configure the BitLocker setting appropriately for fixed disk drives and removable disk drives. CC ID 06064 | Configuration | Preventive | |
Configure the settings for fixed disk drives, removable disk drives, and operating system disk drives. CC ID 06065 | Configuration | Preventive | |
Configure the BitLocker identifiers. CC ID 06066 | Configuration | Preventive | |
Configure utility and device driver software in accordance with organizational standards. CC ID 12340 | Configuration | Preventive | |
Review the use of utility and device driver software, as necessary. CC ID 13145 | Business Processes | Detective | |
Restrict utility programs from interfering with Information Technology operations. CC ID 13087 | Configuration | Preventive | |
Configure appropriate Partitioning schemes. CC ID 02162 | Configuration | Preventive | |
Verify the /home file system, /export/home file system, and /var file system each has its own partition. CC ID 02163 | Configuration | Preventive | |
Verify the root shell environment is located outside the /usr directory in a partitioned environment. CC ID 02158 | Configuration | Preventive | |
Verify the primary filesystem partition uses an appropriate filesystem. CC ID 05716 | Configuration | Preventive | |
Enable the OS/2 subsystem, as appropriate. CC ID 05717 | Configuration | Preventive | |
Configure the "nodev" option for "/tmp" setting to organizational standards. CC ID 08725 | Establish/Maintain Documentation | Preventive | |
Configure the "nodev" option for "/dev/shm" setting to organizational standards. CC ID 08726 | Establish/Maintain Documentation | Preventive | |
Configure the "/tmp filesystem partition" setting to organizational standards. CC ID 08727 | Establish/Maintain Documentation | Preventive | |
Configure the "var/log" filesystem to organizational standards. CC ID 08728 | Establish/Maintain Documentation | Preventive | |
Configure the “var/log/audit” filesystem to organizational standards. CC ID 08729 | Establish/Maintain Documentation | Preventive | |
Configure the "nosuid" setting on the "/tmp" directory to organizational standards. CC ID 08730 | Establish/Maintain Documentation | Preventive | |
Configure the "noexec" setting on the "/tmp" directory to organizational standards. CC ID 08731 | Establish/Maintain Documentation | Preventive | |
Configure the "nosuid" setting on the "/dev/shm" directory to organizational standards. CC ID 08732 | Establish/Maintain Documentation | Preventive | |
Configure the "noexec" option for "/dev/shm" to organizational standards. CC ID 08733 | Establish/Maintain Documentation | Preventive | |
Configure the "/var/tmp filesystem partition" setting to organizational standards. CC ID 08734 | Establish/Maintain Documentation | Preventive | |
Configure the "nodev" option for "/run/shm" to organizational standards. CC ID 11376 | Configuration | Preventive | |
Configure the "nosuid" option for "/run/shm" to organizational standards. CC ID 11377 | Configuration | Preventive | |
Configure the "noexec" option for "/run/shm" to organizational standards. CC ID 11378 | Configuration | Preventive | |
Configure attached printers and shared printers. CC ID 04499 | Configuration | Preventive | |
Establish, implement, and maintain network parameter modification procedures. CC ID 01517 | Establish/Maintain Documentation | Preventive | |
Configure the IPsec security association lifetime to organizational standards. CC ID 16508 | Configuration | Preventive | |
Configure route filtering to organizational standards. CC ID 16359 | Configuration | Preventive | |
Refrain from accepting routes from unauthorized parties. CC ID 16397 | Technical Security | Preventive | |
Configure security gateways to organizational standards. CC ID 16352 | Configuration | Preventive | |
Configure network elements to organizational standards. CC ID 16361 | Configuration | Preventive | |
Configure devices having access to network elements to organizational standards. CC ID 16408 | Configuration | Preventive | |
Configure routing tables to organizational standards. CC ID 15438 | Configuration | Preventive | |
Configure "NetBT NodeType configuration" to organizational standards. CC ID 15383 | Configuration | Preventive | |
Configure "Allow remote server management through WinRM" to organizational standards. CC ID 15364 | Configuration | Preventive | |
Configure "Allow network connectivity during connected-standby (on battery)" to organizational standards. CC ID 15342 | Configuration | Preventive | |
Configure BOOTP queries to be accepted or denied by the DHCP Server, as appropriate. CC ID 06040 | Configuration | Preventive | |
Enable TCP wrappers. CC ID 01567 | Configuration | Preventive | |
Configure TCP wrappers. CC ID 01566 | Configuration | Preventive | |
Configure devices to block or avoid outbound connections. CC ID 04807 | Configuration | Preventive | |
Configure devices to deny inbound connections. CC ID 04805 | Configuration | Preventive | |
Review and restrict network addresses and network protocols. CC ID 01518 | Configuration | Preventive | |
Establish, implement, and maintain a network addressing plan. CC ID 16399 | Establish/Maintain Documentation | Preventive | |
Define the location requirements for network elements and network devices. CC ID 16379 | Process or Activity | Preventive | |
Disable wireless access if it is not necessary. CC ID 12100 | Configuration | Preventive | |
Configure wireless access to be restricted to authorized wireless networks. CC ID 12099 | Technical Security | Preventive | |
Configure Network Address Translation to organizational standards. CC ID 16395 | Configuration | Preventive | |
Enable Network Address Translation or Port Address Translation for internal networks on all network access and control points. CC ID 00545 | Configuration | Preventive | |
Disable NIS Server Daemons unless NIS Server Daemons are absolutely necessary. CC ID 01457 | Configuration | Preventive | |
Disable NIS Client Daemons unless NIS Client Daemons are absolutely necessary. CC ID 01458 | Configuration | Preventive | |
Disable NIS+ daemons unless NIS+ daemons are absolutely necessary. CC ID 01459 | Configuration | Preventive | |
Disable Kerberos server daemons unless Kerberos server daemons are absolutely necessary. CC ID 01461 | Configuration | Preventive | |
Disable Kerberos client daemons unless Kerberos client daemons are absolutely necessary. CC ID 01462 | Configuration | Preventive | |
Disable Kerberos-related daemons unless Kerberos-related daemons are absolutely necessary. CC ID 01463 | Configuration | Preventive | |
Disable DHCP Server unless DHCP Server is absolutely necessary. CC ID 01482 | Configuration | Preventive | |
Disable Domain Name Server unless Domain Name Server is absolutely necessary. CC ID 01483 | Configuration | Preventive | |
Disable Simple Network Management Protocol unless it is absolutely necessary. CC ID 01491 | Configuration | Preventive | |
Enable or disable tunneling, as necessary. CC ID 15235 | Configuration | Preventive | |
Disable Internet Protocol version 6 unless it is absolutely necessary. CC ID 01493 | Configuration | Preventive | |
Disable Simple Mail Transport Protocol unless it is absolutely necessary. CC ID 01825 | Configuration | Preventive | |
Disable SNMP trap unless SNMP trap is absolutely necessary. CC ID 01828 | Configuration | Preventive | |
Disable UNIX-to-UNIX Copy Program unless it is absolutely necessary. CC ID 02169 | Configuration | Preventive | |
Disable the ugidd daemon unless the ugidd daemon is absolutely necessary. CC ID 02181 | Configuration | Preventive | |
Disable IP Routing unless it is absolutely necessary. CC ID 02170 | Configuration | Preventive | |
Disable Client Service for NetWare unless it is absolutely necessary. CC ID 04277 | Configuration | Preventive | |
Disable HyperText Transfer Protocol Secure Socket Layer unless it is absolutely necessary. CC ID 04281 | Configuration | Preventive | |
Disable network connections unless network connections are absolutely necessary. CC ID 04283 | Configuration | Preventive | |
Disable Boot Protocol unless it is absolutely necessary. CC ID 04809 | Configuration | Preventive | |
Disable Pre-boot eXecution Environment unless it is absolutely necessary. CC ID 04819 | Configuration | Preventive | |
Disable Bluetooth unless Bluetooth is absolutely necessary. CC ID 04476 | Configuration | Preventive | |
Disable Internetwork Packet Exchange/Sequenced Packet Exchange. CC ID 04800 | Configuration | Preventive | |
Disable AppleTalk. CC ID 04799 | Configuration | Preventive | |
Disable Network Basic Input/Output System. CC ID 01925 | Configuration | Preventive | |
Assign or reserve static IP addresses in Dynamic Host Configuration Protocol. CC ID 04801 | Configuration | Preventive | |
Disable wireless networking on Multi-Function Devices, unless absolutely necessary. CC ID 04821 | Configuration | Preventive | |
Configure mountd to use a static port or a dynamic portmapper port, as appropriate. CC ID 06023 | Configuration | Preventive | |
Configure the Avahi daemon to serve via Internet Protocol version 4, Internet Protocol version 6, as appropriate. CC ID 06024 | Configuration | Preventive | |
Validate and check Simple Network Management Protocol using snmpwalk. CC ID 06941 | Configuration | Preventive | |
Disable the XDMCP port. CC ID 01563 | Configuration | Preventive | |
Prevent syslog from accepting messages from the network. CC ID 01562 | Configuration | Preventive | |
Prevent X server from listening on port 6000/tcp. CC ID 01565 | Configuration | Preventive | |
Configure the Intrusion Detection System and the Intrusion Prevention System to accept the organizational vulnerability scanning host or vendor's originating IP address. CC ID 01645 | Configuration | Preventive | |
Configure the "Network access: Allow anonymous SID/Name translation" setting to organizational standards. CC ID 01717 | Configuration | Preventive | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts" setting. CC ID 01718 | Configuration | Preventive | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts and shares" setting. CC ID 01719 | Configuration | Preventive | |
Enable Data Execution Protection for all applications. CC ID 01720 | Configuration | Preventive | |
Enable digital encryption or digital signatures of secure channel data. CC ID 01736 | Configuration | Preventive | |
Enable digital signatures of communications using the Server Message Block protocol. CC ID 01762 | Configuration | Preventive | |
Configure the "Microsoft network client: Send unencrypted password to connect to third-party SMB servers" setting. CC ID 01764 | Configuration | Preventive | |
Configure the amount of idle time required before disconnecting an idle session. CC ID 01763 | Configuration | Preventive | |
Configure the "Allow reconnection from original client only" setting to organizational standards. CC ID 04515 | Configuration | Preventive | |
Enable the disconnect clients setting (server) or force logoff setting (client) if the account's allotted logon period expire. CC ID 01765 [{time of day access} Review whether management does the following: Sets time-of-day or terminal limitations for some applications or for more sensitive functions within an application. App A Objective 6.22.e] | Configuration | Preventive | |
Configure the "Network access: Do not allow storage of credentials or .NET Passports for network authentication" setting. CC ID 01766 | Configuration | Preventive | |
Configure the "Network access: Let Everyone permissions apply to anonymous users" setting. CC ID 01767 | Configuration | Preventive | |
Configure the "Network access: Named pipes that can be accessed anonymously" setting. CC ID 01768 | Configuration | Preventive | |
Configure the "Network access: Remotely accessible registry paths" setting. CC ID 01769 | Configuration | Preventive | |
Configure the "Network access: Sharing and security model for local accounts" setting. CC ID 01771 | Configuration | Preventive | |
Configure the "Network security: Do not store LAN Manager hash value on next password change" setting. CC ID 01772 | Configuration | Preventive | |
Configure the "Network security: LAN Manager authentication level" setting. CC ID 01773 | Configuration | Preventive | |
Configure the "Network security: LDAP client signing requirements" setting. CC ID 01774 | Configuration | Preventive | |
Configure Lightweight Directory Access Protocol connections for security. CC ID 04451 | Configuration | Preventive | |
Configure the least session security for NT LM Security Support Provider based clients (including secure RPC) and servers settings. CC ID 01775 | Configuration | Preventive | |
Enable the LDAP cache manager as necessary. CC ID 01460 | Configuration | Preventive | |
Configure firewalls in accordance with organizational standards. CC ID 01926 | Configuration | Preventive | |
Control inbound connections to the firewall. CC ID 04397 | Configuration | Preventive | |
Control outbound connections to the firewall. CC ID 04398 | Configuration | Preventive | |
Configure the "Windows Firewall: Do not allow exceptions" setting. CC ID 04318 | Configuration | Preventive | |
Configure the firewall to define program exceptions as necessary. CC ID 04319 | Configuration | Preventive | |
Configure the firewall to display notifications. CC ID 04399 | Configuration | Preventive | |
Configure the firewall to allow Unicast responses. CC ID 04400 | Configuration | Preventive | |
Configure the firewall to apply local connection security rules. CC ID 04402 | Configuration | Preventive | |
Establish, implement, and maintain firewall rules in accordance with organizational standards. CC ID 16353 | Establish/Maintain Documentation | Preventive | |
Review and approve the firewall rules, as necessary. CC ID 06745 | Configuration | Preventive | |
Disable Internet Connection Sharing. CC ID 02035 | Configuration | Preventive | |
Disable anonymous DDP. CC ID 02193 | Configuration | Preventive | |
Configure the "Set client connection encryption level" setting. CC ID 04321 | Configuration | Preventive | |
Configure the "Network access: Restrict anonymous access to named pipes and shares" setting to organizational standards. CC ID 04381 | Configuration | Preventive | |
Configure the "Intranet Sites: Include all network paths (UNCs)" setting. CC ID 04414 | Configuration | Preventive | |
Configure RConsoleJ in NetWare. CC ID 04460 | Configuration | Preventive | |
Configure Secure Console in NetWare. CC ID 04461 | Configuration | Preventive | |
Disable Universal Description, Discovery, and Integration. CC ID 04466 | Configuration | Preventive | |
Enable encryption for connections that transfer restricted data over HyperText Transfer Protocol. CC ID 04473 | Configuration | Preventive | |
Use HyperText Transfer Protocol Secure to protect authenticators or other restricted data or restricted information. CC ID 04474 | Configuration | Preventive | |
Configure Windows Messenger to prevent access to the internet. CC ID 04518 | Configuration | Preventive | |
Configure the "Always wait for the network at computer startup and logon" setting to organizational standards. CC ID 04519 | Configuration | Preventive | |
Do not Configure anonymous File Transfer Protocol on computers located inside a defined security perimeter. CC ID 04527 | Configuration | Preventive | |
Create an access control list on Network Access and Control Points to restrict access. CC ID 04810 | Configuration | Preventive | |
Configure the Access Control List to restrict connections between untrusted networks and any system that holds restricted data or restricted information. CC ID 06077 | Configuration | Preventive | |
Configure the Access Control List (ACL) so that internal network addresses cannot pass from the Internet into the Demilitarized Zone (DMZ). CC ID 06421 | Configuration | Preventive | |
Configure the Access Control List so that outbound network traffic from protected subnets can only access IP Addresses inside the Demilitarized Zone. CC ID 06422 | Configuration | Preventive | |
Configure Print Services to use port 9100 and/or port 515. CC ID 04811 | Configuration | Preventive | |
Configure the SSH server in accordance with organizational standards. CC ID 04843 | Configuration | Preventive | |
Configure permissions for SSH private host key files to organizational standards. CC ID 15331 | Configuration | Preventive | |
Configure permissions for SSH public host key files to organizational standards. CC ID 15333 | Configuration | Preventive | |
Disable Secure Shell version 1 and use Secure Shell version 2. CC ID 04465 | Configuration | Preventive | |
Allow or deny inbound connections to the secure shell port, as appropriate. CC ID 05746 | Configuration | Preventive | |
Enable or disable the emulation of the rsh command through the SSH server, as appropriate. CC ID 05747 | Configuration | Preventive | |
Configure SSH X11 forwarding to organizational standards. CC ID 05748 | Configuration | Preventive | |
Set the SSH authentication log retry limit. CC ID 05750 | Configuration | Preventive | |
Configure SSH integration with .rhosts to organizational standards. CC ID 05751 | Configuration | Preventive | |
Configure SSH integration with hosts.equiv to organizational standards. CC ID 05752 | Configuration | Preventive | |
Enable or disable SSH Rhosts RSA Authentication, as appropriate. CC ID 05753 | Configuration | Preventive | |
Use Secure Shell for remote logins and file transfers. CC ID 06562 | Configuration | Preventive | |
Configure the "/etc/hosts.deny" file: Content to organizational standards. CC ID 09924 | Configuration | Preventive | |
Configure the "hosts.deny" file permissions to organizational standards. CC ID 09925 | Configuration | Preventive | |
Configure the "PermitEmptyPasswords" setting to organizational standards. CC ID 09926 | Configuration | Preventive | |
Configure the "SSH IgnoreRhosts" setting to organizational standards. CC ID 09951 | Configuration | Preventive | |
Configure the "allowed users and groups" setting for "SSH" to organizational standards. CC ID 09952 | Configuration | Preventive | |
Configure Network Time Protocol. CC ID 04844 | Configuration | Preventive | |
Configure multicasting. CC ID 04845 | Configuration | Preventive | |
Set the apache2 server's ServerTokens value properly. CC ID 05720 | Configuration | Preventive | |
Set the apache2 server's ServerSignature value properly. CC ID 05721 | Configuration | Preventive | |
Configure "Configuration of wireless settings using Windows Connect Now" to organizational standards. CC ID 05722 | Configuration | Preventive | |
Configure X11 forwarding via Secure Shell, as appropriate. CC ID 05723 | Configuration | Preventive | |
Enable the NIS passwd daemon as necessary. CC ID 05725 | Configuration | Preventive | |
Enable the NIS update daemon as necessary. CC ID 05726 | Configuration | Preventive | |
Enable the NIS xfr daemon as necessary. CC ID 05727 | Configuration | Preventive | |
Enable or disable strict destination multihoming, as appropriate. CC ID 05728 | Configuration | Preventive | |
Enable or disable IPv4 strict multihoming, as appropriate. CC ID 05729 | Configuration | Preventive | |
Enable the appropriate tunneling protocol for Internet Protocol version 6. CC ID 05730 | Configuration | Preventive | |
Enable or disable the automatic loading of the IPv6 kernel module, as appropriate. CC ID 05731 | Configuration | Preventive | |
Configure the router advertisements settings to organizational standards. CC ID 05732 | Configuration | Preventive | |
Configure IPv6 privacy extensions properly. CC ID 05733 | Configuration | Preventive | |
Set the default number of global unicast IPv6 addresses allowed per network interface properly. CC ID 05734 | Configuration | Preventive | |
Set the default number of IPv6 router solicitations for network interfaces to send properly. CC ID 05735 | Configuration | Preventive | |
Set the default number of IPv6 duplicate address detection solicitations for network interfaces to send per configured network address properly. CC ID 05736 | Configuration | Preventive | |
Enable or disable IPv6 strict multihoming, as appropriate. CC ID 05737 | Configuration | Preventive | |
Enable or disable IP routing, as appropriate. CC ID 05738 | Configuration | Preventive | |
Enable or disable reverse source routed packets, as appropriate. CC ID 05739 | Configuration | Preventive | |
Restrict packet forwarding, as appropriate. CC ID 05740 | Configuration | Preventive | |
Set unestablished TCP connection queues and established TCP connection queues properly. CC ID 05741 | Configuration | Preventive | |
Enable or disable the LDAP dynamic updates feature, as appropriate. CC ID 05742 | Configuration | Preventive | |
Configure the "Prohibit use of Internet Connection Firewall on your DNS domain network" setting properly. CC ID 05743 | Configuration | Preventive | |
Enable or disable printing services through inetd, as appropriate. CC ID 05744 | Configuration | Preventive | |
Enable or disable firewall access to printing services, as appropriate. CC ID 05745 | Configuration | Preventive | |
Set the Secure Shell largest number for authentication retries. CC ID 05749 | Configuration | Preventive | |
Configure the "Server SPN target name validation level" properly. CC ID 06067 | Configuration | Preventive | |
Configure the "Allow Local System NULL session fallback" setting properly. CC ID 06068 | Configuration | Preventive | |
Configure the "Restrict NTLM" settings properly. CC ID 06069 | Configuration | Preventive | |
Configure the "Allow Local System to use computer identity for NTLM" setting properly. CC ID 06070 | Configuration | Preventive | |
Configure the "Configure encryption types allowed for Kerberos" setting properly. CC ID 06071 | Configuration | Preventive | |
Configure the "Allow PKU2U authentication requests to this computer to use online identities" setting properly. CC ID 06072 | Configuration | Preventive | |
Configure wireless communication to be encrypted using strong cryptography. CC ID 06078 | Configuration | Preventive | |
Reserve the use of VLAN1 to in-band management. CC ID 06413 | Configuration | Preventive | |
Disallow Internet Protocol (IP) directed broadcasts. CC ID 06571 | Configuration | Preventive | |
Configure the "source-routed packets" setting to organizational standards. CC ID 08977 | Configuration | Preventive | |
Disable feedback on protocol format validation errors. CC ID 10646 | Configuration | Preventive | |
Configure the "6to4 Relay Name" setting to organizational standards. CC ID 10688 | Configuration | Preventive | |
Configure the "6to4 Relay Name Resolution Interval" setting to organizational standards. CC ID 10689 | Configuration | Preventive | |
Configure the "6to4 State" setting to organizational standards. CC ID 10690 | Configuration | Preventive | |
Configure the "Automated Site Coverage by the DC Locator DNS SRV Records" setting to organizational standards. CC ID 10759 | Configuration | Preventive | |
Configure the "Best effort service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10764 | Configuration | Preventive | |
Configure the "Best effort service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10765 | Configuration | Preventive | |
Configure the "Best effort service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10766 | Configuration | Preventive | |
Configure the "BranchCache for network files" setting to organizational standards. CC ID 10776 | Configuration | Preventive | |
Configure the "Network Options preference logging and tracing" setting to organizational standards. CC ID 10796 | Configuration | Preventive | |
Configure the "Network Shares preference logging and tracing" setting to organizational standards. CC ID 10797 | Configuration | Preventive | |
Configure the "slow-link mode" setting to organizational standards. CC ID 10820 | Configuration | Preventive | |
Configure the "Controlled load service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10826 | Configuration | Preventive | |
Configure the "Controlled load service type Layer-3 Differentiated Services Code Point (DSCP) for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10827 | Configuration | Preventive | |
Configure the "Controlled load service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10828 | Configuration | Preventive | |
Configure the "Corporate DNS Probe Host Address" setting to organizational standards. CC ID 10829 | Configuration | Preventive | |
Configure the "Corporate DNS Probe Host Name" setting to organizational standards. CC ID 10830 | Configuration | Preventive | |
Configure the "Corporate Site Prefix List" setting to organizational standards. CC ID 10831 | Configuration | Preventive | |
Configure the "Corporate Website Probe URL" setting to organizational standards. CC ID 10832 | Configuration | Preventive | |
Configure the "DC Locator DNS records not registered by the DCs" setting to organizational standards. CC ID 10838 | Configuration | Preventive | |
Configure the "DNS Suffix Search List" setting to organizational standards. CC ID 10890 | Configuration | Preventive | |
Configure the "Do not detect slow network connections" setting to organizational standards. CC ID 10926 | Configuration | Preventive | |
Configure the "Do not show the "local access only" network icon" setting to organizational standards. CC ID 10936 | Configuration | Preventive | |
Configure the "Dynamic Registration of the DC Locator DNS Records" setting to organizational standards. CC ID 10943 | Configuration | Preventive | |
Configure the "Group Policy slow link detection" setting to organizational standards. CC ID 10982 | Configuration | Preventive | |
Configure the "Guaranteed service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10983 | Configuration | Preventive | |
Configure the "Guaranteed service type Layer-3 Differentiated Services Code Point for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10984 | Configuration | Preventive | |
Configure the "Guaranteed service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10985 | Configuration | Preventive | |
Configure the "Limit the maximum network bandwidth used for Peercaching" setting to organizational standards. CC ID 11017 | Configuration | Preventive | |
Configure the "Location of the DCs hosting a domain with single label DNS name" setting to organizational standards. CC ID 11024 | Configuration | Preventive | |
Configure the "Minimum Idle Connection Timeout for RPC/HTTP connections" setting to organizational standards. CC ID 11046 | Configuration | Preventive | |
Configure the "Network control service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 11049 | Configuration | Preventive | |
Configure the "Network control service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 11050 | Configuration | Preventive | |
Configure the "Network control service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 11051 | Configuration | Preventive | |
Configure the "Network Projector Port Setting" setting to organizational standards. CC ID 11052 | Configuration | Preventive | |
Configure the "Override the More Gadgets link" setting to organizational standards. CC ID 11060 | Configuration | Preventive | |
Configure the "Prevent backing up to network location" setting to organizational standards. CC ID 11070 | Configuration | Preventive | |
Configure the "Primary DNS Suffix" setting to organizational standards. CC ID 11094 | Configuration | Preventive | |
Configure the "Primary DNS Suffix Devolution" setting to organizational standards. CC ID 11095 | Configuration | Preventive | |
Configure the "Priority Set in the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11099 | Configuration | Preventive | |
Configure the "Prohibit installation and configuration of Network Bridge on your DNS domain network" setting to organizational standards. CC ID 11102 | Configuration | Preventive | |
Configure the "Prompt user when a slow network connection is detected" setting to organizational standards. CC ID 11109 | Configuration | Preventive | |
Configure the "Qualitative service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 11113 | Configuration | Preventive | |
Configure the "Qualitative service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 11114 | Configuration | Preventive | |
Configure the "Qualitative service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 11115 | Configuration | Preventive | |
Configure the "Refresh Interval of the DC Locator DNS Records" setting to organizational standards. CC ID 11119 | Configuration | Preventive | |
Configure the "Register DNS records with connection-specific DNS suffix" setting to organizational standards. CC ID 11120 | Configuration | Preventive | |
Configure the "Require domain users to elevate when setting a network's location" setting to organizational standards. CC ID 11133 | Configuration | Preventive | |
Configure the "Route all traffic through the internal network" setting to organizational standards. CC ID 11149 | Configuration | Preventive | |
Configure the "Set a support web page link" setting to organizational standards. CC ID 11171 | Configuration | Preventive | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Link Local" to organizational standards. CC ID 11179 | Configuration | Preventive | |
Configure the "Set the Seed Server" setting for "IPv6 Link Local" to organizational standards. CC ID 11190 | Configuration | Preventive | |
Configure the "Set up a maintenance schedule to limit the maximum network bandwidth used for BITS background transfers" setting to organizational standards. CC ID 11197 | Configuration | Preventive | |
Configure the "Set up a work schedule to limit the maximum network bandwidth used for BITS background transfers" setting to organizational standards. CC ID 11198 | Configuration | Preventive | |
Configure the "Sites Covered by the Application Directory Partition Locator DNS SRV Records" setting to organizational standards. CC ID 11202 | Configuration | Preventive | |
Configure the "Sites Covered by the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11203 | Configuration | Preventive | |
Configure the "Sites Covered by the GC Locator DNS SRV Records" setting to organizational standards. CC ID 11204 | Configuration | Preventive | |
Configure the "Slow network connection timeout for user profiles" setting to organizational standards. CC ID 11205 | Configuration | Preventive | |
Configure the "TTL Set in the DC Locator DNS Records" setting to organizational standards. CC ID 11252 | Configuration | Preventive | |
Configure the "Turn off Connect to a Network Projector" setting to organizational standards. CC ID 11272 | Configuration | Preventive | |
Configure the "Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com" setting to organizational standards. CC ID 11283 | Configuration | Preventive | |
Configure the "Turn off Microsoft Peer-to-Peer Networking Services" setting to organizational standards. CC ID 11289 | Configuration | Preventive | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Link Local" to organizational standards. CC ID 11291 | Configuration | Preventive | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Link Local" to organizational standards. CC ID 11299 | Configuration | Preventive | |
Configure the "Turn off Registration if URL connection is referring to Microsoft.com" setting to organizational standards. CC ID 11305 | Configuration | Preventive | |
Configure the "Turn off Windows Network Connectivity Status Indicator active tests" setting to organizational standards. CC ID 11328 | Configuration | Preventive | |
Configure the "Weight Set in the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11371 | Configuration | Preventive | |
Configure Automated Teller Machines in accordance with organizational standards. CC ID 12542 | Configuration | Preventive | |
Enable or disable remote print browsing, as appropriate. CC ID 05718 | Configuration | Preventive | |
Allow or deny remote print browsing Common Unix Printing System the ability to listen for incoming printer information, as appropriate. CC ID 05719 | Configuration | Preventive | |
Configure the time server in accordance with organizational standards. CC ID 06426 | Configuration | Preventive | |
Configure the time server to synchronize with specifically designated hosts. CC ID 06427 | Configuration | Preventive | |
Restrict access to time server configuration to personnel with a business need. CC ID 06858 | Configuration | Preventive | |
Keep current the time synchronization technology. CC ID 12548 | Technical Security | Preventive | |
Verify the organization has Emergency Power Supplies available for the systems. CC ID 01912 | Systems Continuity | Preventive | |
Verify enough emergency power is available for a graceful shutdown if the primary power system fails. CC ID 01913 | Systems Continuity | Preventive | |
Verify emergency power continuity procedures are in place to transfer power to a secondary source if the primary power system fails. CC ID 01914 | Systems Continuity | Preventive | |
Enable or disable the Uninterruptible Power Supply service, as appropriate. CC ID 06037 | Configuration | Preventive | |
Configure Private Branch Exchanges in accordance with organizational standards. CC ID 02219 | Configuration | Preventive | |
Enable Direct Inward System Access, only when necessary. CC ID 02220 | Configuration | Preventive | |
Configure voicemail security inside each Private Branch Exchange. CC ID 02221 | Configuration | Preventive | |
Configure Wireless Access Points in accordance with organizational standards. CC ID 12477 | Configuration | Preventive | |
Enable MAC address filtering for Wireless Access Points. CC ID 04592 | Configuration | Preventive | |
Disable Service Set Identifier broadcast. CC ID 04590 | Configuration | Preventive | |
Configure Service Set Identifiers in accordance with organizational standards. CC ID 16447 | Configuration | Preventive | |
Configure the Wireless Access Point transmit power setting to the lowest level possible. CC ID 04593 | Configuration | Preventive | |
Use Wireless Local Area Network Network Interface Cards that turn off or disable Peer-To-Peer Wireless Local Area Network communications. CC ID 04594 | Testing | Detective | |
Enable two-factor authentication for identifying and authenticating Wireless Local Area Network users. CC ID 04595 | Configuration | Preventive | |
Verify wired network interface cards and Wireless Network Interface Cards are not simultaneously active for network devices other than a Wireless Access Point. CC ID 04596 | Testing | Detective | |
Enable an authorized version of Wi-Fi Protected Access. CC ID 04832 | Configuration | Preventive | |
Synchronize the Wireless Access Points' clocks. CC ID 04834 | Configuration | Preventive | |
Disable unnecessary applications, ports, and protocols on Wireless Access Points. CC ID 04835 | Configuration | Preventive | |
Enable or disable all BIOS wireless devices, as appropriate. CC ID 05754 | Configuration | Preventive | |
Enable or disable all wireless interfaces, as necessary. CC ID 05755 | Configuration | Preventive | |
Include or exclude device drivers for wireless devices from the kernel, as appropriate. CC ID 05756 | Configuration | Preventive | |
Reset wireless access points, as necessary. CC ID 14317 | Process or Activity | Corrective | |
Configure mobile device settings in accordance with organizational standards. CC ID 04600 | Configuration | Preventive | |
Configure mobile devices to enable remote wipe. CC ID 12212 | Configuration | Preventive | |
Configure prohibiting the circumvention of security controls on mobile devices. CC ID 12335 | Configuration | Preventive | |
Configure Apple iOS to Organizational Standards. CC ID 09986 | Establish/Maintain Documentation | Preventive | |
Configure the "VPN" setting to organizational standards. CC ID 09987 | Configuration | Preventive | |
Configure the "Fraudulent Website Warning" setting to organizational standards. CC ID 09988 | Configuration | Preventive | |
Configure the "With Authentication" setting to organizational standards. CC ID 09989 | Configuration | Preventive | |
Configure the "Auto-Join" setting to organizational standards. CC ID 09990 | Configuration | Preventive | |
Configure the "AirDrop Discoverability" setting to organizational standards. CC ID 09991 | Configuration | Preventive | |
Configure the "Wi-Fi" setting to organizational standards. CC ID 09992 | Configuration | Preventive | |
Configure the "Personal Hotspot" setting to organizational standards. CC ID 09994 | Configuration | Preventive | |
Configure the "Notifications View" setting for "Access on Lock Screen" to organizational standards. CC ID 09995 | Configuration | Preventive | |
Configure the "Find My iPhone" setting to organizational standards. CC ID 09996 | Configuration | Preventive | |
Configure the "iPhone Unlock" setting to organizational standards. CC ID 09997 | Configuration | Preventive | |
Configure the "Access on Lock Screen" setting to organizational standards. CC ID 09998 | Configuration | Preventive | |
Configure the "Forget this Network" setting to organizational standards. CC ID 09999 | Configuration | Preventive | |
Configure the "Ask to Join Networks" setting to organizational standards. CC ID 10000 | Configuration | Preventive | |
Configure the "Fraudulent Website Warning" setting to organizational standards. CC ID 10001 | Configuration | Preventive | |
Configure the "Credit Cards" setting to organizational standards. CC ID 10002 | Configuration | Preventive | |
Configure the "Saved Credit Card Information" setting to organizational standards. CC ID 10003 | Configuration | Preventive | |
Configure the "Do Not Track" setting to organizational standards. CC ID 10004 | Configuration | Preventive | |
Configure the "With Authentication" setting to organizational standards. CC ID 10005 | Configuration | Preventive | |
Configure the "Allow Move" setting to organizational standards. CC ID 10006 | Configuration | Preventive | |
Configure the "Use Only in Mail" setting to organizational standards. CC ID 10007 | Configuration | Preventive | |
Configure mobile devices to organizational standards. CC ID 04639 | Configuration | Preventive | |
Configure mobile devices to separate organizational data from personal data. CC ID 16463 | Configuration | Preventive | |
Configure the mobile device properties to organizational standards. CC ID 04640 | Configuration | Preventive | |
Configure the mobile device menu items to organizational standards. CC ID 04641 | Configuration | Preventive | |
Configure the BlackBerry handheld device driver settings. CC ID 04642 | Configuration | Preventive | |
Verify only BlackBerry Enterprise Server e-mail software and e-mail hardware is being used. CC ID 04601 | Technical Security | Preventive | |
Configure the BlackBerry Enterprise Server with either BlackBerry DMZ Solution or the BlackBerry firewall solution. CC ID 04602 | Configuration | Preventive | |
Configure automatic master key generation on the BlackBerry Enterprise Server. CC ID 04608 | Configuration | Preventive | |
Train BlackBerry handheld device users on the Bluetooth Smart Card Reader's proper usage. CC ID 04603 | Behavior | Preventive | |
Verify metamessage software is not installed on BlackBerry handheld devices. CC ID 04604 | Technical Security | Preventive | |
Configure e-mail messages to not display a signature line stating the message was sent from a Portable Electronic Device. CC ID 04605 | Configuration | Preventive | |
Verify only the specific mobile device web browser software is installed. CC ID 04606 | Configuration | Preventive | |
Update the software and master keys for mobile Personal Electronic Devices every 30 days. CC ID 04607 | Configuration | Preventive | |
Enable content protection on mobile devices. CC ID 04609 | Configuration | Preventive | |
Configure the application policy groups for each mobile Personal Electronic Device. CC ID 04610 | Configuration | Preventive | |
Configure the BlackBerry Messenger policy group settings. CC ID 04611 | Configuration | Preventive | |
Configure the Camera policy group settings. CC ID 04614 | Configuration | Preventive | |
Configure the Bluetooth policy group settings. CC ID 04612 | Configuration | Preventive | |
Configure the Bluetooth Smart Card Reader policy group settings. CC ID 04613 | Configuration | Preventive | |
Configure the Browser policy group settings. CC ID 04615 | Configuration | Preventive | |
Configure the Certificate Sync policy group settings. CC ID 04616 | Configuration | Preventive | |
Configure the CMIME policy group settings. CC ID 04617 | Configuration | Preventive | |
Configure the Common policy group settings. CC ID 04618 | Configuration | Preventive | |
Configure the Desktop-only policy group settings. CC ID 04619 | Configuration | Preventive | |
Configure the IOT Application policy group settings. CC ID 04620 | Configuration | Preventive | |
Configure the Device-only policy group settings. CC ID 04621 | Configuration | Preventive | |
Configure the Desktop policy group settings. CC ID 04622 | Configuration | Preventive | |
Configure the Global items policy group settings. CC ID 04623 | Configuration | Preventive | |
Configure the Location Based Services policy group settings. CC ID 04624 | Configuration | Preventive | |
Configure the MDS policy group settings. CC ID 04625 | Configuration | Preventive | |
Configure the On-Device Help policy group settings. CC ID 04626 | Configuration | Preventive | |
Configure the Password policy group settings. CC ID 04627 | Configuration | Preventive | |
Configure the PIM Sync policy group settings. CC ID 04628 | Configuration | Preventive | |
Configure the Secure E-mail policy group settings. CC ID 04629 | Configuration | Preventive | |
Configure the Memory Cleaner policy group settings. CC ID 04630 | Configuration | Preventive | |
Configure the Security policy group settings. CC ID 04631 | Configuration | Preventive | |
Configure the Service Exclusivity policy group settings. CC ID 04632 | Configuration | Preventive | |
Configure the SIM Application Toolkit policy group settings. CC ID 04633 | Configuration | Preventive | |
Configure the Smart Dialing policy group settings. CC ID 04634 | Configuration | Preventive | |
Configure the S/MIME policy group settings. CC ID 04635 | Configuration | Preventive | |
Configure the TCP policy group settings. CC ID 04636 | Configuration | Preventive | |
Configure the WTLS (Application) policy group settings. CC ID 04638 | Configuration | Preventive | |
Configure emergency and critical e-mail notifications so that they are digitally signed. CC ID 04841 | Configuration | Preventive | |
Enable data-at-rest encryption on mobile devices. CC ID 04842 | Configuration | Preventive | |
Disable the capability to automatically execute code on mobile devices absent user direction. CC ID 08705 | Configuration | Preventive | |
Configure environmental sensors on mobile devices. CC ID 10667 | Configuration | Preventive | |
Prohibit the remote activation of environmental sensors on mobile devices. CC ID 10666 | Configuration | Preventive | |
Configure the mobile device to explicitly show when an environmental sensor is in use. CC ID 10668 | Configuration | Preventive | |
Configure the environmental sensor to report collected data to designated personnel only. CC ID 10669 | Configuration | Preventive | |
Configure Cisco-specific applications and service in accordance with organizational standards. CC ID 06557 | Configuration | Preventive | |
Disable Cisco Discovery Protocol service unless the Cisco Discovery Protocol service is absolutely necessary. CC ID 06556 | Configuration | Preventive | |
Disable configuration autoloading unless configuration autoloading is absolutely necessary. CC ID 06558 | Configuration | Preventive | |
Disable exec on aux unless exec on aux is absolutely necessary. CC ID 06559 | Configuration | Preventive | |
Define and configure the Cisco loopback interface. CC ID 06560 | Configuration | Preventive | |
Configure custom Oracle-specific applications and services in accordance with organizational standards. CC ID 06565 | Configuration | Preventive | |
Set the Oracle Listener password. CC ID 06566 | Configuration | Preventive | |
Configure Oracle batch processes to not use passwords in parameters or variables. CC ID 06567 | Configuration | Preventive | |
Configure the Global Positioning System settings as appropriate. CC ID 06888 | Configuration | Preventive | |
Configure the Global Positioning System monitor carrier-to-noise density ratio to the range of 48-50 bbhrtz. CC ID 06889 | Configuration | Preventive | |
Configure endpoint security tools in accordance with organizational standards. CC ID 07049 | Configuration | Preventive | |
Secure endpoint security tool configuration settings from unauthorized change. CC ID 07050 | Configuration | Preventive | |
Configure e-mail security settings in accordance with organizational standards. CC ID 07055 | Configuration | Preventive | |
Configure e-mail to limit the number of recipients per message. CC ID 07056 | Configuration | Preventive | |
Configure web server security settings in accordance with organizational standards. CC ID 07059 | Configuration | Preventive | |
Configure the web server to hide the directory of files in a folder. CC ID 07060 | Configuration | Preventive | |
Certify the system before releasing it into a production environment. CC ID 06419 | Configuration | Preventive | |
Document the system's accreditation and residual risks. CC ID 06728 | Configuration | Preventive | |
Establish, implement, and maintain virtualization configuration settings. CC ID 07110 | Configuration | Preventive | |
Implement the security features of hypervisor to protect virtual machines. CC ID 12176 | Configuration | Preventive | |
Execute code in confined virtual machine environments. CC ID 10648 | Configuration | Preventive | |
Configure Microsoft Office to Organizational Standards. CC ID 07147 | Configuration | Preventive | |
Set custom Microsoft Office security options in accordance with organizational standards. CC ID 05757 | Configuration | Preventive | |
Configure the "Disable VBA for Office applications" setting properly. CC ID 05758 | Configuration | Preventive | |
Configure the "ActiveX Control Initialization" setting to organizational standards. CC ID 05759 | Configuration | Preventive | |
Configure the "Online content options" setting properly. CC ID 05760 | Configuration | Preventive | |
Configure the "VBA Macro Warning Settings" setting properly. CC ID 05761 | Configuration | Preventive | |
Configure the "Trust access to Visual Basic Project" setting properly. CC ID 05762 | Configuration | Preventive | |
Configure the "Configure Add-In Trust Level" setting properly. CC ID 05763 | Configuration | Preventive | |
Configure the "Minimum encryption settings" setting properly. CC ID 05764 | Configuration | Preventive | |
Configure the "Do not check e-mail address against address of certificates being used" setting to organizational standards. CC ID 05765 | Configuration | Preventive | |
Configure the "Send all signed messages as clear signed messages" setting properly. CC ID 05766 | Configuration | Preventive | |
Configure the "Request an S/MIME receipt for all S/MIME signed messages" setting properly. CC ID 05767 | Configuration | Preventive | |
Configure the "Do not display 'Publish to GAL' button" setting properly. CC ID 05768 | Configuration | Preventive | |
Configure the "Signature Warning" setting properly. CC ID 05769 | Configuration | Preventive | |
Configure the "Enable Cryptography Icons" setting properly. CC ID 05770 | Configuration | Preventive | |
Configure the "Retrieving CRLs (Certificate Revocation Lists)" setting properly. CC ID 05771 | Configuration | Preventive | |
Configure the "Warn before printing, saving, or sending a file that contains tracked changes or comments" setting properly. CC ID 05772 | Configuration | Preventive | |
Configure the "Underline hyperlinks" setting properly. CC ID 05773 | Configuration | Preventive | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins" setting properly. CC ID 05774 | Configuration | Preventive | |
Configure the "Disable all application add-ins" setting properly. CC ID 05775 | Configuration | Preventive | |
Configure the "Required that application add-ins are signed by Trusted Publisher" setting properly. CC ID 05776 | Configuration | Preventive | |
Configure the "Disable all trusted locations" setting properly. CC ID 05777 | Configuration | Preventive | |
Configure the "Allow Trusted Locations not on the computer" setting properly. CC ID 05778 | Configuration | Preventive | |
Configure the "Modal Trust Decision Only" setting properly. CC ID 05779 | Configuration | Preventive | |
Configure the "Disable commands" setting properly. CC ID 05780 | Configuration | Preventive | |
Configure the "Database Tools | Macro | Convert Macros to Visual Basic" setting to organizational standards. CC ID 05781 | Configuration | Preventive | |
Configure the "Database Tools | Macro | Create Shortcut Menu from Macro" setting to organizational standards. CC ID 05782 | Configuration | Preventive | |
Configure the "Disable shortcut keys" setting properly. CC ID 05783 | Configuration | Preventive | |
Configure the "Default file format" setting properly. CC ID 05784 | Configuration | Preventive | |
Configure the "Do not prompt to convert older databases" setting properly. CC ID 05785 | Configuration | Preventive | |
Configure the "Internet and network paths as hyperlinks" setting properly. CC ID 05786 | Configuration | Preventive | |
Configure the "Save files" setting properly. CC ID 05787 | Configuration | Preventive | |
Configure the "Disable AutoRepublish" setting properly. CC ID 05788 | Configuration | Preventive | |
Configure the "Autorepublish warning alert" setting properly. CC ID 05789 | Configuration | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Excel Open XML workbooks" setting properly. CC ID 05790 | Configuration | Preventive | |
Configure the "Force file extension to match file type" setting properly. CC ID 05791 | Configuration | Preventive | |
Configure the "Store macro in Personal Macro Workbook by default" setting properly. CC ID 05792 | Configuration | Preventive | |
Configure the "Ignore other applications" setting properly. CC ID 05793 | Configuration | Preventive | |
Configure the "Ask to update automatic links" setting properly. CC ID 05794 | Configuration | Preventive | |
Configure the "Save any additional data necessary to maintain formulas" setting properly. CC ID 05795 | Configuration | Preventive | |
Configure the "Load pictures from Web pages not created in Excel" setting properly. CC ID 05796 | Configuration | Preventive | |
Configure the "Do not show data extraction options when opening corrupt workbooks" setting properly. CC ID 05797 | Configuration | Preventive | |
Configure the "Assume structured storage format of workbook is intact when recovering data" setting to organizational standards. CC ID 05798 | Configuration | Preventive | |
Configure the "Corrupt formula conversion (Convert unrecoverable references to: values | #REF or #NAME)" setting to organizational standards. CC ID 05799 | Configuration | Preventive | |
Configure the "Connection File Locations" setting to organizational standards. CC ID 05800 | Configuration | Preventive | |
Configure the "Automatic Query Refresh (Prompt for all workbooks | Do not prompt; do not allow auto refresh | Do not prompt; allow auto refresh)" setting to organizational standards. CC ID 05801 | Configuration | Preventive | |
Configure the "Block opening of" setting properly. CC ID 05802 | Configuration | Preventive | |
Configure the "Block saving of" setting properly. CC ID 05803 | Configuration | Preventive | |
Configure the "Locally cache network file storages" setting to organizational standards. CC ID 05804 | Configuration | Preventive | |
Configure the "Locally cache PivotTable reports" setting to organizational standards. CC ID 05805 | Configuration | Preventive | |
Configure the "OLAP PivotTable User Defined Function (UDF) security setting" setting properly. CC ID 05806 | Configuration | Preventive | |
Configure the "Recognize SmartTags" setting to organizational standards. CC ID 05807 | Configuration | Preventive | |
Configure the "Offline Mode Status" setting properly. CC ID 05808 | Configuration | Preventive | |
Configure the "Control behavior for Windows SharePoint Services gradual upgrade" setting properly. CC ID 05809 | Configuration | Preventive | |
Configure the "Disable opening of solutions from the Internet security zone" setting properly. CC ID 05810 | Configuration | Preventive | |
Configure the "Allow the use of ActiveX Custom Controls in InfoPath forms" setting properly. CC ID 05811 | Configuration | Preventive | |
Configure the "Run forms in restricted mode if they do not specify a publish location and use only features introduced before InfoPath 2003 SP1" setting to organizational standards. CC ID 05812 | Configuration | Preventive | |
Configure the "Allow file types as attachments to forms" setting properly. CC ID 05813 | Configuration | Preventive | |
Configure the "Block specific file types as attachments to forms" setting properly. CC ID 05814 | Configuration | Preventive | |
Configure the "Prevent users from allowing unsafe file types to be attached to forms" setting properly. CC ID 05815 | Configuration | Preventive | |
Configure the "Display a warning that a form is digitally signed" setting properly. CC ID 05816 | Configuration | Preventive | |
Configure the "Control behavior when opening forms" setting properly. CC ID 05817 | Configuration | Preventive | |
Configure the "Beaconing UI for forms" setting properly. CC ID 05818 | Configuration | Preventive | |
Configure the "Disable sending form template with e-mail forms" setting properly. CC ID 05819 | Configuration | Preventive | |
Configure the "Disable dynamic caching of the form template in InfoPath e-mail forms" setting properly. CC ID 05820 | Configuration | Preventive | |
Configure the "Disable sending InfoPath 2003 Forms as e-mail forms" setting properly. CC ID 05821 | Configuration | Preventive | |
Configure the "Disable e-mail forms" setting properly. CC ID 05822 | Configuration | Preventive | |
Configure the "Disable InfoPath e-mail forms in Outlook" setting properly. CC ID 05823 | Configuration | Preventive | |
Configure the "Information Rights Management" setting to organizational standards. CC ID 05824 | Configuration | Preventive | |
Configure the "Custom code" setting properly. CC ID 05825 | Configuration | Preventive | |
Configure the "E-mail forms beaconing UI" setting properly. CC ID 05826 | Configuration | Preventive | |
Configure the "Disable user customization of Quick Access Toolbar via UI" setting properly. CC ID 05827 | Configuration | Preventive | |
Configure the "Disable all user customization of Quick Access Toolar" setting properly. CC ID 05828 | Configuration | Preventive | |
Configure the "Disable UI extending from documents and templates" setting properly. CC ID 05829 | Configuration | Preventive | |
Configure the "Recognize smart tags in Excel" setting properly. CC ID 05830 | Configuration | Preventive | |
Configure the "Disable Clip Art and Media downloads from the client and from Office Online website" setting properly. CC ID 05831 | Configuration | Preventive | |
Configure the "Disable template downloads from the client and from Office Online website" setting properly. CC ID 05832 | Configuration | Preventive | |
Configure the "Disable access to updates, add-ins, and patches on the Office Online website" setting properly. CC ID 05833 | Configuration | Preventive | |
Configure the "Prevent users from uploading document templates to the Office Online community" setting to organizational standards. CC ID 05834 | Configuration | Preventive | |
Configure the "Disable training practice downloads from the Office Online website" setting properly. CC ID 05835 | Configuration | Preventive | |
Configure the "Disable customer-submitted templates downloads from Office Online" setting properly. CC ID 05836 | Configuration | Preventive | |
Configure the "Open Office documents as read/write while browsing" setting properly. CC ID 05837 | Configuration | Preventive | |
Configure the "Rely on VML for displaying graphics in browsers" setting properly. CC ID 05838 | Configuration | Preventive | |
Configure the "Allow PNG as an output format" setting properly. CC ID 05839 | Configuration | Preventive | |
Configure the "Improve Proofing Tools" setting properly. CC ID 05840 | Configuration | Preventive | |
Configure the "Disable Opt-in Wizard on first run" setting properly. CC ID 05841 | Configuration | Preventive | |
Configure the "Microsoft Office Online" setting to organizational standards. CC ID 05842 | Configuration | Preventive | |
Configure the "Disable Password Caching" setting properly. CC ID 05843 | Configuration | Preventive | |
Configure the "Disable all Trust Bar notifications for security issues" setting properly. CC ID 05844 | Configuration | Preventive | |
Configure the "Protect document metadata" setting properly. CC ID 05845 | Configuration | Preventive | |
Configure the "Encryption type for password protected" setting properly. CC ID 05846 | Configuration | Preventive | |
Configure the "Load controls in Forms3" setting properly. CC ID 05847 | Configuration | Preventive | |
Configure the "Automation Security" setting properly. CC ID 05848 | Configuration | Preventive | |
Configure the "Prevent Word and Excel from loading managed code extensions" setting properly. CC ID 05849 | Configuration | Preventive | |
Configure the "Disable hyperlink warnings" setting properly. CC ID 05850 | Configuration | Preventive | |
Configure the "Disable password to open UI" setting properly. CC ID 05851 | Configuration | Preventive | |
Configure the "Download Office Controls" setting to organizational standards. CC ID 05852 | Configuration | Preventive | |
Configure the "Disable All ActiveX" setting properly. CC ID 05853 | Configuration | Preventive | |
Configure the "Allow mix of policy and user locations" setting properly. CC ID 05854 | Configuration | Preventive | |
Configure the "Disable Smart Document's use of manifests" setting properly. CC ID 05855 | Configuration | Preventive | |
Configure the "Completely disable the Smart Documents feature in Word and Excel" setting to organizational standards. CC ID 05856 | Configuration | Preventive | |
Configure the "Disable Internet Fax feature" setting properly. CC ID 05857 | Configuration | Preventive | |
Configure the "Prevent users from changing permissions on rights managed content" setting properly. CC ID 05858 | Configuration | Preventive | |
Configure the "Allow users with earlier versions of Office to read with browsers." setting properly. CC ID 05859 | Configuration | Preventive | |
Configure the "Always require users to connect to verify permission" setting properly. CC ID 05860 | Configuration | Preventive | |
Configure the "Always expand groups in Office when restricting permission for documents" setting properly. CC ID 05861 | Configuration | Preventive | |
Configure the "Never allow users to specify groups when restricting permission for documents" setting properly. CC ID 05862 | Configuration | Preventive | |
Configure the "Disable Microsoft Passport service for content with restricted permission" setting properly. CC ID 05863 | Configuration | Preventive | |
Configure the "Do not allow users to upgrade Information Rights Management configuration" setting to organizational standards. CC ID 05864 | Configuration | Preventive | |
Configure the "Key Usage Filtering" setting properly. CC ID 05865 | Configuration | Preventive | |
Configure the "EKU filtering" setting properly. CC ID 05866 | Configuration | Preventive | |
Configure the "Legacy format signatures" setting properly. CC ID 05867 | Configuration | Preventive | |
Configure the "Suppress Office Signing Providers" setting properly. CC ID 05868 | Configuration | Preventive | |
Configure the "Suppress external signature services menu item" setting properly. CC ID 05869 | Configuration | Preventive | |
Configure the "Disable Check For Solutions" setting properly. CC ID 05870 | Configuration | Preventive | |
Configure the "Disable inclusion of document properties in PDF and XPS output" setting properly. CC ID 05871 | Configuration | Preventive | |
Configure the "Disable Document Information Panel" setting properly. CC ID 05872 | Configuration | Preventive | |
Configure the "Document information panel beaconing UI" setting properly. CC ID 05873 | Configuration | Preventive | |
Configure the "Disable the Office client from polling the Office server for published links" setting properly. CC ID 05874 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats" setting properly. CC ID 05875 | Configuration | Preventive | |
Configure the "Control Blogging" setting properly. CC ID 05876 | Configuration | Preventive | |
Configure the "Enable Smart Resume" setting to organizational standards. CC ID 05877 | Configuration | Preventive | |
Configure the "Do not upload media files" setting to organizational standards. CC ID 05878 | Configuration | Preventive | |
Configure the "Disable hyperlinks to web templates in File | New and task panes" setting properly. CC ID 05879 | Configuration | Preventive | |
Configure the "Prevent access to Web-based file storage" setting to organizational standards. CC ID 05880 | Configuration | Preventive | |
Configure the "Do not allow attachment previewing in Outlook" setting properly. CC ID 05881 | Configuration | Preventive | |
Configure the "Read e-mail as plain text" setting properly. CC ID 05882 | Configuration | Preventive | |
Configure the "Read signed e-mail as plain text" setting properly. CC ID 05883 | Configuration | Preventive | |
Configure the "Prevent publishing to Office Online" setting properly. CC ID 05884 | Configuration | Preventive | |
Configure the "Prevent publishing to a DAV server" setting properly. CC ID 05885 | Configuration | Preventive | |
Configure the "Restrict level of calendar details users can publish" setting properly. CC ID 05886 | Configuration | Preventive | |
Configure the "Access to published calendars" setting properly. CC ID 05887 | Configuration | Preventive | |
Configure the "Restrict upload method" setting properly. CC ID 05888 | Configuration | Preventive | |
Configure the "Hide Junk Mail UI" setting properly. CC ID 05889 | Configuration | Preventive | |
Configure the "Junk E-mail Protection Level" setting properly. CC ID 05890 | Configuration | Preventive | |
Configure the "Trust E-mail from Contacts" setting properly. CC ID 05891 | Configuration | Preventive | |
Configure the "Add e-mail recipients to users' Safe Senders Lists" setting properly. CC ID 05892 | Configuration | Preventive | |
Configure the "Dial-up options" setting properly. CC ID 05893 | Configuration | Preventive | |
Configure the "Do not allow creating, replying, or forwarding signatures for e-mail messages" setting properly. CC ID 05894 | Configuration | Preventive | |
Configure the "Send copy of pictures with HTML messages instead of reference to Internet location" setting to organizational standards. CC ID 05895 | Configuration | Preventive | |
Configure the "Outlook rich text options" setting properly. CC ID 05896 | Configuration | Preventive | |
Configure the "Plain text options" setting properly. CC ID 05897 | Configuration | Preventive | |
Configure the "Set message format" setting properly. CC ID 05898 | Configuration | Preventive | |
Configure the "Make Outlook the default program for E-mail, Contacts, and Calendar" setting properly. CC ID 05899 | Configuration | Preventive | |
Configure the "Do not allow folders in non-default stores to be set as folder home pages" setting properly. CC ID 05900 | Configuration | Preventive | |
Configure the "Use Unicode format when dragging e-mail message to file system" setting properly. CC ID 05901 | Configuration | Preventive | |
Configure the "Do not allow Outlook object model scripts to run" setting properly. CC ID 05902 | Configuration | Preventive | |
Configure the "set maximum level of online status on a person name (do not allow | allow everywhere except to and cc field | allow everywhere)" setting properly. CC ID 05903 | Configuration | Preventive | |
Configure the "Display online status on a person name" setting properly. CC ID 05904 | Configuration | Preventive | |
Configure the "Turn off Enable the Person Names Smart Tag option" setting properly. CC ID 05905 | Configuration | Preventive | |
Configure the "Outlook security mode" setting properly. CC ID 05906 | Configuration | Preventive | |
Configure the "Display Level 1 attachments" setting properly. CC ID 05907 | Configuration | Preventive | |
Configure the "Allow users to demote attachments to Level 2" setting properly. CC ID 05908 | Configuration | Preventive | |
Configure the "Do not prompt about Level 1 attachments" setting properly. CC ID 05909 | Configuration | Preventive | |
Configure the "Allow in-place activation of embedded OLE objects" setting to organizational standards. CC ID 05910 | Configuration | Preventive | |
Configure the "Display OLE package objects" setting properly. CC ID 05911 | Configuration | Preventive | |
Configure the "Add file extensions to block" setting properly. CC ID 05912 | Configuration | Preventive | |
Configure the "Remove file extensions blocked" setting properly. CC ID 05913 | Configuration | Preventive | |
Configure the "Allow scripts in one-off Outlook forms" setting properly. CC ID 05914 | Configuration | Preventive | |
Configure the "Set Outlook object model custom actions execution prompt" setting properly. CC ID 05915 | Configuration | Preventive | |
Configure the "Set control itemproperty pompt" setting properly. CC ID 05916 | Configuration | Preventive | |
Configure the "Configure Outlook object model prompt" setting properly. CC ID 05917 | Configuration | Preventive | |
Configure the "Required Certificate Authority" setting properly. CC ID 05918 | Configuration | Preventive | |
Configure the "S/MIME interoperability with external clients:" setting properly. CC ID 05919 | Configuration | Preventive | |
Configure the "Always use Rich Text formatting in S/MIME messages" setting to organizational standards. CC ID 05920 | Configuration | Preventive | |
Configure the "S/MIME password settings" setting properly. CC ID 05921 | Configuration | Preventive | |
Configure the "Message Formats" setting properly. CC ID 05922 | Configuration | Preventive | |
Configure the "Do not provide Continue option on Encryption warning dialog boxes" setting properly for Microsoft Office 2007. CC ID 05923 | Configuration | Preventive | |
Configure the "Run in FIPS compliant mode" setting properly. CC ID 05925 | Configuration | Preventive | |
Configure the "URL for S/MIME certificates" setting properly. CC ID 05926 | Configuration | Preventive | |
Configure the "Ensure all S/MIME signed messages have a label" setting properly. CC ID 05927 | Configuration | Preventive | |
Configure the "S/MIME receipt requests" setting properly. CC ID 05954 | Configuration | Preventive | |
Configure the "Fortezza certificate policies" setting properly. CC ID 05928 | Configuration | Preventive | |
Configure the "Require SuiteB algorithms for S/MIME operations" setting properly. CC ID 05929 | Configuration | Preventive | |
Configure the "Missing CRLs" setting properly. CC ID 05930 | Configuration | Preventive | |
Configure the "Missing root certificates" setting properly. CC ID 05931 | Configuration | Preventive | |
Configure the "Promote Level 2 errors as errors, not warnings" setting properly. CC ID 05932 | Configuration | Preventive | |
Configure the "Attachment Secure Temporary Folder" setting properly. CC ID 05933 | Configuration | Preventive | |
Configure the "Display pictures and external content in HTML e-mail" setting properly. CC ID 05934 | Configuration | Preventive | |
Configure the "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" setting properly. CC ID 05935 | Configuration | Preventive | |
Configure the "Do not permit download of content from safe zones" setting properly. CC ID 05936 | Configuration | Preventive | |
Configure the "Block Trusted Zones" setting properly. CC ID 05937 | Configuration | Preventive | |
Configure the "Include Internet in Safe Zones for Automatic Picture Download" setting properly. CC ID 05938 | Configuration | Preventive | |
Configure the "Include Intranet in Safe Zones for Automatic Picture Download" setting properly. CC ID 05939 | Configuration | Preventive | |
Configure the "security setting for macros (always warn | never warn, disable all | warn for signed, disable unsigned | no security check)" setting properly. CC ID 05940 | Configuration | Preventive | |
Configure the "Enable links in e-mail messages" setting properly. CC ID 05941 | Configuration | Preventive | |
Configure the "Apply macro security settings to macros, add-ins, and SmartTags" setting properly. CC ID 05942 | Configuration | Preventive | |
Configure the "Automatically configure profile based on Active Directory Primary SMTP address" setting properly. CC ID 05943 | Configuration | Preventive | |
Configure the "Do not allow users to change permissions on folders" setting properly. CC ID 05944 | Configuration | Preventive | |
Configure the "Enable RPC encryption" setting properly. CC ID 05945 | Configuration | Preventive | |
Configure the "Authentication with Exchange server" setting properly. CC ID 05946 | Configuration | Preventive | |
Configure the "Synchronize Outlook RSS Feeds with Common Feed List" setting properly. CC ID 05947 | Configuration | Preventive | |
Configure the "Turn off RSS feature" setting properly. CC ID 05948 | Configuration | Preventive | |
Configure the "Automatically download enclosures" setting to organizational standards. CC ID 05949 | Configuration | Preventive | |
Configure the "Download full text of articles as HTML attachments" setting properly. CC ID 05950 | Configuration | Preventive | |
Configure the "Automatically download attachments" setting properly. CC ID 05951 | Configuration | Preventive | |
Configure the "Do not include Internet Calendar integration in Outlook" setting properly. CC ID 05952 | Configuration | Preventive | |
Configure the "Disable user entries to server list" setting properly. CC ID 05953 | Configuration | Preventive | |
Configure the "Do not expand distribution lists" setting properly. CC ID 05955 | Configuration | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft PowerPoint Open XML presentations" setting properly. CC ID 05956 | Configuration | Preventive | |
Configure the "Run programs" setting properly. CC ID 05957 | Configuration | Preventive | |
Configure the "Make hidden markup visible" setting properly. CC ID 05958 | Configuration | Preventive | |
Configure the "Unblock automatic download of linked images" setting properly. CC ID 05959 | Configuration | Preventive | |
Configure the "Disable Slide Update" setting to organizational standards. CC ID 05960 | Configuration | Preventive | |
Configure the "Hidden text" setting properly. CC ID 05961 | Configuration | Preventive | |
Configure the "Update automatic links at Open" setting properly. CC ID 05962 | Configuration | Preventive | |
Configure the "Save smart tags in e-mail" setting to organizational standards. CC ID 05963 | Configuration | Preventive | |
Configure the "Determine where to force encrypted macros to be scanned in Microsoft Word Open XML documents" setting properly. CC ID 05964 | Configuration | Preventive | |
Configure the "InfoPath APTCA Assembly Whitelist" setting properly. CC ID 05965 | Configuration | Preventive | |
Configure the "Windows Internet Explorer Feature Control Opt-In" setting properly. CC ID 05966 | Configuration | Preventive | |
Configure the "Disable Package Repair" setting to organizational standards. CC ID 05967 | Configuration | Preventive | |
Configure the "Disable user name and password" setting properly. CC ID 05968 | Configuration | Preventive | |
Configure the "Bind to object" setting properly. CC ID 05969 | Configuration | Preventive | |
Configure the "Saved from URL" setting properly. CC ID 05970 | Configuration | Preventive | |
Configure the "Navigate URL" setting properly. CC ID 05971 | Configuration | Preventive | |
Configure the "Block popups" setting properly. CC ID 05972 | Configuration | Preventive | |
Configure the "Prevent users from customizing attachment security settings" setting properly. CC ID 05973 | Configuration | Preventive | |
Configure the "Macro Security Level" setting properly. CC ID 05974 | Configuration | Preventive | |
Configure the "Trust all installed add-ins and templates" setting properly. CC ID 05975 | Configuration | Preventive | |
Configure the "Store random number to improve merge accuracy" setting properly. CC ID 05976 | Configuration | Preventive | |
Configure the "Prevent Users from Changing Office Encryption Settings" setting properly. CC ID 05977 | Configuration | Preventive | |
Configure Universal settings for Microsoft Office in accordance with organizational standards. CC ID 07211 | Configuration | Preventive | |
Configure the "Disable VBA for Office applications" to organizational standards. CC ID 07212 | Configuration | Preventive | |
Configure the "Navigate URL" to organizational standards. CC ID 07213 | Configuration | Preventive | |
Configure the "Block popups" to organizational standards. CC ID 07214 | Configuration | Preventive | |
Configure the "Bind to object" to organizational standards. CC ID 07215 | Configuration | Preventive | |
Configure the "Disable Package Repair" to organizational standards. CC ID 07216 | Configuration | Preventive | |
Configure the "Disable user name and password" to organizational standards. CC ID 07217 | Configuration | Preventive | |
Configure the "Saved from URL" to organizational standards. CC ID 07218 | Configuration | Preventive | |
Configure the "Allow mix of policy and user locations" to organizational standards. CC ID 07284 | Configuration | Preventive | |
Configure the "ActiveX Control Initialization" to organizational standards. CC ID 07285 | Configuration | Preventive | |
Configure the "Allow users with earlier versions of Office to read with browsers." to organizational standards CC ID 07287 | Configuration | Preventive | |
Configure the "Always expand groups in Office when restricting permission for documents" to organizational standards. CC ID 07288 | Configuration | Preventive | |
Configure the "Allow PNG as an output format" to organizational standards. CC ID 07289 | Configuration | Preventive | |
Configure the "Automatically receive small updates to improve reliability" to organizational standards. CC ID 07290 | Configuration | Preventive | |
Configure the "Always require users to connect to verify permission" to organizational standards. CC ID 07291 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2007 through the Compatibility Pack for the 2007 Office system and PowerPoint 2007 Converter" to organizational standards. CC ID 07292 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Word 2007 through the Compatibility Pack for the 2007 Office system and Word 2007 Open XML/Word 97-2003 Format Converter" to organizational standards. CC ID 07294 | Configuration | Preventive | |
Configure the "Block updates from the Office Update Site from applying" to organizational standards. CC ID 07295 | Configuration | Preventive | |
Configure the "Control Blogging" to organizational standards. CC ID 07296 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Excel 2007 through the Compatibility Pack for the 2007 Office system and Excel 2007 Converter" to organizational standards. CC ID 07297 | Configuration | Preventive | |
Configure the "Disable All ActiveX" to organizational standards. CC ID 07298 | Configuration | Preventive | |
Configure the "Disable all Trust Bar notifications for security issues" to organizational standards. CC ID 07299 | Configuration | Preventive | |
Configure the "Disable access to updates, add-ins, and patches on the Office Online website" to organizational standards. CC ID 07300 | Configuration | Preventive | |
Configure the "Disable Check For Solutions" to organizational standards. CC ID 07301 | Configuration | Preventive | |
Configure the "Disable Clip Art and Media downloads from the client and from Office Online website" to organizational standards. CC ID 07302 | Configuration | Preventive | |
Configure the "Disable all user customization of Quick Access Toolbar" to organizational standards. CC ID 07303 | Configuration | Preventive | |
Configure the "Disable Document Information Panel" to organizational standards. CC ID 07304 | Configuration | Preventive | |
Configure the "Disable hyperlink warnings" to organizational standards. CC ID 07305 | Configuration | Preventive | |
Configure the "Disable customer-submitted templates downloads from Office Online" to organizational standards. CC ID 07306 | Configuration | Preventive | |
Configure the "Disable inclusion of document properties in PDF and XPS output" to organizational standards. CC ID 07307 | Configuration | Preventive | |
Configure the "Disable Internet Fax feature" to organizational standards. CC ID 07308 | Configuration | Preventive | |
Configure the "Disable hyperlinks to web templates in File | New and task panes" to organizational standards. CC ID 07309 | Configuration | Preventive | |
Configure the "Disable password to open UI" to organizational standards. CC ID 07311 | Configuration | Preventive | |
Configure the "Disable Microsoft Passport service for content with restricted permission" to organizational standards. CC ID 07312 | Configuration | Preventive | |
Configure the "Disable Smart Document's use of manifests" to organizational standards. CC ID 07313 | Configuration | Preventive | |
Configure the "Disable template downloads from the client and from Office Online website" to organizational standards. CC ID 07314 | Configuration | Preventive | |
Configure the "Automation Security" to organizational standards. CC ID 07315 | Configuration | Preventive | |
Configure the "Disable training practice downloads from the Office Online website" to organizational standards. CC ID 07316 | Configuration | Preventive | |
Configure the "Disable Update Diagnostic" to organizational standards. CC ID 07317 | Configuration | Preventive | |
Configure the "Disable UI extending from documents and templates" to organizational standards. CC ID 07318 | Configuration | Preventive | |
Configure the "Disable Opt-in Wizard on first run" to organizational standards. CC ID 07319 | Configuration | Preventive | |
Configure the "Document Information Panel Beaconing UI" to organizational standards. CC ID 07320 | Configuration | Preventive | |
Configure the "EKU filtering" to organizational standards. CC ID 07321 | Configuration | Preventive | |
Configure the "Encryption type for password protected Office 97-2003 files" to organizational standards. CC ID 07323 | Configuration | Preventive | |
Configure the "Enable Customer Experience Improvement Program" to organizational standards. CC ID 07324 | Configuration | Preventive | |
Configure the "Encryption type for password protected Office Open XML files" to organizational standards. CC ID 07325 | Configuration | Preventive | |
Configure the "Key Usage Filtering" to organizational standards. CC ID 07326 | Configuration | Preventive | |
Configure the "Improve Proofing Tools" to organizational standards. CC ID 07327 | Configuration | Preventive | |
Configure the "Never allow users to specify groups when restricting permission for documents" to organizational standards. CC ID 07328 | Configuration | Preventive | |
Configure the "Legacy format signatures" to organizational standards. CC ID 07329 | Configuration | Preventive | |
Configure the "Load Controls in Forms3" to organizational standards. CC ID 07330 | Configuration | Preventive | |
Configure the "Prevent users from changing permissions on rights managed content" to organizational standards. CC ID 07331 | Configuration | Preventive | |
Configure the "Online content options" to organizational standards. CC ID 07332 | Configuration | Preventive | |
Configure the "Disable user customization of Quick Access Toolbar via UI" to organizational standards. CC ID 07333 | Configuration | Preventive | |
Configure the "Protect document metadata for password protected files" to organizational standards. CC ID 07334 | Configuration | Preventive | |
Configure the "Prevents users from uploading document templates to the Office Online community." to organizational standards CC ID 07335 | Configuration | Preventive | |
Configure the "Recognize smart tags in Excel" to organizational standards. CC ID 07336 | Configuration | Preventive | |
Configure the "Rely on VML for displaying graphics in browsers" to organizational standards. CC ID 07337 | Configuration | Preventive | |
Configure the "Protect document metadata for rights managed Office Open XML Files" to organizational standards. CC ID 07338 | Configuration | Preventive | |
Configure the "Suppress Office Signing Providers" to organizational standards. CC ID 07339 | Configuration | Preventive | |
Configure the "Suppress external signature services menu item" to organizational standards. CC ID 07340 | Configuration | Preventive | |
Configure the "Disable the Office client from polling the Office server for published links" to organizational standards. CC ID 07361 | Configuration | Preventive | |
Configure the "Open Office documents as read/write while browsing" to organizational standards. CC ID 07380 | Configuration | Preventive | |
Configure the "Specify CNG salt length" to organizational standards. CC ID 07905 | Configuration | Preventive | |
Configure the "Trusted Location #6" to organizational standards. CC ID 07919 | Configuration | Preventive | |
Configure the "Trusted Location #9" to organizational standards. CC ID 07920 | Configuration | Preventive | |
Configure the "Disable template downloads from the client and from Office.com" to organizational standards. CC ID 07942 | Configuration | Preventive | |
Configure the "Disable customer-submitted templates downloads from Office.com" to organizational standards. CC ID 07949 | Configuration | Preventive | |
Configure the "Trusted Location #15" to organizational standards. CC ID 07953 | Configuration | Preventive | |
Configure the "Prevents users from uploading document templates to the Office.com Community." to organizational standards CC ID 08017 | Configuration | Preventive | |
Configure the "Disable training practice downloads from Office.com" to organizational standards. CC ID 08027 | Configuration | Preventive | |
Configure the "Disable Clip Art and Media downloads from the client and from Office.com" to organizational standards. CC ID 08049 | Configuration | Preventive | |
Configure the "Allow Trusted Locations on the network" to organizational standards. CC ID 08053 | Configuration | Preventive | |
Configure the "Turn off all user customizations" to organizational standards. CC ID 08084 | Configuration | Preventive | |
Configure the "Disable access to updates, add-ins, and patches on Office.com" to organizational standards. CC ID 08137 | Configuration | Preventive | |
Configure Microsoft InfoPath settings for Microsoft Office in accordance with organizational standards. CC ID 07219 | Configuration | Preventive | |
Configure the "InfoPath APTCA Assembly allowable list" to organizational standards. CC ID 07220 | Configuration | Preventive | |
Configure the "InfoPath APTCA Assembly Allowable List Enforcement" to organizational standards. CC ID 07221 | Configuration | Preventive | |
Configure the "Allow file types as attachments to forms" to organizational standards. CC ID 07260 | Configuration | Preventive | |
Configure the "Beaconing UI for forms opened in InfoPath" to organizational standards. CC ID 07262 | Configuration | Preventive | |
Configure the "Control behavior for Windows SharePoint Services gradual upgrade" to organizational standards. CC ID 07264 | Configuration | Preventive | |
Configure the "Control behavior when opening forms in the Intranet security zone" to organizational standards. CC ID 07266 | Configuration | Preventive | |
Configure the "Custom code" to organizational standards. CC ID 07267 | Configuration | Preventive | |
Configure the "Beaconing UI for forms opened in InfoPath Editor ActiveX" to organizational standards. CC ID 07268 | Configuration | Preventive | |
Configure the "Control behavior when opening InfoPath e-mail forms containing code or script" to organizational standards. CC ID 07269 | Configuration | Preventive | |
Configure the "Disable dynamic caching of the form template in InfoPath e-mail forms" to organizational standards. CC ID 07270 | Configuration | Preventive | |
Configure the "Disable e-mail forms from the Full Trust security zone" to organizational standards. CC ID 07271 | Configuration | Preventive | |
Configure the "Control behavior when opening forms in the Trusted Site security zone" to organizational standards. CC ID 07272 | Configuration | Preventive | |
Configure the "Control behavior when opening forms in the Internet security zone" to organizational standards. CC ID 07273 | Configuration | Preventive | |
Configure the "Disable e-mail forms from the Intranet security zone" to organizational standards. CC ID 07274 | Configuration | Preventive | |
Configure the "Block specific file types as attachments to forms" to organizational standards. CC ID 07276 | Configuration | Preventive | |
Configure the "Disable e-mail forms from the Internet security zone" to organizational standards. CC ID 07277 | Configuration | Preventive | |
Configure the "Disable fully trusted solutions full access to computer" to organizational standards. CC ID 07278 | Configuration | Preventive | |
Configure the "Disable sending form template with e-mail forms" to organizational standards. CC ID 07279 | Configuration | Preventive | |
Configure the "Disable InfoPath e-mail forms in Outlook" to organizational standards. CC ID 07280 | Configuration | Preventive | |
Configure the "Email Forms Beaconing UI" to organizational standards. CC ID 07281 | Configuration | Preventive | |
Configure the "Disable e-mail forms running in restricted security level" to organizational standards. CC ID 07282 | Configuration | Preventive | |
Configure the "Disable sending InfoPath 2003 Forms as e-mail forms" to organizational standards. CC ID 07283 | Configuration | Preventive | |
Configure the "Prevent users from allowing unsafe file types to be attached to forms" to organizational standards. CC ID 07286 | Configuration | Preventive | |
Configure the "Information Rights Management" to organizational standards. CC ID 07293 | Configuration | Preventive | |
Configure the "Disable opening of solutions from the Internet security zone" to organizational standards. CC ID 07310 | Configuration | Preventive | |
Configure the "Offline Mode status" to organizational standards. CC ID 07322 | Configuration | Preventive | |
Configure Microsoft Access settings for Microsoft Office in accordance with organizational standards. CC ID 07222 | Configuration | Preventive | |
Configure the "Disable all application add-ins" to organizational standards. CC ID 07223 | Configuration | Preventive | |
Configure the "Allow Trusted Locations not on the computer" to organizational standards. CC ID 07224 | Configuration | Preventive | |
Configure the "Disable commands" to organizational standards. CC ID 07225 | Configuration | Preventive | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins" to organizational standards. CC ID 07226 | Configuration | Preventive | |
Configure the "Disable all trusted locations" to organizational standards. CC ID 07227 | Configuration | Preventive | |
Configure the "Disable shortcut keys" to organizational standards. CC ID 07228 | Configuration | Preventive | |
Configure the "Do not prompt to convert older databases" to organizational standards. CC ID 07229 | Configuration | Preventive | |
Configure the "Modal Trust Decision Only" to organizational standards. CC ID 07230 | Configuration | Preventive | |
Configure the "Default file format" to organizational standards. CC ID 07231 | Configuration | Preventive | |
Configure the "Require that application add-ins are signed by Trusted Publisher" to organizational standards. CC ID 07233 | Configuration | Preventive | |
Configure the "VBA Macro Warning Settings" to organizational standards. CC ID 07234 | Configuration | Preventive | |
Configure the "Underline hyperlinks" to organizational standards. CC ID 07235 | Configuration | Preventive | |
Configure Microsoft Excel settings for Microsoft Office in accordance with organizational standards. CC ID 07232 | Configuration | Preventive | |
Configure the "Block opening of Binary file types" to organizational standards. CC ID 07236 | Configuration | Preventive | |
Configure the "AutoRepublish Warning Alert" to organizational standards. CC ID 07237 | Configuration | Preventive | |
Configure the "Block opening of DIF and SYLK file types" to organizational standards. CC ID 07238 | Configuration | Preventive | |
Configure the "Ask to update automatic links" to organizational standards. CC ID 07239 | Configuration | Preventive | |
Configure the "Block opening of Open XML file types" to organizational standards. CC ID 07240 | Configuration | Preventive | |
Configure the "Block opening of Xll file type" to organizational standards. CC ID 07241 | Configuration | Preventive | |
Configure the "Block opening of Xml file types" to organizational standards. CC ID 07242 | Configuration | Preventive | |
Configure the "Block opening of Text file types" to organizational standards. CC ID 07243 | Configuration | Preventive | |
Configure the "Block saving of Binary file types" to organizational standards. CC ID 07244 | Configuration | Preventive | |
Configure the "Block saving DIF and SYLK file types" to organizational standards. CC ID 07245 | Configuration | Preventive | |
Configure the "Block opening of files created by pre-release versions of Excel 2007" to organizational standards. CC ID 07246 | Configuration | Preventive | |
Configure the "Block saving of Text file types" to organizational standards. CC ID 07247 | Configuration | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Excel Open XML workbooks" to organizational standards. CC ID 07248 | Configuration | Preventive | |
Configure the "Block opening of Html and Xmlss file types" to organizational standards. CC ID 07249 | Configuration | Preventive | |
Configure the "Block opening of Binary 12 file types" to organizational standards. CC ID 07250 | Configuration | Preventive | |
Configure the "Block saving of Open XML file types" to organizational standards. CC ID 07251 | Configuration | Preventive | |
Configure the "Block saving of Binary12 file types" to organizational standards. CC ID 07252 | Configuration | Preventive | |
Configure the "Disable AutoRepublish" to organizational standards. CC ID 07253 | Configuration | Preventive | |
Configure the "Do not show data extraction options when opening corrupt workbooks" to organizational standards. CC ID 07254 | Configuration | Preventive | |
Configure the "Internet and network paths as hyperlinks" to organizational standards. CC ID 07255 | Configuration | Preventive | |
Configure the "Load pictures from Web pages not created in Excel" to organizational standards. CC ID 07256 | Configuration | Preventive | |
Configure the "Save any additional data necessary to maintain formulas" to organizational standards. CC ID 07257 | Configuration | Preventive | |
Configure the "Store macro in Personal Macro Workbook by default" to organizational standards. CC ID 07258 | Configuration | Preventive | |
Configure the "Save Excel files as" to organizational standards. CC ID 07259 | Configuration | Preventive | |
Configure the "Trust access to Visual Basic Project" to organizational standards. CC ID 07261 | Configuration | Preventive | |
Configure the "Force file extension to match file type" to organizational standards. CC ID 07263 | Configuration | Preventive | |
Configure the "Ignore other applications" to organizational standards. CC ID 07265 | Configuration | Preventive | |
Configure the "Block saving of Html and Xmlss file types" to organizational standards. CC ID 07275 | Configuration | Preventive | |
Configure the "Trusted Location #10" to organizational standards. CC ID 07927 | Configuration | Preventive | |
Configure the "Configure CNG cipher chaining mode" to organizational standards. CC ID 07934 | Configuration | Preventive | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins and block them" to organizational standards. CC ID 07938 | Configuration | Preventive | |
Configure the "Trusted Location #20" to organizational standards. CC ID 07947 | Configuration | Preventive | |
Configure the "Trusted Location #18" to organizational standards. CC ID 07961 | Configuration | Preventive | |
Configure the "Do not show AutoRepublish warning alert" to organizational standards. CC ID 07970 | Configuration | Preventive | |
Configure the "Turn off Protected View for attachments opened from Outlook" to organizational standards. CC ID 07973 | Configuration | Preventive | |
Configure the "Turn off Trusted Documents on the network" to organizational standards. CC ID 07980 | Configuration | Preventive | |
Configure the "Trusted Location #11" to organizational standards. CC ID 08006 | Configuration | Preventive | |
Configure the "Perform file validation on pivot caches" to organizational standards. CC ID 08022 | Configuration | Preventive | |
Configure the "Scan encrypted macros in Excel Open XML workbooks" to organizational standards. CC ID 08102 | Configuration | Preventive | |
Configure the "Open files on local Intranet UNC in Protected View" to organizational standards. CC ID 08110 | Configuration | Preventive | |
Configure the "Microsoft Office query files" to organizational standards. CC ID 08205 | Configuration | Preventive | |
Configure the "Excel 97-2003 workbooks and templates" to organizational standards. CC ID 08236 | Configuration | Preventive | |
Configure the "Excel 95-97 workbooks and templates" to organizational standards. CC ID 08255 | Configuration | Preventive | |
Configure the "XML files" to organizational standards. CC ID 08262 | Configuration | Preventive | |
Configure the "Excel 3 worksheets" to organizational standards. CC ID 08270 | Configuration | Preventive | |
Configure the "Dif and Sylk files" to organizational standards. CC ID 08284 | Configuration | Preventive | |
Configure the "dBase III / IV files" to organizational standards. CC ID 08300 | Configuration | Preventive | |
Configure the "Excel 2 macrosheets and add-in files" to organizational standards. CC ID 08303 | Configuration | Preventive | |
Configure the "Excel 2007 and later binary workbooks" to organizational standards. CC ID 08305 | Configuration | Preventive | |
Configure the "Microsoft Office Open XML converters for Excel" to organizational standards. CC ID 08308 | Configuration | Preventive | |
Configure the "Web pages and Excel 2003 XML spreadsheets" to organizational standards. CC ID 08314 | Configuration | Preventive | |
Configure the "Excel 4 workbooks" to organizational standards. CC ID 08315 | Configuration | Preventive | |
Configure the "Excel 2007 and later workbooks and templates" to organizational standards. CC ID 08317 | Configuration | Preventive | |
Configure the "Excel 95 workbooks" to organizational standards. CC ID 08319 | Configuration | Preventive | |
Configure the "Other data source files" to organizational standards. CC ID 08321 | Configuration | Preventive | |
Configure the "Excel 2007 and later macro-enabled workbooks and templates" to organizational standards. CC ID 08323 | Configuration | Preventive | |
Configure the "Legacy converters for Excel" to organizational standards. CC ID 08325 | Configuration | Preventive | |
Configure the "Excel 2 worksheets" to organizational standards. CC ID 08326 | Configuration | Preventive | |
Configure the "Offline cube files" to organizational standards. CC ID 08327 | Configuration | Preventive | |
Configure the "Excel 4 macrosheets and add-in files" to organizational standards. CC ID 08329 | Configuration | Preventive | |
Configure the "Excel 2007 and later add-in files" to organizational standards. CC ID 08330 | Configuration | Preventive | |
Configure the "Excel 3 macrosheets and add-in files" to organizational standards. CC ID 08332 | Configuration | Preventive | |
Configure the "OpenDocument Spreadsheet files" to organizational standards. CC ID 08335 | Configuration | Preventive | |
Configure the "Excel add-in files" to organizational standards. CC ID 08337 | Configuration | Preventive | |
Configure the "Text files" to organizational standards. CC ID 08339 | Configuration | Preventive | |
Configure the "Excel 97-2003 add-in files" to organizational standards. CC ID 08344 | Configuration | Preventive | |
Configure the "Excel 4 worksheets" to organizational standards. CC ID 08345 | Configuration | Preventive | |
Configure the "Microsoft Office data connection files" to organizational standards. CC ID 08346 | Configuration | Preventive | |
Configure Microsoft Outlook settings for Microsoft Office in accordance with organizational standards. CC ID 07341 | Configuration | Preventive | |
Configure the "Add file extensions to block as Level 1" to organizational standards. CC ID 07342 | Configuration | Preventive | |
Configure the "Access to published calendars" to organizational standards. CC ID 07343 | Configuration | Preventive | |
Configure the "Add e-mail recipients to users' Safe Senders Lists" to organizational standards. CC ID 07344 | Configuration | Preventive | |
Configure the "Allow access to e-mail attachments" to organizational standards. CC ID 07345 | Configuration | Preventive | |
Configure the "Allow Active X One Off Forms" to organizational standards. CC ID 07346 | Configuration | Preventive | |
Configure the "Add file extensions to block as Level 2" to organizational standards. CC ID 07347 | Configuration | Preventive | |
Configure the "Allow users to demote attachments to Level 2" to organizational standards. CC ID 07348 | Configuration | Preventive | |
Configure the "Apply macro security settings to macros, add-ins, and SmartTags" to organizational standards. CC ID 07349 | Configuration | Preventive | |
Configure the "Allow scripts in one-off Outlook forms" to organizational standards. CC ID 07350 | Configuration | Preventive | |
Configure the "Authentication with Exchange Server" to organizational standards. CC ID 07351 | Configuration | Preventive | |
Configure the "Attachment Secure Temporary Folder" to organizational standards. CC ID 07352 | Configuration | Preventive | |
Configure the "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" to organizational standards. CC ID 07353 | Configuration | Preventive | |
Configure the "Automatically configure profile based on Active Directory Primary SMTP address" to organizational standards. CC ID 07354 | Configuration | Preventive | |
Configure the "Block Trusted Zones" to organizational standards. CC ID 07355 | Configuration | Preventive | |
Configure the "Configure Add-In Trust Level" to organizational standards. CC ID 07356 | Configuration | Preventive | |
Configure the "Automatically download attachments" to organizational standards. CC ID 07357 | Configuration | Preventive | |
Configure the "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" to organizational standards. CC ID 07358 | Configuration | Preventive | |
Configure the "Configure Outlook object model prompt when accessing address information via UserProperties.Find" to organizational standards. CC ID 07359 | Configuration | Preventive | |
Configure the "Configure Outlook object model prompt when executing Save As" to organizational standards. CC ID 07360 | Configuration | Preventive | |
Configure the "Configure Outlook object model prompt when responding to meeting and task requests" to organizational standards. CC ID 07362 | Configuration | Preventive | |
Configure the "Dial-up options" to organizational standards. CC ID 07363 | Configuration | Preventive | |
Configure the "Configure Outlook object model prompt when sending mail" to organizational standards. CC ID 07364 | Configuration | Preventive | |
Configure the "Configure trusted add-ins" to organizational standards. CC ID 07365 | Configuration | Preventive | |
Configure the "Disable user entries to server list" to organizational standards. CC ID 07366 | Configuration | Preventive | |
Configure the "Disable Remember Password" to organizational standards. CC ID 07367 | Configuration | Preventive | |
Configure the "Display Level 1 attachments" to organizational standards. CC ID 07368 | Configuration | Preventive | |
Configure the "Configure Outlook object model prompt when reading address information" to organizational standards. CC ID 07369 | Configuration | Preventive | |
Configure the "Do not allow attachment previewing in Outlook" to organizational standards. CC ID 07370 | Configuration | Preventive | |
Configure the "Do not allow creating, replying, or forwarding signatures for e-mail messages" to organizational standards. CC ID 07371 | Configuration | Preventive | |
Configure the "Configure Outlook object model prompt when accessing an address book" to organizational standards. CC ID 07372 | Configuration | Preventive | |
Configure the "Do not allow folders in non-default stores to be set as folder home pages" to organizational standards. CC ID 07373 | Configuration | Preventive | |
Configure the "Do not allow Outlook object model scripts to run for public folders" to organizational standards. CC ID 07374 | Configuration | Preventive | |
Configure the "Do not allow Outlook object model scripts to run for shared folders" to organizational standards. CC ID 07375 | Configuration | Preventive | |
Configure the "Do not automatically sign replies" to organizational standards. CC ID 07376 | Configuration | Preventive | |
Configure the "Do not check e-mail address against address of certificates being used" to organizational standards. CC ID 07377 | Configuration | Preventive | |
Configure the "Do not allow users to change permissions on folders" to organizational standards. CC ID 07378 | Configuration | Preventive | |
Configure the "Do not expand distribution lists" to organizational standards. CC ID 07379 | Configuration | Preventive | |
Configure the "Do not display 'Publish to GAL' button" to organizational standards. CC ID 07381 | Configuration | Preventive | |
Configure the "Do not prompt about Level 1 attachments when closing an item" to organizational standards. CC ID 07382 | Configuration | Preventive | |
Configure the "Do not permit download of content from safe zones" to organizational standards. CC ID 07383 | Configuration | Preventive | |
Configure the "Download full text of articles as HTML attachments" to organizational standards. CC ID 07384 | Configuration | Preventive | |
Configure the "Do not prompt about Level 1 attachments when sending an item" to organizational standards. CC ID 07385 | Configuration | Preventive | |
Configure the "Do not provide Continue option on Encryption warning dialog boxes" to organizational standards. CC ID 07386 | Configuration | Preventive | |
Configure the "Enable RPC encryption" to organizational standards. CC ID 07387 | Configuration | Preventive | |
Configure the "Encrypt all e-mail messages" to organizational standards. CC ID 07388 | Configuration | Preventive | |
Configure the "Enable links in e-mail messages" to organizational standards. CC ID 07389 | Configuration | Preventive | |
Configure the "Display pictures and external content in HTML e-mail" to organizational standards. CC ID 07390 | Configuration | Preventive | |
Configure the "Hide Junk Mail UI" to organizational standards. CC ID 07391 | Configuration | Preventive | |
Configure the "Ensure all S/MIME signed messages have a label" to organizational standards. CC ID 07392 | Configuration | Preventive | |
Configure the "Include Intranet in Safe Zones for Automatic Picture Download" to organizational standards. CC ID 07393 | Configuration | Preventive | |
Configure the "Include Internet in Safe Zones for Automatic Picture Download" to organizational standards. CC ID 07394 | Configuration | Preventive | |
Configure the "Message Formats" to organizational standards. CC ID 07395 | Configuration | Preventive | |
Configure the "Junk E-mail protection level" to organizational standards. CC ID 07396 | Configuration | Preventive | |
Configure the "Make Outlook the default program for E-mail, Contacts, and Calendar" to organizational standards. CC ID 07397 | Configuration | Preventive | |
Configure the "Do not include Internet Calendar integration in Outlook" to organizational standards. CC ID 07398 | Configuration | Preventive | |
Configure the "Missing CRLs" to organizational standards. CC ID 07399 | Configuration | Preventive | |
Configure the "Display online status on a person name" to organizational standards. CC ID 07400 | Configuration | Preventive | |
Configure the "Outlook Rich Text options" to organizational standards. CC ID 07401 | Configuration | Preventive | |
Configure the "Outlook Security Mode" to organizational standards. CC ID 07402 | Configuration | Preventive | |
Configure the "Plain text options" to organizational standards. CC ID 07403 | Configuration | Preventive | |
Configure the "Prevent publishing to a DAV server" to organizational standards. CC ID 07404 | Configuration | Preventive | |
Configure the "Prevent publishing to Office Online" to organizational standards. CC ID 07405 | Configuration | Preventive | |
Configure the "Promote Level 2 errors as errors, not warnings" to organizational standards. CC ID 07406 | Configuration | Preventive | |
Configure the "Prevent users from customizing attachment security settings" to organizational standards. CC ID 07407 | Configuration | Preventive | |
Configure the "Prompt user to choose security settings if default settings fail" to organizational standards. CC ID 07408 | Configuration | Preventive | |
Configure the "Remove file extensions blocked as Level 1" to organizational standards. CC ID 07409 | Configuration | Preventive | |
Configure the "Remove file extensions blocked as Level 2" to organizational standards. CC ID 07410 | Configuration | Preventive | |
Configure the "Read e-mail as plain text" to organizational standards. CC ID 07411 | Configuration | Preventive | |
Configure the "Read signed e-mail as plain text" to organizational standards. CC ID 07412 | Configuration | Preventive | |
Configure the "Request an S/MIME receipt for all S/MIME signed messages" to organizational standards. CC ID 07413 | Configuration | Preventive | |
Configure the "Restrict level of calendar details users can publish" to organizational standards. CC ID 07414 | Configuration | Preventive | |
Configure the "Require SuiteB algorithms for S/MIME operations" to organizational standards. CC ID 07415 | Configuration | Preventive | |
Configure the "Minimum encryption settings" to organizational standards. CC ID 07416 | Configuration | Preventive | |
Configure the "Retrieving CRLs (Certificate Revocation Lists)" to organizational standards. CC ID 07417 | Configuration | Preventive | |
Configure the "Run in FIPS compliant mode" to organizational standards. CC ID 07418 | Configuration | Preventive | |
Configure the "Missing root certificates" to organizational standards. CC ID 07419 | Configuration | Preventive | |
Configure the "S/MIME password settings" to organizational standards. CC ID 07420 | Configuration | Preventive | |
Configure the "S/MIME receipt requests" to organizational standards. CC ID 07421 | Configuration | Preventive | |
Configure the "S/MIME interoperability with external clients:" to organizational standards. CC ID 07422 | Configuration | Preventive | |
Configure the "Send all signed messages as clear signed messages" to organizational standards. CC ID 07423 | Configuration | Preventive | |
Configure the "Security setting for macros" to organizational standards. CC ID 07424 | Configuration | Preventive | |
Configure the "Set control ItemProperty prompt" to organizational standards. CC ID 07425 | Configuration | Preventive | |
Configure the "Set maximum level of online status on a person name" to organizational standards. CC ID 07426 | Configuration | Preventive | |
Configure the "Set message format" to organizational standards. CC ID 07427 | Configuration | Preventive | |
Configure the "Sign all e-mail messages" to organizational standards. CC ID 07428 | Configuration | Preventive | |
Configure the "Fortezza certificate policies" to organizational standards. CC ID 07429 | Configuration | Preventive | |
Configure the "Synchronize Outlook RSS Feeds with Common Feed List" to organizational standards. CC ID 07430 | Configuration | Preventive | |
Configure the "Trust E-mail from Contacts" to organizational standards. CC ID 07431 | Configuration | Preventive | |
Configure the "Signature Warning" to organizational standards. CC ID 07432 | Configuration | Preventive | |
Configure the "Turn off RSS feature" to organizational standards. CC ID 07466 | Configuration | Preventive | |
Configure the "Restrict upload method" to organizational standards. CC ID 07473 | Configuration | Preventive | |
Configure the "Required Certificate Authority" to organizational standards. CC ID 07493 | Configuration | Preventive | |
Configure the "Turn off Enable the Person Names Smart Tag option" to organizational standards. CC ID 07499 | Configuration | Preventive | |
Configure the "Use Unicode format when dragging e-mail message to file system" to organizational standards. CC ID 07506 | Configuration | Preventive | |
Configure the "URL for S/MIME certificates" to organizational standards. CC ID 07520 | Configuration | Preventive | |
Configure the "Set Outlook object model Custom Actions execution prompt" to organizational standards. CC ID 07539 | Configuration | Preventive | |
Configure the "Prevent publishing to Office.com" to organizational standards. CC ID 08243 | Configuration | Preventive | |
Configure the "Do not allow signatures for e-mail messages" to organizational standards. CC ID 08318 | Configuration | Preventive | |
Configure Microsoft PowerPoint settings for Microsoft Office in accordance with organizational standards. CC ID 07433 | Configuration | Preventive | |
Configure the "Block saving of GraphicFilters" to organizational standards. CC ID 07456 | Configuration | Preventive | |
Configure the "Block opening of Converters" to organizational standards. CC ID 07458 | Configuration | Preventive | |
Configure the "Save files in this format" to organizational standards. CC ID 07461 | Configuration | Preventive | |
Configure the "Disable Slide Update" to organizational standards. CC ID 07464 | Configuration | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft PowerPoint Open XML presentations" to organizational standards. CC ID 07467 | Configuration | Preventive | |
Configure the "Block saving of Html file types" to organizational standards. CC ID 07474 | Configuration | Preventive | |
Configure the "Block saving of Outlines" to organizational standards. CC ID 07485 | Configuration | Preventive | |
Configure the "Block opening of Outlines" to organizational standards. CC ID 07490 | Configuration | Preventive | |
Configure the "Make hidden markup visible" to organizational standards. CC ID 07511 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2007" to organizational standards. CC ID 07516 | Configuration | Preventive | |
Configure the "Run Programs" to organizational standards. CC ID 07518 | Configuration | Preventive | |
Configure the "Unblock automatic download of linked images" to organizational standards. CC ID 07519 | Configuration | Preventive | |
Configure the "Block opening of Open Xml files types" to organizational standards. CC ID 07531 | Configuration | Preventive | |
Configure the "Web Pages" to organizational standards. CC ID 07914 | Configuration | Preventive | |
Configure the "Turn off trusted documents" to organizational standards. CC ID 07925 | Configuration | Preventive | |
Configure the "Set CNG password spin count" to organizational standards. CC ID 07946 | Configuration | Preventive | |
Configure the "Trusted Location #16" to organizational standards. CC ID 07956 | Configuration | Preventive | |
Configure the "Outline files" to organizational standards. CC ID 07958 | Configuration | Preventive | |
Configure the "Trusted Location #3" to organizational standards. CC ID 07966 | Configuration | Preventive | |
Configure the "Scan encrypted macros in PowerPoint Open XML presentations" to organizational standards. CC ID 07967 | Configuration | Preventive | |
Configure the "Trusted Location #4" to organizational standards. CC ID 07978 | Configuration | Preventive | |
Configure the "Set maximum number of trusted documents" to organizational standards. CC ID 08005 | Configuration | Preventive | |
Configure the "Legacy converters for PowerPoint" to organizational standards. CC ID 08009 | Configuration | Preventive | |
Configure the "Set document behavior if file validation fails" to organizational standards. CC ID 08025 | Configuration | Preventive | |
Configure the "Microsoft Office Open XML converters for PowerPoint" to organizational standards. CC ID 08030 | Configuration | Preventive | |
Configure the "PowerPoint beta converters" to organizational standards. CC ID 08047 | Configuration | Preventive | |
Configure the "OpenDocument Presentation files" to organizational standards. CC ID 08051 | Configuration | Preventive | |
Configure the "Use new key on password change" to organizational standards. CC ID 08052 | Configuration | Preventive | |
Configure the "Graphic Filters" to organizational standards. CC ID 08060 | Configuration | Preventive | |
Configure the "PowerPoint 2007 and later presentations, shows, templates, themes and add-in files" to organizational standards. CC ID 08099 | Configuration | Preventive | |
Configure the "PowerPoint 97-2003 presentations, shows, templates and add-in files" to organizational standards. CC ID 08106 | Configuration | Preventive | |
Configure the "PowerPoint beta files" to organizational standards. CC ID 08121 | Configuration | Preventive | |
Configure the "Set default file block behavior" to organizational standards. CC ID 08142 | Configuration | Preventive | |
Configure Microsoft Word settings for Microsoft Office in accordance with organizational standards. CC ID 07438 | Configuration | Preventive | |
Configure the "Block opening of files before version" to organizational standards. CC ID 07462 | Configuration | Preventive | |
Configure the "Block open Converters" to organizational standards. CC ID 07468 | Configuration | Preventive | |
Configure the "Update automatic links at Open" to organizational standards. CC ID 07483 | Configuration | Preventive | |
Configure the "Warn before printing, saving or sending a file that contains tracked changes or comments" to organizational standards. CC ID 07494 | Configuration | Preventive | |
Configure the "Block saving of RTF file types" to organizational standards. CC ID 07501 | Configuration | Preventive | |
Configure the "Block saving of Converters" to organizational standards. CC ID 07504 | Configuration | Preventive | |
Configure the "Block opening of Word 2003 XML file types" to organizational standards. CC ID 07507 | Configuration | Preventive | |
Configure the "Block opening of RTF file types" to organizational standards. CC ID 07510 | Configuration | Preventive | |
Configure the "Block opening of HTML file types" to organizational standards. CC ID 07512 | Configuration | Preventive | |
Configure the "Hidden text" to organizational standards. CC ID 07513 | Configuration | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Word Open XML documents" to organizational standards. CC ID 07533 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Word 2007" to organizational standards. CC ID 07541 | Configuration | Preventive | |
Configure the "Block opening of Internal file types" to organizational standards. CC ID 07552 | Configuration | Preventive | |
Configure the "Block saving of Word 2003 XML file types" to organizational standards. CC ID 07567 | Configuration | Preventive | |
Configure the "RTF files" to organizational standards. CC ID 07911 | Configuration | Preventive | |
Configure the "Set maximum number of trust records to preserve" to organizational standards. CC ID 07912 | Configuration | Preventive | |
Configure the "Specify CNG hash algorithm" to organizational standards. CC ID 07913 | Configuration | Preventive | |
Configure the "VBA Macro Notification Settings" to organizational standards. CC ID 07926 | Configuration | Preventive | |
Configure the "Trusted Location #2" to organizational standards. CC ID 07933 | Configuration | Preventive | |
Configure the "Do not open files in unsafe locations in Protected View" to organizational standards. CC ID 07939 | Configuration | Preventive | |
Configure the "Set parameters for CNG context" to organizational standards. CC ID 07948 | Configuration | Preventive | |
Configure the "Store random number to improve merge accuracy" to organizational standards. CC ID 07972 | Configuration | Preventive | |
Configure the "Trusted Location #19" to organizational standards. CC ID 07975 | Configuration | Preventive | |
Configure the "Legacy converters for Word" to organizational standards. CC ID 07985 | Configuration | Preventive | |
Configure the "Trusted Location #5" to organizational standards. CC ID 07987 | Configuration | Preventive | |
Configure the "Word 6.0 binary documents and templates" to organizational standards. CC ID 07995 | Configuration | Preventive | |
Configure the "Word 2000 binary documents and templates" to organizational standards. CC ID 08012 | Configuration | Preventive | |
Configure the "Trusted Location #13" to organizational standards. CC ID 08013 | Configuration | Preventive | |
Configure the "Trusted Location #17" to organizational standards. CC ID 08015 | Configuration | Preventive | |
Configure the "Word 97 binary documents and templates" to organizational standards. CC ID 08024 | Configuration | Preventive | |
Configure the "Do not open files from the Internet zone in Protected View" to organizational standards. CC ID 08029 | Configuration | Preventive | |
Configure the "Turn off file validation" to organizational standards. CC ID 08048 | Configuration | Preventive | |
Configure the "Office Open XML converters for Word" to organizational standards. CC ID 08055 | Configuration | Preventive | |
Configure the "Word 95 binary documents and templates" to organizational standards. CC ID 08065 | Configuration | Preventive | |
Configure the "Word beta converters" to organizational standards. CC ID 08080 | Configuration | Preventive | |
Configure the "Word 2007 and later binary documents and templates" to organizational standards. CC ID 08082 | Configuration | Preventive | |
Configure the "Word beta files" to organizational standards. CC ID 08092 | Configuration | Preventive | |
Configure the "Word 2003 binary documents and templates" to organizational standards. CC ID 08093 | Configuration | Preventive | |
Configure the "Word XP binary documents and templates" to organizational standards. CC ID 08095 | Configuration | Preventive | |
Configure the "Word 2007 and later documents and templates" to organizational standards. CC ID 08097 | Configuration | Preventive | |
Configure the "Word 2 and earlier binary documents and templates" to organizational standards. CC ID 08112 | Configuration | Preventive | |
Configure the "Plain text files" to organizational standards. CC ID 08125 | Configuration | Preventive | |
Configure the "Word 2003 and plain XML documents" to organizational standards. CC ID 08134 | Configuration | Preventive | |
Configure the "OpenDocument Text files" to organizational standards. CC ID 08141 | Configuration | Preventive | |
Configure the "Scan encrypted macros in Word Open XML documents" to organizational standards. CC ID 08147 | Configuration | Preventive | |
Configure Microsoft OneNote settings for Microsoft Office in accordance with organizational standards. CC ID 07908 | Configuration | Preventive | |
Configure the "Specify encryption compatibility" to organizational standards. CC ID 07909 | Configuration | Preventive | |
Configure the "Specify CNG random number generator algorithm" to organizational standards. CC ID 07916 | Configuration | Preventive | |
Configure the "Set CNG cipher algorithm" to organizational standards. CC ID 07944 | Configuration | Preventive | |
Configure the "Set CNG cipher key length" to organizational standards. CC ID 07974 | Configuration | Preventive | |
Configure User Interface settings for Microsoft Office in accordance with organizational standards. CC ID 07923 | Configuration | Preventive | |
Configure Signing settings for Microsoft Office in accordance with organizational standards. CC ID 07929 | Configuration | Preventive | |
Configure Email Form settings for Microsoft Office in accordance with organizational standards. CC ID 07930 | Configuration | Preventive | |
Configure Security settings for Microsoft Office in accordance with organizational standards. CC ID 07932 | Configuration | Preventive | |
Configure the "Trusted Location #8" to organizational standards. CC ID 07935 | Configuration | Preventive | |
Configure the "Unsafe Location #12" to organizational standards. CC ID 07940 | Configuration | Preventive | |
Configure the "Unsafe Location #20" to organizational standards. CC ID 07943 | Configuration | Preventive | |
Configure the "Check the XAdES portions of a digital signature" to organizational standards. CC ID 07955 | Configuration | Preventive | |
Configure the "Check OLE objects" to organizational standards. CC ID 07957 | Configuration | Preventive | |
Configure the "Consistent Mime Handling" to organizational standards. CC ID 07959 | Configuration | Preventive | |
Configure the "Protection From Zone Elevation" to organizational standards. CC ID 07964 | Configuration | Preventive | |
Configure the "Trusted Location #14" to organizational standards. CC ID 07965 | Configuration | Preventive | |
Configure the "Turn off Data Execution Prevention" to organizational standards. CC ID 07968 | Configuration | Preventive | |
Configure the "Trusted Location #12" to organizational standards. CC ID 07976 | Configuration | Preventive | |
Configure the "Set password hash format as ISO-compliant" to organizational standards. CC ID 07977 | Configuration | Preventive | |
Configure the "Prompt to allow fatally corrupt files to open instead of blocking them" to organizational standards. CC ID 07982 | Configuration | Preventive | |
Configure the "Encrypt document properties" to organizational standards. CC ID 07991 | Configuration | Preventive | |
Configure the "Prevent Word and Excel from loading managed code extensions" to organizational standards. CC ID 07999 | Configuration | Preventive | |
Configure the "Apply macro security settings to macros, add-ins and additional actions" to organizational standards. CC ID 08002 | Configuration | Preventive | |
Configure the "Add-on Management" to organizational standards. CC ID 08007 | Configuration | Preventive | |
Configure the "Trusted Location #7" to organizational standards. CC ID 08008 | Configuration | Preventive | |
Configure the "Trusted Location #1" to organizational standards. CC ID 08016 | Configuration | Preventive | |
Configure the "Unsafe Location #13" to organizational standards. CC ID 08023 | Configuration | Preventive | |
Configure the "S/MIME receipt requests behavior" to organizational standards. CC ID 08026 | Configuration | Preventive | |
Configure the "Do not include XAdES reference object in the manifest" to organizational standards. CC ID 08031 | Configuration | Preventive | |
Configure the "Unsafe Location #11" to organizational standards. CC ID 08032 | Configuration | Preventive | |
Configure the "Windows Internet Explorer Feature Control Opt-In" to organizational standards. CC ID 08033 | Configuration | Preventive | |
Configure the "Allow hyperlinks in suspected phishing e-mail messages" to organizational standards. CC ID 08034 | Configuration | Preventive | |
Configure the "Unsafe Location #5" to organizational standards. CC ID 08038 | Configuration | Preventive | |
Configure the "Specify minimum XAdES level for digital signature generation" to organizational standards. CC ID 08040 | Configuration | Preventive | |
Configure the "Check OWC data source providers" to organizational standards. CC ID 08041 | Configuration | Preventive | |
Configure the "Unsafe Location #10" to organizational standards. CC ID 08044 | Configuration | Preventive | |
Configure the "Set password rules domain timeout" to organizational standards. CC ID 08045 | Configuration | Preventive | |
Configure the "Object Caching Protection" to organizational standards. CC ID 08046 | Configuration | Preventive | |
Configure the "Unsafe Location #18" to organizational standards. CC ID 08056 | Configuration | Preventive | |
Configure the "Unsafe Location #8" to organizational standards. CC ID 08057 | Configuration | Preventive | |
Configure the "Unsafe Location #3" to organizational standards. CC ID 08059 | Configuration | Preventive | |
Configure the "Unsafe Location #6" to organizational standards. CC ID 08063 | Configuration | Preventive | |
Configure the "Replies or forwards to signed/encrypted messages are signed/encrypted" to organizational standards. CC ID 08064 | Configuration | Preventive | |
Configure the "Set timestamp server timeout" to organizational standards. CC ID 08068 | Configuration | Preventive | |
Configure the "Unsafe Location #16" to organizational standards. CC ID 08071 | Configuration | Preventive | |
Configure the "Previous-version file formats" to organizational standards. CC ID 08072 | Configuration | Preventive | |
Configure the "Turn off PDF encryption setting UI" to organizational standards. CC ID 08074 | Configuration | Preventive | |
Configure the "Unsafe Location #2" to organizational standards. CC ID 08075 | Configuration | Preventive | |
Configure the "Restrict File Download" to organizational standards. CC ID 08076 | Configuration | Preventive | |
Configure the "Require OCSP at signature generation time" to organizational standards. CC ID 08077 | Configuration | Preventive | |
Configure the "Disable Password Caching" to organizational standards. CC ID 08079 | Configuration | Preventive | |
Configure the "Message when Outlook cannot find the digital ID to decode a message" to organizational standards. CC ID 08083 | Configuration | Preventive | |
Configure the "Enable Cryptography Icons" to organizational standards. CC ID 08086 | Configuration | Preventive | |
Configure the "Unsafe Location #14" to organizational standards. CC ID 08091 | Configuration | Preventive | |
Configure the "Disable 'Remember password' for Internet e-mail accounts" to organizational standards. CC ID 08096 | Configuration | Preventive | |
Configure the "Suppress hyperlink warnings" to organizational standards. CC ID 08100 | Configuration | Preventive | |
Configure the "Use Protected View for attachments received from internal senders" to organizational standards. CC ID 08104 | Configuration | Preventive | |
Configure the "Unsafe Location #9" to organizational standards. CC ID 08108 | Configuration | Preventive | |
Configure the "Display OLE package objects" to organizational standards. CC ID 08109 | Configuration | Preventive | |
Configure the "Configure time stamping hashing algorithm" to organizational standards. CC ID 08111 | Configuration | Preventive | |
Configure the "Scripted Window Security Restrictions" to organizational standards. CC ID 08113 | Configuration | Preventive | |
Configure the "Set password rules level" to organizational standards. CC ID 08117 | Configuration | Preventive | |
Configure the "Information Bar" to organizational standards. CC ID 08118 | Configuration | Preventive | |
Configure the "Mime Sniffing Safety Feature" to organizational standards. CC ID 08119 | Configuration | Preventive | |
Configure the "Publisher Automation Security Level" to organizational standards. CC ID 08123 | Configuration | Preventive | |
Configure the "Check Excel RTD servers" to organizational standards. CC ID 08127 | Configuration | Preventive | |
Configure the "Path to shared Workgroup information file for secured MDB files" to organizational standards. CC ID 08128 | Configuration | Preventive | |
Configure the "Check ActiveX objects" to organizational standards. CC ID 08131 | Configuration | Preventive | |
Configure the "Unsafe Location #15" to organizational standards. CC ID 08132 | Configuration | Preventive | |
Configure the "Unsafe Location #19" to organizational standards. CC ID 08135 | Configuration | Preventive | |
Configure the "Always use TNEF formatting in S/MIME messages" to organizational standards. CC ID 08136 | Configuration | Preventive | |
Configure the "Restrict ActiveX Install" to organizational standards. CC ID 08138 | Configuration | Preventive | |
Configure the "Set signature verification level" to organizational standards. CC ID 08140 | Configuration | Preventive | |
Configure the "Unsafe Location #17" to organizational standards. CC ID 08143 | Configuration | Preventive | |
Configure the "Do not allow expired certificates when validating signatures" to organizational standards. CC ID 08144 | Configuration | Preventive | |
Configure the "Unsafe Location #4" to organizational standards. CC ID 08145 | Configuration | Preventive | |
Configure the "Requested XAdES level for signature generation" to organizational standards. CC ID 08146 | Configuration | Preventive | |
Configure the "Specify timestamp server name" to organizational standards. CC ID 08148 | Configuration | Preventive | |
Configure the "Unsafe Location #7" to organizational standards. CC ID 08149 | Configuration | Preventive | |
Configure the "Select digital signature hashing algorithm" to organizational standards. CC ID 08150 | Configuration | Preventive | |
Configure the "Local Machine Zone Lockdown Security" to organizational standards. CC ID 08151 | Configuration | Preventive | |
Configure the "Graphics filter import" to organizational standards. CC ID 08152 | Configuration | Preventive | |
Configure the "Unsafe Location #1" to organizational standards. CC ID 08153 | Configuration | Preventive | |
Configure the "Security Level" to organizational standards. CC ID 08157 | Configuration | Preventive | |
Configure the "Turn off error reporting for files that fail file validation" to organizational standards. CC ID 08159 | Configuration | Preventive | |
Configure the "Block application add-ins loading" to organizational standards. CC ID 08160 | Configuration | Preventive | |
Configure the "Allow the use of ActiveX Custom Controls in InfoPath forms" to organizational standards. CC ID 08171 | Configuration | Preventive | |
Configure the "Control behavior for Microsoft SharePoint Foundation gradual upgrade" to organizational standards. CC ID 08181 | Configuration | Preventive | |
Configure the "Block cross-domain data form retrieval" to organizational standards. CC ID 08238 | Configuration | Preventive | |
Configure the "Display a warning that a form is digitally signed" to organizational standards. CC ID 08307 | Configuration | Preventive | |
Configure the "Beaconing UI for forms opened in InfoPath Filler ActiveX" to organizational standards. CC ID 08333 | Configuration | Preventive | |
Configure the "Disable opening forms with managed code from the Internet security zone" to organizational standards. CC ID 08340 | Configuration | Preventive | |
Configure Restricted Permissions settings for Microsoft Office in accordance with organizational standards. CC ID 07937 | Configuration | Preventive | |
Configure Account settings for Microsoft Office in accordance with organizational standards. CC ID 07951 | Configuration | Preventive | |
Configure Add-In settings for Microsoft Office in accordance with organizational standards. CC ID 07962 | Configuration | Preventive | |
Configure the "Do not allow on-demand activity synchronization" to organizational standards. CC ID 07963 | Configuration | Preventive | |
Configure the "Do not show social network info-bars" to organizational standards. CC ID 07988 | Configuration | Preventive | |
Configure the "Turn off Outlook Social Connector" to organizational standards. CC ID 07989 | Configuration | Preventive | |
Configure the "Set GAL contact synchronization interval" to organizational standards. CC ID 08039 | Configuration | Preventive | |
Configure the "Do not download photos from Active Directory" to organizational standards. CC ID 08043 | Configuration | Preventive | |
Configure the "Specify activity feed synchronization interval" to organizational standards. CC ID 08058 | Configuration | Preventive | |
Configure the "Block social network contact synchronization" to organizational standards. CC ID 08062 | Configuration | Preventive | |
Configure the "Block network activity synchronization" to organizational standards. CC ID 08103 | Configuration | Preventive | |
Configure the "Block specific social network providers" to organizational standards. CC ID 08114 | Configuration | Preventive | |
Configure the "Specify list of social network providers to load" to organizational standards. CC ID 08122 | Configuration | Preventive | |
Configure the "Block Global Address List synchronization" to organizational standards. CC ID 08139 | Configuration | Preventive | |
Configure the "Prevent social network connectivity" to organizational standards. CC ID 08156 | Configuration | Preventive | |
Configure File Format Converter settings for Microsoft Office in accordance with organizational standards. CC ID 07983 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Excel 2010 through the Compatibility Pack for Office 2010 and Excel 2010 Converter" to organizational standards. CC ID 07984 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Word 2010 through the Compatibility Pack for Office 2010 and Word 2010 Open XML/Word 97-2003 Format Converter" to organizational standards. CC ID 08004 | Configuration | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2010 through the Compatibility Pack for Office 2010 and PowerPoint 2010 Converter" to organizational standards. CC ID 08124 | Configuration | Preventive | |
Configure Microsoft Project settings for Microsoft Office in accordance with organizational standards. CC ID 08036 | Configuration | Preventive | |
Configure the "Enable untrusted intranet zone access to Project server" to organizational standards. CC ID 08037 | Configuration | Preventive | |
Configure Meeting Workspace settings for Microsoft Office in accordance with organizational standards. CC ID 08050 | Configuration | Preventive | |
Configure Miscellaneous settings for Microsoft Office in accordance with organizational standards. CC ID 08054 | Configuration | Preventive | |
Configure the "OLAP PivotTable User Defined Function (UDF) security setting" to organizational standards. CC ID 08133 | Configuration | Preventive | |
Configure the "Do not expand Contact Groups" to organizational standards. CC ID 08343 | Configuration | Preventive | |
Configure Data Backup and Recovery settings for Microsoft Office in accordance with organizational standards. CC ID 08098 | Configuration | Preventive | |
Configure Privacy settings for Microsoft Office in accordance with organizational standards. CC ID 08101 | Configuration | Preventive | |
Configure Server Settings settings for Microsoft Office in accordance with organizational standards. CC ID 08154 | Configuration | Preventive | |
Configure the "Disable the Office client from polling the SharePoint Server for published links" to organizational standards. CC ID 08155 | Configuration | Preventive | |
Configure Smart Documents settings for Microsoft Office in accordance with organizational standards. CC ID 08158 | Configuration | Preventive | |
Configure Fax settings for Microsoft Office in accordance with organizational standards. CC ID 08310 | Configuration | Preventive | |
Configure the "Date Format" setting to organizational standards. CC ID 09400 | Configuration | Preventive | |
Configure the "Do not allow printing to Journal Note Writer" setting to organizational standards. CC ID 10911 | Configuration | Preventive | |
Configure the "Do not allow Windows Journal to be run" setting to organizational standards. CC ID 10922 | Configuration | Preventive | |
Configure Services settings to organizational standards. CC ID 07434 | Configuration | Preventive | |
Configure Active Directory in accordance with organizational standards. CC ID 16434 | Configuration | Preventive | |
Configure SID filtering in accordance with organizational standards. CC ID 16435 | Configuration | Preventive | |
Configure AWS Config to organizational standards. CC ID 15440 | Configuration | Preventive | |
Configure "Configure Authenticated Proxy usage for the Connected User Experience and Telemetry service" to organizational standards. CC ID 15343 | Configuration | Preventive | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_X64" to organizational standards CC ID 07435 | Configuration | Preventive | |
Configure the "namespace" to organizational standards. CC ID 14654 | Configuration | Preventive | |
Configure the "Smart Card" to organizational standards. CC ID 07436 | Configuration | Preventive | |
Configure the "File Server Storage Reports Manager" to organizational standards. CC ID 07437 | Configuration | Preventive | |
Configure the "IP Helper" to organizational standards. CC ID 07439 | Configuration | Preventive | |
Configure the "ipc" argument to organizational standards. CC ID 14524 | Configuration | Preventive | |
Configure the "AD RMS Logging Service" to organizational standards. CC ID 07440 | Configuration | Preventive | |
Configure the "Windows Time" to organizational standards. CC ID 07441 | Configuration | Preventive | |
Configure the "Protected Storage" to organizational standards. CC ID 07442 | Configuration | Preventive | |
Configure the "Windows License Monitoring Service" to organizational standards. CC ID 07443 | Configuration | Preventive | |
Configure the "Portable Device Enumerator Service" to organizational standards. CC ID 07444 | Configuration | Preventive | |
Configure the "Software Licensing" to organizational standards. CC ID 07445 | Configuration | Preventive | |
Configure the "Offline Files" to organizational standards. CC ID 07446 | Configuration | Preventive | |
Configure the "Peer Networking Identity Manager" to organizational standards. CC ID 07447 | Configuration | Preventive | |
Configure the "Human Interface Device Access" to organizational standards. CC ID 07448 | Configuration | Preventive | |
Configure the "Link-Layer Topology Discovery Mapper" to organizational standards. CC ID 07449 | Configuration | Preventive | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_I64" to organizational standards CC ID 07450 | Configuration | Preventive | |
Configure the "Windows Firewall" to organizational standards. CC ID 07451 | Configuration | Preventive | |
Configure the "networkpolicy" to organizational standards. CC ID 14655 | Configuration | Preventive | |
Configure the "Net.Tcp Port Sharing Service" to organizational standards. CC ID 07452 | Configuration | Preventive | |
Configure the "pid" argument to organizational standards. CC ID 14532 | Configuration | Preventive | |
Configure the "Secondary Logon" to organizational standards. CC ID 07453 | Configuration | Preventive | |
Configure the "Remote Access Connection Manager" to organizational standards. CC ID 07454 | Configuration | Preventive | |
Configure the "Function Discovery Provider Host" to organizational standards. CC ID 07455 | Configuration | Preventive | |
Configure the "Windows Process Activation Service" to organizational standards. CC ID 07457 | Configuration | Preventive | |
Configure the "Task Scheduler" to organizational standards. CC ID 07459 | Configuration | Preventive | |
Configure the "Intersite Messaging" to organizational standards. CC ID 07460 | Configuration | Preventive | |
Configure the "Special Administration Console Helper" to organizational standards. CC ID 07463 | Configuration | Preventive | |
Configure the "Security Accounts Manager" to organizational standards. CC ID 07465 | Configuration | Preventive | |
Configure the "Kerberos Key Distribution Center" to organizational standards. CC ID 07469 | Configuration | Preventive | |
Configure the "COM+ System Application" to organizational standards. CC ID 07470 | Configuration | Preventive | |
Configure the "RPC Endpoint Mapper" to organizational standards. CC ID 07471 | Configuration | Preventive | |
Configure the "UPnP Device Host" to organizational standards. CC ID 07472 | Configuration | Preventive | |
Configure the "DHCP Client" to organizational standards. CC ID 07475 | Configuration | Preventive | |
Configure the "Extensible Authentication Protocol" to organizational standards. CC ID 07476 | Configuration | Preventive | |
Configure the "SNMP Service" to organizational standards. CC ID 07477 | Configuration | Preventive | |
Configure the "Message Queuing Down Level Clients" to organizational standards. CC ID 07478 | Configuration | Preventive | |
Configure the "TPM Base Services" to organizational standards. CC ID 07479 | Configuration | Preventive | |
Configure the "Windows Deployment Services server" to organizational standards. CC ID 07480 | Configuration | Preventive | |
Configure the "Microsoft iSNS Server" to organizational standards. CC ID 07481 | Configuration | Preventive | |
Configure the "Multimedia Class Scheduler" to organizational standards. CC ID 07482 | Configuration | Preventive | |
Configure the "uts" argument to organizational standards. CC ID 14526 | Configuration | Preventive | |
Configure the "Performance Counter DLL Host" to organizational standards. CC ID 07484 | Configuration | Preventive | |
Configure the "pids-limit" argument to organizational standards. CC ID 14537 | Configuration | Preventive | |
Configure the "Windows Search" to organizational standards. CC ID 07486 | Configuration | Preventive | |
Configure the "DFS Replication" to organizational standards. CC ID 07487 | Configuration | Preventive | |
Configure the "Superfetch" to organizational standards. CC ID 07488 | Configuration | Preventive | |
Configure the "Power" to organizational standards. CC ID 07489 | Configuration | Preventive | |
Configure the "Remote Access Quarantine Agent" to organizational standards. CC ID 07491 | Configuration | Preventive | |
Configure the "Windows Audio" to organizational standards. CC ID 07492 | Configuration | Preventive | |
Configure the "Windows Event Log" to organizational standards. CC ID 07495 | Configuration | Preventive | |
Configure the "Performance Logs & Alerts" to organizational standards. CC ID 07496 | Configuration | Preventive | |
Configure the "File Replication" to organizational standards. CC ID 07497 | Configuration | Preventive | |
Configure the "Encrypting File System (EFS)" to organizational standards. CC ID 07498 | Configuration | Preventive | |
Configure the "userns" argument to organizational standards. CC ID 14530 | Configuration | Preventive | |
Configure the "Quality Windows Audio Video Experience" to organizational standards. CC ID 07500 | Configuration | Preventive | |
Configure the "TCP/IP NetBIOS Helper" to organizational standards. CC ID 07502 | Configuration | Preventive | |
Configure the "Windows System Resource Manager" to organizational standards. CC ID 07503 | Configuration | Preventive | |
Configure the "Interactive Services Detection" to organizational standards. CC ID 07505 | Configuration | Preventive | |
Configure the "Software Protection" to organizational standards. CC ID 07508 | Configuration | Preventive | |
Configure the "ASP .NET State Service" to organizational standards CC ID 07509 | Configuration | Preventive | |
Configure the "Distributed Transaction Coordinator" to organizational standards. CC ID 07514 | Configuration | Preventive | |
Configure the "Telnet" to organizational standards. CC ID 07515 | Configuration | Preventive | |
Configure the "Hyper-V Image Management Service" to organizational standards. CC ID 07517 | Configuration | Preventive | |
Configure the "Server" to organizational standards. CC ID 07521 | Configuration | Preventive | |
Configure the "Group Policy Client" to organizational standards. CC ID 07522 | Configuration | Preventive | |
Configure the "Desktop Window Manager Session Manager" to organizational standards. CC ID 07523 | Configuration | Preventive | |
Configure the "Windows Management Instrumentation" to organizational standards. CC ID 07524 | Configuration | Preventive | |
Configure the "World Wide Web Publishing Service" to organizational standards. CC ID 07525 | Configuration | Preventive | |
Configure the "Function Discovery Resource Publication" to organizational standards. CC ID 07526 | Configuration | Preventive | |
Configure the "Simple Mail Transport Protocol (SMTP)" to organizational standards. CC ID 07527 | Configuration | Preventive | |
Configure the "Resultant Set of Policy Provider" to organizational standards. CC ID 07528 | Configuration | Preventive | |
Configure the "WMI Performance Adapter" to organizational standards. CC ID 07529 | Configuration | Preventive | |
Configure the "Disk Defragmenter" to organizational standards. CC ID 07530 | Configuration | Preventive | |
Configure the "IIS Admin Service" to organizational standards. CC ID 07532 | Configuration | Preventive | |
Configure the "Volume Shadow Copy" to organizational standards. CC ID 07534 | Configuration | Preventive | |
Configure the "Network Location Awareness" to organizational standards. CC ID 07535 | Configuration | Preventive | |
Configure the "Windows Presentation Foundation Font Cache 3.0.0.0" to organizational standards. CC ID 07536 | Configuration | Preventive | |
Configure the "WinHTTP Web Proxy Auto-Discovery Service" to organizational standards. CC ID 07537 | Configuration | Preventive | |
Configure the "Network List Service" to organizational standards. CC ID 07538 | Configuration | Preventive | |
Configure the "Application Experience" to organizational standards. CC ID 07540 | Configuration | Preventive | |
Configure the "Active Directory Web Services" to organizational standards. CC ID 07542 | Configuration | Preventive | |
Configure the "SSDP Discovery" to organizational standards. CC ID 07543 | Configuration | Preventive | |
Configure the "TCP/IP Print Server" to organizational standards. CC ID 07544 | Configuration | Preventive | |
Configure "Netlogon" to organizational standards. CC ID 07545 | Configuration | Preventive | |
Configure the "Windows Error Reporting Service" to organizational standards. CC ID 07546 | Configuration | Preventive | |
Configure the "IKE and AuthIP IPsec Keying Modules" to organizational standards. CC ID 07547 | Configuration | Preventive | |
Configure the "DFS Namespace" to organizational standards. CC ID 07548 | Configuration | Preventive | |
Configure the "SQL Server VSS Writer" to organizational standards. CC ID 07549 | Configuration | Preventive | |
Configure the "Network Policy Server" to organizational standards. CC ID 07550 | Configuration | Preventive | |
Configure the "Windows Driver Foundation - User-mode Driver Framework" to organizational standards. CC ID 07551 | Configuration | Preventive | |
Configure the "Server For NIS" to organizational standards. CC ID 07553 | Configuration | Preventive | |
Configure the "User Profile Service" to organizational standards. CC ID 07554 [Review whether applications in use provide the following capabilities: Have user and group profiles to manage user access for applications if they are not part of a centralized identity access management system. App A Objective 6.27.b] | Configuration | Preventive | |
Configure the "SNMP Trap" to organizational standards. CC ID 07555 | Configuration | Preventive | |
Configure the "Net.Tcp Listener Adapter" to organizational standards. CC ID 07556 | Configuration | Preventive | |
Configure the "Network Access Protection Agent" to organizational standards. CC ID 07557 | Configuration | Preventive | |
Configure the "Remote Access Auto Connection Manager" to organizational standards. CC ID 07558 | Configuration | Preventive | |
Configure the "Server for NFS" to organizational standards. CC ID 07559 | Configuration | Preventive | |
Configure the "Credential Manager" to organizational standards. CC ID 07560 | Configuration | Preventive | |
Configure the "Workstation" to organizational standards. CC ID 07561 | Configuration | Preventive | |
Configure the "PNRP Machine Name Publication Service" to organizational standards. CC ID 07562 | Configuration | Preventive | |
Configure the "Print Spooler" to organizational standards. CC ID 07563 | Configuration | Preventive | |
Configure the "Windows Internet Name Service (WINS)" to organizational standards. CC ID 07564 | Configuration | Preventive | |
Configure the "Net.Msmq Listener Adapter" to organizational standards. CC ID 07565 | Configuration | Preventive | |
Configure the "COM+ Event System" to organizational standards. CC ID 07566 | Configuration | Preventive | |
Configure the "Windows Update" to organizational standards. CC ID 07568 | Configuration | Preventive | |
Configure the "Windows Installer" to organizational standards. CC ID 07569 | Configuration | Preventive | |
Configure the "Windows Color System" to organizational standards. CC ID 07570 | Configuration | Preventive | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_X86" to organizational standards CC ID 07571 | Configuration | Preventive | |
Configure the "Block Level Backup Engine Service" to organizational standards. CC ID 07572 | Configuration | Preventive | |
Configure the "Windows CardSpace" to organizational standards. CC ID 07573 | Configuration | Preventive | |
Configure the "webclient" to organizational standards. CC ID 07574 | Configuration | Preventive | |
Configure the "Diagnostic Service Host" to organizational standards. CC ID 07575 | Configuration | Preventive | |
Configure the "Active Directory Certificate Services" to organizational standards. CC ID 07576 | Configuration | Preventive | |
Configure the "File Server Resource Manager" to organizational standards. CC ID 07577 | Configuration | Preventive | |
Configure the "Secure Socket Tunneling Protocol Service" to organizational standards. CC ID 07578 | Configuration | Preventive | |
Configure the "Cluster Service" to organizational standards. CC ID 07579 | Configuration | Preventive | |
Configure the "Application Management" to organizational standards. CC ID 07580 | Configuration | Preventive | |
Configure the "Remote Procedure Call (RPC) Locator" to organizational standards. CC ID 07581 | Configuration | Preventive | |
Configure the "Thread Ordering Server" to organizational standards. CC ID 07582 | Configuration | Preventive | |
Configure the "FTP Publishing Service" to organizational standards. CC ID 07583 | Configuration | Preventive | |
Configure the "System Event Notification Service" to organizational standards. CC ID 07584 | Configuration | Preventive | |
Configure the "Remote Procedure Call (RPC)" to organizational standards. CC ID 07585 | Configuration | Preventive | |
Configure the "Net.Pipe Listener Adapter" to organizational standards. CC ID 07586 | Configuration | Preventive | |
Configure the "Remote Desktop Licensing" to organizational standards. CC ID 07587 | Configuration | Preventive | |
Configure the "Message Queuing Triggers" to organizational standards. CC ID 07588 | Configuration | Preventive | |
Configure the "Windows Modules Installer" to organizational standards. CC ID 07589 | Configuration | Preventive | |
Configure the "Application Layer Gateway Service" to organizational standards. CC ID 07590 | Configuration | Preventive | |
Configure the "DNS Server" to organizational standards. CC ID 07591 | Configuration | Preventive | |
Configure the "Web Management Service" to organizational standards. CC ID 07592 | Configuration | Preventive | |
Configure the "Windows Remote Management (WS-Management)" to organizational standards. CC ID 07593 | Configuration | Preventive | |
Configure the "Remote Desktop Gateway" to organizational standards. CC ID 07594 | Configuration | Preventive | |
Configure the "Network Connections" to organizational standards. CC ID 07595 | Configuration | Preventive | |
Configure the "Background Intelligent Transfer Service" to organizational standards. CC ID 07596 | Configuration | Preventive | |
Configure the "Remote Desktop Session Broker" to organizational standards. CC ID 07597 | Configuration | Preventive | |
Configure the "Removable Storage" to organizational standards. CC ID 07598 | Configuration | Preventive | |
Configure the "KtmRm for Distributed Transaction Coordinator" to organizational standards. CC ID 07614 | Configuration | Preventive | |
Configure the "Microsoft Software Shadow Copy Provider" to organizational standards. CC ID 07615 | Configuration | Preventive | |
Configure the "Remote Desktop Services" to organizational standards. CC ID 07616 | Configuration | Preventive | |
Configure the "Peer Name Resolution Protocol" to organizational standards. CC ID 07617 | Configuration | Preventive | |
Configure the "Online Responder Service" to organizational standards. CC ID 07618 | Configuration | Preventive | |
Configure the "Message Queuing" to organizational standards. CC ID 07619 | Configuration | Preventive | |
Configure the "Telephony" to organizational standards. CC ID 07620 | Configuration | Preventive | |
Configure the "Plug and Play" to organizational standards. CC ID 07624 | Configuration | Preventive | |
Configure the "DHCP Server" to organizational standards. CC ID 07627 | Configuration | Preventive | |
Configure the "Remote Registry" to organizational standards. CC ID 07628 | Configuration | Preventive | |
Configure the "Cryptographic Services" to organizational standards. CC ID 07630 | Configuration | Preventive | |
Configure the "Remote Desktop Configuration" to organizational standards. CC ID 07631 | Configuration | Preventive | |
Configure the "CNG Key Isolation" to organizational standards. CC ID 07634 | Configuration | Preventive | |
Configure the "Active Directory Domain Services" to organizational standards. CC ID 07636 | Configuration | Preventive | |
Configure the "Hyper-V Networking Management Service" to organizational standards. CC ID 07637 | Configuration | Preventive | |
Configure the "Problem Reports and Solutions Control Panel Support" to organizational standards. CC ID 07640 | Configuration | Preventive | |
Configure the "Certificate Propagation" to organizational standards. CC ID 07641 | Configuration | Preventive | |
Configure the "Health Key and Certificate Management" to organizational standards. CC ID 07644 | Configuration | Preventive | |
Configure the "DNS Client" to organizational standards. CC ID 07645 | Configuration | Preventive | |
Configure the "Shell Hardware Detection" to organizational standards. CC ID 07647 | Configuration | Preventive | |
Configure the "DCOM Server Process Launcher" to organizational standards. CC ID 07649 | Configuration | Preventive | |
Configure the "Distributed Link Tracking Client" to organizational standards. CC ID 07651 | Configuration | Preventive | |
Configure the "IPsec Policy Agent" to organizational standards. CC ID 07654 | Configuration | Preventive | |
Configure the "Application Information" to organizational standards. CC ID 07656 | Configuration | Preventive | |
Configure the "Windows Audio Endpoint Builder" to organizational standards. CC ID 07661 | Configuration | Preventive | |
Configure the "SL UI Notification Service" to organizational standards. CC ID 07665 | Configuration | Preventive | |
Configure the "Hyper-V Virtual Machine Management Service" to organizational standards. CC ID 07668 | Configuration | Preventive | |
Configure the "Windows Internal Database (MICROSOFT**SSEE)" to organizational standards. CC ID 07670 | Configuration | Preventive | |
Configure the "Themes" to organizational standards. CC ID 07672 | Configuration | Preventive | |
Configure the "Base Filtering Engine" to organizational standards. CC ID 07673 | Configuration | Preventive | |
Configure the "Simple TCP/IP Services" to organizational standards. CC ID 07674 | Configuration | Preventive | |
Configure Transmission Control Protocol/Internet Protocol (TCP/IP) to organizational standards. CC ID 16358 | Configuration | Preventive | |
Configure the "Fax" to organizational standards. CC ID 07675 | Configuration | Preventive | |
Configure the "Diagnostic System Host" to organizational standards. CC ID 07686 | Configuration | Preventive | |
Configure the "Routing and Remote Access" to organizational standards. CC ID 07692 | Configuration | Preventive | |
Configure the "Microsoft Fibre Channel Platform Registration Service" to organizational standards. CC ID 07696 | Configuration | Preventive | |
Configure the "Windows Event Collector" to organizational standards. CC ID 07700 | Configuration | Preventive | |
Configure the "Internet Connection Sharing (ICS)" to organizational standards. CC ID 07702 | Configuration | Preventive | |
Configure the "IAS Jet Database Access" to organizational standards. CC ID 07709 | Configuration | Preventive | |
Configure the "Wired AutoConfig" to organizational standards. CC ID 07725 | Configuration | Preventive | |
Configure the "Remote Desktop UserMode Port Redirector" to organizational standards. CC ID 07727 | Configuration | Preventive | |
Configure the "Application Identity" to organizational standards. CC ID 07731 | Configuration | Preventive | |
Configure the "Network Store Interface Service" to organizational standards. CC ID 07740 | Configuration | Preventive | |
Configure the "PnP-X IP Bus Enumerator" to organizational standards. CC ID 07761 | Configuration | Preventive | |
Configure the "Diagnostic Policy Service" to organizational standards. CC ID 07766 | Configuration | Preventive | |
Configure the "Virtual Disk" to organizational standards. CC ID 07767 | Configuration | Preventive | |
Configure the "AD FS Web Agent Authentication Service" to organizational standards. CC ID 07768 | Configuration | Preventive | |
Configure the "Microsoft iSCSI Initiator Service" to organizational standards. CC ID 07780 | Configuration | Preventive | |
Configure the "Computer Browser" to organizational standards. CC ID 07794 | Configuration | Preventive | |
Configure the "Smart Card Removal Policy" to organizational standards. CC ID 07795 | Configuration | Preventive | |
Configure the "Windows Font Cache Service" to organizational standards. CC ID 07797 | Configuration | Preventive | |
Configure the "Application Host Helper Service" to organizational standards. CC ID 07855 | Configuration | Preventive | |
Configure the "Remote Desktop Help Session Manager" to organizational standards. CC ID 08163 | Configuration | Preventive | |
Configure the "Network DDE" to organizational standards. CC ID 08164 | Configuration | Preventive | |
Configure the "Upload Manager" to organizational standards. CC ID 08165 | Configuration | Preventive | |
Configure the "Event Log" to organizational standards. CC ID 08166 | Configuration | Preventive | |
Configure the "Client for NFS" to organizational standards. CC ID 08168 | Configuration | Preventive | |
Configure the "Fax Service" to organizational standards. CC ID 08172 | Configuration | Preventive | |
Configure the "Virtual Disk Service" to organizational standards. CC ID 08174 | Configuration | Preventive | |
Configure the "Uninterruptable Power Supply" to organizational standards. CC ID 08175 | Configuration | Preventive | |
Configure the "Network DDE DSDM" to organizational standards. CC ID 08176 | Configuration | Preventive | |
Configure the "Portable Media Serial Number Service" to organizational standards. CC ID 08177 | Configuration | Preventive | |
Configure the "Windows Management Instrumentation Driver Extensions" to organizational standards. CC ID 08179 | Configuration | Preventive | |
Configure the "License Logging" to organizational standards. CC ID 08180 | Configuration | Preventive | |
Configure the "Windows Image Acquisition (WIA)" to organizational standards. CC ID 08183 | Configuration | Preventive | |
Configure the "Terminal Server Licensing" to organizational standards. CC ID 08185 | Configuration | Preventive | |
Configure the "Virtual Machine Additions Shared Folder Service" to organizational standards. CC ID 08189 | Configuration | Preventive | |
Configure the "Net Logon" to organizational standards. CC ID 08191 | Configuration | Preventive | |
Configure the "HTTP SSL" to organizational standards. CC ID 08194 | Configuration | Preventive | |
Configure the "Alerter" to organizational standards. CC ID 08196 | Configuration | Preventive | |
Configure the "User Name Mapping" to organizational standards. CC ID 08203 | Configuration | Preventive | |
Configure the "Error Reporting Service" to organizational standards. CC ID 08206 | Configuration | Preventive | |
Configure the "Windows User Mode Driver Framework" to organizational standards. CC ID 08207 | Configuration | Preventive | |
Configure the "NetMeeting Remote Desktop Sharing" to organizational standards. CC ID 08209 | Configuration | Preventive | |
Configure the "Terminal Services UserMode Port Redirector" to organizational standards. CC ID 08212 | Configuration | Preventive | |
Configure the "File Replication Service" to organizational standards. CC ID 08213 | Configuration | Preventive | |
Configure the "NT LM Security Support Provider" to organizational standards. CC ID 08223 | Configuration | Preventive | |
Configure the "Messenger" to organizational standards. CC ID 08227 | Configuration | Preventive | |
Configure the "Logical Disk Manager" to organizational standards. CC ID 08230 | Configuration | Preventive | |
Configure the "Network Location Awareness (NLA)" to organizational standards. CC ID 08231 | Configuration | Preventive | |
Configure the "Certificate Services" to organizational standards. CC ID 08232 | Configuration | Preventive | |
Configure the "IPSEC Services" to organizational standards. CC ID 08233 | Configuration | Preventive | |
Configure the "Terminal Services Gateway" to organizational standards. CC ID 08235 | Configuration | Preventive | |
Configure the "Clipbook" to organizational standards. CC ID 08237 | Configuration | Preventive | |
Configure the "Indexing Service" to organizational standards. CC ID 08239 | Configuration | Preventive | |
Configure the "File Server for Macintosh" to organizational standards. CC ID 08242 | Configuration | Preventive | |
Configure the "Virtual Machine Additions Service Application" to organizational standards. CC ID 08245 | Configuration | Preventive | |
Configure the "Network Provisioning Service" to organizational standards. CC ID 08250 | Configuration | Preventive | |
Configure the "Terminal Services" to organizational standards. CC ID 08252 | Configuration | Preventive | |
Configure the "Windows Firewall/Internet Connection Sharing (ICS)" to organizational standards. CC ID 08254 | Configuration | Preventive | |
Configure the ".NET Runtime Optimization Service v2.0.50727_x86" to organizational standards CC ID 08256 | Configuration | Preventive | |
Configure the "Terminal Services Session Directory" to organizational standards. CC ID 08261 | Configuration | Preventive | |
Configure the "Application Experience Lookup Service" to organizational standards. CC ID 08267 | Configuration | Preventive | |
Configure the "Distributed File System" to organizational standards. CC ID 08268 | Configuration | Preventive | |
Configure the "Help and Support" to organizational standards. CC ID 08271 | Configuration | Preventive | |
Configure the "Automatic Updates" to organizational standards. CC ID 08273 | Configuration | Preventive | |
Configure the "Distributed Link Tracking Server" to organizational standards. CC ID 08276 | Configuration | Preventive | |
Configure the "IMAPI CD-Burning Service" to organizational standards. CC ID 08277 | Configuration | Preventive | |
Configure the "Terminal Services Configuration" to organizational standards. CC ID 08287 | Configuration | Preventive | |
Configure the "Logical Disk Manager Administrative Service" to organizational standards. CC ID 08290 | Configuration | Preventive | |
Configure the "Wireless Configuration" to organizational standards. CC ID 08292 | Configuration | Preventive | |
Configure the "System Event Notification" to organizational standards. CC ID 08306 | Configuration | Preventive | |
Configure the "Internet Authentication Service" to organizational standards. CC ID 08313 | Configuration | Preventive | |
Configure the "Terminal Services Licensing" to organizational standards. CC ID 08320 | Configuration | Preventive | |
Configure the "Microsoft Exchange ADAM" to organizational standards. CC ID 08349 | Configuration | Preventive | |
Configure the "Microsoft Exchange Server Extension for Windows Server Backup" to organizational standards. CC ID 08351 | Configuration | Preventive | |
Configure the "Microsoft Exchange Search Indexer" to organizational standards. CC ID 08355 | Configuration | Preventive | |
Configure the "Remote Desktop Connection Broker" to organizational standards. CC ID 08356 | Configuration | Preventive | |
Configure the "Microsoft Exchange Service Host" to organizational standards. CC ID 08358 | Configuration | Preventive | |
Configure the "Microsoft Exchange Transport" to organizational standards. CC ID 08359 | Configuration | Preventive | |
Configure the "Microsoft Exchange Transport Log Search" to organizational standards. CC ID 08364 | Configuration | Preventive | |
Configure the "Hyper-V Time Synchronization Service" to organizational standards. CC ID 08365 | Configuration | Preventive | |
Configure the "DS Role Server" to organizational standards. CC ID 08366 | Configuration | Preventive | |
Configure the "RemoteApp and Desktop Connection Management" to organizational standards. CC ID 08367 | Configuration | Preventive | |
Configure the "Hyper-V Guest Shutdown Service" to organizational standards. CC ID 08368 | Configuration | Preventive | |
Configure the "Optimize drives" to organizational standards. CC ID 08369 | Configuration | Preventive | |
Configure the "Remote Desktop Management" to organizational standards. CC ID 08371 | Configuration | Preventive | |
Configure the "Background Tasks Infrastructure Service" to organizational standards. CC ID 08373 | Configuration | Preventive | |
Configure the "Microsoft Exchange Forms-Based Authentication service" to organizational standards. CC ID 08375 | Configuration | Preventive | |
Configure the "Microsoft Exchange POP3" to organizational standards. CC ID 08376 | Configuration | Preventive | |
Configure the "Microsoft Exchange Information Store" to organizational standards. CC ID 08377 | Configuration | Preventive | |
Configure the "LPD Service" to organizational standards. CC ID 08378 | Configuration | Preventive | |
Configure the "Microsoft Exchange Mailbox Assistants" to organizational standards. CC ID 08379 | Configuration | Preventive | |
Configure the "Microsoft Exchange Monitoring" to organizational standards. CC ID 08380 | Configuration | Preventive | |
Configure the "Microsoft Exchange Unified Messaging" to organizational standards. CC ID 08381 | Configuration | Preventive | |
Configure the "Microsoft Search (Exchange)" to organizational standards. CC ID 08384 | Configuration | Preventive | |
Configure the "Windows All-User Install Agent" to organizational standards. CC ID 08386 | Configuration | Preventive | |
Configure the "Microsoft Exchange EdgeSync Service" to organizational standards. CC ID 08388 | Configuration | Preventive | |
Configure the "Microsoft FTP Service" to organizational standards. CC ID 08389 | Configuration | Preventive | |
Configure the "Device Install Service" to organizational standards. CC ID 08390 | Configuration | Preventive | |
Configure the "Device Association Service" to organizational standards. CC ID 08393 | Configuration | Preventive | |
Configure the "Hyper-V Heartbeat Service" to organizational standards. CC ID 08400 | Configuration | Preventive | |
Configure the "Microsoft Exchange Speech Engine Service" to organizational standards. CC ID 08402 | Configuration | Preventive | |
Configure the "Hyper-V Data Exchange Service" to organizational standards. CC ID 08403 | Configuration | Preventive | |
Configure the "Microsoft Exchange Mail Submission Service" to organizational standards. CC ID 08408 | Configuration | Preventive | |
Configure the "Windows Presentation Foundation Font Cache 4.0.0.0" to organizational standards. CC ID 08409 | Configuration | Preventive | |
Configure the "Microsoft Exchange Replication Service" to organizational standards. CC ID 08414 | Configuration | Preventive | |
Configure the "Windows Internal Database" to organizational standards. CC ID 08416 | Configuration | Preventive | |
Configure the "Device Setup Manager" to organizational standards. CC ID 08417 | Configuration | Preventive | |
Configure the "User Access Logging Service" to organizational standards. CC ID 08418 | Configuration | Preventive | |
Configure the "Windows Internal Database VSS Writer" to organizational standards. CC ID 08423 | Configuration | Preventive | |
Configure the "Remote Desktop Services UserMode Port Redirector" to organizational standards. CC ID 08424 | Configuration | Preventive | |
Configure the "Remote Access Management service" to organizational standards. CC ID 08425 | Configuration | Preventive | |
Configure the "Data Deduplication Volume Shadow Copy Service" to organizational standards. CC ID 08428 | Configuration | Preventive | |
Configure the "Hyper-V Remote Desktop Virtualization Service" to organizational standards. CC ID 08440 | Configuration | Preventive | |
Configure the "Microsoft Exchange Anti-spam Update" to organizational standards. CC ID 08442 | Configuration | Preventive | |
Configure the "Microsoft Exchange System Attendant" to organizational standards. CC ID 08448 | Configuration | Preventive | |
Configure the "Microsoft Exchange File Distribution" to organizational standards. CC ID 08449 | Configuration | Preventive | |
Configure the "Printer Extensions and Notifications" to organizational standards. CC ID 08451 | Configuration | Preventive | |
Configure the "Microsoft Key Distribution Service" to organizational standards. CC ID 08452 | Configuration | Preventive | |
Configure the "Microsoft File Server Shadow Copy Agent Service" to organizational standards. CC ID 08455 | Configuration | Preventive | |
Configure the "Microsoft Exchange Address Book" to organizational standards. CC ID 08458 | Configuration | Preventive | |
Configure the "Data Deduplication Service" to organizational standards. CC ID 08459 | Configuration | Preventive | |
Configure the "Microsoft Exchange Active Directory Topology" to organizational standards. CC ID 08465 | Configuration | Preventive | |
Configure the "Windows Store Service (WSService)" to organizational standards. CC ID 08467 | Configuration | Preventive | |
Configure the "Local Session Manager" to organizational standards. CC ID 08468 | Configuration | Preventive | |
Configure the "Microsoft iSCSI Software Target" to organizational standards. CC ID 08470 | Configuration | Preventive | |
Configure the "Network Connectivity Assistant" to organizational standards. CC ID 08474 | Configuration | Preventive | |
Configure the "Microsoft Exchange IMAP4" to organizational standards. CC ID 08479 | Configuration | Preventive | |
Configure the "Distributed Scan Server service" to organizational standards. CC ID 08482 | Configuration | Preventive | |
Configure the "Microsoft Exchange Protected Service Host" to organizational standards. CC ID 08488 | Configuration | Preventive | |
Configure the "KDC Proxy Server service (KPS)" to organizational standards. CC ID 08497 | Configuration | Preventive | |
Configure the "Microsoft Exchange RPC Client Access" to organizational standards. CC ID 08500 | Configuration | Preventive | |
Configure the "Hyper-V Volume Shadow Copy Requestor" to organizational standards. CC ID 08512 | Configuration | Preventive | |
Configure the "Microsoft Exchange Credential Service (Exchange 2010)" to organizational standards. CC ID 08514 | Configuration | Preventive | |
Configure the "Microsoft Exchange Throttling" to organizational standards. CC ID 08525 | Configuration | Preventive | |
Configure the "Spot Verifier" to organizational standards. CC ID 08538 | Configuration | Preventive | |
Configure the "Microsoft Exchange Mailbox Replication" to organizational standards. CC ID 08539 | Configuration | Preventive | |
Configure the "Terminal Services Session Broker" to organizational standards. CC ID 08586 | Configuration | Preventive | |
Configure the "Microsoft Exchange Credential Service (Exchange 2007)" to organizational standards. CC ID 08590 | Configuration | Preventive | |
Configure the "Network News Transport Protocol (NNTP) service" setting to organizational standards. CC ID 10221 | Configuration | Preventive | |
Configure the "Telephony service" setting to organizational standards. CC ID 10223 | Configuration | Preventive | |
Configure the "ATI hotkey poller service" setting to organizational standards. CC ID 10237 | Configuration | Preventive | |
Configure the "IP Version 6 Helper service" setting to organizational standards. CC ID 10239 | Configuration | Preventive | |
Configure the "Client Service for Netware service" setting to organizational standards. CC ID 10240 | Configuration | Preventive | |
Configure the "Utility Manager service" setting to organizational standards. CC ID 10241 | Configuration | Preventive | |
Configure the "Remote Administration Service service" setting to organizational standards. CC ID 10242 | Configuration | Preventive | |
Configure the "Microsoft POP3 Service service" setting to organizational standards. CC ID 10243 | Configuration | Preventive | |
Configure the "Windows System Resource Manager (WSRM) service" setting to organizational standards. CC ID 10244 | Configuration | Preventive | |
Configure the "Services for Unix Trivial FTP Daemon (TFTP) service" setting to organizational standards. CC ID 10245 | Configuration | Preventive | |
Configure the "Services for Unix Server for PCNFS service" setting to organizational standards. CC ID 10246 | Configuration | Preventive | |
Configure the "Print Server for Macintosh service" setting to organizational standards. CC ID 10249 | Configuration | Preventive | |
Configure the "Remote Installation Services service" setting to organizational standards. CC ID 10250 | Configuration | Preventive | |
Configure the "Remote Server Manager service" setting to organizational standards. CC ID 10251 | Configuration | Preventive | |
Configure the "Remote Server Monitor service" setting to organizational standards. CC ID 10252 | Configuration | Preventive | |
Configure the "Remote Storage Notification service" setting to organizational standards. CC ID 10253 | Configuration | Preventive | |
Configure the "Remote Storage Server service" setting to organizational standards. CC ID 10254 | Configuration | Preventive | |
Configure the "Windows Media Services service" setting to organizational standards. CC ID 10255 | Configuration | Preventive | |
Configure the "Web Element Manager service" setting to organizational standards. CC ID 10256 | Configuration | Preventive | |
Configure the "Infrared Monitor service service" setting to organizational standards. CC ID 10257 | Configuration | Preventive | |
Configure the "QoS Admission Control (RSVP) service" setting to organizational standards. CC ID 10258 | Configuration | Preventive | |
Configure the "Allow CredSSP authentication" setting for the "WinRM service" to organizational standards. CC ID 10715 | Configuration | Preventive | |
Configure the "Disallow Kerberos authentication" setting for the "WinRM service" to organizational standards. CC ID 10873 | Configuration | Preventive | |
Configure the "Disallow Negotiate authentication" setting for the "WinRM service" to organizational standards. CC ID 10876 | Configuration | Preventive | |
Configure the "Turn off Federation Service" setting to organizational standards. CC ID 11278 | Configuration | Preventive | |
Configure the "Turn off Internet File Association service" setting to organizational standards. CC ID 11284 | Configuration | Preventive | |
Configure the "Turn on Smart Card Plug and Play service" setting to organizational standards. CC ID 11351 | Configuration | Preventive | |
Configure the "rsyncd service" setting to organizational standards. CC ID 11382 | Configuration | Preventive | |
Configure network protection settings to organizational standards. CC ID 07601 | Configuration | Preventive | |
Configure the "CNI" plugin to organizational standards. CC ID 14659 | Configuration | Preventive | |
Configure the "data-path-addr" argument to organizational standards. CC ID 14546 | Configuration | Preventive | |
Configure the "advertise-addr" argument to organizational standards. CC ID 14544 | Configuration | Preventive | |
Configure the "nftables" to organizational standards. CC ID 15320 | Configuration | Preventive | |
Configure the "iptables" to organizational standards. CC ID 14463 | Configuration | Preventive | |
Configure the "ip6tables" settings to organizational standards. CC ID 15322 | Configuration | Preventive | |
Configure the "insecure registries" to organizational standards. CC ID 14455 | Configuration | Preventive | |
Configure the "MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to organizational standards. CC ID 07602 | Configuration | Preventive | |
Configure the "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to organizational standards. CC ID 07648 | Configuration | Preventive | |
Configure the "net-host" argument to organizational standards. CC ID 14529 | Configuration | Preventive | |
Configure the "firewalld" to organizational standards. CC ID 15321 | Configuration | Preventive | |
Configure the "network bridge" to organizational standards. CC ID 14501 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Firewall state" to organizational standards. CC ID 07667 | Configuration | Preventive | |
Configure the "MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments)" to organizational standards. CC ID 07680 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Outbound connections" to organizational standards. CC ID 07695 | Configuration | Preventive | |
Configure the "MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic." to organizational standards CC ID 07703 | Configuration | Preventive | |
Configure the "MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS)" to organizational standards. CC ID 07733 | Configuration | Preventive | |
Configure the "publish" argument to organizational standards. CC ID 14500 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Inbound connections" to organizational standards. CC ID 07747 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Apply local firewall rules" to organizational standards. CC ID 07777 | Configuration | Preventive | |
Configure the "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to organizational standards. CC ID 07801 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Firewall state" to organizational standards. CC ID 07803 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Apply local connection security rules" to organizational standards. CC ID 07805 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Apply local firewall rules" to organizational standards. CC ID 07833 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Display a notification" to organizational standards. CC ID 07836 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Outbound connections" to organizational standards. CC ID 07839 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Apply local firewall rules" to organizational standards. CC ID 07850 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Inbound connections" to organizational standards. CC ID 07851 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Outbound connections" to organizational standards. CC ID 07858 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Firewall state" to organizational standards. CC ID 07861 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Display a notification" to organizational standards. CC ID 07868 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Inbound connections" to organizational standards. CC ID 07872 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Allow unicast response" to organizational standards. CC ID 07873 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Allow unicast response" to organizational standards. CC ID 07885 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Apply local connection security rules" to organizational standards. CC ID 07890 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Allow unicast response" to organizational standards. CC ID 07893 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Apply local connection security rules" to organizational standards. CC ID 07896 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Display a notification" to organizational standards. CC ID 07902 | Configuration | Preventive | |
Configure the "Windows Firewall: Protect all network connections" to organizational standards. CC ID 08161 | Configuration | Preventive | |
Configure the "Windows Firewall: Allow inbound UPnP framework exceptions" to organizational standards. CC ID 08170 | Configuration | Preventive | |
Configure the "Windows Firewall: Allow local program exceptions" to organizational standards. CC ID 08173 | Configuration | Preventive | |
Configure the "Windows Firewall: Do not allow exceptions" to organizational standards. CC ID 08184 | Configuration | Preventive | |
Configure the "MSS: (DisableSavePassword) Prevent the dial-up password from being saved (recommended)" to organizational standards. CC ID 08208 | Configuration | Preventive | |
Configure the "MSS: (EnableDeadGWDetect) Allow automatic detection of dead network gateways (could lead to DoS)" to organizational standards. CC ID 08210 | Configuration | Preventive | |
Configure the "Windows Firewall: Allow local port exceptions" to organizational standards. CC ID 08214 | Configuration | Preventive | |
Configure the "Windows Firewall: Define inbound port exceptions" to organizational standards. CC ID 08215 | Configuration | Preventive | |
Configure the "Windows Firewall: Prohibit unicast response to multicast or broadcast requests" to organizational standards. CC ID 08217 | Configuration | Preventive | |
Configure the "Windows Firewall: Prohibit notifications" to organizational standards. CC ID 08249 | Configuration | Preventive | |
Configure the "Windows Firewall: Allow inbound file and printer sharing exception" to organizational standards. CC ID 08275 | Configuration | Preventive | |
Configure the "MSS: (TcpMaxConnectResponseRetransmissions) SYN-ACK retransmissions when a connection request is not acknowledged" to organizational standards. CC ID 08279 | Configuration | Preventive | |
Configure the "Windows Firewall: Define inbound program exceptions" to organizational standards. CC ID 08282 | Configuration | Preventive | |
Configure the "Windows Firewall: Allow ICMP exceptions" to organizational standards. CC ID 08289 | Configuration | Preventive | |
Configure the "Windows Firewall: Allow inbound Remote Desktop exceptions" to organizational standards. CC ID 08295 | Configuration | Preventive | |
Configure the "Allow unencrypted traffic" to organizational standards. CC ID 08383 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Logging: Log successful connections" to organizational standards. CC ID 08466 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Logging: Size limit (KB)" to organizational standards. CC ID 08494 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Logging: Log successful connections" to organizational standards. CC ID 08544 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Logging: Name" to organizational standards. CC ID 08595 | Configuration | Preventive | |
Configure Account settings in accordance with organizational standards. CC ID 07603 | Configuration | Preventive | |
Configure the "Account lockout threshold" to organizational standards. CC ID 07604 | Configuration | Preventive | |
Configure the "Account lockout duration" to organizational standards. CC ID 07771 | Configuration | Preventive | |
Configure the "Reset account lockout counter after" to organizational standards. CC ID 07853 | Configuration | Preventive | |
Configure system integrity settings to organizational standards. CC ID 07605 | Configuration | Preventive | |
Configure the "User Account Control: Switch to the secure desktop when prompting for elevation" to organizational standards. CC ID 07606 | Configuration | Preventive | |
Configure the "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to organizational standards. CC ID 07642 | Configuration | Preventive | |
Configure the "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to organizational standards. CC ID 07681 | Configuration | Preventive | |
Configure the "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to organizational standards. CC ID 07690 | Configuration | Preventive | |
Configure the "User Account Control: Only elevate executables that are signed and validated" to organizational standards. CC ID 07723 | Configuration | Preventive | |
Configure the "User Account Control: Run all administrators in Admin Approval Mode" to organizational standards. CC ID 07726 | Configuration | Preventive | |
Configure the "Interactive logon: Do not require CTRL+ALT+DEL" to organizational standards. CC ID 07775 | Configuration | Preventive | |
Configure the "User Account Control: Admin Approval Mode for the Built-in Administrator account" to organizational standards. CC ID 07800 | Configuration | Preventive | |
Configure the "User Account Control: Detect application installations and prompt for elevation" to organizational standards. CC ID 07815 | Configuration | Preventive | |
Configure the "User Account Control: Virtualize file and registry write failures to per-user locations" to organizational standards. CC ID 07834 | Configuration | Preventive | |
Configure the "User Account Control: Behavior of the elevation prompt for standard users" to organizational standards. CC ID 07874 | Configuration | Preventive | |
Configure the "Do not process the legacy run list" to organizational standards. CC ID 08167 | Configuration | Preventive | |
Configure the "Configure Automatic Updates" to organizational standards. CC ID 08192 | Configuration | Preventive | |
Configure the "Reschedule Automatic Updates scheduled installations" to organizational standards. CC ID 08195 | Configuration | Preventive | |
Configure the "No auto-restart with logged on users for scheduled automatic updates installations" to organizational standards. CC ID 08216 | Configuration | Preventive | |
Configure the "Specify intranet Microsoft update service location" to organizational standards. CC ID 08224 | Configuration | Preventive | |
Configure the "Devices: Unsigned driver installation behavior" to organizational standards. CC ID 08225 | Configuration | Preventive | |
Configure the "Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box" to organizational standards. CC ID 08281 | Configuration | Preventive | |
Configure the "Allow unmanaged devices" to organizational standards. CC ID 08391 | Configuration | Preventive | |
Configure the "Allow all trusted apps to install" to organizational standards. CC ID 08392 | Configuration | Preventive | |
Configure the "Turn on script execution" to organizational standards. CC ID 08411 | Configuration | Preventive | |
Configure the "Configure registry policy processing" to organizational standards. CC ID 08426 | Configuration | Preventive | |
Configure the "Specify the search server for device driver updates" to organizational standards. CC ID 08481 | Configuration | Preventive | |
Configure the "Configure Windows SmartScreen" to organizational standards. CC ID 08485 | Configuration | Preventive | |
Configure the "Detect compatibility issues for applications and drivers" to organizational standards. CC ID 08489 | Configuration | Preventive | |
Configure the "Turn off Automatic Download of updates" to organizational standards. CC ID 08498 | Configuration | Preventive | |
Configure the "Allow deployment operations in special profiles" to organizational standards. CC ID 08529 | Configuration | Preventive | |
Configure the "Turn off Data Execution Prevention for Explorer" to organizational standards. CC ID 08531 | Configuration | Preventive | |
Configure the "Specify settings for optional component installation and component repair" to organizational standards. CC ID 08550 | Configuration | Preventive | |
Configure the "Refresh interval" to organizational standards. CC ID 08559 | Configuration | Preventive | |
Configure the "Boot-Start Driver Initialization Policy" to organizational standards. CC ID 08571 | Configuration | Preventive | |
Configure the "Turn off the Store application" to organizational standards. CC ID 08596 | Configuration | Preventive | |
Configure the "Periodic Execution of File Integrity" setting to organizational standards. CC ID 09935 | Configuration | Preventive | |
Prohibit the use of binary code or machine code from sources with limited or no warranty absent the source code. CC ID 10681 | Configuration | Preventive | |
Do not allow processes to execute absent supervision. CC ID 10683 | Configuration | Preventive | |
Configure the "Disk Quota policy processing" setting to organizational standards. CC ID 10884 | Configuration | Preventive | |
Configure the "EFS recovery policy processing" setting to organizational standards. CC ID 10945 | Configuration | Preventive | |
Configure the "Enable disk quotas" setting to organizational standards. CC ID 10947 | Configuration | Preventive | |
Configure the "Folder Redirection policy processing" setting to organizational standards. CC ID 10972 | Configuration | Preventive | |
Configure the "Group Policy refresh interval for computers" setting to organizational standards. CC ID 10980 | Configuration | Preventive | |
Configure the "Group Policy refresh interval for domain controllers" setting to organizational standards. CC ID 10981 | Configuration | Preventive | |
Configure the "Internet Explorer Maintenance policy processing" setting to organizational standards. CC ID 10998 | Configuration | Preventive | |
Configure the "IP Security policy processing" setting to organizational standards. CC ID 10999 | Configuration | Preventive | |
Configure the "Leave Windows Installer and Group Policy Software Installation Data" setting to organizational standards. CC ID 11004 | Configuration | Preventive | |
Configure the "Maximum wait time for Group Policy scripts" setting to organizational standards. CC ID 11042 | Configuration | Preventive | |
Configure the "Scripts policy processing" setting to organizational standards. CC ID 11159 | Configuration | Preventive | |
Configure the "Security policy processing" setting to organizational standards. CC ID 11160 | Configuration | Preventive | |
Configure the "Software Installation policy processing" setting to organizational standards. CC ID 11206 | Configuration | Preventive | |
Configure the "Startup policy processing wait time" setting to organizational standards. CC ID 11229 | Configuration | Preventive | |
Configure the "Turn off Local Group Policy objects processing" setting to organizational standards. CC ID 11286 | Configuration | Preventive | |
Configure the "User Group Policy loopback processing mode" setting to organizational standards. CC ID 11367 | Configuration | Preventive | |
Configure the "Wired policy processing" setting to organizational standards. CC ID 11373 | Configuration | Preventive | |
Configure the "Wireless policy processing" setting to organizational standards. CC ID 11374 | Configuration | Preventive | |
Configure Protocol Configuration settings to organizational standards. CC ID 07607 | Configuration | Preventive | |
Configure the "MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds" to organizational standards. CC ID 07608 | Configuration | Preventive | |
Configure the "Microsoft network client: Send unencrypted password to third-party SMB servers" to organizational standards. CC ID 07623 | Configuration | Preventive | |
Configure the "Network access: Remotely accessible registry paths and sub-paths" to organizational standards. CC ID 07632 | Configuration | Preventive | |
Configure the "Microsoft network server: Digitally sign communications (if client agrees)" to organizational standards. CC ID 07643 | Configuration | Preventive | |
Configure the "Network access: Let Everyone permissions apply to anonymous users" to organizational standards. CC ID 07646 | Configuration | Preventive | |
Configure the "Network security: Allow LocalSystem NULL session fallback" to organizational standards. CC ID 07650 | Configuration | Preventive | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to organizational standards. CC ID 07682 | Configuration | Preventive | |
Configure the "Network access: Do not allow storage of passwords and credentials for network authentication" to organizational standards. CC ID 07694 | Configuration | Preventive | |
Configure the "Network security: LAN Manager authentication level" to organizational standards. CC ID 07704 | Configuration | Preventive | |
Configure the "Interactive logon: Number of previous logons to cache (in case domain controller is not available)" to organizational standards. CC ID 07705 | Configuration | Preventive | |
Configure the "Network access: Sharing and security model for local accounts" to organizational standards. CC ID 07712 | Configuration | Preventive | |
Configure the "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to organizational standards. CC ID 07719 | Configuration | Preventive | |
Configure the "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to organizational standards. CC ID 07721 | Configuration | Preventive | |
Configure the "Domain member: Digitally encrypt secure channel data (when possible)" to organizational standards. CC ID 07728 | Configuration | Preventive | |
Configure the "Network security: Do not store LAN Manager hash value on next password change" to organizational standards. CC ID 07732 | Configuration | Preventive | |
Configure the "Domain member: Require strong (Windows 2000 or later) session key" to organizational standards. CC ID 07741 | Configuration | Preventive | |
Configure the "Network access: Shares that can be accessed anonymously" to organizational standards. CC ID 07748 | Configuration | Preventive | |
Configure the "Network access: Allow anonymous SID/Name translation" to organizational standards. CC ID 07749 | Configuration | Preventive | |
Configure the "Microsoft network client: Digitally sign communications (if server agrees)" to organizational standards. CC ID 07750 | Configuration | Preventive | |
Configure the "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to organizational standards. CC ID 07754 | Configuration | Preventive | |
Configure the "Microsoft network client: Digitally sign communications (always)" to organizational standards. CC ID 07759 | Configuration | Preventive | |
Configure the "Network security: LDAP client signing requirements" to organizational standards. CC ID 07760 | Configuration | Preventive | |
Configure the "MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to organizational standards. CC ID 07772 | Configuration | Preventive | |
Configure the "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to organizational standards. CC ID 07773 | Configuration | Preventive | |
Configure the "Network access: Restrict anonymous access to Named Pipes and Shares" to organizational standards. CC ID 07798 | Configuration | Preventive | |
Configure the "Network Security: Restrict NTLM: Add remote server exceptions for NTLM authentication" to organizational standards. CC ID 07837 | Configuration | Preventive | |
Configure the "Domain controller: LDAP server signing requirements" to organizational standards. CC ID 07857 | Configuration | Preventive | |
Configure the "Network access: Remotely accessible registry paths" to organizational standards. CC ID 07863 | Configuration | Preventive | |
Configure the "Set client connection encryption level" to organizational standards. CC ID 07881 | Configuration | Preventive | |
Configure the "Windows Firewall: Allow inbound remote administration exception" to organizational standards. CC ID 08182 | Configuration | Preventive | |
Configure the "MSS: (SynAttackProtect) Syn attack protection level (protects against DoS)" to organizational standards. CC ID 08198 | Configuration | Preventive | |
Configure the "Network access: Do not allow storage of credentials or .NET Passports for network authentication" to organizational standards CC ID 08200 | Configuration | Preventive | |
Configure the "Turn off Internet download for Web publishing and online ordering wizards" to organizational standards. CC ID 08259 | Configuration | Preventive | |
Configure the "Maximum tolerance for computer clock synchronization" to organizational standards. CC ID 08260 | Configuration | Preventive | |
Configure the "Maximum lifetime for user ticket" to organizational standards. CC ID 08299 | Configuration | Preventive | |
Configure the "Maximum lifetime for service ticket" to organizational standards. CC ID 08301 | Configuration | Preventive | |
Configure the "Set IP Stateless Autoconfiguration Limits State" to organizational standards. CC ID 08348 | Configuration | Preventive | |
Configure the "Prohibit connection to non-domain networks when connected to domain authenticated network" to organizational standards. CC ID 08420 | Configuration | Preventive | |
Configure the "Restrict Unauthenticated RPC clients" to organizational standards. CC ID 08437 | Configuration | Preventive | |
Configure the "Enable RPC Endpoint Mapper Client Authentication" to organizational standards. CC ID 08526 | Configuration | Preventive | |
Configure the "Minimize the number of simultaneous connections to the Internet or a Windows Domain" to organizational standards. CC ID 08603 | Configuration | Preventive | |
Configure Logging settings in accordance with organizational standards. CC ID 07611 | Configuration | Preventive | |
Configure "CloudTrail" to organizational standards. CC ID 15443 | Configuration | Preventive | |
Configure "CloudTrail log file validation" to organizational standards. CC ID 15437 | Configuration | Preventive | |
Configure "VPC flow logging" to organizational standards. CC ID 15436 | Configuration | Preventive | |
Configure "object-level logging" to organizational standards. CC ID 15433 | Configuration | Preventive | |
Configure "Turn on PowerShell Transcription" to organizational standards. CC ID 15415 | Configuration | Preventive | |
Configure "Turn on PowerShell Script Block Logging" to organizational standards. CC ID 15413 | Configuration | Preventive | |
Configure "Audit PNP Activity" to organizational standards. CC ID 15393 | Configuration | Preventive | |
Configure "Include command line in process creation events" to organizational standards. CC ID 15358 | Configuration | Preventive | |
Configure "Audit Group Membership" to organizational standards. CC ID 15341 | Configuration | Preventive | |
Configure the "audit_backlog_limit" setting to organizational standards. CC ID 15324 | Configuration | Preventive | |
Configure the "/etc/docker/daemon.json" files and directories auditing to organizational standards. CC ID 14467 | Configuration | Detective | |
Configure the "systemd-journald" to organizational standards. CC ID 15326 | Configuration | Preventive | |
Configure the "/etc/docker" files and directories auditing to organizational standards. CC ID 14459 | Configuration | Detective | |
Configure the "docker.socket" files and directories auditing to organizational standards. CC ID 14458 | Configuration | Detective | |
Configure the "docker.service" files and directories auditing to organizational standards. CC ID 14454 | Configuration | Detective | |
Configure the "/var/lib/docker" files and directories auditing to organizational standards. CC ID 14453 | Configuration | Detective | |
Configure the "/usr/sbin/runc" files and directories auditing to organizational standards. CC ID 14452 | Configuration | Detective | |
Configure the "/usr/bin/containerd" files and directories auditing to organizational standards. CC ID 14451 | Configuration | Detective | |
Configure the "/etc/default/docker" files and directories auditing to organizational standards. CC ID 14450 | Configuration | Detective | |
Configure the "/etc/sysconfig/docker" files and directories auditing to organizational standards. CC ID 14449 | Configuration | Detective | |
Provide the reference database used to verify input data in the logging capability. CC ID 15018 | Log Management | Preventive | |
Configure the "Audit Policy: Object Access: SAM" to organizational standards. CC ID 07612 | Configuration | Preventive | |
Configure the storage parameters for all logs. CC ID 06330 | Configuration | Preventive | |
Configure sufficient log storage capacity and prevent the capacity from being exceeded. CC ID 01425 | Configuration | Preventive | |
Configure the log retention method. CC ID 01715 | Configuration | Preventive | |
Configure the log retention size. CC ID 01716 | Configuration | Preventive | |
Configure syslogd to send logs to a Remote LogHost. CC ID 01526 | Configuration | Preventive | |
Configure the "Audit Policy: Account Management: User Account Management" to organizational standards. CC ID 07613 | Configuration | Preventive | |
Configure the security parameters for all logs. CC ID 01712 [Review whether management has the following: Processes for the security and integrity of log files (e.g., encryption of log files, adequate storage capacity, secure backup and disposal of logs, logging to a separate computer, use of read-only media, controlled log parameters, and restricted access to log files). App A Objective 6.35.b Review whether management has the following: Processes for the security and integrity of log files (e.g., encryption of log files, adequate storage capacity, secure backup and disposal of logs, logging to a separate computer, use of read-only media, controlled log parameters, and restricted access to log files). App A Objective 6.35.b] | Configuration | Preventive | |
Configure the log so that it cannot be disabled. CC ID 00595 | Configuration | Preventive | |
Configure the event log size capacity limits for the application log, the security log, and the system log. CC ID 01713 | Configuration | Preventive | |
Configure the application log, the security log, and the system log to restrict guest access. CC ID 01714 | Configuration | Preventive | |
Configure the log to capture audit log initialization, along with auditable event selection. CC ID 00649 | Log Management | Detective | |
Configure the "mss: (warninglevel) percentage threshold for the security event log at which the system will generate a warning" setting. CC ID 04275 | Configuration | Preventive | |
Configure the "Audit Policy: System: System Integrity" to organizational standards. CC ID 07652 | Configuration | Preventive | |
Configure the detailed data elements to be captured for all logs so that events are identified by type, location, subject, user, what data was accessed, etc. CC ID 06331 | Configuration | Preventive | |
Configure the log to capture creates, reads, updates, or deletes of records containing personal data. CC ID 11890 | Log Management | Detective | |
Configure the log to capture the information referent when personal data is being accessed. CC ID 11968 | Log Management | Detective | |
Configure the log to capture the user's identification. CC ID 01334 | Configuration | Preventive | |
Configure the log to capture a date and time stamp. CC ID 01336 | Configuration | Preventive | |
Configure the log to capture each auditable event's origination. CC ID 01338 | Log Management | Detective | |
Configure the log to uniquely identify each asset. CC ID 01339 | Configuration | Preventive | |
Configure the log to capture remote access information. CC ID 05596 | Configuration | Detective | |
Configure the log to capture the type of each event. CC ID 06423 | Configuration | Preventive | |
Configure the log to capture each event's success or failure indication. CC ID 06424 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: File Share" to organizational standards. CC ID 07655 | Configuration | Preventive | |
Configure all logs to capture auditable events or actionable events. CC ID 06332 | Configuration | Preventive | |
Configure the log to capture the amount of data uploaded and downloaded. CC ID 16494 | Log Management | Preventive | |
Configure the log to capture startups and shutdowns. CC ID 16491 | Log Management | Preventive | |
Configure the log to capture user queries and searches. CC ID 16479 | Log Management | Preventive | |
Configure the log to capture Internet Protocol addresses. CC ID 16495 | Log Management | Preventive | |
Configure the log to capture error messages. CC ID 16477 | Log Management | Preventive | |
Configure the log to capture system failures. CC ID 16475 | Log Management | Preventive | |
Configure the log to capture account lockouts. CC ID 16470 | Configuration | Preventive | |
Configure the log to capture execution events. CC ID 16469 | Configuration | Preventive | |
Configure the log to capture AWS Organizations changes. CC ID 15445 | Configuration | Preventive | |
Configure the log to capture Identity and Access Management policy changes. CC ID 15442 | Configuration | Preventive | |
Configure the log to capture management console sign-in without multi-factor authentication. CC ID 15441 | Configuration | Preventive | |
Configure the log to capture route table changes. CC ID 15439 | Configuration | Preventive | |
Configure the log to capture virtual private cloud changes. CC ID 15435 | Configuration | Preventive | |
Configure the log to capture changes to encryption keys. CC ID 15432 | Configuration | Preventive | |
Configure the log to capture unauthorized API calls. CC ID 15429 | Configuration | Preventive | |
Configure the log to capture changes to network gateways. CC ID 15421 | Configuration | Preventive | |
Configure the log to capture all malicious code that has been discovered, quarantined, and/or eradicated. CC ID 00577 | Log Management | Detective | |
Configure the log to capture all spoofed addresses. CC ID 01313 | Configuration | Preventive | |
Configure the "logging level" to organizational standards. CC ID 14456 | Configuration | Detective | |
Capture successful operating system access and successful software access. CC ID 00527 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Independently monitors operating system access by user, terminal, date, and time of access. App A Objective 6.21.g] | Log Management | Detective | |
Configure the log to capture hardware and software access attempts. CC ID 01220 | Log Management | Detective | |
Configure the log to capture all URL requests. CC ID 12138 | Technical Security | Detective | |
Configure inetd tracing. CC ID 01523 | Configuration | Preventive | |
Configure the system to capture messages sent to the syslog AUTH facility. CC ID 01525 | Configuration | Preventive | |
Configure the log to capture logons, logouts, logon attempts, and logout attempts. CC ID 01915 | Log Management | Detective | |
Configure Cron logging. CC ID 01528 | Configuration | Preventive | |
Configure the kernel level auditing setting. CC ID 01530 | Configuration | Preventive | |
Configure the "audit successful file system mounts" setting to organizational standards. CC ID 09923 | Configuration | Preventive | |
Configure system accounting/system events. CC ID 01529 | Configuration | Preventive | |
Configure the privilege use auditing setting. CC ID 01699 | Configuration | Preventive | |
Configure the log to record the Denial of Access that results from an excessive number of unsuccessful logon attempts. CC ID 01919 | Configuration | Preventive | |
Configure the Audit Process Tracking setting. CC ID 01700 | Configuration | Preventive | |
Configure the log to capture access to restricted data or restricted information. CC ID 00644 | Log Management | Detective | |
Configure the EEPROM security-mode accesses and EEPROM log-failed accesses. CC ID 01575 | Configuration | Preventive | |
Configure the log to capture user identifier, address, port blocking or blacklisting. CC ID 01918 | Configuration | Preventive | |
Configure the log to capture actions taken by individuals with root privileges or administrative privileges and add logging option to the root file system. CC ID 00645 [{privileged users} Determine whether management has effective threat monitoring processes, including the following: Establishing and documenting a process to independently monitor administrators and other users with higher privileges. App A Objective 8.4.f] | Log Management | Detective | |
Configure the log to capture identification and authentication mechanism use. CC ID 00648 | Log Management | Detective | |
Configure the log to capture all access to the audit trail. CC ID 00646 | Log Management | Detective | |
Configure the log to capture Object access to key directories or key files. CC ID 01697 | Log Management | Detective | |
Configure the log to capture both access and access attempts to security-relevant objects and security-relevant directories. CC ID 01916 | Log Management | Detective | |
Configure the log to capture system level object creation and deletion. CC ID 00650 | Log Management | Detective | |
Enable directory service access events, as appropriate. CC ID 05616 | Configuration | Preventive | |
Configure the log to capture failed transactions. CC ID 06334 | Configuration | Preventive | |
Configure the log to capture successful transactions. CC ID 06335 | Configuration | Preventive | |
Audit non attributable events (na class). CC ID 05604 | Configuration | Preventive | |
Configure the log to capture configuration changes. CC ID 06881 | Configuration | Preventive | |
Log, monitor, and review all changes to time settings on critical systems. CC ID 11608 | Configuration | Preventive | |
Configure the log to capture changes to User privileges, audit policies, and trust policies by enabling audit policy changes. CC ID 01698 | Log Management | Detective | |
Configure the log to capture user account additions, modifications, and deletions. CC ID 16482 | Log Management | Preventive | |
Configure the log to capture all changes to certificates. CC ID 05595 | Configuration | Preventive | |
Configure the log to capture user authenticator changes. CC ID 01917 | Log Management | Detective | |
Configure the "inetd logging" setting to organizational standards. CC ID 08970 | Configuration | Preventive | |
Configure the "audit sudoers" setting to organizational standards. CC ID 09950 | Configuration | Preventive | |
Configure the event log settings for specific Operating System functions. CC ID 06337 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Registry" to organizational standards. CC ID 07658 | Configuration | Preventive | |
Configure the "Audit: Audit the use of Backup and Restore privilege" setting. CC ID 01724 | Configuration | Preventive | |
Configure the "Audit: Shut down the system immediately if unable to log security audits" setting. CC ID 01725 | Configuration | Preventive | |
Configure "Audit account management" to organizational standards. CC ID 02039 | Configuration | Preventive | |
Configure the "Audit: Force audit policy subcategory settings (Windows Vista or later)" setting. CC ID 04387 | Configuration | Preventive | |
Configure console logging. CC ID 04454 | Configuration | Preventive | |
Configure boot error logging. CC ID 04455 | Configuration | Preventive | |
Disable the "Audit password" setting in NetWare. CC ID 04456 | Configuration | Preventive | |
Configure the "Disable Logging" setting. CC ID 05590 | Configuration | Preventive | |
Enable BIN mode auditing. CC ID 05591 | Configuration | Preventive | |
Enable or disable the BSM auditing setting, as appropriate. CC ID 05592 | Configuration | Preventive | |
Enable or disable NFS server logging, as appropriate. CC ID 05593 | Log Management | Detective | |
Log Pluggable Authentication Modules access at an appropriate level. CC ID 05599 | Log Management | Detective | |
Set the X server audit level appropriately. CC ID 05600 | Configuration | Preventive | |
Enable or disable the logging of "martian" packets (impossible addresses), as appropriate. CC ID 05601 | Log Management | Detective | |
Enable or disable dhcpd logging, as appropriate. CC ID 05602 | Log Management | Detective | |
Enable or disable attempted stack exploit logging, as appropriate. CC ID 05614 | Log Management | Detective | |
Enable or disable the debug logging option, as appropriate. CC ID 05617 | Log Management | Detective | |
Configure the "Turn on session logging" properly. CC ID 05618 | Configuration | Preventive | |
Configure Sendmail with the appropriate logging levels. CC ID 06028 | Configuration | Preventive | |
Enable or disable auditing in the runcontrol scripts, as appropriate. CC ID 06029 | Configuration | Preventive | |
Enable or disable auditing for user accounts, as appropriate. CC ID 06030 | Configuration | Preventive | |
Enable or disable auditing at boot time, as appropriate. CC ID 06031 | Configuration | Preventive | |
Enable or disable the logging of vsftpd transactions, as appropriate. CC ID 06032 | Log Management | Detective | |
Enable or disable the auditing of chgrp usage, as appropriate. CC ID 06033 | Configuration | Preventive | |
Enable or disable the auditing of mkgroup usage, as appropriate. CC ID 06034 | Configuration | Preventive | |
Enable or disable the auditing of rmgroup usage, as appropriate. CC ID 06035 | Configuration | Preventive | |
Enable or disable the auditing of the exit function, as appropriate. CC ID 06036 | Configuration | Preventive | |
Generate an alert when an audit log failure occurs. CC ID 06737 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Logoff" to organizational standards. CC ID 07662 | Configuration | Preventive | |
Configure additional log settings. CC ID 06333 | Configuration | Preventive | |
Configure additional logging for the FTP daemon. CC ID 01524 | Configuration | Preventive | |
Configure the log to send alerts for each auditable events success or failure. CC ID 01337 | Log Management | Preventive | |
Configure the "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to organizational standards. CC ID 07664 | Configuration | Preventive | |
Configure additional log file parameters appropriately. CC ID 06338 | Configuration | Preventive | |
Create the /var/adm/loginlog file. CC ID 01527 | Configuration | Preventive | |
Verify the audit config file contains only accounts that should be present. CC ID 05594 | Configuration | Preventive | |
Specify the PRI audit file properly. CC ID 05597 | Configuration | Preventive | |
Specify the SEC audit file properly. CC ID 05598 | Configuration | Preventive | |
Verify auditing is logged to an appropriate directory. CC ID 05603 | Log Management | Detective | |
Verify the user audit file contains the appropriate never-audit flags. CC ID 05605 | Configuration | Preventive | |
Enable or disable the /var/log/authlog log, as appropriate. CC ID 05606 | Log Management | Detective | |
Enable or disable the /var/log/syslog log, as appropriate. CC ID 05607 | Log Management | Detective | |
Enable or disable the /var/adm/messages log, as appropriate. CC ID 05608 | Log Management | Detective | |
Enable or disable the /var/adm/sulog log, as appropriate. CC ID 05609 | Log Management | Detective | |
Enable or disable the /var/adm/utmp(x) log, as appropriate. CC ID 05610 | Log Management | Detective | |
Enable or disable the /var/adm/wtmp(x) log, as appropriate. CC ID 05611 | Log Management | Detective | |
Enable or disable the /var/adm/sshlog log, as appropriate. CC ID 05612 | Log Management | Detective | |
Enable or disable the /var/log/pamlog log, as appropriate. CC ID 05613 | Log Management | Detective | |
Perform filesystem logging and filesystem journaling. CC ID 05615 | Log Management | Detective | |
Configure the "Background upload of a roaming user profile's registry file while user is logged on" setting to organizational standards. CC ID 10761 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: File System" to organizational standards. CC ID 07666 | Configuration | Preventive | |
Configure the "Backup log automatically when full" setting for the "setup log" to organizational standards. CC ID 10762 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Logon" to organizational standards. CC ID 07669 | Configuration | Preventive | |
Configure the "Audit Policy: Account Logon: Kerberos Authentication Service" to organizational standards. CC ID 07679 | Configuration | Preventive | |
Configure the "Applications preference logging and tracing" setting to organizational standards. CC ID 10774 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: IPsec Extended Mode" to organizational standards. CC ID 07683 | Configuration | Preventive | |
Configure the "Data Sources preference logging and tracing" setting to organizational standards. CC ID 10779 | Configuration | Preventive | |
Configure the "Devices preference logging and tracing" setting to organizational standards. CC ID 10782 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Handle Manipulation" to organizational standards. CC ID 07684 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Detailed File Share" to organizational standards. CC ID 07687 | Configuration | Preventive | |
Configure the "Drive Maps preference logging and tracing" setting to organizational standards. CC ID 10783 | Configuration | Preventive | |
Configure the "Environment preference logging and tracing" setting to organizational standards. CC ID 10784 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Network Policy Server" to organizational standards. CC ID 07701 | Configuration | Preventive | |
Configure the "Audit Policy: Detailed Tracking: Process Creation" to organizational standards. CC ID 07707 | Configuration | Preventive | |
Configure the "Files preference logging and tracing" setting to organizational standards. CC ID 10785 | Configuration | Preventive | |
Configure the "Folder Options preference logging and tracing" setting to organizational standards. CC ID 10786 | Configuration | Preventive | |
Configure the "Audit Policy: System: IPsec Driver" to organizational standards. CC ID 07708 | Configuration | Preventive | |
Configure the "Folders preference logging and tracing" setting to organizational standards. CC ID 10787 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Account Lockout" to organizational standards. CC ID 07713 | Configuration | Preventive | |
Configure the "Ini Files preference logging and tracing" setting to organizational standards. CC ID 10788 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Kernel Object" to organizational standards. CC ID 07720 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Other Object Access Events" to organizational standards. CC ID 07724 | Configuration | Preventive | |
Configure the "Internet Settings preference logging and tracing" setting to organizational standards. CC ID 10789 | Configuration | Preventive | |
Configure the "Local Users and Groups preference logging and tracing" setting to organizational standards. CC ID 10793 | Configuration | Preventive | |
Configure the "Audit Policy: DS Access: Directory Service Replication" to organizational standards. CC ID 07734 | Configuration | Preventive | |
Configure the "Audit Policy: Policy Change: Audit Policy Change" to organizational standards. CC ID 07735 | Configuration | Preventive | |
Configure the "Regional Options preference logging and tracing" setting to organizational standards. CC ID 10802 | Configuration | Preventive | |
Configure the "Registry preference logging and tracing" setting to organizational standards. CC ID 10803 | Configuration | Preventive | |
Configure the "Audit Policy: DS Access: Directory Service Changes" to organizational standards. CC ID 07736 | Configuration | Preventive | |
Configure the "Scheduled Tasks preference logging and tracing" setting to organizational standards. CC ID 10815 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Certification Services" to organizational standards. CC ID 07742 | Configuration | Preventive | |
Configure the "Maximum Log Size (KB)" to organizational standards. CC ID 07744 | Configuration | Preventive | |
Configure the "Services preference logging and tracing" setting to organizational standards. CC ID 10818 | Configuration | Preventive | |
Configure the "Audit Policy: Detailed Tracking: DPAPI Activity" to organizational standards. CC ID 07746 | Configuration | Preventive | |
Configure the "Shortcuts preference logging and tracing" setting to organizational standards. CC ID 10819 | Configuration | Preventive | |
Configure the "Start Menu preference logging and tracing" setting to organizational standards. CC ID 10821 | Configuration | Preventive | |
Configure the "Audit Policy: Account Management: Other Account Management Events" to organizational standards. CC ID 07751 | Configuration | Preventive | |
Configure the "Delete data from devices running Microsoft firmware when a user logs off from the computer." setting to organizational standards. CC ID 10846 | Configuration | Preventive | |
Configure the "Audit Policy: Account Management: Computer Account Management" to organizational standards. CC ID 07752 | Configuration | Preventive | |
Configure the "Disable logging via package settings" setting to organizational standards. CC ID 10864 | Configuration | Preventive | |
Configure the "Audit Policy: Privilege Use: Non Sensitive Privilege Use" to organizational standards. CC ID 07756 | Configuration | Preventive | |
Configure the "Do not forcefully unload the users registry at user logoff" setting to organizational standards. CC ID 10930 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Application Generated" to organizational standards. CC ID 07757 | Configuration | Preventive | |
Configure the "Audit Policy: DS Access: Detailed Directory Service Replication" to organizational standards. CC ID 07764 | Configuration | Preventive | |
Configure the "Do not log users on with temporary profiles" setting to organizational standards. CC ID 10931 | Configuration | Preventive | |
Configure the "Audit Policy: Privilege Use: Other Privilege Use Events" to organizational standards. CC ID 07776 | Configuration | Preventive | |
Configure the "Log Access" setting for the "application log" to organizational standards. CC ID 11026 | Configuration | Preventive | |
Configure the "Audit Policy: Account Logon: Kerberos Service Ticket Operations" to organizational standards. CC ID 07786 | Configuration | Preventive | |
Configure the "Log Access" setting for the "setup log" to organizational standards. CC ID 11027 | Configuration | Preventive | |
Configure the "Log Access" setting for the "system log" to organizational standards. CC ID 11028 | Configuration | Preventive | |
Configure the "Audit Policy: DS Access: Directory Service Access" to organizational standards. CC ID 07790 | Configuration | Preventive | |
Configure the "Log directory pruning retry events" setting to organizational standards. CC ID 11029 | Configuration | Preventive | |
Configure the "Retain old events" to organizational standards. CC ID 07791 | Configuration | Preventive | |
Configure the "Log event when quota limit exceeded" setting to organizational standards. CC ID 11030 | Configuration | Preventive | |
Configure the "Audit: Audit the use of Backup and Restore privilege" to organizational standards. CC ID 07792 | Configuration | Preventive | |
Configure the "Audit Policy: Policy Change: MPSSVC Rule-Level Policy Change" to organizational standards. CC ID 07793 | Configuration | Preventive | |
Configure the "Log File Path" setting for the "application log" to organizational standards. CC ID 11033 | Configuration | Preventive | |
Configure the "Audit Policy: Policy Change: Other Policy Change Events" to organizational standards. CC ID 07810 | Configuration | Preventive | |
Configure the "Log File Path" setting for the "setup log" to organizational standards. CC ID 11034 | Configuration | Preventive | |
Configure the "Log File Path" setting for the "system log" to organizational standards. CC ID 11035 | Configuration | Preventive | |
Configure the "Audit: Shut down system immediately if unable to log security audits" to organizational standards. CC ID 07812 | Configuration | Preventive | |
Configure the "Logging" setting to organizational standards. CC ID 11036 | Configuration | Preventive | |
Configure the "Audit Policy: System: Other System Events" to organizational standards. CC ID 07817 | Configuration | Preventive | |
Configure the "Audit Policy: Account Management: Application Group Management" to organizational standards. CC ID 07819 | Configuration | Preventive | |
Configure the "Remove "Disconnect" option from Shut Down dialog" setting to organizational standards. CC ID 11126 | Configuration | Preventive | |
Configure the "MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning" to organizational standards. CC ID 07820 | Configuration | Preventive | |
Configure the "Remove browse dialog box for new source" setting to organizational standards. CC ID 11127 | Configuration | Preventive | |
Configure the "Restricts the UI language Windows uses for all logged users" setting to organizational standards. CC ID 11147 | Configuration | Preventive | |
Configure the "Audit Policy: Account Logon: Other Account Logon Events" to organizational standards. CC ID 07825 | Configuration | Preventive | |
Configure the "Set roaming profile path for all users logging onto this computer" setting to organizational standards. CC ID 11182 | Configuration | Preventive | |
Configure the "Audit Policy: Account Management: Distribution Group Management" to organizational standards. CC ID 07828 | Configuration | Preventive | |
Configure the "Set the Time interval in minutes for logging accounting data" setting to organizational standards. CC ID 11193 | Configuration | Preventive | |
Configure the "Audit: Audit the access of global system objects" to organizational standards. CC ID 07831 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Special Logon" to organizational standards. CC ID 07835 | Configuration | Preventive | |
Configure the "Turn off Resultant Set of Policy logging" setting to organizational standards. CC ID 11307 | Configuration | Preventive | |
Configure the "Turn on extensive logging for Active Directory Domain Services domain controllers that are running Server for NIS" setting to organizational standards. CC ID 11343 | Configuration | Preventive | |
Configure the "Audit Policy: Detailed Tracking: RPC Events" to organizational standards. CC ID 07840 | Configuration | Preventive | |
Configure the "Audit Policy: Policy Change: Authentication Policy Change" to organizational standards. CC ID 07846 | Configuration | Preventive | |
Configure the "Turn on extensive logging for Password Synchronization" setting to organizational standards. CC ID 11344 | Configuration | Preventive | |
Configure the "Audit Policy: Detailed Tracking: Process Termination" to organizational standards. CC ID 07849 | Configuration | Preventive | |
Configure the "Turn on logging" setting to organizational standards. CC ID 11345 | Configuration | Preventive | |
Configure the "Turn on session logging" setting to organizational standards. CC ID 11350 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: IPsec Quick Mode" to organizational standards. CC ID 07852 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Filtering Platform Packet Drop" to organizational standards. CC ID 07856 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Filtering Platform Connection" to organizational standards. CC ID 07864 | Configuration | Preventive | |
Configure the "Audit Policy: Policy Change: Authorization Policy Change" to organizational standards. CC ID 07875 | Configuration | Preventive | |
Configure the "Audit Policy: Account Management: Security Group Management" to organizational standards. CC ID 07880 | Configuration | Preventive | |
Configure the "Audit Policy: Privilege Use: Sensitive Privilege Use" to organizational standards. CC ID 07887 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: IPsec Main Mode" to organizational standards. CC ID 07888 | Configuration | Preventive | |
Configure the "Audit Policy: Account Logon: Credential Validation" to organizational standards. CC ID 07892 | Configuration | Preventive | |
Configure the "Audit Policy: Policy Change: Filtering Platform Policy Change" to organizational standards. CC ID 07895 | Configuration | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Other Logon/Logoff Events" to organizational standards. CC ID 07899 | Configuration | Preventive | |
Configure the "Audit Policy: System: Security State Change" to organizational standards. CC ID 07903 | Configuration | Preventive | |
Configure the "Audit Policy: System: Security System Extension" to organizational standards. CC ID 07904 | Configuration | Preventive | |
Configure the "Audit account logon events" to organizational standards. CC ID 08188 | Configuration | Preventive | |
Configure the "Retention method for security log" to organizational standards. CC ID 08197 | Configuration | Preventive | |
Configure the "Retention method for system log" to organizational standards. CC ID 08211 | Configuration | Preventive | |
Configure the "Audit logon events" to organizational standards. CC ID 08221 | Configuration | Preventive | |
Configure the "Retention method for application log" to organizational standards. CC ID 08226 | Configuration | Preventive | |
Configure the "Retain security log" to organizational standards. CC ID 08241 | Configuration | Preventive | |
Configure the "Audit system events" to organizational standards. CC ID 08244 | Configuration | Preventive | |
Configure the "Retain application log" to organizational standards. CC ID 08246 | Configuration | Preventive | |
Configure the "Prevent local guests group from accessing application log" to organizational standards. CC ID 08248 | Configuration | Preventive | |
Configure the "Maximum security log size" to organizational standards. CC ID 08251 | Configuration | Preventive | |
Configure the "Retain system log" to organizational standards. CC ID 08258 | Configuration | Preventive | |
Configure the "Audit privilege use" to organizational standards. CC ID 08266 | Configuration | Preventive | |
Configure the "Audit policy change" to organizational standards. CC ID 08272 | Configuration | Preventive | |
Configure the "Audit object access" to organizational standards. CC ID 08278 | Configuration | Preventive | |
Configure the "Audit process tracking" to organizational standards. CC ID 08283 | Configuration | Preventive | |
Configure the "Maximum system log size" to organizational standards. CC ID 08286 | Configuration | Preventive | |
Configure the "Maximum application log size" to organizational standards. CC ID 08296 | Configuration | Preventive | |
Configure the "Prevent local guests group from accessing security log" to organizational standards. CC ID 08297 | Configuration | Preventive | |
Configure the "Audit directory service access" to organizational standards. CC ID 08304 | Configuration | Preventive | |
Configure the "Audit account management" to organizational standards. CC ID 08316 | Configuration | Preventive | |
Configure the "Prevent local guests group from accessing system log" to organizational standards. CC ID 08336 | Configuration | Preventive | |
Configure the "Specify the maximum log file size (KB)" to organizational standards. CC ID 08352 | Configuration | Preventive | |
Configure the "Message tracking logging - Mailbox" to organizational standards. CC ID 08360 | Configuration | Preventive | |
Configure the "Turn on Connectivity logging" to organizational standards. CC ID 08398 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Logging: Size limit (KB)" to organizational standards. CC ID 08405 | Configuration | Preventive | |
Configure the "Control Event Log behavior when the log file reaches its maximum size" to organizational standards. CC ID 08444 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Logging: Log dropped packets" to organizational standards. CC ID 08445 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Logging: Log dropped packets" to organizational standards. CC ID 08454 | Configuration | Preventive | |
Configure the "Configure Protocol logging" to organizational standards. CC ID 08463 | Configuration | Preventive | |
Configure the "Message tracking logging - Transport" to organizational standards. CC ID 08477 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Logging: Log dropped packets" to organizational standards. CC ID 08501 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Removable Storage" to organizational standards. CC ID 08504 | Configuration | Preventive | |
Configure the "Windows Firewall: Domain: Logging: Name" to organizational standards. CC ID 08543 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Logging: Log successful connections" to organizational standards. CC ID 08545 | Configuration | Preventive | |
Configure the "Audit Policy: Object Access: Central Access Policy Staging" to organizational standards. CC ID 08558 | Configuration | Preventive | |
Configure the "Windows Firewall: Public: Logging: Name" to organizational standards. CC ID 08565 | Configuration | Preventive | |
Configure the "Windows Firewall: Private: Logging: Size limit (KB)" to organizational standards. CC ID 08606 | Configuration | Preventive | |
Configure the "kernel arguments" setting for "auditing early in the boot process" to organizational standards. CC ID 08749 | Establish/Maintain Documentation | Preventive | |
Configure the "record date and time modification events" setting for "auditing" to organizational standards. CC ID 08750 | Establish/Maintain Documentation | Preventive | |
Configure the "record user/group information modification events" setting for "auditing" to organizational standards. CC ID 08751 | Establish/Maintain Documentation | Preventive | |
Configure the "record changes to the system network environment" setting for "auditing" to organizational standards. CC ID 08752 | Establish/Maintain Documentation | Preventive | |
Configure the "record changes to the system's mandatory access controls" setting for "auditing" to organizational standards. CC ID 08753 | Establish/Maintain Documentation | Preventive | |
Configure the "record logon and logout events" setting for "auditing" to organizational standards. CC ID 08754 | Establish/Maintain Documentation | Preventive | |
Configure the "record process and session initiation events" setting for "auditing" to organizational standards. CC ID 08755 | Establish/Maintain Documentation | Preventive | |
Configure the "record changes to discretionary access control permissions" setting for "auditing" to organizational standards. CC ID 08756 | Establish/Maintain Documentation | Preventive | |
Configure the "record unauthorized attempts to access files" setting for "auditing" to organizational standards. CC ID 08757 | Establish/Maintain Documentation | Preventive | |
Configure the "record use of privileged commands" setting for "auditing" to organizational standards. CC ID 08758 | Establish/Maintain Documentation | Preventive | |
Configure the "record data export to media events" setting for "auditing" to organizational standards. CC ID 08759 | Establish/Maintain Documentation | Preventive | |
Configure the "record file and program deletion events" setting for "auditing" to organizational standards. CC ID 08760 | Establish/Maintain Documentation | Preventive | |
Configure the "record administrator and security personnel action events" setting for "auditing" to organizational standards. CC ID 08761 | Establish/Maintain Documentation | Preventive | |
Configure the "record kernel module loading and unloading events" setting for "auditing" to organizational standards. CC ID 08762 | Establish/Maintain Documentation | Preventive | |
Configure the "Ensure auditd configuration is immutable" setting for "auditing" to organizational standards. CC ID 08763 | Establish/Maintain Documentation | Preventive | |
Configure the "audit file ownership changes" setting to organizational standards. CC ID 08966 | Audits and Risk Management | Preventive | |
Configure the "audit change user functions" setting to organizational standards. CC ID 08982 | Configuration | Preventive | |
Configure the "audit the use of chmod command" setting to organizational standards. CC ID 08983 | Configuration | Preventive | |
Configure the "audit the chown command" setting to organizational standards. CC ID 08984 | Configuration | Preventive | |
Configure the "Collect Session Initiation Information" setting to organizational standards. CC ID 09948 | Configuration | Preventive | |
Configure the "Collect Discretionary Access Control Permission Modification Events" setting to organizational standards. CC ID 09949 | Configuration | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Fault Tolerant Heap" to organizational standards. CC ID 10808 | Configuration | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Boot Performance Diagnostics" to organizational standards. CC ID 10809 | Configuration | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Memory Leak Diagnosis" to organizational standards. CC ID 10810 | Configuration | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Resource Exhaustion Detection and Resolution" to organizational standards. CC ID 10811 | Configuration | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Shutdown Performance Diagnostics" to organizational standards. CC ID 10812 | Configuration | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Standby/Resume Performance Diagnostics" to organizational standards. CC ID 10813 | Configuration | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows System Responsiveness Diagnostics" to organizational standards. CC ID 10814 | Configuration | Preventive | |
Configure the "Default quota limit and warning level" setting to organizational standards. CC ID 10840 | Configuration | Preventive | |
Configure the "Detect application failures caused by deprecated COM objects" setting to organizational standards. CC ID 10851 | Configuration | Preventive | |
Configure the "Detect application failures caused by deprecated Windows DLLs" setting to organizational standards. CC ID 10852 | Configuration | Preventive | |
Configure the "Detect application install failures" setting to organizational standards. CC ID 10853 | Configuration | Preventive | |
Configure the "Detect application installers that need to be run as administrator" setting to organizational standards. CC ID 10854 | Configuration | Preventive | |
Configure the "Detect applications unable to launch installers under UAC" setting to organizational standards. CC ID 10855 | Configuration | Preventive | |
Configure the "Diagnostics: Configure scenario execution level" setting to organizational standards. CC ID 10856 | Configuration | Preventive | |
Configure the "Disk Diagnostic: Configure execution level" setting to organizational standards. CC ID 10883 | Configuration | Preventive | |
Configure the "Log event when quota warning level exceeded" setting to organizational standards. CC ID 11031 | Configuration | Preventive | |
Configure the "Log File Debug Output Level" setting to organizational standards. CC ID 11032 | Configuration | Preventive | |
Configure the "Microsoft Support Diagnostic Tool: Configure execution level" setting to organizational standards. CC ID 11043 | Configuration | Preventive | |
Configure the "Primary DNS Suffix Devolution Level" setting to organizational standards. CC ID 11096 | Configuration | Preventive | |
Configure the "Require user authentication for remote connections by using Network Level Authentication" setting to organizational standards. CC ID 11138 | Configuration | Preventive | |
Configure the "Specify channel binding token hardening level" setting to organizational standards. CC ID 11209 | Configuration | Preventive | |
Configure the "Update Security Level" setting to organizational standards. CC ID 11357 | Configuration | Preventive | |
Configure the "Update Top Level Domain Zones" setting to organizational standards. CC ID 11358 | Configuration | Preventive | |
Configure Key, Certificate, Password, Authentication and Identity Management settings in accordance with organizational standards. CC ID 07621 | Configuration | Preventive | |
Configure Kerberos pre-authentication to organizational standards. CC ID 16480 | Configuration | Preventive | |
Configure time-based user access restrictions in accordance with organizational standards. CC ID 16436 | Configuration | Preventive | |
Configure "MFA Delete" to organizational standards. CC ID 15430 | Configuration | Preventive | |
Configure Identity and Access Management policies to organizational standards. CC ID 15422 | Configuration | Preventive | |
Configure the Identity and Access Management Access analyzer to organizational standards. CC ID 15420 | Configuration | Preventive | |
Configure "Support device authentication using certificate" to organizational standards. CC ID 15410 | Configuration | Preventive | |
Install LAPS AdmPwd GPO Extension, as necessary. CC ID 15409 | Configuration | Preventive | |
Configure "Require pin for pairing" to organizational standards. CC ID 15395 | Configuration | Preventive | |
Configure "Do not allow password expiration time longer than required by policy" to organizational standards. CC ID 15390 | Configuration | Preventive | |
Configure "Enable Local Admin Password Management" to organizational standards. CC ID 15387 | Configuration | Preventive | |
Configure "Allow Microsoft accounts to be optional" to organizational standards. CC ID 15368 | Configuration | Preventive | |
Configure "Turn off picture password sign-in" to organizational standards. CC ID 15347 | Configuration | Preventive | |
Configure "Enable insecure guest logons" to organizational standards. CC ID 15344 | Configuration | Preventive | |
Configure the "cert-expiry" argument to organizational standards. CC ID 14541 | Configuration | Preventive | |
Configure "client certificate authentication" to organizational standards. CC ID 14608 | Configuration | Preventive | |
Configure the "client certificate bundles" to organizational standards. CC ID 14518 | Configuration | Preventive | |
Configure the "external-server-cert" argument to organizational standards. CC ID 14522 | Configuration | Preventive | |
Configure the "Network Security: Restrict NTLM: Incoming NTLM traffic" to organizational standards. CC ID 07622 | Configuration | Preventive | |
Configure the "Network Security: Allow PKU2U authentication requests to this computer to use online identities" to organizational standards. CC ID 07638 | Configuration | Preventive | |
Configure the "Interactive logon: Require Domain Controller authentication to unlock workstation" to organizational standards. CC ID 07639 | Configuration | Preventive | |
Configure the "Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers" to organizational standards. CC ID 07663 | Configuration | Preventive | |
Configure the "Maximum password age" to organizational standards. CC ID 07688 | Configuration | Preventive | |
Configure the "Network Security: Restrict NTLM: Add server exceptions in this domain" to organizational standards. CC ID 07693 | Configuration | Preventive | |
Configure "Accounts: Limit local account use of blank passwords to console logon only" to organizational standards. CC ID 07697 | Configuration | Preventive | |
Configure the "Minimum password length" to organizational standards. CC ID 07711 | Configuration | Preventive | |
Configure the "Microsoft network server: Server SPN target name validation level" to organizational standards. CC ID 07714 | Configuration | Preventive | |
Configure the "Network Security: Restrict NTLM: Audit Incoming NTLM Traffic" to organizational standards. CC ID 07730 | Configuration | Preventive | |
Configure the "Domain member: Maximum machine account password age" to organizational standards. CC ID 07737 | Configuration | Preventive | |
Configure the "Password must meet complexity requirements" to organizational standards. CC ID 07743 | Configuration | Preventive | |
Configure the "Service Account Tokens" to organizational standards. CC ID 14646 | Configuration | Preventive | |
Configure the "Interactive logon: Require smart card" to organizational standards. CC ID 07753 | Configuration | Preventive | |
Configure the "System cryptography: Force strong key protection for user keys stored on the computer" to organizational standards. CC ID 07763 | Configuration | Preventive | |
Configure the "rotate" argument to organizational standards. CC ID 14548 | Configuration | Preventive | |
Configure the "Network Security: Restrict NTLM: Audit NTLM authentication in this domain" to organizational standards. CC ID 07769 | Configuration | Preventive | |
Configure the "Domain controller: Refuse machine account password changes" to organizational standards. CC ID 07827 | Configuration | Preventive | |
Configure the "Store passwords using reversible encryption" to organizational standards. CC ID 07829 | Configuration | Preventive | |
Configure the "Network security: Allow Local System to use computer identity for NTLM" to organizational standards. CC ID 07830 | Configuration | Preventive | |
Configure the "Interactive logon: Prompt user to change password before expiration" to organizational standards. CC ID 07844 | Configuration | Preventive | |
Configure the "Network Security: Restrict NTLM: NTLM authentication in this domain" to organizational standards. CC ID 07859 | Configuration | Preventive | |
Configure the "Enforce password history" to organizational standards. CC ID 07877 | Configuration | Preventive | |
Configure the "Domain member: Disable machine account password changes" to organizational standards. CC ID 07883 | Configuration | Preventive | |
Configure the "Interactive logon: Smart card removal behavior" to organizational standards. CC ID 07884 | Configuration | Preventive | |
Configure the "Logon options" to organizational standards. CC ID 07917 | Configuration | Preventive | |
Configure the "Prevent ignoring certificate errors" to organizational standards. CC ID 07924 | Configuration | Preventive | |
Configure the "Turn off Encryption Support" to organizational standards. CC ID 08028 | Configuration | Preventive | |
Configure the "Disable changing certificate settings" to organizational standards. CC ID 08042 | Configuration | Preventive | |
Configure the "Check for server certificate revocation" to organizational standards. CC ID 08120 | Configuration | Preventive | |
Configure the "Do not allow passwords to be saved" to organizational standards. CC ID 08178 | Configuration | Preventive | |
Configure the "RPC Endpoint Mapper Client Authentication" to organizational standards. CC ID 08202 | Configuration | Preventive | |
Configure the "Restrictions for Unauthenticated RPC clients" to organizational standards. CC ID 08240 | Configuration | Preventive | |
Configure the "Maximum lifetime for user ticket renewal" to organizational standards. CC ID 08257 | Configuration | Preventive | |
Configure the "System objects: Default owner for objects created by members of the Administrators group" to organizational standards. CC ID 08269 | Configuration | Preventive | |
Configure the "Enforce user logon restrictions" to organizational standards. CC ID 08274 | Configuration | Preventive | |
Configure the "Require a Password When a Computer Wakes (Plugged In)" to organizational standards. CC ID 08404 | Configuration | Preventive | |
Configure the "Configure login authentication for POP3" to organizational standards. CC ID 08413 | Configuration | Preventive | |
Configure the "Turn on PIN sign-in" to organizational standards. CC ID 08415 | Configuration | Preventive | |
Configure the "Interactive logon: Machine account lockout threshold" to organizational standards. CC ID 08419 | Configuration | Preventive | |
Configure the "Allow the use of biometrics" to organizational standards. CC ID 08435 | Configuration | Preventive | |
Configure the "Configure login authentication for IMAP4" to organizational standards. CC ID 08443 | Configuration | Preventive | |
Configure the "Allow simple passwords" to organizational standards. CC ID 08476 | Configuration | Preventive | |
Configure the "Require a Password When a Computer Wakes (On Battery)" to organizational standards. CC ID 08487 | Configuration | Preventive | |
Configure the "Require password" to organizational standards. CC ID 08511 | Configuration | Preventive | |
Configure the "Time without user input before password must be re-entered" to organizational standards. CC ID 08518 | Configuration | Preventive | |
Configure the "Allow basic authentication" to organizational standards. CC ID 08522 | Configuration | Preventive | |
Configure the "External send connector authentication: Domain Security" to organizational standards. CC ID 08527 | Configuration | Preventive | |
Configure the "External send connector authentication: Ignore Start TLS" to organizational standards. CC ID 08530 | Configuration | Preventive | |
Configure the "Turn on Basic feed authentication over HTTP" to organizational standards. CC ID 08548 | Configuration | Preventive | |
Configure the "Number of attempts allowed" to organizational standards. CC ID 08569 | Configuration | Preventive | |
Configure the "Password Expiration" to organizational standards. CC ID 08576 | Configuration | Preventive | |
Configure the "External send connector authentication: DNS Routing" to organizational standards. CC ID 08579 | Configuration | Preventive | |
Configure the "Require alphanumeric password" to organizational standards. CC ID 08582 | Configuration | Preventive | |
Configure the "Allow access to voicemail without requiring a PIN" to organizational standards. CC ID 08585 | Configuration | Preventive | |
Configure the "Require Client Certificates" to organizational standards. CC ID 08597 | Configuration | Preventive | |
Configure the "Disallow Digest authentication" to organizational standards. CC ID 08602 | Configuration | Preventive | |
Configure the "Accounts: Block Microsoft accounts" to organizational standards. CC ID 08613 | Configuration | Preventive | |
Configure Encryption settings in accordance with organizational standards. CC ID 07625 | Configuration | Preventive | |
Configure "Elastic Block Store volume encryption" to organizational standards. CC ID 15434 | Configuration | Preventive | |
Configure "Encryption Oracle Remediation" to organizational standards. CC ID 15366 | Configuration | Preventive | |
Configure the "encryption provider" to organizational standards. CC ID 14591 | Configuration | Preventive | |
Configure the "Microsoft network server: Digitally sign communications (always)" to organizational standards. CC ID 07626 | Configuration | Preventive | |
Configure the "Domain member: Digitally encrypt or sign secure channel data (always)" to organizational standards. CC ID 07657 | Configuration | Preventive | |
Configure the "Domain member: Digitally sign secure channel data (when possible)" to organizational standards. CC ID 07678 | Configuration | Preventive | |
Configure the "Network Security: Configure encryption types allowed for Kerberos" to organizational standards. CC ID 07799 | Configuration | Preventive | |
Configure the "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to organizational standards. CC ID 07822 | Configuration | Preventive | |
Configure the "Configure use of smart cards on fixed data drives" to organizational standards. CC ID 08361 | Configuration | Preventive | |
Configure the "Enforce drive encryption type on removable data drives" to organizational standards. CC ID 08363 | Configuration | Preventive | |
Configure the "Configure TPM platform validation profile for BIOS-based firmware configurations" to organizational standards. CC ID 08370 | Configuration | Preventive | |
Configure the "Configure use of passwords for removable data drives" to organizational standards. CC ID 08394 | Configuration | Preventive | |
Configure the "Configure use of hardware-based encryption for removable data drives" to organizational standards. CC ID 08401 | Configuration | Preventive | |
Configure the "Require additional authentication at startup" to organizational standards. CC ID 08422 | Configuration | Preventive | |
Configure the "Deny write access to fixed drives not protected by BitLocker" to organizational standards. CC ID 08429 | Configuration | Preventive | |
Configure the "Configure startup mode" to organizational standards. CC ID 08430 | Configuration | Preventive | |
Configure the "Require client MAPI encryption" to organizational standards. CC ID 08446 | Configuration | Preventive | |
Configure the "Configure dial plan security" to organizational standards. CC ID 08453 | Configuration | Preventive | |
Configure the "Allow access to BitLocker-protected removable data drives from earlier versions of Windows" to organizational standards. CC ID 08457 | Configuration | Preventive | |
Configure the "Enforce drive encryption type on fixed data drives" to organizational standards. CC ID 08460 | Configuration | Preventive | |
Configure the "Allow Secure Boot for integrity validation" to organizational standards. CC ID 08461 | Configuration | Preventive | |
Configure the "Configure use of passwords for operating system drives" to organizational standards. CC ID 08478 | Configuration | Preventive | |
Configure the "Choose how BitLocker-protected removable drives can be recovered" to organizational standards. CC ID 08484 | Configuration | Preventive | |
Configure the "Validate smart card certificate usage rule compliance" to organizational standards. CC ID 08492 | Configuration | Preventive | |
Configure the "Allow enhanced PINs for startup" to organizational standards. CC ID 08495 | Configuration | Preventive | |
Configure the "Choose how BitLocker-protected operating system drives can be recovered" to organizational standards. CC ID 08499 | Configuration | Preventive | |
Configure the "Allow access to BitLocker-protected fixed data drives from earlier versions of Windows" to organizational standards. CC ID 08505 | Configuration | Preventive | |
Configure the "Choose how BitLocker-protected fixed drives can be recovered" to organizational standards. CC ID 08509 | Configuration | Preventive | |
Configure the "Configure use of passwords for fixed data drives" to organizational standards. CC ID 08513 | Configuration | Preventive | |
Configure the "Choose drive encryption method and cipher strength" to organizational standards. CC ID 08537 | Configuration | Preventive | |
Configure the "Choose default folder for recovery password" to organizational standards. CC ID 08541 | Configuration | Preventive | |
Configure the "Prevent memory overwrite on restart" to organizational standards. CC ID 08542 | Configuration | Preventive | |
Configure the "Deny write access to removable drives not protected by BitLocker" to organizational standards. CC ID 08549 | Configuration | Preventive | |
Configure the "opt encrypted" flag to organizational standards. CC ID 14534 | Configuration | Preventive | |
Configure the "Provide the unique identifiers for your organization" to organizational standards. CC ID 08552 | Configuration | Preventive | |
Configure the "Enable use of BitLocker authentication requiring preboot keyboard input on slates" to organizational standards. CC ID 08556 | Configuration | Preventive | |
Configure the "Require encryption on device" to organizational standards. CC ID 08563 | Configuration | Preventive | |
Configure the "Enable S/MIME for OWA 2007" to organizational standards. CC ID 08564 | Configuration | Preventive | |
Configure the "Control use of BitLocker on removable drives" to organizational standards. CC ID 08566 | Configuration | Preventive | |
Configure the "Configure use of hardware-based encryption for fixed data drives" to organizational standards. CC ID 08568 | Configuration | Preventive | |
Configure the "Configure use of smart cards on removable data drives" to organizational standards. CC ID 08570 | Configuration | Preventive | |
Configure the "Enforce drive encryption type on operating system drives" to organizational standards. CC ID 08573 | Configuration | Preventive | |
Configure the "Disallow standard users from changing the PIN or password" to organizational standards. CC ID 08574 | Configuration | Preventive | |
Configure the "Use enhanced Boot Configuration Data validation profile" to organizational standards. CC ID 08578 | Configuration | Preventive | |
Configure the "Allow network unlock at startup" to organizational standards. CC ID 08588 | Configuration | Preventive | |
Configure the "Enable S/MIME for OWA 2010" to organizational standards. CC ID 08592 | Configuration | Preventive | |
Configure the "Configure minimum PIN length for startup" to organizational standards. CC ID 08594 | Configuration | Preventive | |
Configure the "Configure TPM platform validation profile" to organizational standards. CC ID 08598 | Configuration | Preventive | |
Configure the "Configure use of hardware-based encryption for operating system drives" to organizational standards. CC ID 08601 | Configuration | Preventive | |
Configure the "Reset platform validation data after BitLocker recovery" to organizational standards. CC ID 08607 | Configuration | Preventive | |
Configure the "Configure TPM platform validation profile for native UEFI firmware configurations" to organizational standards. CC ID 08614 | Configuration | Preventive | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives" setting to organizational standards. CC ID 10039 | Configuration | Preventive | |
Configure the "Save BitLocker recovery information to AD DS for fixed data drives" setting to organizational standards. CC ID 10040 | Configuration | Preventive | |
Configure the "Omit recovery options from the BitLocker setup wizard" setting to organizational standards. CC ID 10041 | Configuration | Preventive | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for operating system drives" setting to organizational standards. CC ID 10042 | Configuration | Preventive | |
Configure the "Save BitLocker recovery information to AD DS for operating system drives" setting to organizational standards. CC ID 10043 | Configuration | Preventive | |
Configure the "Allow BitLocker without a compatible TPM" setting to organizational standards. CC ID 10044 | Configuration | Preventive | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for removable data drives" setting to organizational standards. CC ID 10045 | Configuration | Preventive | |
Configure the "Save BitLocker recovery information to AD DS for removable data drives" setting to organizational standards. CC ID 10046 | Configuration | Preventive | |
Configure File Retention, Impact Level, and Classification Settings settings in accordance with organizational standards. CC ID 07715 | Configuration | Preventive | |
Configure the "Classification of files based on Discoverability" to organizational standards. CC ID 07716 | Configuration | Preventive | |
Configure the "Classification of files based on Intellectual Property" to organizational standards. CC ID 07765 | Configuration | Preventive | |
Configure the "Classification of files based on Confidentiality" to organizational standards. CC ID 07782 | Configuration | Preventive | |
Configure the "Classification of files based on PHI" to organizational standards. CC ID 07785 | Configuration | Preventive | |
Configure the "Classification of files based on Impact Level" to organizational standards. CC ID 07789 | Configuration | Preventive | |
Configure the "Classification of files based on Retention" to organizational standards. CC ID 07860 | Configuration | Preventive | |
Configure the "Classification of files based on PII" to organizational standards. CC ID 07865 | Configuration | Preventive | |
Configure System settings in accordance with organizational standards. CC ID 07806 | Configuration | Preventive | |
Configure the "System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)" to organizational standards CC ID 07807 | Configuration | Preventive | |
Configure the "Accounts: Rename guest account" to organizational standards. CC ID 07816 | Configuration | Preventive | |
Configure the "Accounts: Rename administrator account" to organizational standards. CC ID 07843 | Configuration | Preventive | |
Configure the "Accounts: Guest account status" to organizational standards. CC ID 07971 | Configuration | Preventive | |
Configure the "Accounts: Administrator account status" to organizational standards. CC ID 07996 | Configuration | Preventive | |
Configure the "Prompt for password on resume from hibernate / suspend" to organizational standards. CC ID 08342 | Configuration | Preventive | |
Configure Virus and Malware Protection settings in accordance with organizational standards. CC ID 07906 | Configuration | Preventive | |
Configure "Turn on behavior monitoring" to organizational standards. CC ID 15407 | Configuration | Preventive | |
Configure "Turn off real-time protection" to organizational standards. CC ID 15406 | Configuration | Preventive | |
Configure "Scan all downloaded files and attachments" to organizational standards. CC ID 15404 | Configuration | Preventive | |
Configure "Scan removable drives" to organizational standards. CC ID 15401 | Configuration | Preventive | |
Configure "Configure Attack Surface Reduction rules: Set the state for each ASR rule" to organizational standards. CC ID 15392 | Configuration | Preventive | |
Configure "Join Microsoft MAPS" to organizational standards. CC ID 15384 | Configuration | Preventive | |
Configure "Configure detection for potentially unwanted applications" to organizational standards. CC ID 15375 | Configuration | Preventive | |
Configure "Turn off Microsoft Defender AntiVirus" to organizational standards. CC ID 15371 | Configuration | Preventive | |
Configure "Enable file hash computation feature" to organizational standards. CC ID 15340 | Configuration | Preventive | |
Configure the "Internet Explorer Processes" to organizational standards. CC ID 07907 | Configuration | Preventive | |
Configure the "Turn on the auto-complete feature for user names and passwords on forms" to organizational standards. CC ID 07941 | Configuration | Preventive | |
Configure the "Automatic prompting for file downloads" to organizational standards. CC ID 07950 | Configuration | Preventive | |
Configure the "Use SmartScreen Filter" to organizational standards. CC ID 07952 | Configuration | Preventive | |
Configure the "Run ActiveX controls and plugins" to organizational standards. CC ID 07954 | Configuration | Preventive | |
Configure the "Java permissions" to organizational standards. CC ID 07969 | Configuration | Preventive | |
Configure the "Use Pop-up Blocker" to organizational standards. CC ID 07990 | Configuration | Preventive | |
Configure the "Prevent Bypassing SmartScreen Filter Warnings" to organizational standards. CC ID 07994 | Configuration | Preventive | |
Configure the "Allow cut, copy or paste operations from the clipboard via script" to organizational standards. CC ID 07997 | Configuration | Preventive | |
Configure the "Allow software to run or install even if the signature is invalid" to organizational standards. CC ID 08019 | Configuration | Preventive | |
Configure the "Do not allow users to enable or disable add-ons" to organizational standards. CC ID 08035 | Configuration | Preventive | |
Configure the "Disable AutoComplete for forms" to organizational standards. CC ID 08066 | Configuration | Preventive | |
Configure the "Download unsigned ActiveX controls" to organizational standards. CC ID 08073 | Configuration | Preventive | |
Configure the "Scripting of Java applets" to organizational standards. CC ID 08105 | Configuration | Preventive | |
Configure the "Allow only approved domains to use ActiveX controls without prompt" to organizational standards. CC ID 08374 | Configuration | Preventive | |
Configure the "Prevent per-user installation of ActiveX controls" to organizational standards. CC ID 08382 | Configuration | Preventive | |
Configure the "Turn on Cross-Site Scripting Filter" to organizational standards. CC ID 08395 | Configuration | Preventive | |
Configure the "Turn on certificate address mismatch warning" to organizational standards. CC ID 08410 | Configuration | Preventive | |
Configure the "Show security warning for potentially unsafe files" to organizational standards. CC ID 08412 | Configuration | Preventive | |
Configure the "Turn on Protected Mode" to organizational standards. CC ID 08471 | Configuration | Preventive | |
Configure the "Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled" to organizational standards. CC ID 08510 | Configuration | Preventive | |
Configure the "Check for signatures on downloaded programs" to organizational standards. CC ID 08584 | Configuration | Preventive | |
Configure the "Specify use of ActiveX Installer Service for installation of ActiveX controls" to organizational standards. CC ID 08587 | Configuration | Preventive | |
Configure the "Prevent changing the URL for checking updates to Internet Explorer and Internet Tools" to organizational standards. CC ID 08589 | Configuration | Preventive | |
Configure the "Enable MIME Sniffing" to organizational standards. CC ID 08591 | Configuration | Preventive | |
Configure "Prevent downloading of enclosures" to organizational standards. CC ID 08612 | Configuration | Preventive | |
Configure User Notification settings in accordance with organizational standards. CC ID 08201 | Configuration | Preventive | |
Configure the "Display Error Notification" to organizational standards. CC ID 08280 | Configuration | Preventive | |
Configure the "Customize Warning Messages" to organizational standards. CC ID 08599 | Configuration | Preventive | |
Configure Windows Components settings in accordance with organizational standards. CC ID 08263 | Configuration | Preventive | |
Configure the "Notify antivirus programs when opening attachments" to organizational standards. CC ID 08264 | Configuration | Preventive | |
Configure the "Do not preserve zone information in file attachments" to organizational standards. CC ID 08309 | Configuration | Preventive | |
Configure the "Remove CD Burning features" to organizational standards. CC ID 08324 | Configuration | Preventive | |
Configure the "Remove Security tab" to organizational standards. CC ID 08328 | Configuration | Preventive | |
Configure the "Hide mechanisms to remove zone information" to organizational standards. CC ID 08338 | Configuration | Preventive | |
Configure the "Prevent Codec Download" to organizational standards. CC ID 08554 | Configuration | Preventive | |
Configure File System settings in accordance with organizational standards. CC ID 08294 | Configuration | Preventive | |
Configure Control Panel settings in accordance with organizational standards. CC ID 08311 | Configuration | Preventive | |
Configure the "Screen saver timeout" to organizational standards. CC ID 08312 | Configuration | Preventive | |
Configure the "Enable screen saver" to organizational standards. CC ID 08322 | Configuration | Preventive | |
Configure the "Force specific screen saver" to organizational standards. CC ID 08334 | Configuration | Preventive | |
Configure the "Password protect the screen saver" to organizational standards. CC ID 08341 | Configuration | Preventive | |
Configure the "Prevent changing screen saver" to organizational standards. CC ID 08560 | Configuration | Preventive | |
Configure Capacity and Performance Management settings in accordance with organizational standards. CC ID 08353 | Configuration | Preventive | |
Configure the "Maximum receive size - organization level" to organizational standards. CC ID 08354 | Configuration | Preventive | |
Configure the "Maximum send size - connector level" to organizational standards. CC ID 08399 | Configuration | Preventive | |
Configure the "Maximum number of recipients - organization level" to organizational standards. CC ID 08431 | Configuration | Preventive | |
Configure the "Enable Sender ID agent" to organizational standards. CC ID 08450 | Configuration | Preventive | |
Configure the "Maximum receive size - connector level" to organizational standards. CC ID 08480 | Configuration | Preventive | |
Configure the "Maximum send size - organization level" to organizational standards. CC ID 08483 | Configuration | Preventive | |
Configure the "Mount database at startup" to organizational standards. CC ID 08493 | Configuration | Preventive | |
Configure the "Enable Sender reputation" to organizational standards. CC ID 08503 | Configuration | Preventive | |
Configure the "Mailbox quotas: Issue warning at" to organizational standards. CC ID 08508 | Configuration | Preventive | |
Configure the "Mailbox quotas: Prohibit send and receive at" to organizational standards. CC ID 08532 | Configuration | Preventive | |
Configure the "Mailbox quotas: Prohibit send at" to organizational standards. CC ID 08610 | Configuration | Preventive | |
Configure Personal Information Handling settings in accordance with organizational standards. CC ID 08396 | Configuration | Preventive | |
Configure the "Enable OOF messages to remote domains" to organizational standards. CC ID 08397 | Configuration | Preventive | |
Configure the "Enable automatic forwards to remote domains" to organizational standards. CC ID 08462 | Configuration | Preventive | |
Configure the "Enable non-delivery reports to remote domains" to organizational standards. CC ID 08506 | Configuration | Preventive | |
Configure Data Backup and Recovery settings in accordance with organizational standards. CC ID 08406 | Configuration | Preventive | |
Configure the "Retain deleted items for the specified number of days" to organizational standards. CC ID 08407 | Configuration | Preventive | |
Configure the "Do not permanently delete items until the database has been backed up" to organizational standards. CC ID 08490 | Configuration | Preventive | |
Configure the "Keep deleted mailboxes for the specified number of days" to organizational standards. CC ID 08600 | Configuration | Preventive | |
Configure Nonrepudiation Configuration settings in accordance with organizational standards. CC ID 08432 | Configuration | Preventive | |
Configure the "Configure Sender Filtering" to organizational standards. CC ID 08433 | Configuration | Preventive | |
Configure the "Turn on Administrator Audit Logging" to organizational standards. CC ID 08528 | Configuration | Preventive | |
Configure Device Installation settings in accordance with organizational standards. CC ID 08438 | Configuration | Preventive | |
Configure the "Prevent installation of devices using drivers that match these device setup classes" to organizational standards. CC ID 08439 | Configuration | Preventive | |
Configure the "device installation time-out" setting to organizational standards. CC ID 10781 | Configuration | Preventive | |
Configure the "list of Enhanced Storage devices usable on your computer" setting to organizational standards. CC ID 10791 | Configuration | Preventive | |
Configure the "Display a custom message title when device installation is prevented by a policy setting" setting to organizational standards. CC ID 10885 | Configuration | Preventive | |
Configure the "Do not send a Windows error report when a generic driver is installed on a device" setting to organizational standards. CC ID 10933 | Configuration | Preventive | |
Configure the "Prevent creation of a system restore point during device activity that would normally prompt creation of a restore point" setting to organizational standards. CC ID 11072 | Configuration | Preventive | |
Configure the "Prevent device metadata retrieval from the Internet" setting to organizational standards. CC ID 11073 | Configuration | Preventive | |
Configure the "Prevent installation of devices not described by other policy settings" setting to organizational standards. CC ID 11078 | Configuration | Preventive | |
Configure the "Prevent installation of devices that match any of these device IDs" setting to organizational standards. CC ID 11079 | Configuration | Preventive | |
Configure the "Prevent installation of removable devices" setting to organizational standards. CC ID 11080 | Configuration | Preventive | |
Configure the "Prevent Windows from sending an error report when a device driver requests additional software during installation" setting to organizational standards. CC ID 11093 | Configuration | Preventive | |
Configure the "Require a PIN to access data on devices running Microsoft firmware" setting to organizational standards. CC ID 11132 | Configuration | Preventive | |
Configure the "Specify search order for device driver source locations" setting to organizational standards. CC ID 11214 | Configuration | Preventive | |
Configure the "Turn off "Found New Hardware" balloons during device installation" setting to organizational standards. CC ID 11253 | Configuration | Preventive | |
Configure the "Turn off Autoplay for non-volume devices" setting to organizational standards. CC ID 11268 | Configuration | Preventive | |
Configure the "Turn off Windows Update device driver search prompt" setting to organizational standards. CC ID 11332 | Configuration | Preventive | |
Configure Security settings in accordance with organizational standards. CC ID 08469 | Configuration | Preventive | |
Configure the "Enable automatic replies to remote domains" to organizational standards. CC ID 08534 | Configuration | Preventive | |
Configure Power Management settings in accordance with organizational standards. CC ID 08515 | Configuration | Preventive | |
Configure the "Allow Standby States (S1-S3) When Sleeping (Plugged In)" to organizational standards. CC ID 08516 | Configuration | Preventive | |
Configure the "Allow Standby States (S1-S3) When Sleeping (On Battery)" to organizational standards. CC ID 08581 | Configuration | Preventive | |
Configure the "Allow Applications to Prevent Automatic Sleep (Plugged In)" setting to organizational standards. CC ID 10703 | Configuration | Preventive | |
Configure the "Allow Automatic Sleep with Open Network Files (Plugged In)" setting to organizational standards. CC ID 10709 | Configuration | Preventive | |
Configure the "Allow remote access to the Plug and Play interface" setting to organizational standards. CC ID 10742 | Configuration | Preventive | |
Configure the "Power Options preference logging and tracing" setting to organizational standards. CC ID 10798 | Configuration | Preventive | |
Configure the "Critical Battery Notification Action" setting to organizational standards. CC ID 10833 | Configuration | Preventive | |
Configure the "Critical Battery Notification Level" setting to organizational standards. CC ID 10834 | Configuration | Preventive | |
Configure the "Do not allow supported Plug and Play device redirection" setting to organizational standards. CC ID 10917 | Configuration | Preventive | |
Configure the "Do not turn off system power after a Windows system shutdown has occurred." setting to organizational standards. CC ID 10937 | Configuration | Preventive | |
Configure the "Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates" setting to organizational standards. CC ID 10954 | Configuration | Preventive | |
Configure the "Low Battery Notification Action" setting to organizational standards. CC ID 11037 | Configuration | Preventive | |
Configure the "Low Battery Notification Level" setting to organizational standards. CC ID 11038 | Configuration | Preventive | |
Configure the "Reduce Display Brightness (On Battery)" setting to organizational standards. CC ID 11117 | Configuration | Preventive | |
Configure the "Reduce Display Brightness (Plugged In)" setting to organizational standards. CC ID 11118 | Configuration | Preventive | |
Configure the "Reserve Battery Notification Level" setting to organizational standards. CC ID 11139 | Configuration | Preventive | |
Configure Powershell to organizational standards. CC ID 15233 | Configuration | Preventive | |
Configure the "Run Windows PowerShell scripts first at computer startup, shutdown" setting to organizational standards. CC ID 11156 | Configuration | Preventive | |
Configure the "Run Windows PowerShell scripts first at user logon, logoff" setting to organizational standards. CC ID 11157 | Configuration | Preventive | |
Configure the "Select an Active Power Plan" setting to organizational standards. CC ID 11161 | Configuration | Preventive | |
Configure the "Select the Lid Switch Action (On Battery)" setting to organizational standards. CC ID 11162 | Configuration | Preventive | |
Configure the "Select the Lid Switch Action (Plugged In)" setting to organizational standards. CC ID 11163 | Configuration | Preventive | |
Configure the "Select the Power Button Action (On Battery)" setting to organizational standards. CC ID 11165 | Configuration | Preventive | |
Configure the "Select the Power Button Action (Plugged In)" setting to organizational standards. CC ID 11166 | Configuration | Preventive | |
Configure the "Select the Sleep Button Action (On Battery)" setting to organizational standards. CC ID 11167 | Configuration | Preventive | |
Configure the "Select the Sleep Button Action (Plugged In)" setting to organizational standards. CC ID 11168 | Configuration | Preventive | |
Configure the "Specify a Custom Active Power Plan" setting to organizational standards. CC ID 11207 | Configuration | Preventive | |
Configure the "Specify the Display Dim Brightness (On Battery)" setting to organizational standards. CC ID 11217 | Configuration | Preventive | |
Configure the "Specify the Display Dim Brightness (Plugged In)" setting to organizational standards. CC ID 11218 | Configuration | Preventive | |
Configure the "Specify the System Hibernate Timeout (On Battery)" setting to organizational standards. CC ID 11219 | Configuration | Preventive | |
Configure the "Specify the System Hibernate Timeout (Plugged In)" setting to organizational standards. CC ID 11220 | Configuration | Preventive | |
Configure the "Specify the System Sleep Timeout (On Battery)" setting to organizational standards. CC ID 11221 | Configuration | Preventive | |
Configure the "Specify the System Sleep Timeout (Plugged In)" setting to organizational standards. CC ID 11222 | Configuration | Preventive | |
Configure the "Specify the Unattended Sleep Timeout (On Battery)" setting to organizational standards. CC ID 11223 | Configuration | Preventive | |
Configure the "Specify the Unattended Sleep Timeout (Plugged In)" setting to organizational standards. CC ID 11224 | Configuration | Preventive | |
Configure the "Turn Off Adaptive Display Timeout (On Battery)" setting to organizational standards. CC ID 11259 | Configuration | Preventive | |
Configure the "Turn Off Adaptive Display Timeout (Plugged In)" setting to organizational standards. CC ID 11260 | Configuration | Preventive | |
Configure the "Turn Off Cache Power Mode" setting to organizational standards. CC ID 11270 | Configuration | Preventive | |
Configure the "Turn Off Hybrid Sleep (On Battery)" setting to organizational standards. CC ID 11281 | Configuration | Preventive | |
Configure the "Turn Off Hybrid Sleep (Plugged In)" setting to organizational standards. CC ID 11282 | Configuration | Preventive | |
Configure the "Turn Off Low Battery User Notification" setting to organizational standards. CC ID 11288 | Configuration | Preventive | |
Configure the "Turn Off the Hard Disk (On Battery)" setting to organizational standards. CC ID 11318 | Configuration | Preventive | |
Configure the "Turn Off the Hard Disk (Plugged In)" setting to organizational standards. CC ID 11319 | Configuration | Preventive | |
Configure the "Turn On Desktop Background Slideshow (On Battery)" setting to organizational standards. CC ID 11340 | Configuration | Preventive | |
Configure the "Turn On Desktop Background Slideshow (Plugged In)" setting to organizational standards. CC ID 11341 | Configuration | Preventive | |
Configure the "Turn on the Ability for Applications to Prevent Sleep Transitions (On Battery)" setting to organizational standards. CC ID 11353 | Configuration | Preventive | |
Configure the "Turn on the Ability for Applications to Prevent Sleep Transitions (Plugged In)" setting to organizational standards. CC ID 11354 | Configuration | Preventive | |
Configure Patch Management settings in accordance with organizational standards. CC ID 08519 | Configuration | Preventive | |
Configure "Select when Preview Builds and Feature Updates are received" to organizational standards. CC ID 15399 | Configuration | Preventive | |
Configure "Select when Quality Updates are received" to organizational standards. CC ID 15355 | Configuration | Preventive | |
Configure the "Check for missing Windows Updates" to organizational standards. CC ID 08520 | Configuration | Preventive | |
Configure Start Menu and Task Bar settings in accordance with organizational standards. CC ID 08615 | Configuration | Preventive | |
Configure the "Turn off toast notifications on the lock screen" to organizational standards. CC ID 08616 | Configuration | Preventive | |
Configure "Turn off notifications network usage" to organizational standards. CC ID 15337 | Configuration | Preventive | |
Configure the proxy server to organizational standards. CC ID 12115 | Configuration | Preventive | |
Configure the proxy server to log Transmission Control Protocol sessions. CC ID 12123 | Configuration | Preventive | |
Configure Red Hat Enterprise Linux to Organizational Standards. CC ID 08713 | Establish/Maintain Documentation | Preventive | |
Configure the "GPG Key for package manager" setting to organizational standards. CC ID 08764 | Establish/Maintain Documentation | Preventive | |
Configure the "Support for cramfs filesystems" setting to organizational standards. CC ID 08765 | Establish/Maintain Documentation | Preventive | |
Configure the "Support for freevxfs filesystems" setting to organizational standards. CC ID 08766 | Establish/Maintain Documentation | Preventive | |
Configure the "Support for hfs filesystems" setting to organizational standards. CC ID 08767 | Establish/Maintain Documentation | Preventive | |
Configure the "Support for hfsplus filesystems" setting to organizational standards. CC ID 08768 | Establish/Maintain Documentation | Preventive | |
Configure the "Support for jffs2 filesystems" setting to organizational standards. CC ID 08769 | Establish/Maintain Documentation | Preventive | |
Configure the "Support for squashfs filesystems" setting to organizational standards. CC ID 08770 | Establish/Maintain Documentation | Preventive | |
Configure the "Support for udf filesystems" setting to organizational standards. CC ID 08771 | Establish/Maintain Documentation | Preventive | |
Configure the "NIS file inclusions" setting for the"/etc/group" file to organizational standards. CC ID 08772 | Establish/Maintain Documentation | Preventive | |
Configure the "NIS file inclusions" setting for the"/etc/shadow" file to organizational standards. CC ID 08773 | Establish/Maintain Documentation | Preventive | |
Configure the "setuid" attribute for "all files" to organizational standards. CC ID 08774 | Establish/Maintain Documentation | Preventive | |
Configure the "setgid" attribute for "all files" to organizational standards. CC ID 08775 | Establish/Maintain Documentation | Preventive | |
Configure the "gnome desktop screensaver" setting for "all users" to organizational standards. CC ID 08776 | Establish/Maintain Documentation | Preventive | |
Configure the "screen blanking function of the gnome desktop screensaver" as a "mandatory setting" for "all users" to organizational standards. CC ID 08777 | Establish/Maintain Documentation | Preventive | |
Configure the "device files with the unlabeled SELinux type" setting for "system includes" to organizational standards. CC ID 08778 | Establish/Maintain Documentation | Preventive | |
Configure the "system should act as a network sniffer" setting to organizational standards. CC ID 08779 | Establish/Maintain Documentation | Preventive | |
Configure the "default policy" setting for "iptables INPUT table" to organizational standards. CC ID 08780 | Establish/Maintain Documentation | Preventive | |
Configure the "DCCP" setting to organizational standards. CC ID 08781 | Establish/Maintain Documentation | Preventive | |
Configure the Stream Control Transmission Protocol setting to organizational standards. CC ID 08782 | Establish/Maintain Documentation | Preventive | |
Configure the "RDS" setting to organizational standards. CC ID 08783 | Establish/Maintain Documentation | Preventive | |
Configure the "TIPC" setting to organizational standards. CC ID 08784 | Establish/Maintain Documentation | Preventive | |
Configure the "Bluetooth kernel modules" setting to organizational standards. CC ID 08785 | Establish/Maintain Documentation | Preventive | |
Configure the "Zeroconf networking" setting to organizational standards. CC ID 08786 | Establish/Maintain Documentation | Preventive | |
Configure the "at daemon" setting to organizational standards. CC ID 08787 | Establish/Maintain Documentation | Preventive | |
Configure the "SSH 'keep alive' message count" setting to organizational standards. CC ID 08788 | Establish/Maintain Documentation | Preventive | |
Configure the "set environment options for SSH" setting to organizational standards. CC ID 08789 | Establish/Maintain Documentation | Preventive | |
Configure the Secure Shell setting to organizational standards. CC ID 08790 | Establish/Maintain Documentation | Preventive | |
Configure the "sendmail" setting to organizational standards. CC ID 08791 | Establish/Maintain Documentation | Preventive | |
Configure the "Postfix network listening" setting to organizational standards. CC ID 08792 | Establish/Maintain Documentation | Preventive | |
Configure the "require LDAP servers to use TLS for SSL communications" setting for "LDAP client" to organizational standards. CC ID 08793 | Establish/Maintain Documentation | Preventive | |
Configure the "Client SMB packet signing" setting for "smbclient" to organizational standards. CC ID 08794 | Establish/Maintain Documentation | Preventive | |
Configure the "Client SMB packet signing" setting for "mount.cifs" to organizational standards. CC ID 08795 | Establish/Maintain Documentation | Preventive | |
Configure the "'wheel' group" setting to organizational standards. CC ID 08796 | Establish/Maintain Documentation | Preventive | |
Configure the "Access to the root account via su should be restricted to the wheel group" setting to organizational standards. CC ID 08797 | Establish/Maintain Documentation | Preventive | |
Configure the "retry value" setting to organizational standards. CC ID 08798 | Establish/Maintain Documentation | Preventive | |
Configure the "rsyslog service" setting to organizational standards. CC ID 08799 | Establish/Maintain Documentation | Preventive | |
Configure the "send to a remote log host" setting for "Rsyslog logs" to organizational standards. CC ID 08800 | Establish/Maintain Documentation | Preventive | |
Configure the "accept remote messages" setting for "Rsyslog" to organizational standards. CC ID 08801 | Establish/Maintain Documentation | Preventive | |
Configure the "irda service" setting to organizational standards. CC ID 08802 | Establish/Maintain Documentation | Preventive | |
Configure the "avahi service" firewall setting to organizational standards. CC ID 08803 | Establish/Maintain Documentation | Preventive | |
Configure the "rawdevices service" setting to organizational standards. CC ID 08804 | Establish/Maintain Documentation | Preventive | |
Configure the "login_defs" variable in "libuser.conf" for "libuser library" to organizational standards. CC ID 08805 | Establish/Maintain Documentation | Preventive | |
Configure the "User accounts may or may not be inactivated a specified number of days after account expiration" setting to organizational standards. CC ID 08806 | Establish/Maintain Documentation | Preventive | |
Configure the "duplicate UIDs" setting to organizational standards. CC ID 09930 | Configuration | Preventive | |
Configure the "duplicate GIDs" setting to organizational standards. CC ID 09931 | Configuration | Preventive | |
Configure the "duplicate group names" setting to organizational standards. CC ID 09932 | Configuration | Preventive | |
Configure the "Connection to the Red Hat Network RPM Repositories" setting to organizational standards. CC ID 09933 | Configuration | Preventive | |
Configure the "Obtain Software Package Updates with yum" setting to organizational standards. CC ID 09934 | Configuration | Preventive | |
Configure the "Check for Unconfined Daemons" setting to organizational standards. CC ID 09936 | Configuration | Preventive | |
Configure the "/etc/hosts.allow" file to organizational standards. CC ID 09944 | Configuration | Preventive | |
Configure the "disable system when on audit log is full" setting to organizational standards. CC ID 09945 | Configuration | Preventive | |
Configure the "max_log_file" setting to organizational standards. CC ID 15323 | Configuration | Preventive | |
Configure the "max_log_file_action" setting to organizational standards. CC ID 09946 | Configuration | Preventive | |
Configure the "audit processes that start prior to auditd" setting to organizational standards. CC ID 09947 | Configuration | Preventive | |
Configure the "Password Creation Requirement" settings for "pam_cracklib" to organizational standards. CC ID 09953 | Configuration | Preventive | |
Configure the "System Accounts" setting to organizational standards. CC ID 09954 | Configuration | Preventive | |
Configure the "Verify That Reserved UIDs Are Assigned to System Accounts" setting to organizational standards. CC ID 09955 | Configuration | Preventive | |
Configure the "Check for Duplicate User Names" setting to organizational standards. CC ID 09956 | Configuration | Preventive | |
Configure the "User .forward" files to organizational standards. CC ID 09957 | Configuration | Preventive | |
Configure Polycom HDX to Organizational Standards. CC ID 08986 | Configuration | Preventive | |
Configure the "echo cancellation" setting to organizational standards. CC ID 09359 | Configuration | Preventive | |
Configure the "keyboard noise reduction" setting to organizational standards. CC ID 09360 | Configuration | Preventive | |
Configure the "live music mode" setting to organizational standards. CC ID 09361 | Configuration | Preventive | |
Configure the "VCR audio out always on" setting to organizational standards. CC ID 09362 | Configuration | Preventive | |
Configure the "user alert tone" setting to organizational standards. CC ID 09363 | Configuration | Preventive | |
Configure the "incoming call ring tone" setting to organizational standards. CC ID 09364 | Configuration | Preventive | |
Configure the "keypad audio confirmation" setting to organizational standards. CC ID 09365 | Configuration | Preventive | |
Configure the "allow Microsoft Exchange calendar integration" setting to organizational standards. CC ID 09366 | Configuration | Preventive | |
Configure the "Microsoft Exchange calendar domain" setting to organizational standards. CC ID 09367 | Configuration | Preventive | |
Configure the "Microsoft Exchange calendar password" setting to organizational standards. CC ID 09368 | Configuration | Preventive | |
Configure the "mailbox to be monitored by Microsoft Exchange calendar service" setting to organizational standards. CC ID 09369 | Configuration | Preventive | |
Configure the "Microsoft Exchange calendar server address" setting to organizational standards. CC ID 09370 | Configuration | Preventive | |
Configure the "allow Microsoft Exchange calendar service to display private meetings" setting to organizational standards. CC ID 09371 | Configuration | Preventive | |
Configure the "number of minutes before the meeting to display a reminder" setting to organizational standards. CC ID 09372 | Configuration | Preventive | |
Configure the "play a sound along with the text reminder when the system is not in a call" setting to organizational standards. CC ID 09373 | Configuration | Preventive | |
Configure the "backlight compensation" setting to organizational standards. CC ID 09374 | Configuration | Preventive | |
Configure the "camera pan direction" setting to organizational standards. CC ID 09375 | Configuration | Preventive | |
Configure the "camera presets" setting to organizational standards. CC ID 09376 | Configuration | Preventive | |
Configure the "camera video input type" setting to organizational standards. CC ID 09377 | Configuration | Preventive | |
Configure the "camera input aspect ratio" setting to organizational standards. CC ID 09378 | Configuration | Preventive | |
Configure the "camera input name" setting to organizational standards. CC ID 09379 | Configuration | Preventive | |
Configure the "camera input video quality type" setting to organizational standards. CC ID 09380 | Configuration | Preventive | |
Configure the "primary camera" setting to organizational standards. CC ID 09381 | Configuration | Preventive | |
Configure the "camera quality preference" setting to organizational standards. CC ID 09382 | Configuration | Preventive | |
Configure the "camera power frequency" setting to organizational standards. CC ID 09383 | Configuration | Preventive | |
Configure the "allow camera tracking" setting to organizational standards. CC ID 09384 | Configuration | Preventive | |
Configure the "foreground source for Polycom people on content" setting to organizational standards. CC ID 09385 | Configuration | Preventive | |
Configure the "background source for Polycom people on content" setting to organizational standards. CC ID 09386 | Configuration | Preventive | |
Configure the "country name for the system" setting to organizational standards. CC ID 09387 | Configuration | Preventive | |
Configure the "language for the system local GUI" setting to organizational standards. CC ID 09388 | Configuration | Preventive | |
Configure the "NTP" setting to organizational standards. CC ID 09389 | Configuration | Preventive | |
Configure the "primary NTP server" setting to organizational standards. CC ID 09390 | Configuration | Preventive | |
Configure the "secondary NTP server" setting to organizational standards. CC ID 09391 | Configuration | Preventive | |
Configure the "system day" setting to organizational standards. CC ID 09392 | Configuration | Preventive | |
Configure the "system month" setting to organizational standards. CC ID 09393 | Configuration | Preventive | |
Configure the "system year" setting to organizational standards. CC ID 09394 | Configuration | Preventive | |
Configure the "system hour" setting to organizational standards. CC ID 09395 | Configuration | Preventive | |
Configure the "system minutes" setting to organizational standards. CC ID 09396 | Configuration | Preventive | |
Configure the "system AM or PM" setting to organizational standards. CC ID 09397 | Configuration | Preventive | |
Configure the "system time zone" setting to organizational standards. CC ID 09398 | Configuration | Preventive | |
Configure the "automatically adjust for daylight savings time" setting to organizational standards. CC ID 09399 | Configuration | Preventive | |
Configure the "time format" setting to organizational standards. CC ID 09401 | Configuration | Preventive | |
Configure the "LDAP authentication type" setting to organizational standards. CC ID 09402 | Configuration | Preventive | |
Configure the "LDAP SSL encryption state" setting to organizational standards. CC ID 09403 | Configuration | Preventive | |
Configure the "LDAP base DN" setting to organizational standards. CC ID 09404 | Configuration | Preventive | |
Configure the "LDAP NTLM domain" setting to organizational standards. CC ID 09405 | Configuration | Preventive | |
Configure the "LDAP bind DN" setting to organizational standards. CC ID 09406 | Configuration | Preventive | |
Configure the "LDAP password" setting to organizational standards. CC ID 09407 | Configuration | Preventive | |
Configure the "LDAP server address" setting to organizational standards. CC ID 09408 | Configuration | Preventive | |
Configure the "LDAP server port" setting to organizational standards. CC ID 09409 | Configuration | Preventive | |
Configure the "LDAP user name" setting to organizational standards. CC ID 09410 | Configuration | Preventive | |
Configure the "allow access to a Polycom Global Directory Server" setting to organizational standards. CC ID 09411 | Configuration | Preventive | |
Configure the "server address of a Polycom Global Directory Server" setting to organizational standards. CC ID 09412 | Configuration | Preventive | |
Configure the "maximum international call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09413 | Configuration | Preventive | |
Configure the "maximum internet call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09414 | Configuration | Preventive | |
Configure the "maximum ISDN transmit call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09415 | Configuration | Preventive | |
Configure the "display the system address in a Polycom Global Directory Server" setting to organizational standards. CC ID 09416 | Configuration | Preventive | |
Configure the "retrieval and display of contacts from a Microsoft Lync (Office Communications/OCS) Server" setting to organizational standards. CC ID 09417 | Configuration | Preventive | |
Configure the "prompt the user to add a local address book entry for a far site upon call disconnection" setting to organizational standards. CC ID 09418 | Configuration | Preventive | |
Configure the "prompt the user before allowing a local address book entry to be deleted" setting to organizational standards. CC ID 09419 | Configuration | Preventive | |
Configure the "preview of local address book entries" setting to organizational standards. CC ID 09420 | Configuration | Preventive | |
Configure the "content video adjustment" setting to organizational standards. CC ID 09421 | Configuration | Preventive | |
Configure the "people video adjustment" setting to organizational standards. CC ID 09422 | Configuration | Preventive | |
Configure the "display type" setting to organizational standards. CC ID 09423 | Configuration | Preventive | |
Configure the "display aspect ratio" setting to organizational standards. CC ID 09424 | Configuration | Preventive | |
Configure the "display resolution" setting to organizational standards. CC ID 09425 | Configuration | Preventive | |
Configure the "splash screen on the content monitor" setting to organizational standards. CC ID 09426 | Configuration | Preventive | |
Configure the "VCR/DVD record source" setting to organizational standards. CC ID 09427 | Configuration | Preventive | |
Configure the "screen saver text" setting to organizational standards. CC ID 09428 | Configuration | Preventive | |
Configure the "picture in picture (PIP) placement" setting to organizational standards. CC ID 09429 | Configuration | Preventive | |
Configure the "how to display the time in a call" setting to organizational standards. CC ID 09430 | Configuration | Preventive | |
Configure the "far site name display time in a call" setting to organizational standards. CC ID 09431 | Configuration | Preventive | |
Configure the "allow display of the system name on the home screen" setting to organizational standards. CC ID 09432 | Configuration | Preventive | |
Configure the "allow display of the system date time on the home screen" setting to organizational standards. CC ID 09433 | Configuration | Preventive | |
Configure the "allow display of the system IPv4 address on the home screen" setting to organizational standards. CC ID 09434 | Configuration | Preventive | |
Configure the "allow display of the system H.323 extension (E.164) on the home screen" setting to organizational standards CC ID 09435 | Configuration | Preventive | |
Configure the "allow display of the system do not disturb control on the home screen" setting to organizational standards. CC ID 09436 | Configuration | Preventive | |
Configure the "allow display of the system SIP address on the home screen" setting to organizational standards. CC ID 09437 | Configuration | Preventive | |
Configure the "allow display of the system call quality menu on the home screen" setting to organizational standards. CC ID 09438 | Configuration | Preventive | |
Configure the "output upon screen saver activation for monitor 1" setting to organizational standards. CC ID 09439 | Configuration | Preventive | |
Configure the "output upon screen saver activation for monitor 2" setting to organizational standards. CC ID 09440 | Configuration | Preventive | |
Configure the "QoS type" setting to organizational standards. CC ID 09441 | Configuration | Preventive | |
Configure the "value for DiffServ for video" setting to organizational standards. CC ID 09442 | Configuration | Preventive | |
Configure the "value for DiffServ for audio" setting to organizational standards. CC ID 09443 | Configuration | Preventive | |
Configure the "value for DiffServ for fecc" setting to organizational standards. CC ID 09444 | Configuration | Preventive | |
Configure the "value for IP Precedence for video" setting to organizational standards. CC ID 09445 | Configuration | Preventive | |
Configure the "value for IP Precedence for audio" setting to organizational standards. CC ID 09446 | Configuration | Preventive | |
Configure the "value for IP Precedence for fecc" setting to organizational standards. CC ID 09447 | Configuration | Preventive | |
Configure the "SIP transport protocol" setting to organizational standards. CC ID 09448 | Configuration | Preventive | |
Configure the "SIP registrar server" setting to organizational standards. CC ID 09449 | Configuration | Preventive | |
Configure the "SIP proxy server" setting to organizational standards. CC ID 09450 | Configuration | Preventive | |
Configure the "SIP password" setting to organizational standards. CC ID 09451 | Configuration | Preventive | |
Configure the "allow EAP/802.1X" setting to organizational standards. CC ID 09452 | Configuration | Preventive | |
Configure the "allow 802.1p/Q" setting to organizational standards. CC ID 09453 | Configuration | Preventive | |
Configure the "fixed ports" setting to organizational standards. CC ID 09454 | Configuration | Preventive | |
Configure the "Transmission Control Protocol ports" setting to organizational standards. CC ID 09455 | Configuration | Preventive | |
Configure the "UDP ports" setting to organizational standards. CC ID 09456 | Configuration | Preventive | |
Configure the "system hostname" setting to organizational standards. CC ID 09457 | Configuration | Preventive | |
Configure the "H.323" setting to organizational standards CC ID 09458 | Configuration | Preventive | |
Configure the "allow display of the H.323 extension (E.164) on the local GUI" setting to organizational standards CC ID 09459 | Configuration | Preventive | |
Configure the "H.323 extension (E.164)" setting to organizational standards CC ID 09460 | Configuration | Preventive | |
Configure the "maximum IP call speed to place calls" setting to organizational standards. CC ID 09461 | Configuration | Preventive | |
Configure the "maximum IP call speed to receive calls" setting to organizational standards. CC ID 09462 | Configuration | Preventive | |
Configure the "use Polycom PathNavigator" setting to organizational standards. CC ID 09463 | Configuration | Preventive | |
Configure the "gatekeeper" setting to organizational standards. CC ID 09464 | Configuration | Preventive | |
Configure the "gatekeeper authentication" setting to organizational standards. CC ID 09465 | Configuration | Preventive | |
Configure the "gatekeeper authentication user name" setting to organizational standards. CC ID 09466 | Configuration | Preventive | |
Configure the "gatekeeper authentication password" setting to organizational standards. CC ID 09467 | Configuration | Preventive | |
Configure the "primary gatekeeper address" setting to organizational standards. CC ID 09468 | Configuration | Preventive | |
Configure the "IP gateway" setting to organizational standards. CC ID 09469 | Configuration | Preventive | |
Configure the "ISDN gateway" setting to organizational standards. CC ID 09470 | Configuration | Preventive | |
Configure the "gateway country code" setting to organizational standards. CC ID 09471 | Configuration | Preventive | |
Configure the "gateway area code" setting to organizational standards. CC ID 09472 | Configuration | Preventive | |
Configure the "gateway number" setting to organizational standards. CC ID 09473 | Configuration | Preventive | |
Configure the "gateway extension number" setting to organizational standards. CC ID 09474 | Configuration | Preventive | |
Configure the "gateway dial prefix" setting to organizational standards. CC ID 09475 | Configuration | Preventive | |
Configure the "gateway dial suffix" setting to organizational standards. CC ID 09476 | Configuration | Preventive | |
Configure the "gateway number type" setting to organizational standards. CC ID 09477 | Configuration | Preventive | |
Configure the "number of digits in the DID gateway number (if set to number+extension)" setting to organizational standards. CC ID 09478 | Configuration | Preventive | |
Configure the "gateway dial speed" setting to organizational standards. CC ID 09479 | Configuration | Preventive | |
Configure the "MTU mode assignment type" setting to organizational standards. CC ID 09480 | Configuration | Preventive | |
Configure the "MTU size manually" setting to organizational standards. CC ID 09481 | Configuration | Preventive | |
Configure the "Polycom Video Error Concealment (PVEC)" setting to organizational standards. CC ID 09482 | Configuration | Preventive | |
Configure the "RSVP" setting to organizational standards. CC ID 09483 | Configuration | Preventive | |
Configure the "dynamic bandwidth" setting to organizational standards. CC ID 09484 | Configuration | Preventive | |
Configure the "maximum transmit bandwidth" setting to organizational standards. CC ID 09485 | Configuration | Preventive | |
Configure the "maximum receive bandwidth" setting to organizational standards. CC ID 09486 | Configuration | Preventive | |
Configure the "NAT configuration type" setting to organizational standards. CC ID 09487 | Configuration | Preventive | |
Configure the "NAT public WAN address" setting to organizational standards. CC ID 09488 | Configuration | Preventive | |
Configure the "NAT to be H.323 compatible" setting to organizational standards CC ID 09489 | Configuration | Preventive | |
Configure the "which NAT address to be displayed in the Polycom Global Directory Server" setting to organizational standards. CC ID 09490 | Configuration | Preventive | |
Configure the "ISDN interface" setting to organizational standards. CC ID 09491 | Configuration | Preventive | |
Configure the "ISDN BRI switch type" setting to organizational standards. CC ID 09492 | Configuration | Preventive | |
Configure the "all ISDN BRI lines" setting to organizational standards. CC ID 09493 | Configuration | Preventive | |
Configure the "ISDN BRI line 1" setting to organizational standards. CC ID 09494 | Configuration | Preventive | |
Configure the "ISDN BRI line 2" setting to organizational standards. CC ID 09495 | Configuration | Preventive | |
Configure the "ISDN BRI line 3" setting to organizational standards. CC ID 09496 | Configuration | Preventive | |
Configure the "ISDN BRI line 4" setting to organizational standards. CC ID 09497 | Configuration | Preventive | |
Configure the "ISDN BRI country code" setting to organizational standards. CC ID 09498 | Configuration | Preventive | |
Configure the "ISDN BRI area code" setting to organizational standards. CC ID 09499 | Configuration | Preventive | |
Configure the "ISDN BRI number 1a" setting to organizational standards. CC ID 09500 | Configuration | Preventive | |
Configure the "ISDN BRI number 1b" setting to organizational standards. CC ID 09501 | Configuration | Preventive | |
Configure the "ISDN BRI number 2a" setting to organizational standards. CC ID 09502 | Configuration | Preventive | |
Configure the "ISDN BRI number 2b" setting to organizational standards. CC ID 09503 | Configuration | Preventive | |
Configure the "ISDN BRI number 3a" setting to organizational standards. CC ID 09504 | Configuration | Preventive | |
Configure the "ISDN BRI number 3b" setting to organizational standards. CC ID 09505 | Configuration | Preventive | |
Configure the "ISDN BRI number 4a" setting to organizational standards. CC ID 09506 | Configuration | Preventive | |
Configure the "ISDN BRI number 4b" setting to organizational standards. CC ID 09507 | Configuration | Preventive | |
Configure the "auto BRI setting that allows SPID numbers to be assigned in NI1 or NI2" setting to organizational standards. CC ID 09508 | Configuration | Preventive | |
Configure the "ISDN BRI SPID number 1a" setting to organizational standards. CC ID 09509 | Configuration | Preventive | |
Configure the "ISDN BRI SPID number 1b" setting to organizational standards. CC ID 09510 | Configuration | Preventive | |
Configure the "ISDN BRI SPID number 2a" setting to organizational standards. CC ID 09511 | Configuration | Preventive | |
Configure the "ISDN BRI SPID number 2b" setting to organizational standards. CC ID 09512 | Configuration | Preventive | |
Configure the "ISDN BRI SPID number 3a" setting to organizational standards. CC ID 09513 | Configuration | Preventive | |
Configure the "ISDN BRI SPID number 3b" setting to organizational standards. CC ID 09514 | Configuration | Preventive | |
Configure the "ISDN BRI SPID number 4a" setting to organizational standards. CC ID 09515 | Configuration | Preventive | |
Configure the "ISDN BRI SPID number 4b" setting to organizational standards. CC ID 09516 | Configuration | Preventive | |
Configure the "ISDN PRI switch type" setting to organizational standards. CC ID 09517 | Configuration | Preventive | |
Configure the "ISDN PRI call by call value" setting to organizational standards. CC ID 09518 | Configuration | Preventive | |
Configure the "each ISDN PRI channels" setting to organizational standards. CC ID 09519 | Configuration | Preventive | |
Configure the "ISDN PRI T1 CSU mode type" setting to organizational standards. CC ID 09520 | Configuration | Preventive | |
Configure the "number of ISDN PRI channels allowed to be dialed in parallel" setting to organizational standards. CC ID 09521 | Configuration | Preventive | |
Configure the "ISDN PRI international prefix" setting to organizational standards. CC ID 09522 | Configuration | Preventive | |
Configure the "ISDN PRI T1 line buildout for internal CSUs" setting to organizational standards. CC ID 09523 | Configuration | Preventive | |
Configure the "ISDN PRI T1 line buildout for external CSUs" setting to organizational standards. CC ID 09524 | Configuration | Preventive | |
Configure the "ISDN PRI line signal" setting to organizational standards. CC ID 09525 | Configuration | Preventive | |
Configure the "ISDN PRI numbering plan" setting to organizational standards. CC ID 09526 | Configuration | Preventive | |
Configure the "ISDN PRI outside line number" setting to organizational standards. CC ID 09527 | Configuration | Preventive | |
Configure the "ISDN PRI number" setting to organizational standards. CC ID 09528 | Configuration | Preventive | |
Configure the "V.35" setting to organizational standards CC ID 09529 | Configuration | Preventive | |
Configure the "V.35 number for port 1" setting to organizational standards CC ID 09530 | Configuration | Preventive | |
Configure the "V.35 number for port 2" setting to organizational standards CC ID 09531 | Configuration | Preventive | |
Configure the "V.35 prefix" setting to organizational standards CC ID 09532 | Configuration | Preventive | |
Configure the "V.35 suffix" setting to organizational standards CC ID 09533 | Configuration | Preventive | |
Configure the "V.35 CTS" setting to organizational standards CC ID 09534 | Configuration | Preventive | |
Configure the "V.35 DCD filter" setting to organizational standards CC ID 09535 | Configuration | Preventive | |
Configure the "V.35 DCD" setting to organizational standards CC ID 09536 | Configuration | Preventive | |
Configure the "V.35 DSR answer" setting to organizational standards CC ID 09537 | Configuration | Preventive | |
Configure the "V.35 DSR" setting to organizational standards CC ID 09538 | Configuration | Preventive | |
Configure the "V.35 DTR" setting to organizational standards CC ID 09539 | Configuration | Preventive | |
Configure the "V.35 RT" setting to organizational standards CC ID 09540 | Configuration | Preventive | |
Configure the "V.35 RTS" setting to organizational standards CC ID 09541 | Configuration | Preventive | |
Configure the "V.35 ST" setting to organizational standards CC ID 09542 | Configuration | Preventive | |
Configure the "V.35 broadcast mode" setting to organizational standards CC ID 09543 | Configuration | Preventive | |
Configure the "RS-366 dialing" setting to organizational standards. CC ID 09544 | Configuration | Preventive | |
Configure the "V.35 protocol used " setting to organizational standards CC ID 09545 | Configuration | Preventive | |
Configure the "V.35 profile used " setting to organizational standards CC ID 09546 | Configuration | Preventive | |
Configure the "V.35 H.331 audio mode" setting to organizational standards CC ID 09547 | Configuration | Preventive | |
Configure the "V.35 H.331 dual stream" setting to organizational standards CC ID 09548 | Configuration | Preventive | |
Configure the "V.35 H.331 frame rate" setting to organizational standards CC ID 09549 | Configuration | Preventive | |
Configure the "V.35 H.331 video format" setting to organizational standards CC ID 09550 | Configuration | Preventive | |
Configure the "V.35 H.331 video protocol" setting to organizational standards CC ID 09551 | Configuration | Preventive | |
Configure the "IPv4 address assignment method" setting to organizational standards. CC ID 09552 | Configuration | Preventive | |
Configure the "IPv4 address" setting to organizational standards. CC ID 09553 | Configuration | Preventive | |
Configure the "default gateway" setting to organizational standards. CC ID 09554 | Configuration | Preventive | |
Configure the "IPv4 subnet mask" setting to organizational standards. CC ID 09555 | Configuration | Preventive | |
Configure IPv6 extension headers to organizational standards. CC ID 16398 | Configuration | Preventive | |
Configure the "IPv6 address assignment method" setting to organizational standards. CC ID 09556 | Configuration | Preventive | |
Configure the "IPv6 link-local address" setting to organizational standards. CC ID 09557 | Configuration | Preventive | |
Configure the "IPv6 site-local address" setting to organizational standards. CC ID 09558 | Configuration | Preventive | |
Configure the "IPv6 global address" setting to organizational standards. CC ID 09559 | Configuration | Preventive | |
Configure the "default gateway" setting for "IPv6" to organizational standards. CC ID 09560 | Configuration | Preventive | |
Configure the "system domain name" setting to organizational standards. CC ID 09561 | Configuration | Preventive | |
Configure the "primary DNS server address" setting to organizational standards. CC ID 09562 | Configuration | Preventive | |
Configure the "secondary DNS server address" setting to organizational standards. CC ID 09563 | Configuration | Preventive | |
Configure the "third DNS server address" setting to organizational standards. CC ID 09564 | Configuration | Preventive | |
Configure the "fourth DNS server address" setting to organizational standards. CC ID 09565 | Configuration | Preventive | |
Configure the "system LAN speed" setting to organizational standards. CC ID 09566 | Configuration | Preventive | |
Configure the "system duplex mode" setting to organizational standards. CC ID 09567 | Configuration | Preventive | |
Configure the "system to ignore redirect messages" setting to organizational standards. CC ID 09568 | Configuration | Preventive | |
Configure the "system ICMP transmission rate limit (in milliseconds)" setting to organizational standards. CC ID 09569 | Configuration | Preventive | |
Configure the "generate destination unreachable messages" setting to organizational standards. CC ID 09570 | Configuration | Preventive | |
Configure the "respond to broadcast and multicast echo requests" setting to organizational standards. CC ID 09571 | Configuration | Preventive | |
Configure the "IPv6 DAD transmit count" setting to organizational standards. CC ID 09572 | Configuration | Preventive | |
Configure the "phone number of the room where the system is located" setting to organizational standards. CC ID 09573 | Configuration | Preventive | |
Configure the "GMS tech support contact name" setting to organizational standards. CC ID 09574 | Configuration | Preventive | |
Configure the "GMS tech support contact email" setting to organizational standards. CC ID 09575 | Configuration | Preventive | |
Configure the "GMS tech support contact phone number" setting to organizational standards. CC ID 09576 | Configuration | Preventive | |
Configure the "GMS tech support contact fax number" setting to organizational standards. CC ID 09577 | Configuration | Preventive | |
Configure the "GMS tech support contact city" setting to organizational standards. CC ID 09578 | Configuration | Preventive | |
Configure the "GMS tech support contact state" setting to organizational standards. CC ID 09579 | Configuration | Preventive | |
Configure the "GMS tech support contact country" setting to organizational standards. CC ID 09580 | Configuration | Preventive | |
Configure the "security profile" setting to organizational standards. CC ID 09581 | Configuration | Preventive | |
Configure the "allow PC LAN port access" setting to organizational standards. CC ID 09582 | Configuration | Preventive | |
Configure the "require certificate validation for web server" setting to organizational standards. CC ID 09583 | Configuration | Preventive | |
Configure the "require certificate validation for peer client applications" setting to organizational standards. CC ID 09584 | Configuration | Preventive | |
Configure the "maximum peer certificate chain depth" setting to organizational standards. CC ID 09585 | Configuration | Preventive | |
Configure the "certificate revocation method" setting to organizational standards. CC ID 09586 | Configuration | Preventive | |
Configure the "allow incomplete revocation checks" setting to organizational standards. CC ID 09587 | Configuration | Preventive | |
Configure the "the global responder specified in the certificate" setting to organizational standards. CC ID 09588 | Configuration | Preventive | |
Configure the "require login for system access" setting to organizational standards. CC ID 09589 | Configuration | Preventive | |
Configure the "allow the local password to be used for remote access" setting to organizational standards. CC ID 09590 | Configuration | Preventive | |
Configure the "allow remote access via web" setting to organizational standards. CC ID 09591 | Configuration | Preventive | |
Configure the "web access port number" setting to organizational standards. CC ID 09592 | Configuration | Preventive | |
Configure the "require whitelist" setting to organizational standards. CC ID 09593 | Configuration | Preventive | |
Configure the "allow remote access via telnet" setting to organizational standards. CC ID 09594 | Configuration | Preventive | |
Configure the "allow remote access via SNMP" setting to organizational standards. CC ID 09595 | Configuration | Preventive | |
Configure the "allow video display on the web" setting to organizational standards. CC ID 09596 | Configuration | Preventive | |
Configure the "require display of a security banner upon login" setting to organizational standards. CC ID 09597 | Configuration | Preventive | |
Configure the "custom text for the local security banner" setting to organizational standards. CC ID 09598 | Configuration | Preventive | |
Configure the "custom text for the web security banner" setting to organizational standards. CC ID 09599 | Configuration | Preventive | |
Configure the "allow a non-admin user to make changes to the local system address book" setting to organizational standards. CC ID 09600 | Configuration | Preventive | |
Configure the "allow a non-admin user to make changes to the camera presets" setting to organizational standards. CC ID 09601 | Configuration | Preventive | |
Configure the "allow mixed protocol (IP and ISDN) multipoint calls" setting to organizational standards. CC ID 09602 | Configuration | Preventive | |
Configure the "require Active Directory authentication" setting to organizational standards. CC ID 09603 | Configuration | Preventive | |
Configure the "Active Directory server address" setting to organizational standards. CC ID 09604 | Configuration | Preventive | |
Configure the "Active Directory admin group" setting to organizational standards. CC ID 09605 | Configuration | Preventive | |
Configure the "Active Directory user group" setting to organizational standards. CC ID 09606 | Configuration | Preventive | |
Configure the "require admin password for remote login" setting to organizational standards. CC ID 09607 | Configuration | Preventive | |
Configure the "RS-232 serial port access mode" setting to organizational standards. CC ID 09608 | Configuration | Preventive | |
Configure the "RS-232 serial port baud rate" setting to organizational standards. CC ID 09609 | Configuration | Preventive | |
Configure the "require AES encryption" setting to organizational standards. CC ID 09610 | Configuration | Preventive | |
Configure the "SIP" setting to organizational standards. CC ID 09611 | Configuration | Preventive | |
Configure the "allow recent call list to be accessible" setting to organizational standards. CC ID 09612 | Configuration | Preventive | |
Configure the "allow the last number dialed to be accessible" setting to organizational standards. CC ID 09613 | Configuration | Preventive | |
Configure the "allow far end control of the near camera" setting to organizational standards. CC ID 09614 | Configuration | Preventive | |
Configure the "allow a call detail report to be created and maintained" setting to organizational standards. CC ID 09615 | Configuration | Preventive | |
Configure the "Availability Control (Do Not Disturb) for all calls" setting to organizational standards. CC ID 09616 | Configuration | Preventive | |
Configure the "Do Not Disturb only for point to point calls" setting to organizational standards. CC ID 09617 | Configuration | Preventive | |
Configure the "Do Not Disturb only for multipoint calls" setting to organizational standards. CC ID 09618 | Configuration | Preventive | |
Configure the "require the admin account to be locked after a certain number of failed login attempts" setting to organizational standards. CC ID 09619 | Configuration | Preventive | |
Configure the "admin account lock duration (in minutes)" setting to organizational standards. CC ID 09620 | Configuration | Preventive | |
Configure the "require the user account to be locked after a certain number of unsuccessful logon attempts" setting to organizational standards. CC ID 09621 | Configuration | Preventive | |
Configure the "user account lock duration (in minutes)" setting to organizational standards. CC ID 09622 | Configuration | Preventive | |
Configure the "idle session timeout (in minutes)" setting to organizational standards. CC ID 09623 | Configuration | Preventive | |
Configure the "monitoring of inactive web sessions " setting to organizational standards. CC ID 09624 | Configuration | Preventive | |
Configure the "list of all sessions (local, web and serial) visible on the local or web GUI" setting to organizational standards. CC ID 09625 | Configuration | Preventive | |
Configure the "maximum number of concurrent active web sessions" setting to organizational standards. CC ID 09626 | Configuration | Preventive | |
Configure the "number of failed login attempts on the web interface and serial port (port lockout) after which the interface will be locked" setting to organizational standards. CC ID 09627 | Configuration | Preventive | |
Configure the "web interface and serial port (port lockout) lock duration should (in minutes) be configured" setting to organizational standards. CC ID 09628 | Configuration | Preventive | |
Configure the "local (room) admin password" setting to organizational standards. CC ID 09629 | Configuration | Preventive | |
Configure the "remote access admin password" setting to organizational standards. CC ID 09630 | Configuration | Preventive | |
Configure the "local (room) user password" setting to organizational standards. CC ID 09631 | Configuration | Preventive | |
Configure the "meeting password" setting to organizational standards. CC ID 09632 | Configuration | Preventive | |
Configure the "MCU password" setting to organizational standards. CC ID 09633 | Configuration | Preventive | |
Configure the "minimum length required for a local (room) admin password" setting to organizational standards. CC ID 09634 | Configuration | Preventive | |
Configure the "require that the local (room) admin password contain lower case characters" setting to organizational standards. CC ID 09635 | Configuration | Preventive | |
Configure the "require that the local (room) admin password contain upper case characters" setting to organizational standards. CC ID 09636 | Configuration | Preventive | |
Configure the "require that the local (room) admin password contain numbers" setting to organizational standards. CC ID 09637 | Configuration | Preventive | |
Configure the "require that the local (room) admin password contain special characters" setting to organizational standards. CC ID 09638 | Configuration | Preventive | |
Configure the "reject a certain number of previous local (room) admin passwords when creating a new password" setting to organizational standards. CC ID 09639 | Configuration | Preventive | |
Configure the "minimum age for the local (room) admin password before it can be changed" setting to organizational standards. CC ID 09640 | Configuration | Preventive | |
Configure the "maximum age for the local (room) admin password after which it must be changed" setting to organizational standards. CC ID 09641 | Configuration | Preventive | |
Configure the "how many days ahead of time a password expiration warning should be provided when the local (room) admin password is about to expire" setting to organizational standards. CC ID 09642 | Configuration | Preventive | |
Configure the "minimum number of characters that must be changed when creating a new local (room) admin password" setting to organizational standards. CC ID 09643 | Configuration | Preventive | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new local (room) admin password" setting to organizational standards. CC ID 09644 | Configuration | Preventive | |
Configure the "the local (room) admin password can contain the admin account name or the reverse of the account name" setting to organizational standards. CC ID 09645 | Configuration | Preventive | |
Configure the "minimum length required for a remote admin password" setting to organizational standards. CC ID 09646 | Configuration | Preventive | |
Configure the "require that the remote admin password contain lower case characters" setting to organizational standards. CC ID 09647 | Configuration | Preventive | |
Configure the "require that the remote admin password contain upper case characters" setting to organizational standards. CC ID 09648 | Configuration | Preventive | |
Configure the "require that the remote admin password contain numbers" setting to organizational standards. CC ID 09649 | Configuration | Preventive | |
Configure the "require that the remote admin password contain special characters" setting to organizational standards. CC ID 09650 | Configuration | Preventive | |
Configure the "reject a certain number of previous remote admin passwords when creating a new password" setting to organizational standards. CC ID 09651 | Configuration | Preventive | |
Configure the "minimum age for the remote admin password before it can be changed" setting to organizational standards. CC ID 09652 | Configuration | Preventive | |
Configure the "maximum age for the remote admin password after which it must be changed" setting to organizational standards. CC ID 09653 | Configuration | Preventive | |
Configure the "how many days ahead of time a password expiration warning should be provided when the remote admin password is about to expire" setting to organizational standards. CC ID 09654 | Configuration | Preventive | |
Configure the "minimum number of characters that must be changed when creating a new remote admin password" setting to organizational standards. CC ID 09655 | Configuration | Preventive | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new remote admin password" setting to organizational standards. CC ID 09656 | Configuration | Preventive | |
Configure the "remote admin password can contain the admin account name or the reverse of the account name" setting to organizational standards. CC ID 09657 | Configuration | Preventive | |
Configure the "minimum length required for a local (room) user password" setting to organizational standards. CC ID 09658 | Configuration | Preventive | |
Configure the "require that the local (room) user password contain lower case characters" setting to organizational standards. CC ID 09659 | Configuration | Preventive | |
Configure the "require that the local (room) user password contain upper case characters" setting to organizational standards. CC ID 09660 | Configuration | Preventive | |
Configure the "require that the local (room) user password contain numbers" setting to organizational standards. CC ID 09661 | Configuration | Preventive | |
Configure the "require that the local (room) user password contain special characters" setting to organizational standards. CC ID 09662 | Configuration | Preventive | |
Configure the "reject a certain number of previous local (room) user passwords when creating a new password" setting to organizational standards. CC ID 09663 | Configuration | Preventive | |
Configure the "minimum age for the local (room) user password before it can be changed" setting to organizational standards. CC ID 09664 | Configuration | Preventive | |
Configure the "maximum age for the local (room) user password after which it must be changed" setting to organizational standards. CC ID 09665 | Configuration | Preventive | |
Configure the "how many days ahead of time a password expiration warning should be provided when the local (room) user password is about to expire" setting to organizational standards. CC ID 09666 | Configuration | Preventive | |
Configure the "minimum number of characters that must be changed when creating a new local (room) user password" setting to organizational standards. CC ID 09667 | Configuration | Preventive | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new local (room) user password" setting to organizational standards. CC ID 09668 | Configuration | Preventive | |
Configure the "the local (room) user password can contain the user account name or the reverse of the account name" setting to organizational standards. CC ID 09669 | Configuration | Preventive | |
Configure the "minimum length required for a meeting password" setting to organizational standards. CC ID 09670 | Configuration | Preventive | |
Configure the "require that the meeting password contain lower case characters" setting to organizational standards. CC ID 09671 | Configuration | Preventive | |
Configure the "require that the meeting password contain upper case characters" setting to organizational standards. CC ID 09672 | Configuration | Preventive | |
Configure the "require that the meeting password contain numbers" setting to organizational standards. CC ID 09673 | Configuration | Preventive | |
Configure the "require that the meeting password contain special characters" setting to organizational standards. CC ID 09674 | Configuration | Preventive | |
Configure the "reject a certain number of previous meeting passwords when creating a new meeting password" setting to organizational standards. CC ID 09675 | Configuration | Preventive | |
Configure the "minimum age for the meeting password before it can be changed" setting to organizational standards. CC ID 09676 | Configuration | Preventive | |
Configure the "maximum age for the meeting password after which it must be changed" setting to organizational standards. CC ID 09677 | Configuration | Preventive | |
Configure the "how many days ahead of time a password expiration warning should be provided when the meeting password is about to expire" setting to organizational standards. CC ID 09678 | Configuration | Preventive | |
Configure the "minimum number of characters that must be changed when creating a new meeting password" setting to organizational standards. CC ID 09679 | Configuration | Preventive | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new meeting password" setting to organizational standards. CC ID 09680 | Configuration | Preventive | |
Configure the "allow access to security related settings by non-admin users" setting to organizational standards. CC ID 09681 | Configuration | Preventive | |
Configure the "NTLM version" setting to organizational standards. CC ID 09682 | Configuration | Preventive | |
Configure the "folder name to be used when downloading log files" setting to organizational standards. CC ID 09683 | Configuration | Preventive | |
Configure the "percent filled threshold above which a warning will be provided if log files exceed it" setting to organizational standards. CC ID 09684 | Configuration | Preventive | |
Configure the "frequency of transferring logs to a storage device then deleting the logs from the system" setting to organizational standards. CC ID 09685 | Configuration | Preventive | |
Configure the "show content immediately upon connecting a computer to the system" setting to organizational standards. CC ID 09686 | Configuration | Preventive | |
Configure the "require an account number to dial a call" setting to organizational standards. CC ID 09687 | Configuration | Preventive | |
Configure the "require validation of an account number before allowing a call to be dialed" setting to organizational standards. CC ID 09688 | Configuration | Preventive | |
Configure the "maximum time that a call can be connected" setting to organizational standards. CC ID 09689 | Configuration | Preventive | |
Configure the "mute a call that is auto answered" setting to organizational standards. CC ID 09690 | Configuration | Preventive | |
Configure the "H.460 firewall traversal" setting to organizational standards CC ID 09691 | Configuration | Preventive | |
Configure the "POTS" setting to organizational standards. CC ID 09692 | Configuration | Preventive | |
Configure the "POTS area code manually" setting to organizational standards. CC ID 09693 | Configuration | Preventive | |
Configure the "POTS number manually" setting to organizational standards. CC ID 09694 | Configuration | Preventive | |
Configure the "allow a Polycom Touch Control panel to pair with the system" setting to organizational standards. CC ID 09695 | Configuration | Preventive | |
Configure the "screen saver wait time" setting to organizational standards. CC ID 09696 | Configuration | Preventive | |
Configure the "video call dial order" setting to organizational standards. CC ID 09697 | Configuration | Preventive | |
Configure the "voice call dial order" setting to organizational standards. CC ID 09698 | Configuration | Preventive | |
Configure the "diagnostic (basic) mode" setting to organizational standards. CC ID 09699 | Configuration | Preventive | |
Configure the "dual monitor emulation" setting to organizational standards. CC ID 09700 | Configuration | Preventive | |
Configure the "H.239" setting to organizational standards CC ID 09701 | Configuration | Preventive | |
Configure the "VGA quality preference" setting to organizational standards. CC ID 09702 | Configuration | Preventive | |
Configure the "power button on the IR remote control" setting to organizational standards. CC ID 09703 | Configuration | Preventive | |
Configure the "numeric keypad function on the IR remote control" setting to organizational standards. CC ID 09704 | Configuration | Preventive | |
Configure the "allow use of a non-Polycom IR remote control" setting to organizational standards. CC ID 09705 | Configuration | Preventive | |
Configure the "channel ID for the IR remote control" setting to organizational standards. CC ID 09706 | Configuration | Preventive | |
Configure the "transcoding" setting to organizational standards. CC ID 09707 | Configuration | Preventive | |
Configure the "allow the system to dial any calls" setting to organizational standards. CC ID 09708 | Configuration | Preventive | |
Configure the "preferred dialing method" setting to organizational standards. CC ID 09709 | Configuration | Preventive | |
Configure the "domain of the provisioning server" setting to organizational standards. CC ID 09710 | Configuration | Preventive | |
Configure the "user name to connect to the provisioning server" setting to organizational standards. CC ID 09711 | Configuration | Preventive | |
Configure the "password to connect to the provisioning server" setting to organizational standards. CC ID 09712 | Configuration | Preventive | |
Configure the "server address of the provisioning server" setting to organizational standards. CC ID 09713 | Configuration | Preventive | |
Configure the "SNMP admin name" setting to organizational standards. CC ID 09714 | Configuration | Preventive | |
Configure the "SNMP community name" setting to organizational standards. CC ID 09715 | Configuration | Preventive | |
Configure the "SNMP console address" setting to organizational standards. CC ID 09716 | Configuration | Preventive | |
Configure the "SNMP location" setting to organizational standards. CC ID 09717 | Configuration | Preventive | |
Configure the "SNMP system description" setting to organizational standards. CC ID 09718 | Configuration | Preventive | |
Configure the "SNMP trap version" setting to organizational standards. CC ID 09719 | Configuration | Preventive | |
Configure Apache and Tomcat to Organizational Standards. CC ID 08987 | Configuration | Preventive | |
Configure the "demo CGI printenv.pl" setting to organizational standards. CC ID 08993 | Configuration | Preventive | |
Configure the "testcgi" setting to organizational standards. CC ID 08994 | Configuration | Preventive | |
Configure the "FollowSymLinks" setting for the "DocumentRoot" to organizational standards. CC ID 08995 | Configuration | Preventive | |
Configure the "IncludesNOEXEC" setting for the "DocumentRoot" to organizational standards. CC ID 08996 | Configuration | Preventive | |
Configure the "Indexes" setting for the "DocumentRoot" to organizational standards. CC ID 08997 | Configuration | Preventive | |
Configure the "Allow" setting for the "OS root" to organizational standards. CC ID 08998 | Configuration | Preventive | |
Configure the "Allow" setting to organizational standards. CC ID 08999 | Configuration | Preventive | |
Configure the "KeepAlive" setting to organizational standards. CC ID 09000 | Configuration | Preventive | |
Configure the "KeepAliveTimeout" setting to organizational standards. CC ID 09001 | Configuration | Preventive | |
Configure the "LimitRequestBody" setting to organizational standards. CC ID 09002 | Configuration | Preventive | |
Configure the "LimitRequestFields" setting to organizational standards. CC ID 09003 | Configuration | Preventive | |
Configure the "LimitRequestFieldSizeBody" setting to organizational standards. CC ID 09004 | Configuration | Preventive | |
Configure the "LimitRequestline" setting to organizational standards. CC ID 09005 | Configuration | Preventive | |
Configure the "loglevel" setting to organizational standards. CC ID 09006 | Configuration | Preventive | |
Configure the "MaxClients" setting to organizational standards. CC ID 09007 | Configuration | Preventive | |
Configure the "ServerTokens" setting to organizational standards. CC ID 09008 | Configuration | Preventive | |
Configure the "Timeout" setting to organizational standards. CC ID 09009 | Configuration | Preventive | |
Configure the "apache access log file" setting to organizational standards. CC ID 09010 | Configuration | Preventive | |
Configure the "AllowOverride" for "OS root" to organizational standards. CC ID 09011 | Configuration | Preventive | |
Configure the "AllowOverride" setting for "web site root directories" to organizational standards. CC ID 09012 | Configuration | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 400 errors" to organizational standards. CC ID 09013 | Configuration | Preventive | |
Configure the "Group" setting to organizational standards. CC ID 09014 | Configuration | Preventive | |
Configure the "runtime rewriting engine" setting to organizational standards. CC ID 09015 | Configuration | Preventive | |
Configure the "ServerSignature" setting to organizational standards. CC ID 09016 | Configuration | Preventive | |
Configure the "apache system logging" setting to organizational standards. CC ID 09017 | Configuration | Preventive | |
Configure the "User" setting to organizational standards. CC ID 09019 | Configuration | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 401 errors" to organizational standards. CC ID 09020 | Configuration | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 403 errors" to organizational standards. CC ID 09021 | Configuration | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 404 errors" to organizational standards. CC ID 09022 | Configuration | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 405 errors" to organizational standards. CC ID 09023 | Configuration | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 500 errors" to organizational standards. CC ID 09024 | Configuration | Preventive | |
Configure the "Deny" setting for the "OS root" to organizational standards. CC ID 09025 | Configuration | Preventive | |
Configure the "Deny" setting to organizational standards. CC ID 09026 | Configuration | Preventive | |
Configure the "error log file" setting to organizational standards. CC ID 09040 | Configuration | Preventive | |
Configure the "Includes" setting for the "DocumentRoot" to organizational standards. CC ID 09046 | Configuration | Preventive | |
Configure the "MultiViews" setting for the "DocumentRoot" to organizational standards. CC ID 09047 | Configuration | Preventive | |
Configure the "Order" setting for the "OS root" to organizational standards. CC ID 09048 | Configuration | Preventive | |
Configure the "permitted HTTP request methods" setting to organizational standards. CC ID 09049 | Configuration | Preventive | |
Configure the "httpd.conf" file to organizational standards. CC ID 09050 | Configuration | Preventive | |
Configure the "htpasswd" file to organizational standards. CC ID 09053 | Configuration | Preventive | |
Configure the "Server Administrator email address" setting to organizational standards. CC ID 09054 | Configuration | Preventive | |
Configure the "StartServers" setting to organizational standards. CC ID 09060 | Configuration | Preventive | |
Configure the "MinSpareServers" setting to organizational standards. CC ID 09061 | Configuration | Preventive | |
Configure the "MaxSpareServers" setting to organizational standards. CC ID 09062 | Configuration | Preventive | |
Configure the "ExecCGI" setting for the "DocumentRoot" to organizational standards. CC ID 09063 | Configuration | Preventive | |
Configure the "Order" setting for "all DocumentRoots" to organizational standards. CC ID 09064 | Configuration | Preventive | |
Configure the "Order" setting to organizational standards. CC ID 09065 | Configuration | Preventive | |
Configure the "action directive" setting to organizational standards. CC ID 09066 | Configuration | Preventive | |
Configure the "AddHandler directive" setting to organizational standards. CC ID 09067 | Configuration | Preventive | |
Configure the "Anonymous sharing of Apache's web content directories with nfs" setting to organizational standards. CC ID 09068 | Configuration | Preventive | |
Configure the "Anonymous sharing of Apache's web content directories with smb" setting to organizational standards. CC ID 09069 | Configuration | Preventive | |
Configure the "MaxKeepAliveRequests" setting to organizational standards. CC ID 09070 | Configuration | Preventive | |
Configure the "log_config_module" setting to organizational standards. CC ID 09072 | Configuration | Preventive | |
Configure the "disallow paths and files" setting for "robots.txt" to organizational standards. CC ID 09105 | Configuration | Preventive | |
Configure the "ssl_module" setting to organizational standards. CC ID 09106 | Configuration | Preventive | |
Configure the "SSLProtocol" setting to organizational standards. CC ID 09107 | Configuration | Preventive | |
Configure the "SSLEngine" setting to organizational standards. CC ID 09108 | Configuration | Preventive | |
Configure the "apache online manual" setting to organizational standards. CC ID 09109 | Configuration | Preventive | |
Configure the "FollowSymLinks" setting for "all options directives" to organizational standards. CC ID 09110 | Configuration | Preventive | |
Configure the "Includes" setting for "all options directives" to organizational standards. CC ID 09111 | Configuration | Preventive | |
Configure the "IncludesNoExec" setting for "all options directives" to organizational standards. CC ID 09112 | Configuration | Preventive | |
Configure the "MultiViews" setting for "all options directives" to organizational standards. CC ID 09113 | Configuration | Preventive | |
Configure the "Indexes" setting for "all options directives" to organizational standards. CC ID 09114 | Configuration | Preventive | |
Configure the "dav_module" setting to organizational standards. CC ID 09115 | Configuration | Preventive | |
Configure the "dav_fs_module" setting to organizational standards. CC ID 09116 | Configuration | Preventive | |
Configure the "info_module" setting to organizational standards. CC ID 09117 | Configuration | Preventive | |
Configure the "status_module" setting to organizational standards. CC ID 09118 | Configuration | Preventive | |
Configure the "proxy_module" setting to organizational standards. CC ID 09119 | Configuration | Preventive | |
Configure the "proxy_ftp_module" setting to organizational standards. CC ID 09120 | Configuration | Preventive | |
Configure the "proxy_http_module" setting to organizational standards. CC ID 09121 | Configuration | Preventive | |
Configure the "proxy_connect_module" setting to organizational standards. CC ID 09122 | Configuration | Preventive | |
Configure the "ExecCGI" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09130 | Configuration | Preventive | |
Configure the "FollowSymLinks" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09131 | Configuration | Preventive | |
Configure the "Includes" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09132 | Configuration | Preventive | |
Configure the "IncludesNoExec" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09133 | Configuration | Preventive | |
Configure the "Indexes" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09134 | Configuration | Preventive | |
Configure the "MultiViews" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09135 | Configuration | Preventive | |
Configure the "SymLinksIfOwnerMatch" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09136 | Configuration | Preventive | |
Configure the "TraceEnable" setting to organizational standards. CC ID 09137 | Configuration | Preventive | |
Configure the "listening IP address" setting to organizational standards. CC ID 09138 | Configuration | Preventive | |
Configure the "listening port" setting to organizational standards. CC ID 09139 | Configuration | Preventive | |
Configure the "ScriptAlias" setting to organizational standards. CC ID 09140 | Configuration | Preventive | |
Configure the "automatic directory indexing" setting to organizational standards. CC ID 09141 | Configuration | Preventive | |
Configure the "Anonymous sharing of Apache's web content directories" setting to organizational standards. CC ID 09142 | Configuration | Preventive | |
Configure the "apache web server" setting to organizational standards. CC ID 09147 | Configuration | Preventive | |
Configure the "dav_lock_module" setting to organizational standards. CC ID 09150 | Configuration | Preventive | |
Configure the "proxy_ajp_module" setting to organizational standards. CC ID 09151 | Configuration | Preventive | |
Configure the "proxy_balancer_module" setting to organizational standards. CC ID 09152 | Configuration | Preventive | |
Configure the "CGI scripts for Apache Tomcat" setting to organizational standards. CC ID 09720 | Configuration | Preventive | |
Configure the "Access to Apache Tomcat's interactive scripts" setting to organizational standards. CC ID 09721 | Configuration | Preventive | |
Configure the "Tomcat Apache's backup CGI *.bak" files to organizational standards CC ID 09722 | Configuration | Preventive | |
Configure the "Tomcat Apache's backup CGI *.old" files to organizational standards CC ID 09723 | Configuration | Preventive | |
Configure the "Tomcat Apache's backup CGI *.temp" files to organizational standards CC ID 09724 | Configuration | Preventive | |
Configure the "Tomcat Apache's backup CGI *.tmp" files to organizational standards CC ID 09725 | Configuration | Preventive | |
Configure the "Tomcat Apache's backup CGI *.backup" files to organizational standards CC ID 09726 | Configuration | Preventive | |
Configure the "Tomcat Apache's backup CGI copy of*.*" files to organizational standards CC ID 09727 | Configuration | Preventive | |
Configure the "maxProcessors attribute" setting to organizational standards. CC ID 09728 | Configuration | Preventive | |
Configure the "access log valve" setting for the "tomcat Engine container" to organizational standards. CC ID 09730 | Configuration | Preventive | |
Configure the "access log valve" setting for the "tomcat Host container" to organizational standards. CC ID 09731 | Configuration | Preventive | |
Configure the "access log valve" setting for the "tomcat Context container" to organizational standards. CC ID 09732 | Configuration | Preventive | |
Configure the "disallow paths and files" setting for the "tomcat site robots.txt" file to organizational standards. CC ID 09745 | Configuration | Preventive | |
Configure the "tomcat SSLProtocol atribute" setting to organizational standards. CC ID 09746 | Configuration | Preventive | |
Configure the "tomcat Connector SSLEngine attribute" setting to organizational standards. CC ID 09747 | Configuration | Preventive | |
Configure the "tomcat Listener SSLEngine attribute" setting to organizational standards. CC ID 09748 | Configuration | Preventive | |
Configure the "tomcat server attribute" setting to organizational standards. CC ID 09749 | Configuration | Preventive | |
Configure the "account running the tomcat service" setting to organizational standards. CC ID 09750 | Configuration | Preventive | |
Configure the "tomcat server documentation" setting to organizational standards. CC ID 09751 | Configuration | Preventive | |
Configure the "tomcat js examples" setting to organizational standards. CC ID 09752 | Configuration | Preventive | |
Configure the "tomcat servlet examples" setting to organizational standards. CC ID 09753 | Configuration | Preventive | |
Configure the "tomcat webdav" folder to organizational standards. CC ID 09754 | Configuration | Preventive | |
Configure the "tomcat examples" folder to organizational standards. CC ID 09755 | Configuration | Preventive | |
Configure the "tomcat balancer" folder to organizational standards. CC ID 09756 | Configuration | Preventive | |
Configure the "tomcat pattern attribute" setting to organizational standards. CC ID 09757 | Configuration | Preventive | |
Configure the "Java Security Manager (JSM)" setting to organizational standards. CC ID 09758 | Configuration | Preventive | |
Configure the "run with the Java Security Manager upon startup" setting to organizational standards. CC ID 09759 | Configuration | Preventive | |
Configure the "shutdown port number" for the "tomcat server" to organizational standards. CC ID 09760 | Configuration | Preventive | |
Configure the "Tomcat Legacy JK AJP 1.3 connector" setting to organizational standards. CC ID 09761 | Configuration | Preventive | |
Configure the "port number" setting for the "Tomcat Legacy JK AJP 1.3 connector" to organizational standards. CC ID 09762 | Configuration | Preventive | |
Configure the "Tomcat Legacy HTTP/1.1 connector" setting to organizational standards. CC ID 09763 | Configuration | Preventive | |
Configure the "port number" for the "Tomcat Legacy HTTP/1.1 connector" to organizational standards. CC ID 09764 | Configuration | Preventive | |
Configure the "Tomcat login authentication method" setting to organizational standards. CC ID 09765 | Configuration | Preventive | |
Configure the "security roles" for the "Tomcat manager app" to organizational standards. CC ID 09766 | Configuration | Preventive | |
Configure the "security roles" setting for the "tomcat admin app" to organizational standards. CC ID 09767 | Configuration | Preventive | |
Configure the "deny access to the Tomcat Admin app" setting to organizational standards. CC ID 09768 | Configuration | Preventive | |
Configure the "allow access to the Tomcat Admin app" setting to organizational standards. CC ID 09769 | Configuration | Preventive | |
Configure the "deny access to the Tomcat manager app" setting to organizational standards. CC ID 09770 | Configuration | Preventive | |
Configure the "allow access to the Tomcat manager app" setting to organizational standards. CC ID 09771 | Configuration | Preventive | |
Configure the "password digest algorithm" setting for "JDBCRealm (database) connections" to organizational standards. CC ID 09779 | Configuration | Preventive | |
Configure the "JDBCRealm (database) password digest algorithm" setting to organizational standards. CC ID 09780 | Configuration | Preventive | |
Configure the "password digest algorithm" setting for "JNDIRealm (LDAP) connections" to organizational standards. CC ID 09781 | Configuration | Preventive | |
Configure the "JNDIRealm (LDAP) password digest" setting to organizational standards. CC ID 09782 | Configuration | Preventive | |
Configure the "Tomcat HTTP/1.1 connector" setting to organizational standards. CC ID 09783 | Configuration | Preventive | |
Configure the "port number" setting for the "Tomcat HTTP/1.1 connector" to organizational standards. CC ID 09784 | Configuration | Preventive | |
Configure the "secure attribute" for the "Tomcat HTTP/1.1 connectors" to organizational standards. CC ID 09785 | Configuration | Preventive | |
Configure the "Tomcat Legacy JK/JK2 AJP 1.3 connector" setting to organizational standards. CC ID 09786 | Configuration | Preventive | |
Configure the "port number" setting for the "JK/JK2 AJP 1.3 connector" to organizational standards. CC ID 09787 | Configuration | Preventive | |
Configure the "Tomcat WARP connector" setting to organizational standards. CC ID 09788 | Configuration | Preventive | |
Configure the "port number" setting for the "WARP connector" to organizational standards. CC ID 09789 | Configuration | Preventive | |
Configure the "location of the log files directory" setting for the "Logger element" to organizational standards. CC ID 09790 | Configuration | Preventive | |
Configure the "example server.xml" file to organizational standards. CC ID 09791 | Configuration | Preventive | |
Configure the "file prefix" setting for the "Logger element" to organizational standards. CC ID 09794 | Configuration | Preventive | |
Configure the "verbosity" setting for the "Logger element" to organizational standards. CC ID 09795 | Configuration | Preventive | |
Configure the "Tomcat server port number" setting to organizational standards. CC ID 09797 | Configuration | Preventive | |
Configure the "secure attribute" for the "Tomcat JK/JK2 AJP 1.3 connectors" to organizational standards. CC ID 09803 | Configuration | Preventive | |
Configure the "JULI container level logging" setting to organizational standards. CC ID 09804 | Configuration | Preventive | |
Configure the "JULI FileHandler threshold level " setting to organizational standards. CC ID 09805 | Configuration | Preventive | |
Configure the "JULI FileHandler save directory " setting to organizational standards. CC ID 09806 | Configuration | Preventive | |
Configure the "JULI FileHandlerlog file name prefix " setting to organizational standards. CC ID 09807 | Configuration | Preventive | |
Configure the "grant of all permissions to Tomcat web applications" setting to organizational standards. CC ID 09808 | Configuration | Preventive | |
Configure the "example" files to organizational standards. CC ID 09809 | Configuration | Preventive | |
Configure the "WebDAV app" setting to organizational standards. CC ID 09810 | Configuration | Preventive | |
Configure the "Tomcat-docs" setting to organizational standards. CC ID 09811 | Configuration | Preventive | |
Configure the "Balancer app" setting to organizational standards. CC ID 09812 | Configuration | Preventive | |
Configure the "save directory for log files" setting to organizational standards. CC ID 09816 | Configuration | Preventive | |
Configure the "verify passwords in tomcat-users.xml are stored using an authorized digest" setting to organizational standards. CC ID 09817 | Configuration | Preventive | |
Configure IIS to Organizational Standards. CC ID 08988 | Configuration | Preventive | |
Configure the "IIS Web Root folder path" setting to organizational standards. CC ID 09153 | Configuration | Preventive | |
Configure the "IIS Web Root" directory to organizational standards. CC ID 09154 | Configuration | Preventive | |
Configure the "use the appropriate network interface" setting to organizational standards. CC ID 09155 | Configuration | Preventive | |
Configure the "Enable Logging" setting to organizational standards. CC ID 09167 | Configuration | Preventive | |
Configure the "Integrated Windows Authentication" setting to organizational standards. CC ID 09176 | Configuration | Preventive | |
Configure the "Special Characters In Shells" setting for the "WWW service" to organizational standards. CC ID 09177 | Configuration | Preventive | |
Configure the "IIS WWW service SSL error logging" setting to organizational standards. CC ID 09178 | Configuration | Preventive | |
Configure the "RDSServer.DataFactory object" setting to organizational standards. CC ID 09179 | Configuration | Preventive | |
Configure the "AdvancedDataFactory object" setting to organizational standards. CC ID 09180 | Configuration | Preventive | |
Configure the "VbBusObj.VbBusObjCls object" setting to organizational standards. CC ID 09181 | Configuration | Preventive | |
Configure the ".printer extension mapping" setting to organizational standards CC ID 09182 | Configuration | Preventive | |
Configure the ".htw extension mapping" setting to organizational standards CC ID 09183 | Configuration | Preventive | |
Configure the ".ida extension mapping" setting to organizational standards CC ID 09184 | Configuration | Preventive | |
Configure the ".idq extension mapping" setting to organizational standards CC ID 09185 | Configuration | Preventive | |
Configure the ".idc extension mapping" setting to organizational standards CC ID 09186 | Configuration | Preventive | |
Configure the ".shtm extension mapping" setting to organizational standards CC ID 09187 | Configuration | Preventive | |
Configure the ".stm extension mapping" setting to organizational standards CC ID 09188 | Configuration | Preventive | |
Configure the ".shtml extension mapping" setting to organizational standards CC ID 09189 | Configuration | Preventive | |
Configure the "Relative path traversal" setting to organizational standards. CC ID 09190 | Configuration | Preventive | |
Configure the "HTTP protocol logging" setting to organizational standards. CC ID 09199 | Configuration | Preventive | |
Configure the "Date logging" setting to organizational standards. CC ID 09200 | Configuration | Preventive | |
Configure the "Time logging" setting to organizational standards. CC ID 09201 | Configuration | Preventive | |
Configure the "Client IP Address logging" setting to organizational standards. CC ID 09202 | Configuration | Preventive | |
Configure the "User name logging" setting to organizational standards. CC ID 09203 | Configuration | Preventive | |
Configure the "User agent logging" setting to organizational standards. CC ID 09204 | Configuration | Preventive | |
Configure the "Method logging" setting to organizational standards. CC ID 09205 | Configuration | Preventive | |
Configure the "URI stem logging" setting to organizational standards. CC ID 09206 | Configuration | Preventive | |
Configure the "URL query logging" setting to organizational standards. CC ID 09207 | Configuration | Preventive | |
Configure the "Server IP address logging" setting to organizational standards. CC ID 09208 | Configuration | Preventive | |
Configure the "Server port logging" setting to organizational standards. CC ID 09209 | Configuration | Preventive | |
Configure the "Protocol status logging" setting to organizational standards. CC ID 09210 | Configuration | Preventive | |
Configure the "Win32 status logging" setting to organizational standards. CC ID 09211 | Configuration | Preventive | |
Configure the "HTTP Log folder path" setting to organizational standards. CC ID 09212 | Configuration | Preventive | |
Configure the "Web-based password reset IIS application mappings (.htr)" setting to organizational standards CC ID 09215 | Configuration | Preventive | |
Configure the "IIS Sample files" setting to organizational standards. CC ID 09216 | Configuration | Preventive | |
Configure the "sample Data Access files" setting to organizational standards. CC ID 09217 | Configuration | Preventive | |
Configure the "IIS Help files" setting to organizational standards. CC ID 09218 | Configuration | Preventive | |
Configure the "Remote Account password changes" setting to organizational standards. CC ID 09219 | Configuration | Preventive | |
Configure the "execution context of the IIS CGI processes" setting to organizational standards. CC ID 09220 | Configuration | Preventive | |
Configure the "Server Side Includes command shell" setting to organizational standards. CC ID 09229 | Configuration | Preventive | |
Configure the "IIS sample Web Printing files" setting to organizational standards. CC ID 09230 | Configuration | Preventive | |
Configure the "AllowRestrictedChars" setting to organizational standards. CC ID 09231 | Configuration | Preventive | |
Configure the "EnableNonUTF8" setting to organizational standards. CC ID 09232 | Configuration | Preventive | |
Configure the "FavorUTF8" setting to organizational standards. CC ID 09233 | Configuration | Preventive | |
Configure the "maximum possible size of request headers" setting to organizational standards. CC ID 09234 | Configuration | Preventive | |
Configure the "maximum possible combined size of request line and headers" setting to organizational standards. CC ID 09235 | Configuration | Preventive | |
Configure the "maximum number of characters in a URL path setting" setting to organizational standards. CC ID 09236 | Configuration | Preventive | |
Configure the "maximum number of URL path segments" setting to organizational standards. CC ID 09237 | Configuration | Preventive | |
Configure the "allowance of %U notation in request URLs" setting to organizational standards. CC ID 09238 | Configuration | Preventive | |
Configure the "maximum response size that can be cached in the kernel" setting to organizational standards. CC ID 09239 | Configuration | Preventive | |
Configure the "maximum size of the entire request body" setting to organizational standards. CC ID 09240 | Configuration | Preventive | |
Configure the "URLScan ISAPI filters" setting to organizational standards. CC ID 09241 | Configuration | Preventive | |
Configure the "HTTP SSL (HTTPFilter) service" setting to organizational standards. CC ID 09242 | Configuration | Preventive | |
Configure the "identity" setting for the "IIS Application Pools service" to organizational standards. CC ID 09243 | Configuration | Preventive | |
Configure the "worker process isolation" setting to organizational standards. CC ID 09244 | Configuration | Preventive | |
Configure the "Recycle worker process (in minutes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09245 | Configuration | Preventive | |
Configure the "Recycle worker process (number of requests)" setting for the "IIS Application Pool" to organizational standards. CC ID 09246 | Configuration | Preventive | |
Configure the "Maximum virtual memory (in megabytes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09247 | Configuration | Preventive | |
Configure the "Maximum used memory (in megabytes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09248 | Configuration | Preventive | |
Configure the "Shutdown worker processes after being idle (time in minutes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09249 | Configuration | Preventive | |
Configure the "Limit the kernel request queue (number of requests)" setting for the "IIS Application Pool" to organizational standards. CC ID 09250 | Configuration | Preventive | |
Configure the "Enable pinging" setting for the "IIS Application Pool" to organizational standards. CC ID 09251 | Configuration | Preventive | |
Configure the "Ping worker process every (frequency in seconds)" setting for the "IIS Application Pool" to organizational standards. CC ID 09252 | Configuration | Preventive | |
Configure the "Enable rapid-fail protection" setting for the "IIS Application Pool" to organizational standards. CC ID 09253 | Configuration | Preventive | |
Configure the "Enable rapid-fail protection - Failures" setting for the "IIS Application Pool" to organizational standards. CC ID 09254 | Configuration | Preventive | |
Configure the "Enable rapid-fail protection - Time Period" setting for the "IIS Application Pool" to organizational standards. CC ID 09255 | Configuration | Preventive | |
Configure the "auditing" setting for the "MetaBase.xml" file to organizational standards. CC ID 09256 | Configuration | Preventive | |
Configure Microsoft SQL Server to Organizational Standards. CC ID 08989 | Configuration | Preventive | |
Configure the "allowing DDL statements to modify the application schema" permissions for the "Database application" to organizational standards. CC ID 09258 | Configuration | Preventive | |
Configure the "encrypt custom and GOTS application source code" setting to organizational standards. CC ID 09259 | Configuration | Preventive | |
Configure the "Access to DBMS software files and directories" setting to organizational standards. CC ID 09264 | Configuration | Preventive | |
Configure the "Default demonstration and sample database objects and applications" setting to organizational standards. CC ID 09265 | Configuration | Preventive | |
Configure the "auditing parameters" for "database auditing" to organizational standards. CC ID 09266 | Configuration | Preventive | |
Configure the "DBMS login account password complexity requirements" setting to organizational standards. CC ID 09268 | Configuration | Preventive | |
Configure the "Passwords for DBMS default accounts" setting to organizational standards. CC ID 09269 | Configuration | Preventive | |
Configure the "Remote DBMS administration" setting to organizational standards. CC ID 09270 | Configuration | Preventive | |
Configure the "C2 Audit records" setting to organizational standards. CC ID 09271 | Configuration | Preventive | |
Configure the "SQL Mail XPs" setting to organizational standards. CC ID 09272 | Configuration | Preventive | |
Configure the "SQL Server Service" setting to organizational standards. CC ID 09275 | Configuration | Preventive | |
Configure the "Access extended stored procedure xp_cmdshell" setting to organizational standards. CC ID 09277 | Configuration | Preventive | |
Configure the "xp_cmdshell" setting to organizational standards. CC ID 09278 | Configuration | Preventive | |
Configure the "OLE Automation extended stored procedures" setting to organizational standards. CC ID 09279 | Configuration | Preventive | |
Configure the "Access to registry extended stored procedures" setting to organizational standards. CC ID 09280 | Configuration | Preventive | |
Configure the "Remote access" setting to organizational standards. CC ID 09281 | Configuration | Preventive | |
Configure "Set time limit for active but idle Remote Desktop Services sessions" to organizational standards. CC ID 15382 | Configuration | Preventive | |
Configure the "Always show desktop on connection" setting to organizational standards. CC ID 10753 | Configuration | Preventive | |
Configure the "Automatic reconnection" setting to organizational standards. CC ID 10760 | Configuration | Preventive | |
Configure the "keep-alive connection interval" setting to organizational standards. CC ID 10790 | Configuration | Preventive | |
Configure the "RD Connection Broker farm name" setting to organizational standards. CC ID 10800 | Configuration | Preventive | |
Configure the "RD Connection Broker server name" setting to organizational standards. CC ID 10801 | Configuration | Preventive | |
Configure the "server authentication for client" setting for "Remote Desktop Connection Client" to organizational standards. CC ID 10817 | Configuration | Preventive | |
Configure the "Do not use Remote Desktop Session Host server IP address when virtual IP address is not available" setting to organizational standards. CC ID 10938 | Configuration | Preventive | |
Configure the "Enforce Removal of Remote Desktop Wallpaper" setting to organizational standards. CC ID 10957 | Configuration | Preventive | |
Configure the "Hide previous versions list for remote files" setting to organizational standards. CC ID 10990 | Configuration | Preventive | |
Configure the "Join RD Connection Broker" setting to organizational standards. CC ID 11003 | Configuration | Preventive | |
Configure the "Limit number of connections" setting to organizational standards. CC ID 11011 | Configuration | Preventive | |
Configure the "Optimize visual experience for Remote Desktop Services sessions" setting to organizational standards. CC ID 11058 | Configuration | Preventive | |
Configure the "Prevent restoring remote previous versions" setting to organizational standards. CC ID 11089 | Configuration | Preventive | |
Configure the "Require strict target SPN match on remote procedure calls" setting to organizational standards. CC ID 11136 | Configuration | Preventive | |
Configure the "Require use of specific security layer for remote (RDP) connections" setting to organizational standards. CC ID 11137 | Configuration | Preventive | |
Configure the "Restrict Remote Desktop Services users to a single Remote Desktop Services session" setting to organizational standards. CC ID 11142 | Configuration | Preventive | |
Configure the "Select the network adapter to be used for Remote Desktop IP Virtualization" setting to organizational standards. CC ID 11164 | Configuration | Preventive | |
Configure the "Set maximum wait time for the network if a user has a roaming user profile or remote home directory" setting to organizational standards. CC ID 11175 | Configuration | Preventive | |
Configure the "Set path for Remote Desktop Services Roaming User Profile" setting to organizational standards. CC ID 11176 | Configuration | Preventive | |
Configure the "Set Remote Desktop Services User Home Directory" setting to organizational standards. CC ID 11181 | Configuration | Preventive | |
Configure the "Set rules for remote control of Remote Desktop Services user sessions" setting to organizational standards. CC ID 11183 | Configuration | Preventive | |
Configure the "Set the Remote Desktop licensing mode" setting to organizational standards. CC ID 11188 | Configuration | Preventive | |
Configure the "Set time limit for active Remote Desktop Services sessions" setting to organizational standards. CC ID 11194 | Configuration | Preventive | |
Configure the "Set time limit for logoff of RemoteApp sessions" setting to organizational standards. CC ID 11195 | Configuration | Preventive | |
Configure the "Specify maximum number of remote shells per user" setting to organizational standards. CC ID 11213 | Configuration | Preventive | |
Configure the "Start a program on connection" setting to organizational standards. CC ID 11228 | Configuration | Preventive | |
Configure the "Turn off desktop gadgets" setting to organizational standards. CC ID 11275 | Configuration | Preventive | |
Configure the "Turn off legacy remote shutdown interface" setting to organizational standards. CC ID 11285 | Configuration | Preventive | |
Configure the "Turn Off user-installed desktop gadgets" setting to organizational standards. CC ID 11322 | Configuration | Preventive | |
Configure the "Turn on Remote Desktop IP Virtualization" setting to organizational standards. CC ID 11348 | Configuration | Preventive | |
Configure the "Use RD Connection Broker load balancing" setting to organizational standards. CC ID 11364 | Configuration | Preventive | |
Configure the "Use the specified Remote Desktop license servers" setting to organizational standards. CC ID 11366 | Configuration | Preventive | |
Configure the "Wait for remote user profile" setting to organizational standards. CC ID 11370 | Configuration | Preventive | |
Configure the "SQL Server authentication" setting to organizational standards. CC ID 09282 | Configuration | Preventive | |
Configure the "Access to CmdExec and ActiveScripting jobs" setting to organizational standards. CC ID 09283 | Configuration | Preventive | |
Configure the "Error log retention" setting to organizational standards. CC ID 09284 | Configuration | Preventive | |
Configure the "Trace rollover" setting to organizational standards. CC ID 09285 | Configuration | Preventive | |
Configure the "Named Pipes network protocol" setting to organizational standards. CC ID 09286 | Configuration | Preventive | |
Configure the "SQL Server event forwarding" setting to organizational standards. CC ID 09287 | Configuration | Preventive | |
Configure the "Access to manage the database master key" setting to organizational standards. CC ID 09288 | Configuration | Preventive | |
Configure the "Encryption of the asymmetric keys" setting to organizational standards. CC ID 09290 | Configuration | Preventive | |
Configure the "audit unauthorized access to the asymmetric keys" setting to organizational standards. CC ID 09291 | Configuration | Preventive | |
Configure the "Database Master key encryption password" setting to organizational standards. CC ID 09292 | Configuration | Preventive | |
Configure the "encrypt Database Master Key" setting to organizational standards. CC ID 09293 | Configuration | Preventive | |
Configure the "store the database master key password" setting to organizational standards. CC ID 09294 | Configuration | Preventive | |
Configure the "protect symmetric keys" setting to organizational standards. CC ID 09295 | Configuration | Preventive | |
Configure the "clear residual data from memory, data objects or files, or other storage locations" setting to organizational standards. CC ID 09296 | Configuration | Preventive | |
Configure the "DBMS account passwords expiration" setting to organizational standards. CC ID 09297 | Configuration | Preventive | |
Configure the "audit attempts to bypass access controls" setting to organizational standards. CC ID 09310 | Configuration | Preventive | |
Configure the "default audit trace" setting to organizational standards. CC ID 09311 | Configuration | Preventive | |
Configure the "Audit records contents" setting to organizational standards. CC ID 09312 | Configuration | Preventive | |
Configure the "port" setting for "Sql Server Analysis Services" to organizational standards. CC ID 09313 | Configuration | Preventive | |
Configure the "port" setting for the "DBMS" to organizational standards. CC ID 09314 | Configuration | Preventive | |
Configure the "Fixed server roll membership" setting to organizational standards. CC ID 09315 | Configuration | Preventive | |
Configure the "Database Mail XPs" setting to organizational standards. CC ID 09316 | Configuration | Preventive | |
Configure the "SQL Server Agent Email" setting to organizational standards. CC ID 09317 | Configuration | Preventive | |
Configure the "scan for startup procs" setting to organizational standards. CC ID 09331 | Configuration | Preventive | |
Configure the "Access to SQL Server Agent CmdExec" setting to organizational standards. CC ID 09332 | Configuration | Preventive | |
Configure the "Access to ActiveScripting jobs" setting to organizational standards. CC ID 09333 | Configuration | Preventive | |
Configure the "SQL Server Agent proxies" setting to organizational standards. CC ID 09334 | Configuration | Preventive | |
Configure the "Replication snapshot folders" setting to organizational standards. CC ID 09335 | Configuration | Preventive | |
Configure the "Ad hoc data mining queries configuration" setting to organizational standards. CC ID 09336 | Configuration | Preventive | |
Configure the "Analysis Services Anonymous Connections" setting to organizational standards. CC ID 09337 | Configuration | Preventive | |
Configure the "Analysis Services Links to Objects" setting to organizational standards. CC ID 09338 | Configuration | Preventive | |
Configure the "Analysis Services Links From Objects" setting to organizational standards. CC ID 09339 | Configuration | Preventive | |
Configure the "Analysis Services user-defined COM functions" setting to organizational standards. CC ID 09340 | Configuration | Preventive | |
Configure the "Analysis Services Required Protection Levels" setting to organizational standards. CC ID 09341 | Configuration | Preventive | |
Configure the "Analysis Services Security Package List" setting to organizational standards. CC ID 09342 | Configuration | Preventive | |
Configure the "Analysis Services server role" setting to organizational standards. CC ID 09343 | Configuration | Preventive | |
Configure the "Analysis Services database roles" setting to organizational standards. CC ID 09344 | Configuration | Preventive | |
Configure the "Reporting Services Web service requests and HTTP" setting to organizational standards. CC ID 09345 | Configuration | Preventive | |
Configure the "Reporting Services scheduled events and report delivery" setting to organizational standards. CC ID 09346 | Configuration | Preventive | |
Configure the "Command Language Runtime objects" setting to organizational standards. CC ID 09348 | Configuration | Preventive | |
Configure the "XML Web Services endpoints" setting to organizational standards. CC ID 09349 | Configuration | Preventive | |
Configure the "db_owner role members" setting to organizational standards. CC ID 09350 | Configuration | Preventive | |
Configure the "Web Assistant procedures configuration" setting to organizational standards. CC ID 09351 | Configuration | Preventive | |
Configure the "Disallow adhoc access" setting for "linked servers" to organizational standards. CC ID 09353 | Configuration | Preventive | |
Configure the "Ad Hoc distributed queries" setting to organizational standards. CC ID 09354 | Configuration | Preventive | |
Configure the "Access to Analysis Services data sources" setting to organizational standards. CC ID 09355 | Configuration | Preventive | |
Configure the "Database TRUSTWORTHY status" setting to organizational standards. CC ID 09356 | Configuration | Preventive | |
Configure the "Agent XPs" setting to organizational standards. CC ID 09357 | Configuration | Preventive | |
Configure the "SMO and DMO XPs" setting to organizational standards. CC ID 09358 | Configuration | Preventive | |
Configure Oracle WebLogic Server to Organizational Standards. CC ID 08990 | Configuration | Preventive | |
Configure the "Complete Message Timeout" setting to organizational standards. CC ID 09818 | Configuration | Preventive | |
Configure the "FIPS- compliant cryptographic module" setting to organizational standards. CC ID 09819 | Configuration | Preventive | |
Configure the "Allow Unencrypted Null Cipher" setting to organizational standards. CC ID 09820 | Configuration | Preventive | |
Configure the "Maximum Message Size" setting to organizational standards. CC ID 09821 | Configuration | Preventive | |
Configure the "Security Interoperability Mode" setting to organizational standards. CC ID 09822 | Configuration | Preventive | |
Configure the "Severity field" setting to organizational standards. CC ID 09824 | Configuration | Preventive | |
Configure the "servlet.HttpServletResponse" setting for "Active Context Handler" to organizational standards. CC ID 09825 | Configuration | Preventive | |
Configure the "wli.Message" setting for "Active Context Handler" to organizational standards. CC ID 09826 | Configuration | Preventive | |
Configure the "channel.Port" setting for "Active Context Handler" to organizational standards. CC ID 09827 | Configuration | Preventive | |
Configure the "channel.PublicPort" setting for "Active Context Handler" to organizational standards. CC ID 09828 | Configuration | Preventive | |
Configure the "channel.RemotePort" setting for "Active Context Handler" to organizational standards. CC ID 09829 | Configuration | Preventive | |
Configure the "channel.Protocol" setting for "Active Context Handler" to organizational standards. CC ID 09830 | Configuration | Preventive | |
Configure the "channel.Address" setting for "Active Context Handler" to organizational standards. CC ID 09831 | Configuration | Preventive | |
Configure the "channel.PublicAddress" setting for "Active Context Handler" to organizational standards. CC ID 09832 | Configuration | Preventive | |
Configure the "channel.RemoteAddress" setting for "Active Context Handler" to organizational standards. CC ID 09833 | Configuration | Preventive | |
Configure the "channel.ChannelName" setting for "Active Context Handler" to organizational standards. CC ID 09834 | Configuration | Preventive | |
Configure the "channel.Secure" setting for "Active Context Handler" to organizational standards. CC ID 09835 | Configuration | Preventive | |
Configure the "ejb20.Parameter" setting for "Active Context Handler" to organizational standards CC ID 09836 | Configuration | Preventive | |
Configure the "wsee.SOAPmessage" setting for "Active Context Handler" to organizational standards. CC ID 09837 | Configuration | Preventive | |
Configure the "entitlement.EAuxilaryID" setting for "Active Context Handler" to organizational standards. CC ID 09838 | Configuration | Preventive | |
Configure the "security.ChainPrevalidatedBySSL" setting for "Active Context Handler" to organizational standards. CC ID 09839 | Configuration | Preventive | |
Configure the "xml.SecurityToken" setting for "Active Context Handler" to organizational standards. CC ID 09840 | Configuration | Preventive | |
Configure the "webservice.Integrity" setting for "Active Context Handler" to organizational standards. CC ID 09841 | Configuration | Preventive | |
Configure the "saml.SSLClientCertificateChain" setting for "Active Context Handler" to organizational standards. CC ID 09842 | Configuration | Preventive | |
Configure the "saml.MessageSignerCerficate" setting for "Active Context Handler" to organizational standards. CC ID 09843 | Configuration | Preventive | |
Configure the "saml.subject.ConfirmationMethod" setting for "Active Context Handler" to organizational standards. CC ID 09844 | Configuration | Preventive | |
Configure the "saml.subject.dom.KeyInfo" setting for "Active Context Handler" to organizational standards. CC ID 09845 | Configuration | Preventive | |
Configure the "jmx.ObjectName" setting for "Active Context Handler" to organizational standards. CC ID 09846 | Configuration | Preventive | |
Configure the "jmx.ShortName" setting for "Active Context Handler" to organizational standards. CC ID 09847 | Configuration | Preventive | |
Configure the "jmx.Parameters" setting for "Active Context Handler" to organizational standards. CC ID 09848 | Configuration | Preventive | |
Configure the "jmx.Signature" setting for "Active Context Handler" to organizational standards. CC ID 09849 | Configuration | Preventive | |
Configure the "jmx.AuditProtectedArgInfo" setting for "Active Context Handler" to organizational standards. CC ID 09850 | Configuration | Preventive | |
Configure the "jmx.OldAttributeValue" setting for "Active Context Handler" to organizational standards. CC ID 09851 | Configuration | Preventive | |
Configure the "Reject if Password Contains the User Name" setting to organizational standards. CC ID 09852 | Configuration | Preventive | |
Configure the "Reject if Password Contains the User Name Reversed" setting to organizational standards. CC ID 09853 | Configuration | Preventive | |
Configure the "maximum instances of any character field" setting to organizational standards. CC ID 09854 | Configuration | Preventive | |
Configure the "maximum consecutive characters field" setting to organizational standards. CC ID 09855 | Configuration | Preventive | |
Configure the "minimum number of alphabetic characters field" setting to organizational standards. CC ID 09856 | Configuration | Preventive | |
Configure the "minimum number of numeric characters field" setting to organizational standards. CC ID 09857 | Configuration | Preventive | |
Configure the "minimum number of non-alphanumeric characters field" setting to organizational standards. CC ID 09858 | Configuration | Preventive | |
Configure the "Lockout Threshold" setting in the "Security Realm" to organizational standards. CC ID 09861 | Configuration | Preventive | |
Configure the "Lockout Duration" setting in the "Security Realm" to organizational standards. CC ID 09862 | Configuration | Preventive | |
Configure the "Lockout Reset Duration" setting in the "Security Realm" to organizational standards. CC ID 09863 | Configuration | Preventive | |
Configure the "Require Unanimous Permit" setting to organizational standards. CC ID 09864 | Configuration | Preventive | |
Configure the "Host Name Verification" setting on the "Administration Server" to organizational standards. CC ID 09865 | Configuration | Preventive | |
Configure the "Minimum Number of Non-Alphabetic Characters" setting to organizational standards. CC ID 09866 | Configuration | Preventive | |
Configure the "SSL Enabled" setting for "LDAP Server connections" to organizational standards. CC ID 09867 | Configuration | Preventive | |
Configure the "Host Name Verification" setting to organizational standards. CC ID 09868 | Configuration | Preventive | |
Configure the "Domain Credentials" setting to organizational standards. CC ID 09869 | Configuration | Preventive | |
Configure the "Configuration Archive Enabled" setting to organizational standards. CC ID 09870 | Configuration | Preventive | |
Configure the "Archive Configuration Count" setting to organizational standards. CC ID 09871 | Configuration | Preventive | |
Configure the "Default Administrator field" setting to organizational standards. CC ID 09872 | Configuration | Preventive | |
Configure the "SSL Listen Port" setting to organizational standards. CC ID 09873 | Configuration | Preventive | |
Configure the "Administration Console Session Timeout field" setting to organizational standards. CC ID 09874 | Configuration | Preventive | |
Configure the "Production Mode" setting to organizational standards. CC ID 09875 | Configuration | Preventive | |
Configure the "WebLogic Auditing provider" setting to organizational standards. CC ID 09876 | Configuration | Preventive | |
Configure the "Invocation Timeout Seconds" setting to organizational standards. CC ID 09877 | Configuration | Preventive | |
Configure the "Anonymous Admin Lookup Enabled" setting to organizational standards. CC ID 09878 | Configuration | Preventive | |
Configure the "Web App Files Case Insensitive" setting to organizational standards. CC ID 09879 | Configuration | Preventive | |
Configure the "Enable Administration Port" setting to organizational standards. CC ID 09880 | Configuration | Preventive | |
Configure the "SSL Rejection Logging Enabled" setting to organizational standards. CC ID 09881 | Configuration | Preventive | |
Configure the "Export Key Lifespan" setting to organizational standards. CC ID 09882 | Configuration | Preventive | |
Configure the "Client Cert Proxy Enabled" setting for the "Administration Server" to organizational standards. CC ID 09883 | Configuration | Preventive | |
Configure the "Client Cert Proxy Enabled" setting for the "managed server" to organizational standards. CC ID 09884 | Configuration | Preventive | |
Configure the "Frontend Host" setting to organizational standards. CC ID 09885 | Configuration | Preventive | |
Configure the "Check Roles and Policies" setting to organizational standards. CC ID 09886 | Configuration | Preventive | |
Configure the "Security Model Default" setting to organizational standards. CC ID 09887 | Configuration | Preventive | |
Configure the "When Deploying Web Applications or EJBS" setting to organizational standards. CC ID 09888 | Configuration | Preventive | |
Configure the "Configuration Audit Type field" setting to organizational standards. CC ID 09889 | Configuration | Preventive | |
Configure the "EditMBeanServerEnabled" setting for the "Administration Server" to organizational standards. CC ID 09890 | Configuration | Preventive | |
Configure the "two-way SSL" setting to organizational standards. CC ID 09891 | Configuration | Preventive | |
Configure the "Embedded LDAP Timeout" setting to organizational standards. CC ID 09892 | Configuration | Preventive | |
Configure the "Anonymous Bind Allowed" setting to organizational standards. CC ID 09893 | Configuration | Preventive | |
Configure the "Post Timeout field" setting to organizational standards. CC ID 09894 | Configuration | Preventive | |
Configure the "HTTP Duration" setting to organizational standards. CC ID 09895 | Configuration | Preventive | |
Configure the "HTTPS Duration" setting to organizational standards. CC ID 09896 | Configuration | Preventive | |
Configure the "HTTP Maximum Message Size" setting to organizational standards. CC ID 09897 | Configuration | Preventive | |
Configure the "Connection Filter" setting for the "managed server" to organizational standards. CC ID 09898 | Configuration | Preventive | |
Configure the "connection filter" setting to organizational standards. CC ID 09899 | Configuration | Preventive | |
Configure the "Client Cert Proxy Enabled" setting to organizational standards. CC ID 09904 | Configuration | Preventive | |
Configure the "Auth Cookie Enabled" setting to organizational standards. CC ID 09905 | Configuration | Preventive | |
Configure the "Maximum Open Sockets" setting on the "Administration server" to organizational standards. CC ID 09906 | Configuration | Preventive | |
Configure the "Complete Message Timeout" setting for "each custom channel" to organizational standards. CC ID 09908 | Configuration | Preventive | |
Configure the "Idle Connection Timeout" setting for "each custom channel" to organizational standards. CC ID 09909 | Configuration | Preventive | |
Configure the "Maximum Message Size" setting for "each custom channel" to organizational standards. CC ID 09910 | Configuration | Preventive | |
Configure the "Node Manager Listen Address" setting to organizational standards. CC ID 09911 | Configuration | Preventive | |
Configure the "Node Manager Type" setting to organizational standards. CC ID 09912 | Configuration | Preventive | |
Configure the "Policy Selection Preference" setting to organizational standards. CC ID 09913 | Configuration | Preventive | |
Configure the "Maximum Open Sockets" setting for "all Managed Servers" to organizational standards. CC ID 09914 | Configuration | Preventive | |
Configure the "Enforce Constraints" setting for "digital certificates" to organizational standards. CC ID 09915 | Configuration | Preventive | |
Configure the "Keystores field" setting to organizational standards. CC ID 09916 | Configuration | Preventive | |
Configure the "HTTP Access Log File" setting to organizational standards. CC ID 09917 | Configuration | Preventive | |
Configure the "Custom Hostname Verifier field" setting to organizational standards. CC ID 09918 | Configuration | Preventive | |
Configure the "SSL port enabled" setting to organizational standards. CC ID 09919 | Configuration | Preventive | |
Configure the "Listen Port Enabled" setting to organizational standards. CC ID 09920 | Configuration | Preventive | |
Configure security and protection software according to Organizational Standards. CC ID 11917 | Configuration | Preventive | |
Configure security and protection software to automatically run at startup. CC ID 12443 | Configuration | Preventive | |
Configure security and protection software to check for up-to-date signature files. CC ID 00576 | Testing | Detective | |
Configure security and protection software to enable automatic updates. CC ID 11945 | Configuration | Preventive | |
Configure security and protection software to check e-mail messages. CC ID 00578 | Testing | Preventive | |
Configure security and protection software to check e-mail attachments. CC ID 11860 | Configuration | Preventive | |
Configure security and protection software to check for phishing attacks. CC ID 04569 | Technical Security | Detective | |
Configure Windows Defender Remote Credential Guard to organizational standards. CC ID 16515 | Configuration | Preventive | |
Configure Windows Defender Credential Guard to organizational standards. CC ID 16514 | Configuration | Preventive | |
Configure dedicated systems used for system management according to organizational standards. CC ID 12132 | Configuration | Preventive | |
Configure dedicated systems used for system management to prohibit them from composing documents. CC ID 12161 | Configuration | Preventive | |
Configure dedicated systems used for system management so they are prohibited from accessing e-mail. CC ID 12160 | Configuration | Preventive | |
Configure Application Programming Interfaces in accordance with organizational standards. CC ID 12170 | Configuration | Preventive | |
Configure Application Programming Interfaces to enforce authentication. CC ID 12172 | Configuration | Preventive | |
Configure Application Programming Interfaces to employ strong cryptography. CC ID 12171 | Configuration | Preventive | |
Configure the Domain Name System in accordance with organizational standards. CC ID 12202 | Configuration | Preventive | |
Configure the Domain Name System query logging to organizational standards. CC ID 12210 | Configuration | Preventive | |
Configure the secure name/address resolution service (recursive or caching resolver). CC ID 01625 | Configuration | Preventive | |
Configure the secure name/address resolution service (authoritative source). CC ID 01624 | Configuration | Preventive | |
Configure payment systems in accordance with organizational standards. CC ID 12217 | Configuration | Preventive | |
Configure payment systems to disable storing transactions when offline. CC ID 12220 | Configuration | Preventive | |
Configure payment systems to disable authorizing transactions when offline. CC ID 12219 | Configuration | Preventive | |
Configure payment applications to become disabled when suspicious activity is detected. CC ID 12221 | Configuration | Corrective | |
Configure File Integrity Monitoring Software to Organizational Standards. CC ID 11923 | Configuration | Preventive | |
Configure the file integrity monitoring software to perform critical file comparisons, as necessary. CC ID 11924 | Configuration | Preventive | |
Configure Bluetooth settings according to organizational standards. CC ID 12422 | Configuration | Preventive | |
Unpair Bluetooth devices when the pairing is no longer required. CC ID 15232 | Configuration | Preventive | |
Use authorized versions of Bluetooth to pair Bluetooth devices. CC ID 15231 | Configuration | Preventive | |
Refrain from using unit keys on Bluetooth devices. CC ID 12541 | Configuration | Preventive | |
Configure link keys to be based on combination keys in Bluetooth devices. CC ID 12539 | Configuration | Preventive | |
Refrain from using the "Just Works" model of Secure Simple Pairing in Bluetooth settings. CC ID 12538 | Configuration | Preventive | |
Disable all Bluetooth profiles other than the Serial Port Profile. CC ID 12536 | Configuration | Preventive | |
Lock Bluetooth profiles to prevent them being altered by end users. CC ID 12535 | Configuration | Preventive | |
Configure Bluetooth to refrain from allowing multiple profiles of Bluetooth stacks. CC ID 12433 | Configuration | Preventive | |
Remove backup files after initializing and hardening is complete. CC ID 01602 | Configuration | Preventive | |
Perform vulnerability testing before final installation. CC ID 00884 | Testing | Detective | |
Reboot the system after initial systems hardening is complete and before certification. CC ID 01603 | Systems Design, Build, and Implementation | Preventive | |
Configure systems to protect against unauthorized data mining. CC ID 10095 | Configuration | Preventive | |
Implement safeguards to prevent unauthorized code execution. CC ID 10686 | Configuration | Preventive | |
Configure network switches to organizational standards. CC ID 12120 | Configuration | Preventive | |
Enable Virtual Local Area Networks on network switches, as necessary. CC ID 12129 | Configuration | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Systems design, build, and implementation CC ID 00989 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain a System Development Life Cycle program. CC ID 11823 | Systems Design, Build, and Implementation | Preventive | |
Include information security throughout the system development life cycle. CC ID 12042 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Systems Design, Build, and Implementation | Preventive | |
Protect confidential information during the system development life cycle program. CC ID 13479 | Data and Information Management | Preventive | |
Initiate the System Development Life Cycle planning phase. CC ID 06266 | Systems Design, Build, and Implementation | Preventive | |
Establish, implement, and maintain a system design project management framework. CC ID 00990 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain project management standards. CC ID 00992 | Establish/Maintain Documentation | Preventive | |
Conduct a post implementation review when the system design project ends. CC ID 01003 [Review whether management implements the following as appropriate: Reliability of the items purchased is regularly reviewed post-implementation. App A Objective 6.19.e] | Testing | Detective | |
Initiate the System Development Life Cycle development phase or System Development Life Cycle build phase. CC ID 06267 | Systems Design, Build, and Implementation | Preventive | |
Develop systems in accordance with the system design specifications and system design standards. CC ID 01094 | Systems Design, Build, and Implementation | Preventive | |
Develop new products based on best practices. CC ID 01095 | Systems Design, Build, and Implementation | Preventive | |
Implement security controls when developing systems. CC ID 06270 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Systems Design, Build, and Implementation | Preventive | |
Analyze and minimize attack surfaces when developing systems. CC ID 06828 | Systems Design, Build, and Implementation | Preventive | |
Include restricted data encryption and restricted information encryption in the security controls. CC ID 01083 | Technical Security | Preventive | |
Require successful authentication before granting access to system functionality via network interfaces. CC ID 14926 | Technical Security | Preventive | |
Implement a hardware security module, as necessary. CC ID 12222 | Systems Design, Build, and Implementation | Preventive | |
Audit all modifications to the application being developed. CC ID 01614 | Testing | Detective | |
Require dual authentication when switching out of PCI mode in the hardware security module. CC ID 12274 | Systems Design, Build, and Implementation | Preventive | |
Include an indicator to designate when the hardware security module is in PCI mode. CC ID 12273 | Systems Design, Build, and Implementation | Preventive | |
Design the random number generator to generate random numbers that are unpredictable. CC ID 12255 | Systems Design, Build, and Implementation | Preventive | |
Design the hardware security module to enforce the separation between applications. CC ID 12254 | Systems Design, Build, and Implementation | Preventive | |
Protect sensitive data when transiting sensitive services in the hardware security module. CC ID 12253 | Systems Design, Build, and Implementation | Preventive | |
Design the hardware security module to automatically clear its internal buffers of sensitive information prior to reuse of the buffer. CC ID 12233 | Systems Design, Build, and Implementation | Preventive | |
Design the hardware security module to automatically clear its internal buffers of sensitive information after it recovers from an error condition. CC ID 12252 | Systems Design, Build, and Implementation | Preventive | |
Design the hardware security module to automatically clear its internal buffers of sensitive information when it has timed out. CC ID 12251 | Systems Design, Build, and Implementation | Preventive | |
Design the hardware security module to erase sensitive data when compromised. CC ID 12275 | Systems Design, Build, and Implementation | Preventive | |
Restrict key-usage information for cryptographic keys in the hardware security module. CC ID 12232 | Systems Design, Build, and Implementation | Preventive | |
Prevent cryptographic keys in the hardware security module from making unauthorized changes to data. CC ID 12231 | Systems Design, Build, and Implementation | Preventive | |
Include in the system documentation methodologies for authenticating the hardware security module. CC ID 12258 | Establish/Maintain Documentation | Preventive | |
Protect sensitive information within the hardware security module from unauthorized changes. CC ID 12225 | Systems Design, Build, and Implementation | Preventive | |
Prohibit sensitive functions from working outside of protected areas of the hardware security module. CC ID 12224 | Systems Design, Build, and Implementation | Preventive | |
Establish, implement, and maintain an acceptable use policy for the hardware security module. CC ID 12247 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the acceptable use policy for the hardware security module. CC ID 12264 | Establish/Maintain Documentation | Preventive | |
Include the environmental requirements in the acceptable use policy for the hardware security module. CC ID 12263 | Establish/Maintain Documentation | Preventive | |
Include device identification in the acceptable use policy for the hardware security module. CC ID 12262 | Establish/Maintain Documentation | Preventive | |
Include device functionality in the acceptable use policy for the hardware security module. CC ID 12261 [{network device configuration} Determine whether management does the following: Verifies network devices are properly configured and function appropriately within the environment App A Objective 6.11.l] | Establish/Maintain Documentation | Preventive | |
Include administrative responsibilities in the acceptable use policy for the hardware security module. CC ID 12260 | Establish/Maintain Documentation | Preventive | |
Install secret information into the hardware security module during manufacturing. CC ID 12249 | Systems Design, Build, and Implementation | Preventive | |
Install secret information into the hardware security module so that it can only be verified by the initial-key-loading facility. CC ID 12272 | Systems Design, Build, and Implementation | Preventive | |
Install secret information under dual control into the hardware security module. CC ID 12257 | Systems Design, Build, and Implementation | Preventive | |
Establish, implement, and maintain session security coding standards. CC ID 04584 | Establish/Maintain Documentation | Preventive | |
Establish and maintain a cryptographic architecture document. CC ID 12476 | Establish/Maintain Documentation | Preventive | |
Include the algorithms used in the cryptographic architecture document. CC ID 12483 | Establish/Maintain Documentation | Preventive | |
Include an inventory of all protected areas in the cryptographic architecture document. CC ID 12486 | Establish/Maintain Documentation | Preventive | |
Include a description of the key usage for each key in the cryptographic architecture document. CC ID 12484 | Establish/Maintain Documentation | Preventive | |
Include descriptions of all cryptographic keys in the cryptographic architecture document. CC ID 12487 | Establish/Maintain Documentation | Preventive | |
Include descriptions of the cryptographic key strength of all cryptographic keys in the cryptographic architecture document. CC ID 12488 | Establish/Maintain Documentation | Preventive | |
Include each cryptographic key's expiration date in the cryptographic architecture document. CC ID 12489 | Establish/Maintain Documentation | Preventive | |
Include the protocols used in the cryptographic architecture document. CC ID 12485 | Establish/Maintain Documentation | Preventive | |
Implement software development version controls. CC ID 01098 [Determine whether management does the following: Maintains strict version control of all software updates. App A Objective 6.11.j] | Systems Design, Build, and Implementation | Preventive | |
Develop new products based on secure coding techniques. CC ID 11733 | Systems Design, Build, and Implementation | Preventive | |
Establish and maintain a coding manual for secure coding techniques. CC ID 11863 | Establish/Maintain Documentation | Preventive | |
Control user account management through secure coding techniques in source code. CC ID 11909 | Technical Security | Preventive | |
Restrict direct access of databases to the database administrator through secure coding techniques in source code. CC ID 11933 [Management should implement effective controls for databases and restrict access appropriately. II.C.18 Database Security Management should implement effective controls for databases and restrict access appropriately. II.C.18 Database Security {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the yle="background-color:#F0BBBC;" class="term_primary-noun">sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts access and applies the rule of least privilege in assigning authorizations. App A Objective 6.29 {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts und-color:#F0BBBC;" class="term_primary-noun">access and applies the rule of least privilege in assigning authorizations. App A Objective 6.29] | Technical Security | Preventive | |
Establish and maintain the overall system development project management roles and responsibilities. CC ID 00991 | Establish Roles | Preventive | |
Assign the role of information security management as a part of developing systems. CC ID 06823 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Establish Roles | Preventive | |
Perform Quality Management on all newly developed or modified systems. CC ID 01100 | Testing | Detective | |
Establish, implement, and maintain system testing procedures. CC ID 11744 [Determine whether management does the following: Develops test scripts and implementation plans. App A Objective 6.11.f] | Establish/Maintain Documentation | Preventive | |
Restrict production data from being used in the test environment. CC ID 01103 | Testing | Detective | |
Protect test data in the development environment. CC ID 12014 [{test data} Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality of test plans and data. App A Objective 10.2.e] | Technical Security | Preventive | |
Control the test data used in the development environment. CC ID 12013 | Systems Design, Build, and Implementation | Preventive | |
Select the test data carefully. CC ID 12011 | Systems Design, Build, and Implementation | Preventive | |
Test all software changes before promoting the system to a production environment. CC ID 01106 | Testing | Detective | |
Test security functionality during the development process. CC ID 12015 | Testing | Preventive | |
Include system performance in the scope of system testing. CC ID 12624 | Process or Activity | Preventive | |
Include security controls in the scope of system testing. CC ID 12623 | Process or Activity | Preventive | |
Include business logic in the scope of system testing. CC ID 12622 | Process or Activity | Preventive | |
Review and test custom code to identify potential coding vulnerabilities. CC ID 01316 | Testing | Detective | |
Review and test source code. CC ID 01086 | Testing | Detective | |
Assign the review of custom code changes to individuals other than the code author. CC ID 06291 | Establish Roles | Preventive | |
Evaluate and document all known code anomalies and code deficiencies. CC ID 06611 | Establish/Maintain Documentation | Preventive | |
Correct code anomalies and code deficiencies in custom code and retest before release. CC ID 06292 | Testing | Corrective | |
Approve all custom code test results before code is released. CC ID 06293 | Testing | Detective | |
Disseminate and communicate the system testing procedures to interested personnel and affected parties. CC ID 15471 | Communicate | Preventive | |
Establish, implement, and maintain poor quality material removal procedures. CC ID 06214 | Establish/Maintain Documentation | Preventive | |
Perform Quality Management on all newly developed or modified software. CC ID 11798 [{conduct} Review whether management implements the following as appropriate: Software is reviewed through both automated software testing and code reviews. App A Objective 6.19.d] | Testing | Detective | |
Establish, implement, and maintain a system testing program for all system development projects. CC ID 01101 | Establish/Maintain Documentation | Preventive | |
Initiate the System Development Life Cycle implementation phase. CC ID 06268 | Systems Design, Build, and Implementation | Preventive | |
Establish, implement, and maintain a system implementation standard. CC ID 01111 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an implementation plan. CC ID 01114 [Determine whether management does the following: Develops test scripts and implementation plans. App A Objective 6.11.f] | Establish/Maintain Documentation | Preventive | |
Include an implementation schedule in the implementation plan. CC ID 16124 | Establish/Maintain Documentation | Preventive | |
Include the allocation of resources in the implementation plan. CC ID 16122 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the implementation plan. CC ID 16121 | Establish/Maintain Documentation | Preventive | |
Approve implementation plans, as necessary. CC ID 13628 | Establish/Maintain Documentation | Corrective | |
Perform a final system test prior to implementing a new system. CC ID 01108 | Testing | Detective | |
Conduct a final security audit prior to implementing a new system. CC ID 06833 | Testing | Detective | |
Integrate additional security controls for newly implemented systems into interconnected systems, as necessary. CC ID 06272 [{integrate} Determine whether management responsibilities are appropriate and include the following: Integration of security controls throughout the institution. App A Objective 2.5.i] | Technical Security | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Technical security CC ID 00508 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain an access classification scheme. CC ID 00509 [{network connection type} Review whether management does the following: Identifies access points and connection types that pose risk. App A Objective 6.7.b {network connection type} Review whether management does the following: Identifies access points and connection types that pose risk. App A Objective 6.7.b] | Establish/Maintain Documentation | Preventive | |
Identify external requirements for customer access. CC ID 12736 | Technical Security | Detective | |
Address and remediate external requirements for customer access. CC ID 12737 | Technical Security | Corrective | |
Include restricting access to confidential data or restricted information to a need to know basis in the access classification scheme. CC ID 00510 | Establish/Maintain Documentation | Preventive | |
Include business security requirements in the access classification scheme. CC ID 00002 | Establish/Maintain Documentation | Preventive | |
Interpret and apply security requirements based upon the information classification of the system. CC ID 00003 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Establish/Maintain Documentation | Preventive | |
Include third party access in the access classification scheme. CC ID 11786 [Identify unique products and services and any required third-party access requirements. App A Objective 1.4.b] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain security classifications for organizational assets. CC ID 00005 | Establish/Maintain Documentation | Preventive | |
Establish the criticality of the network and systems. CC ID 00006 | Technical Security | Preventive | |
Limit the use of resources by priority. CC ID 01448 | Technical Security | Preventive | |
Review connection requirements for all systems. CC ID 06411 | Establish/Maintain Documentation | Detective | |
Establish, implement, and maintain an access control program. CC ID 11702 [{controls} Review whether management does the following: Develops and maintains a culture that fosters responsible and controlled access for users. App A Objective 6.8.a] | Establish/Maintain Documentation | Preventive | |
Include instructions to change authenticators as often as necessary in the access control program. CC ID 11931 | Establish/Maintain Documentation | Preventive | |
Include guidance for how users should protect their authentication credentials in the access control program. CC ID 11929 | Establish/Maintain Documentation | Preventive | |
Include guidance on selecting authentication credentials in the access control program. CC ID 11928 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain access control policies. CC ID 00512 [{access control policy} {data transfer policy} Determine whether management maintains policies and effectively controls and protects access to and transmission of information to avoid loss or damage. Review whether management does the following: App A Objective 6.18 {enforce} Determine whether the institution's security operations activities include the following: Enforcement of access controls. App A Objective 8.1.k Determine whether management effectively provides secure customer access to financial services and plans for potential interruptions in service. Review whether management does the following: App A Objective 6.25] | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the access control policy. CC ID 14006 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the access control policy. CC ID 14005 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the access control policy. CC ID 14004 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the access control policy. CC ID 14003 | Establish/Maintain Documentation | Preventive | |
Include the scope in the access control policy. CC ID 14002 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the access control policy. CC ID 14001 | Establish/Maintain Documentation | Preventive | |
Document the business need justification for user accounts. CC ID 15490 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an instant messaging and chat system usage policy. CC ID 11815 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the access control policies to all interested personnel and affected parties. CC ID 10061 [Review whether management does the following: Communicates and enforces the responsibilities of programmers, security administrators, and application owners in maintaining effective application access control. App A Objective 6.22.d] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an access rights management plan. CC ID 00513 [Review whether management has the following: A process to control privileged access. App A Objective 6.20.d Review whether management has the following: A monitoring process to oversee and manage the access rights granted to each user on the system. App A Objective 6.20.c Determine whether management has an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices. Review whether management has the following: App A Objective 6.20 Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Establish/Maintain Documentation | Preventive | |
Implement safeguards to protect access credentials from unauthorized access. CC ID 16433 | Technical Security | Preventive | |
Inventory all user accounts. CC ID 13732 | Establish/Maintain Documentation | Preventive | |
Identify information system users. CC ID 12081 | Technical Security | Detective | |
Review user accounts. CC ID 00525 | Technical Security | Detective | |
Match user accounts to authorized parties. CC ID 12126 | Configuration | Detective | |
Identify and authenticate processes running on information systems that act on behalf of users. CC ID 12082 | Technical Security | Detective | |
Establish and maintain contact information for user accounts, as necessary. CC ID 15418 | Data and Information Management | Preventive | |
Review shared accounts. CC ID 11840 | Technical Security | Detective | |
Control access rights to organizational assets. CC ID 00004 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts and logs access to and activity on operating system parameters, system utilities (especially those with data-altering capabilities), and sensitive system resources (including files, programs, and processes), and supplements with additional security software, as necessary. App A Objective 6.21.b Determine whether management controls access to applications. Review whether management does the following: App A Objective 6.22 As part of management's process to secure the operating system and all system components, determine whether management does the following: Limits the number of employees with access to operating system and system utilities and grants only the minimum level of access required to perform job responsibilities. App A Objective 6.21.a {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical Security | Preventive | |
Configure access control lists in accordance with organizational standards. CC ID 16465 | Configuration | Preventive | |
Add all devices requiring access control to the Access Control List. CC ID 06264 | Establish/Maintain Documentation | Preventive | |
Generate but refrain from storing authenticators or Personal Identification Numbers for systems involved in high risk activities. CC ID 06835 | Technical Security | Preventive | |
Disallow application IDs from running as privileged users. CC ID 10050 | Configuration | Detective | |
Define roles for information systems. CC ID 12454 | Human Resources Management | Preventive | |
Define access needs for each role assigned to an information system. CC ID 12455 | Human Resources Management | Preventive | |
Define access needs for each system component of an information system. CC ID 12456 | Technical Security | Preventive | |
Define the level of privilege required for each system component of an information system. CC ID 12457 | Technical Security | Preventive | |
Establish access rights based on least privilege. CC ID 01411 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Limits the number of employees with access to operating system and system utilities and grants only the minimum level of access required to perform job responsibilities. App A Objective 6.21.a Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts access and applies the rule of least privilege</span> in assigning authorizations. App A Objective 6.29] | Technical Security | Preventive | |
Assign user permissions based on job responsibilities. CC ID 00538 [Review whether management does the following: Manages application access rights by using group profiles. App A Objective 6.22.b Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Technical Security | Preventive | |
Assign user privileges after they have management sign off. CC ID 00542 | Technical Security | Preventive | |
Separate processing domains to segregate user privileges and enhance information flow control. CC ID 06767 | Configuration | Preventive | |
Establish, implement, and maintain lockout procedures or lockout mechanisms to be triggered after a predetermined number of consecutive logon attempts. CC ID 01412 | Technical Security | Preventive | |
Configure the lockout procedure to disregard failed logon attempts after the user is authenticated. CC ID 13822 | Configuration | Preventive | |
Notify the user when an authentication is attempted using an expired authenticator. CC ID 13818 | Communicate | Corrective | |
Disallow unlocking user accounts absent system administrator approval. CC ID 01413 | Technical Security | Preventive | |
Establish, implement, and maintain session lock capabilities. CC ID 01417 | Configuration | Preventive | |
Limit concurrent sessions according to account type. CC ID 01416 | Configuration | Preventive | |
Establish session authenticity through Transport Layer Security. CC ID 01627 | Technical Security | Preventive | |
Configure the "tlsverify" argument to organizational standards. CC ID 14460 | Configuration | Preventive | |
Configure the "tlscacert" argument to organizational standards. CC ID 14521 | Configuration | Preventive | |
Configure the "tlscert" argument to organizational standards. CC ID 14520 | Configuration | Preventive | |
Configure the "tlskey" argument to organizational standards. CC ID 14519 | Configuration | Preventive | |
Enable access control for objects and users on each system. CC ID 04553 | Configuration | Preventive | |
Include all system components in the access control system. CC ID 11939 | Technical Security | Preventive | |
Set access control for objects and users to "deny all" unless explicitly authorized. CC ID 06301 | Process or Activity | Preventive | |
Enable access control for objects and users to match restrictions set by the system's security classification. CC ID 04850 [Determine whether management does the following: Restricts changes to authorized users. App A Objective 6.11.c] | Technical Security | Preventive | |
Enable attribute-based access control for objects and users on information systems. CC ID 16351 | Technical Security | Preventive | |
Enable role-based access control for objects and users on information systems. CC ID 12458 | Technical Security | Preventive | |
Include the objects and users subject to access control in the security policy. CC ID 11836 | Establish/Maintain Documentation | Preventive | |
Assign Information System access authorizations if implementing segregation of duties. CC ID 06323 | Establish Roles | Preventive | |
Enforce access restrictions for change control. CC ID 01428 | Technical Security | Preventive | |
Enforce access restrictions for restricted data. CC ID 01921 [{access controls} Review whether management does the following: Establishes controls to limit access to data. App A Objective 6.18.b] | Data and Information Management | Preventive | |
Permit a limited set of user actions absent identification and authentication. CC ID 04849 | Technical Security | Preventive | |
Perform a risk assessment prior to activating third party access to the organization's critical systems. CC ID 06455 | Testing | Detective | |
Activate third party maintenance accounts and user identifiers, as necessary. CC ID 04262 | Technical Security | Preventive | |
Establish, implement, and maintain a system use agreement for each information system. CC ID 06500 | Establish/Maintain Documentation | Preventive | |
Accept and sign the system use agreement before data or system access is enabled. CC ID 06501 | Establish/Maintain Documentation | Preventive | |
Display a logon banner and appropriate logon message before granting access to the system. CC ID 06770 | Technical Security | Preventive | |
Display previous logon information in the logon banner. CC ID 01415 | Configuration | Preventive | |
Document actions that can be performed on an information system absent identification and authentication of the user. CC ID 06771 | Establish/Maintain Documentation | Preventive | |
Use automatic equipment identification as a method of connection authentication absent an individual's identification and authentication. CC ID 06964 | Technical Security | Preventive | |
Control user privileges. CC ID 11665 | Technical Security | Preventive | |
Review all user privileges, as necessary. CC ID 06784 [Review whether management does the following: Periodically reviews and approves the application access assigned to users for appropriateness. App A Objective 6.22.c] | Technical Security | Preventive | |
Revoke asset access when a personnel status change occurs or an individual is terminated. CC ID 00516 | Behavior | Corrective | |
Encrypt files and move them to a secure file server when a user account is disabled. CC ID 07065 | Configuration | Preventive | |
Review and update accounts and access rights when notified of personnel status changes. CC ID 00788 | Behavior | Corrective | |
Change authenticators after personnel status changes. CC ID 12284 | Human Resources Management | Preventive | |
Review each user's access capabilities when their role changes. CC ID 00524 | Technical Security | Preventive | |
Establish and maintain a Digital Rights Management program. CC ID 07093 | Establish/Maintain Documentation | Preventive | |
Enable products restricted by Digital Rights Management to be used while offline. CC ID 07094 | Technical Security | Preventive | |
Establish, implement, and maintain User Access Management procedures. CC ID 00514 [{physical access} Review whether management does the following: Establishes and appropriately administers a user access program for physical and logical access. App A Objective 6.8.c Review whether management has the following: An authorization process to add, delete, or modify authorized user access to operating systems, applications, directories, files, and specific types of information. App A Objective 6.20.b Review whether management implements the following as appropriate: An enrollment process to add new users to the system. App A Objective 6.20.a {default password} {default account} Review whether management has the following: A process to change or disable default user accounts and passwords. App A Objective 6.20.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Technical Security | Preventive | |
Establish, implement, and maintain an authority for access authorization list. CC ID 06782 | Establish/Maintain Documentation | Preventive | |
Review and approve logical access to all assets based upon organizational policies. CC ID 06641 | Technical Security | Preventive | |
Control the addition and modification of user identifiers, user credentials, or other authenticators. CC ID 00515 | Technical Security | Preventive | |
Assign roles and responsibilities for administering user account management. CC ID 11900 | Human Resources Management | Preventive | |
Automate access control methods, as necessary. CC ID 11838 | Technical Security | Preventive | |
Automate Access Control Systems, as necessary. CC ID 06854 | Technical Security | Preventive | |
Refrain from storing logon credentials for third party applications. CC ID 13690 | Technical Security | Preventive | |
Refrain from allowing user access to identifiers and authenticators used by applications. CC ID 10048 | Technical Security | Preventive | |
Notify interested personnel when user accounts are added or deleted. CC ID 14327 | Communicate | Detective | |
Remove inactive user accounts, as necessary. CC ID 00517 | Technical Security | Corrective | |
Remove temporary user accounts, as necessary. CC ID 11839 | Technical Security | Corrective | |
Establish, implement, and maintain a password policy. CC ID 16346 | Establish/Maintain Documentation | Preventive | |
Enforce the password policy. CC ID 16347 | Technical Security | Preventive | |
Disseminate and communicate the password policies and password procedures to all users who have access to restricted data or restricted information. CC ID 00518 | Establish/Maintain Documentation | Preventive | |
Limit superuser accounts to designated System Administrators. CC ID 06766 | Configuration | Preventive | |
Enforce usage restrictions for superuser accounts. CC ID 07064 | Technical Security | Preventive | |
Establish, implement, and maintain user accounts in accordance with the organizational Governance, Risk, and Compliance framework. CC ID 00526 | Technical Security | Preventive | |
Protect and manage biometric systems and biometric data. CC ID 01261 | Technical Security | Preventive | |
Establish, implement, and maintain biometric collection procedures. CC ID 15419 | Establish/Maintain Documentation | Preventive | |
Document the business need justification for authentication data storage. CC ID 06325 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain access control procedures. CC ID 11663 | Establish/Maintain Documentation | Preventive | |
Implement out-of-band authentication, as necessary. CC ID 10606 | Technical Security | Corrective | |
Grant access to authorized personnel or systems. CC ID 12186 | Configuration | Preventive | |
Document approving and granting access in the access control log. CC ID 06786 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts and logs access to and activity on operating system parameters, system utilities (especially those with data-altering capabilities), and sensitive system resources (including files, programs, and processes), and supplements with additional security software, as necessary. App A Objective 6.21.b] | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the access control log to interested personnel and affected parties. CC ID 16442 | Communicate | Preventive | |
Include the user identifiers of all personnel who are authorized to access a system in the system record. CC ID 15171 | Establish/Maintain Documentation | Preventive | |
Include identity information of all personnel who are authorized to access a system in the system record. CC ID 16406 | Establish/Maintain Documentation | Preventive | |
Include the date and time that access was reviewed in the system record. CC ID 16416 | Data and Information Management | Preventive | |
Include the date and time that access rights were changed in the system record. CC ID 16415 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the access control procedures to all interested personnel and affected parties. CC ID 14123 | Communicate | Corrective | |
Establish, implement, and maintain an identification and authentication policy. CC ID 14033 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the identification and authentication policy. CC ID 14234 | Establish/Maintain Documentation | Preventive | |
Include the scope in the identification and authentication policy. CC ID 14232 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the identification and authentication policy. CC ID 14230 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the identification and authentication policy. CC ID 14229 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the identification and authentication policy. CC ID 14227 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the identification and authentication policy. CC ID 14225 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the identification and authentication policy to interested personnel and affected parties. CC ID 14197 | Communicate | Preventive | |
Establish, implement, and maintain identification and authentication procedures. CC ID 14053 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the identification and authentication procedures to interested personnel and affected parties. CC ID 14223 | Communicate | Preventive | |
Include digital identification procedures in the access control program. CC ID 11841 | Technical Security | Preventive | |
Employ unique identifiers. CC ID 01273 | Testing | Detective | |
Disseminate and communicate user identifiers and authenticators using secure communication protocols. CC ID 06791 | Data and Information Management | Preventive | |
Include instructions to refrain from using previously used authenticators in the access control program. CC ID 11930 | Establish/Maintain Documentation | Preventive | |
Disallow the use of Personal Identification Numbers as user identifiers. CC ID 06785 | Technical Security | Preventive | |
Define the activation requirements for identification cards or badges. CC ID 06583 | Process or Activity | Preventive | |
Require multiple forms of personal identification prior to issuing user identifiers. CC ID 08712 | Human Resources Management | Preventive | |
Authenticate user identities before unlocking an account. CC ID 11837 | Testing | Detective | |
Authenticate user identities before manually resetting an authenticator. CC ID 04567 | Testing | Detective | |
Require proper authentication for user identifiers. CC ID 11785 [{be consistent} Review whether management does the following: Implements a robust authentication method consistent with the criticality and sensitivity of the application. App A Objective 6.22.a {authentication control} Review whether applications in use provide the following capabilities: Integrate additional authentication and encryption controls, as necessary. App A Objective 6.27.f] | Technical Security | Preventive | |
Assign authenticators to user accounts. CC ID 06855 | Configuration | Preventive | |
Assign authentication mechanisms for user account authentication. CC ID 06856 | Configuration | Preventive | |
Refrain from allowing individuals to share authentication mechanisms. CC ID 11932 | Technical Security | Preventive | |
Establish and maintain a memorized secret list. CC ID 13791 | Establish/Maintain Documentation | Preventive | |
Limit account credential reuse as a part of digital identification procedures. CC ID 12357 | Configuration | Preventive | |
Refrain from assigning authentication mechanisms for shared accounts. CC ID 11910 | Technical Security | Preventive | |
Use biometric authentication for identification and authentication, as necessary. CC ID 06857 | Establish Roles | Preventive | |
Employ live scans to verify biometric authentication. CC ID 06847 | Technical Security | Preventive | |
Identify the user when enrolling them in the biometric system. CC ID 06882 | Testing | Detective | |
Disallow self-enrollment of biometric information. CC ID 11834 | Process or Activity | Preventive | |
Tune the biometric identification equipment, as necessary. CC ID 07077 | Configuration | Corrective | |
Notify a user when an authenticator for a user account is changed. CC ID 13820 | Communicate | Preventive | |
Identify and control all network access controls. CC ID 00529 [{wired network} Review whether management does the following: Implements appropriate controls over wired and wireless networks. App A Objective 6.10.c {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical Security | Preventive | |
Place Intrusion Detection Systems and Intrusion Response Systems in network locations where they will be the most effective. CC ID 04589 | Technical Security | Detective | |
Establish, implement, and maintain a network configuration standard. CC ID 00530 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain network segmentation requirements. CC ID 16380 | Establish/Maintain Documentation | Preventive | |
Enforce the network segmentation requirements. CC ID 16381 | Process or Activity | Preventive | |
Ensure the data plane, control plane, and management plane have been segregated according to organizational standards. CC ID 16385 | Technical Security | Preventive | |
Establish, implement, and maintain a network security policy. CC ID 06440 | Establish/Maintain Documentation | Preventive | |
Include compliance requirements in the network security policy. CC ID 14205 | Establish/Maintain Documentation | Preventive | |
Include coordination amongst entities in the network security policy. CC ID 14204 | Establish/Maintain Documentation | Preventive | |
Include management commitment in the network security policy. CC ID 14203 | Establish/Maintain Documentation | Preventive | |
Include roles and responsibilities in the network security policy. CC ID 14202 | Establish/Maintain Documentation | Preventive | |
Include the scope in the network security policy. CC ID 14201 | Establish/Maintain Documentation | Preventive | |
Include the purpose in the network security policy. CC ID 14200 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the network security policy to interested personnel and affected parties. CC ID 14199 | Communicate | Preventive | |
Establish, implement, and maintain system and communications protection procedures. CC ID 14052 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the system and communications protection procedures to interested personnel and affected parties. CC ID 14206 | Communicate | Preventive | |
Establish, implement, and maintain a wireless networking policy. CC ID 06732 [{wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Review whether management does the following: Implements appropriate controlspan> over wired and style="background-color:#F0BBBC;" class="term_primary-noun">wireless networks. App A Objective 6.10.c] | Establish/Maintain Documentation | Preventive | |
Include usage restrictions for Bluetooth in the wireless networking policy. CC ID 16443 | Establish/Maintain Documentation | Preventive | |
Maintain up-to-date network diagrams. CC ID 00531 [Review whether management does the following: Maintains accurate network diagrams and data flow charts. App A Objective 6.10.b {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Establish/Maintain Documentation | Preventive | |
Include the date of the most recent update on the network diagram. CC ID 14319 | Establish/Maintain Documentation | Preventive | |
Include virtual systems in the network diagram. CC ID 16324 | Data and Information Management | Preventive | |
Include the organization's name in the network diagram. CC ID 14318 | Establish/Maintain Documentation | Preventive | |
Use a passive asset inventory discovery tool to identify assets when network mapping. CC ID 13735 | Process or Activity | Detective | |
Include Internet Protocol addresses in the network diagram. CC ID 16244 | Establish/Maintain Documentation | Preventive | |
Include Domain Name System names in the network diagram. CC ID 16240 | Establish/Maintain Documentation | Preventive | |
Accept, by formal signature, the security implications of the network topology. CC ID 12323 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate network diagrams to interested personnel and affected parties. CC ID 13137 | Communicate | Preventive | |
Maintain up-to-date data flow diagrams. CC ID 10059 [Review whether management does the following: Maintains accurate network diagrams and data flow charts. App A Objective 6.10.b {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Establish/Maintain Documentation | Preventive | |
Use an active asset inventory discovery tool to identify sensitive information for data flow diagrams. CC ID 13737 | Process or Activity | Detective | |
Establish, implement, and maintain a sensitive information inventory. CC ID 13736 | Establish/Maintain Documentation | Detective | |
Include information flows to third parties in the data flow diagram. CC ID 13185 | Establish/Maintain Documentation | Preventive | |
Document where data-at-rest and data in transit is encrypted on the data flow diagram. CC ID 16412 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the data flow diagrams to interested personnel and affected parties. CC ID 16407 | Communicate | Preventive | |
Manage all internal network connections. CC ID 06329 | Technical Security | Preventive | |
Employ Dynamic Host Configuration Protocol server logging when assigning dynamic IP addresses using the Dynamic Host Configuration Protocol. CC ID 12109 | Technical Security | Preventive | |
Establish, implement, and maintain separate virtual private networks to transport sensitive information. CC ID 12124 | Technical Security | Preventive | |
Establish, implement, and maintain separate virtual local area networks for untrusted devices. CC ID 12095 | Technical Security | Preventive | |
Plan for and approve all network changes. CC ID 00534 | Technical Security | Preventive | |
Manage all external network connections. CC ID 11842 | Technical Security | Preventive | |
Route outbound Internet traffic through a proxy server that supports decrypting network traffic. CC ID 12116 | Technical Security | Preventive | |
Prohibit systems from connecting directly to external networks. CC ID 08709 | Configuration | Preventive | |
Prohibit systems from connecting directly to internal networks outside the demilitarized zone (DMZ). CC ID 16360 | Technical Security | Preventive | |
Secure the Domain Name System. CC ID 00540 | Configuration | Preventive | |
Implement a fault-tolerant architecture. CC ID 01626 | Technical Security | Preventive | |
Implement segregation of duties. CC ID 11843 | Technical Security | Preventive | |
Configure the network to limit zone transfers to trusted servers. CC ID 01876 | Configuration | Preventive | |
Register all Domain Names associated with the organization to the organization and not an individual. CC ID 07210 | Testing | Detective | |
Establish, implement, and maintain a Boundary Defense program. CC ID 00544 [Review whether applications in use provide the following capabilities: Protect web or Internet-facing applications through additional controls, including web application firewalls, regular scanning for new or recurring vulnerabilities, mitigation or remediation of common security weaknesses, and network segregation. App A Objective 6.27.g] | Establish/Maintain Documentation | Preventive | |
Refrain from disclosing private Internet Protocol addresses and routing information, unless necessary. CC ID 11891 | Technical Security | Preventive | |
Authorize the disclosure of private Internet Protocol addresses and routing information to external entities. CC ID 12034 | Communicate | Preventive | |
Segregate systems in accordance with organizational standards. CC ID 12546 | Technical Security | Preventive | |
Implement gateways between security domains. CC ID 16493 | Systems Design, Build, and Implementation | Preventive | |
Implement resource-isolation mechanisms in organizational networks. CC ID 16438 | Technical Security | Preventive | |
Segregate servers that contain restricted data or restricted information from direct public access. CC ID 00533 | Technical Security | Preventive | |
Prevent logical access to dedicated networks from outside the secure areas. CC ID 12310 | Technical Security | Preventive | |
Design Demilitarized Zones with proper isolation rules. CC ID 00532 | Technical Security | Preventive | |
Restrict inbound network traffic into the Demilitarized Zone. CC ID 01285 | Data and Information Management | Preventive | |
Restrict inbound network traffic into the Demilitarized Zone to Internet Protocol addresses within the Demilitarized Zone. CC ID 11998 | Technical Security | Preventive | |
Restrict inbound Internet traffic within the Demilitarized Zone to system components that provide publicly accessible services, protocols, and ports. CC ID 11993 | Technical Security | Preventive | |
Segregate applications and databases that contain restricted data or restricted information in an internal network zone. CC ID 01289 | Data and Information Management | Preventive | |
Establish, implement, and maintain a network access control standard. CC ID 00546 [Determine whether management secures access to its computer networks through multiple layers of access controls. Review whether management does the following: App A Objective 6.10 {network zone} Review whether management does the following: Establishes zones (e.g., trusted and untrusted) according to risk with appropriate access requirements within and between each zone. App A Objective 6.10.a {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Establish/Maintain Documentation | Preventive | |
Include assigned roles and responsibilities in the network access control standard. CC ID 06410 | Establish Roles | Preventive | |
Employ firewalls to secure network connections between networks of different security categorizations. CC ID 16373 | Technical Security | Preventive | |
Employ firewalls to secure network connections between trusted networks and untrusted networks, as necessary. CC ID 11821 | Technical Security | Preventive | |
Place firewalls between all security domains and between any Demilitarized Zone and internal network zones. CC ID 01274 | Configuration | Preventive | |
Place firewalls between wireless networks and applications or databases that contain restricted data or restricted information. CC ID 01293 | Configuration | Preventive | |
Place firewalls between all security domains and between any secure subnet and internal network zones. CC ID 11784 | Configuration | Preventive | |
Separate the wireless access points and wireless bridges from the wired network via a firewall. CC ID 04588 | Technical Security | Preventive | |
Include configuration management and rulesets in the network access control standard. CC ID 11845 | Establish/Maintain Documentation | Preventive | |
Secure the network access control standard against unauthorized changes. CC ID 11920 | Establish/Maintain Documentation | Preventive | |
Employ centralized management systems to configure and control networks, as necessary. CC ID 12540 | Technical Security | Preventive | |
Establish, implement, and maintain a firewall and router configuration standard. CC ID 00541 | Configuration | Preventive | |
Include testing and approving all network connections through the firewall in the firewall and router configuration standard. CC ID 01270 | Process or Activity | Detective | |
Include compensating controls implemented for insecure protocols in the firewall and router configuration standard. CC ID 11948 | Establish/Maintain Documentation | Preventive | |
Include reviewing the rulesets for firewalls and routers in the firewall and router configuration standard, as necessary. CC ID 11903 | Technical Security | Corrective | |
Include restricting inbound network traffic in the firewall and router configuration standard. CC ID 11960 | Establish/Maintain Documentation | Preventive | |
Include restricting outbound network traffic in the firewall and router configuration standard. CC ID 11961 | Establish/Maintain Documentation | Preventive | |
Include requirements for a firewall at each Internet connection and between any demilitarized zone and the internal network zone in the firewall and router configuration standard. CC ID 12435 | Establish/Maintain Documentation | Preventive | |
Include network diagrams that identify connections between all subnets and wireless networks in the firewall and router configuration standard. CC ID 12434 | Establish/Maintain Documentation | Preventive | |
Include network diagrams that identify storage or processing locations of all restricted data in the firewall and router configuration standard. CC ID 12426 | Establish/Maintain Documentation | Preventive | |
Deny or strictly control wireless traffic to applications or databases that contain restricted data or restricted information. CC ID 11847 | Configuration | Preventive | |
Include a protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 00537 | Establish/Maintain Documentation | Preventive | |
Configure network ports to organizational standards. CC ID 14007 | Configuration | Preventive | |
Include approval of the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 12547 | Establish/Maintain Documentation | Preventive | |
Include the use of protocols above and beyond common information service protocols in the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 00539 | Establish/Maintain Documentation | Preventive | |
Include justifying the use of risky protocols in the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 01280 | Establish/Maintain Documentation | Preventive | |
Document and implement security features for each identified insecure service, protocol, and port in the protocols, ports, applications, and services list. CC ID 12033 | Establish/Maintain Documentation | Preventive | |
Identify the insecure services, protocols, and ports in the protocols, ports, applications, and services list in the firewall and router configuration. CC ID 12032 | Establish/Maintain Documentation | Preventive | |
Install and configure firewalls to be enabled on all mobile devices, if possible. CC ID 00550 | Configuration | Preventive | |
Lock personal firewall configurations to prevent them from being disabled or changed by end users. CC ID 06420 | Technical Security | Preventive | |
Configure network access and control points to protect restricted data or restricted information. CC ID 01284 | Configuration | Preventive | |
Protect data stored at external locations. CC ID 16333 | Data and Information Management | Preventive | |
Configure security alerts in firewalls to include the source Internet protocol address and destination Internet protocol address associated with long sessions. CC ID 12174 | Configuration | Detective | |
Protect the firewall's network connection interfaces. CC ID 01955 | Technical Security | Preventive | |
Configure firewalls to deny all traffic by default, except explicitly designated traffic. CC ID 00547 | Configuration | Preventive | |
Allow local program exceptions on the firewall, as necessary. CC ID 01956 | Configuration | Preventive | |
Allow remote administration exceptions on the firewall, as necessary. CC ID 01957 | Configuration | Preventive | |
Allow file sharing exceptions on the firewall, as necessary. CC ID 01958 | Configuration | Preventive | |
Allow printer sharing exceptions on the firewall, as necessary. CC ID 11849 | Configuration | Preventive | |
Allow Internet Control Message Protocol exceptions on the firewall, as necessary. CC ID 01959 | Configuration | Preventive | |
Allow Remote Desktop Connection exceptions on the firewall, as necessary. CC ID 01960 | Configuration | Preventive | |
Allow UPnP framework exceptions on the firewall, as necessary. CC ID 01961 | Configuration | Preventive | |
Allow notification exceptions on the firewall, as necessary. CC ID 01962 | Configuration | Preventive | |
Allow unicast response to multicast or broadcast exceptions on the firewall, as necessary. CC ID 01964 | Configuration | Preventive | |
Allow protocol port exceptions on the firewall, as necessary. CC ID 01965 | Configuration | Preventive | |
Allow local port exceptions on the firewall, as necessary. CC ID 01966 | Configuration | Preventive | |
Establish, implement, and maintain ingress address filters on the firewall, as necessary. CC ID 01287 | Configuration | Preventive | |
Configure firewalls to perform dynamic packet filtering. CC ID 01288 | Testing | Detective | |
Establish, implement, and maintain packet filtering requirements. CC ID 16362 | Technical Security | Preventive | |
Configure firewall filtering to only permit established connections into the network. CC ID 12482 | Technical Security | Preventive | |
Restrict outbound network traffic from systems that contain restricted data or restricted information. CC ID 01295 | Data and Information Management | Preventive | |
Deny direct Internet access to databases that store restricted data or restricted information. CC ID 01271 | Data and Information Management | Preventive | |
Synchronize and secure all router configuration files. CC ID 01291 | Configuration | Preventive | |
Synchronize and secure all firewall configuration files. CC ID 11851 | Configuration | Preventive | |
Configure firewalls to generate an audit log. CC ID 12038 | Audits and Risk Management | Preventive | |
Configure firewalls to generate an alert when a potential security incident is detected. CC ID 12165 | Configuration | Preventive | |
Record the configuration rules for network access and control points in the configuration management system. CC ID 12105 | Establish/Maintain Documentation | Preventive | |
Record the duration of the business need associated with changes to the configuration rules for network access and control points in the configuration management system. CC ID 12107 | Establish/Maintain Documentation | Preventive | |
Record each individual's name and business need associated with changes to the configuration rules for network access and control points in the configuration management system. CC ID 12106 | Establish/Maintain Documentation | Preventive | |
Configure network access and control points to organizational standards. CC ID 12442 | Configuration | Detective | |
Install and configure application layer firewalls for all key web-facing applications. CC ID 01450 | Configuration | Preventive | |
Update application layer firewalls to the most current version. CC ID 12037 | Process or Activity | Preventive | |
Establish, implement, and maintain Voice over Internet Protocol Configuration Management standards. CC ID 11853 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a Wireless Local Area Network Configuration Management standard. CC ID 11854 | Establish/Maintain Documentation | Preventive | |
Configure third party Wireless Local Area Network services in accordance with organizational Information Assurance standards. CC ID 00751 | Configuration | Preventive | |
Remove all unauthorized Wireless Local Area Networks. CC ID 06309 | Configuration | Preventive | |
Establish, implement, and maintain Voice over Internet Protocol design specification. CC ID 01449 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a Wireless Local Area Network Configuration Management program. CC ID 01646 | Establish/Maintain Documentation | Preventive | |
Distrust relying solely on Wired Equivalent Privacy encryption for Wireless Local Area Networks. CC ID 01647 | Technical Security | Preventive | |
Refrain from using Wired Equivalent Privacy for Wireless Local Area Networks that use Wi-Fi Protected Access. CC ID 01648 | Configuration | Preventive | |
Conduct a Wireless Local Area Network site survey to determine the proper location for wireless access points. CC ID 00605 | Technical Security | Preventive | |
Configure Intrusion Detection Systems and Intrusion Prevention Systems to continuously check and send alerts for rogue devices connected to Wireless Local Area Networks. CC ID 04830 | Configuration | Preventive | |
Remove all unauthorized wireless access points. CC ID 11856 | Configuration | Preventive | |
Enforce information flow control. CC ID 11781 [Review whether management does the following: Implements a layered control system using different controls at different points in a transaction process. App A Objective 6.4.a Review whether management does the following: Implements appropriate controls over the electronic transmission of information or, if appropriate safeguards are unavailable, restricts the type of information that can be transmitted. App A Objective 6.18.d {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Monitor and Evaluate Occurrences | Preventive | |
Monitor information flows for anomalies. CC ID 16365 | Monitor and Evaluate Occurrences | Preventive | |
Establish, implement, and maintain information flow control configuration standards. CC ID 01924 [Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Establish/Maintain Documentation | Preventive | |
Restrict traffic or information flow based on the node type. CC ID 16396 | Technical Security | Preventive | |
Restrict traffic or information flow based on the destination address. CC ID 16378 | Technical Security | Preventive | |
Restrict traffic or information flow based on the origination address. CC ID 16484 | Technical Security | Preventive | |
Assign appropriate roles for enabling or disabling information flow controls. CC ID 06760 | Establish Roles | Preventive | |
Require the system to identify and authenticate approved devices before establishing a connection. CC ID 01429 [{time of day access} Review whether management does the following: Sets time-of-day or terminal limitations for some applications or for more sensitive functions within an application. App A Objective 6.22.e] | Testing | Preventive | |
Maintain a record of the challenge state during identification and authentication in an automated information exchange. CC ID 06629 | Establish/Maintain Documentation | Preventive | |
Monitor and report on the organization's interconnectivity risk. CC ID 13172 [Review whether management does the following: Monitors and reports on the institution's interconnectivity risk. App A Objective 6.7.f {network infrastructure} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Network topology or diagram including changes to configuration or components and all internal and external connections. App A Objective 1.3.b] | Monitor and Evaluate Occurrences | Detective | |
Configure network flow monitoring to organizational standards. CC ID 16364 | Configuration | Preventive | |
Perform content filtering scans on network traffic. CC ID 06761 | Monitor and Evaluate Occurrences | Detective | |
Develop and implement a content filtering word and phrase library. CC ID 07071 | Establish/Maintain Documentation | Preventive | |
Use content filtering scans to identify information flows by data type specification. CC ID 06762 | Technical Security | Preventive | |
Use content filtering scans to identify information flows by data type usage. CC ID 11818 | Technical Security | Preventive | |
Take appropriate action to address information flow anomalies. CC ID 12164 | Investigate | Corrective | |
Document information flow anomalies that do not fit normal traffic patterns. CC ID 12163 | Investigate | Detective | |
Prevent encrypted data from bypassing content filtering mechanisms. CC ID 06758 | Technical Security | Preventive | |
Perform content filtering scans on incoming and outgoing e-mail. CC ID 06733 | Monitor and Evaluate Occurrences | Detective | |
Establish, implement, and maintain a data loss prevention solution to protect Access Control Lists. CC ID 12128 | Technical Security | Preventive | |
Establish, implement, and maintain an automated information flow approval process or semi-automated information flow approval process for transmitting or receiving restricted data or restricted information. CC ID 06734 | Data and Information Management | Detective | |
Constrain the information flow of restricted data or restricted information. CC ID 06763 [Review whether management does the following: Implements appropriate controls over the electronic transmission of information or, if appropriate safeguards are unavailable, restricts the type of information that can be transmitted. App A Objective 6.18.d] | Data and Information Management | Preventive | |
Quarantine data that fails security tests. CC ID 16500 | Data and Information Management | Corrective | |
Restrict access to restricted data and restricted information on a need to know basis. CC ID 12453 | Data and Information Management | Preventive | |
Prohibit restricted data or restricted information from being sent to mobile devices. CC ID 04725 | Data and Information Management | Preventive | |
Prohibit restricted data or restricted information from being copied or moved absent approval of system boundaries for information flow control. CC ID 06310 | Data and Information Management | Preventive | |
Establish, implement, and maintain information flow control policies inside the system and between interconnected systems. CC ID 01410 [{access control policy} {data transfer policy} Determine whether management maintains policies and effectively controls and protects access to and transmission of information to avoid loss or damage. Review whether management does the following: App A Objective 6.18 {network connection} {low risk system} Review whether management does the following: Identifies connections between and access across low-risk and high-risk systems. App A Objective 6.7.c {network connection} {low risk system} Review whether management does the following: Identifies connections between and access across low-risk and high-risk systems. App A Objective 6.7.c Review whether management does the following: Implements and assesses the adequacy of appropriate controls to ensure the security of connections. App A Objective 6.7.e Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7 Determine the extent of network connectivity internally and externally and the boundaries and functions of security domains. App A Objective 1.4.c {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Establish/Maintain Documentation | Preventive | |
Define risk tolerance to illicit data flow for each type of information classification. CC ID 01923 | Data and Information Management | Preventive | |
Establish, implement, and maintain a document printing policy. CC ID 14384 | Establish/Maintain Documentation | Preventive | |
Include printing to personal printers during a continuity event in the document printing policy. CC ID 14396 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain information flow procedures. CC ID 04542 | Establish/Maintain Documentation | Preventive | |
Disclose non-privacy related restricted information after a court makes a determination the information is material to a court case. CC ID 06242 | Data and Information Management | Preventive | |
Exchange non-privacy related restricted information with approved third parties if the information supports an approved activity. CC ID 06243 | Data and Information Management | Preventive | |
Establish, implement, and maintain information exchange procedures. CC ID 11782 | Establish/Maintain Documentation | Preventive | |
Perform content sanitization on data-in-transit. CC ID 16512 | Data and Information Management | Preventive | |
Perform content conversion on data-in-transit. CC ID 16510 | Data and Information Management | Preventive | |
Protect data from unauthorized access while transmitting between separate parts of the system. CC ID 16499 | Data and Information Management | Preventive | |
Protect data from modification or loss while transmitting between separate parts of the system. CC ID 04554 | Data and Information Management | Preventive | |
Protect data from unauthorized disclosure while transmitting between separate parts of the system. CC ID 11859 | Data and Information Management | Preventive | |
Review and approve information exchange system connections. CC ID 07143 | Technical Security | Preventive | |
Log issuers who send personal data in cleartext in the transfer audit log. CC ID 12312 | Log Management | Preventive | |
Establish, implement, and maintain measures to detect and prevent the use of unsafe internet services. CC ID 13104 | Technical Security | Preventive | |
Refrain from storing restricted data at unsafe Internet services or virtual servers. CC ID 13107 | Technical Security | Preventive | |
Establish, implement, and maintain whitelists and blacklists of domain names. CC ID 07097 | Establish/Maintain Documentation | Preventive | |
Revoke membership in the whitelist, as necessary. CC ID 13827 | Establish/Maintain Documentation | Corrective | |
Deploy sender policy framework records in the organization's Domain Name Servers. CC ID 12183 | Configuration | Preventive | |
Block uncategorized sites using URL filtering. CC ID 12140 | Technical Security | Preventive | |
Subscribe to a URL categorization service to maintain website category definitions in the URL filter list. CC ID 12139 | Technical Security | Detective | |
Establish, implement, and maintain whitelists and blacklists of web content. CC ID 15234 | Data and Information Management | Preventive | |
Establish, implement, and maintain whitelists and blacklists of software. CC ID 11780 | Establish/Maintain Documentation | Preventive | |
Implement information flow control policies when making decisions about information sharing or collaboration. CC ID 10094 | Behavior | Preventive | |
Establish, implement, and maintain a data loss prevention program. CC ID 13050 [Determine whether management responsibilities are appropriate and include the following: Protection of data consistently throughout the institution. App A Objective 2.5.j Review whether management does the following: Requires secure storage of all types of sensitive information, whether on computer systems, portable devices, physical media, or hard-copy documents. App A Objective 6.18.a {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Establish/Maintain Documentation | Preventive | |
Include the data loss prevention strategy as part of the data loss prevention program. CC ID 13051 | Establish/Maintain Documentation | Preventive | |
Secure access to each system component operating system. CC ID 00551 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts operating system access to specific terminals in physically secure and monitored locations. App A Objective 6.21.c] | Configuration | Preventive | |
Enforce privileged accounts and non-privileged accounts for system access. CC ID 00558 | Technical Security | Preventive | |
Create a full text analysis on executed privileged functions. CC ID 06778 | Monitor and Evaluate Occurrences | Detective | |
Separate user functionality from system management functionality. CC ID 11858 | Technical Security | Preventive | |
Segregate electronically stored information from operating system access. CC ID 00552 | Configuration | Preventive | |
Control all methods of remote access and teleworking. CC ID 00559 [Determine whether management effectively controls employees' use of remote devices. Review whether management does the following: App A Objective 6.24 Review whether management does the following: Implements controls over remote devices provided by the institution (e.g., securely configures remote access devices, protects devices against malware, patches and updates software, encrypts sensitive data, implements secure containers, audits device access, uses remote disable and wipe capabilities, and uses geolocation). App A Objective 6.24.b Review whether management does the following: Provides remote access in a safe and sound manner. App A Objective 6.23.a {access controls} Review whether management does the following: Implements the controls necessary to offer remote access securely (e.g., disables unnecessary remote access, obtains approvals for and performs audits of remote access, maintains robust configurations, enables logging and monitoring, secures devices, restricts remote access during specific times, controls applications, enables strong authentication, and uses encryption). App A Objective 6.23.b] | Technical Security | Preventive | |
Assign virtual escorting to authorized personnel. CC ID 16440 | Process or Activity | Preventive | |
Establish, implement, and maintain a remote access and teleworking program. CC ID 04545 [{employee-owned device} Determine whether management has policies and procedures to ensure that remote access by employees, whether using institution or personally owned devices, is provided in a safe and sound manner. Review whether management does the following: App A Objective 6.23] | Establish/Maintain Documentation | Preventive | |
Include information security requirements in the remote access and teleworking program. CC ID 15704 | Establish/Maintain Documentation | Preventive | |
Refrain from allowing remote users to copy files to remote devices. CC ID 06792 | Technical Security | Preventive | |
Control remote administration in accordance with organizational standards. CC ID 04459 | Configuration | Preventive | |
Scan the system to verify modems are disabled or removed, except the modems that are explicitly approved. CC ID 00560 | Testing | Detective | |
Control remote access through a network access control. CC ID 01421 | Technical Security | Preventive | |
Install and maintain remote control software and other remote control mechanisms on critical systems. CC ID 06371 | Configuration | Preventive | |
Prohibit remote access to systems processing cleartext restricted data or restricted information. CC ID 12324 | Technical Security | Preventive | |
Employ multifactor authentication for remote access to the organization's network. CC ID 12505 | Technical Security | Preventive | |
Implement multifactor authentication techniques. CC ID 00561 | Configuration | Preventive | |
Implement phishing-resistant multifactor authentication techniques. CC ID 16541 | Technical Security | Preventive | |
Document and approve requests to bypass multifactor authentication. CC ID 15464 | Establish/Maintain Documentation | Preventive | |
Limit the source addresses from which remote administration is performed. CC ID 16393 | Technical Security | Preventive | |
Protect remote access accounts with encryption. CC ID 00562 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Prohibits remote access to operating system and system utilities, where feasible, and, at a minimum, requires strong authentication and encrypted sessions before allowing such remote access. App A Objective 6.21.e] | Configuration | Preventive | |
Monitor and evaluate all remote access usage. CC ID 00563 [Review whether management does the following: Measures the risk associated with connections with third parties with remote access. App A Objective 6.7.d As part of management's process to secure the operating system and all system components, determine whether management does the following: Prohibits remote access to operating system and system utilities, where feasible, and, at a minimum, requires strong authentication and encrypted sessions before allowing such remote access. App A Objective 6.21.e] | Monitor and Evaluate Occurrences | Detective | |
Manage the use of encryption controls and cryptographic controls. CC ID 00570 [{authentication control} Review whether applications in use provide the following capabilities: Integrate additional authentication and encryption controls, as necessary. App A Objective 6.27.f] | Technical Security | Preventive | |
Comply with the encryption laws of the local country. CC ID 16377 | Business Processes | Preventive | |
Define the cryptographic module security functions and the cryptographic module operational modes. CC ID 06542 | Establish/Maintain Documentation | Preventive | |
Define the cryptographic boundaries. CC ID 06543 | Establish/Maintain Documentation | Preventive | |
Establish and maintain the documentation requirements for cryptographic modules. CC ID 06544 | Establish/Maintain Documentation | Preventive | |
Establish and maintain the security requirements for cryptographic module ports and cryptographic module interfaces. CC ID 06545 | Establish/Maintain Documentation | Preventive | |
Implement the documented cryptographic module security functions. CC ID 06755 | Data and Information Management | Preventive | |
Establish, implement, and maintain documentation for the delivery and operation of cryptographic modules. CC ID 06547 | Establish/Maintain Documentation | Preventive | |
Document the operation of the cryptographic module. CC ID 06546 | Establish/Maintain Documentation | Preventive | |
Employ cryptographic controls that comply with applicable requirements. CC ID 12491 | Technical Security | Preventive | |
Establish, implement, and maintain digital signatures. CC ID 13828 | Data and Information Management | Preventive | |
Include the expiration date in digital signatures. CC ID 13833 | Data and Information Management | Preventive | |
Include audience restrictions in digital signatures. CC ID 13834 | Data and Information Management | Preventive | |
Include the subject in digital signatures. CC ID 13832 | Data and Information Management | Preventive | |
Include the issuer in digital signatures. CC ID 13831 | Data and Information Management | Preventive | |
Include identifiers in the digital signature. CC ID 13829 | Data and Information Management | Preventive | |
Generate and protect a secret random number for each digital signature. CC ID 06577 | Establish/Maintain Documentation | Preventive | |
Establish the security strength requirements for the digital signature process. CC ID 06578 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain an encryption management and cryptographic controls policy. CC ID 04546 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30] | Establish/Maintain Documentation | Preventive | |
Refrain from allowing the use of cleartext for input or output of restricted data or restricted information. CC ID 04823 | Configuration | Preventive | |
Encrypt in scope data or in scope information, as necessary. CC ID 04824 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30 Management should implement the type and level of encryption commensurate with the sensitivity of the information. II.C.19 Encryption Management should implement the type and level of encryption commensurate with the sensitivity of the information. II.C.19 Encryption] | Data and Information Management | Preventive | |
Digitally sign records and data, as necessary. CC ID 16507 | Data and Information Management | Preventive | |
Make key usage for data fields unique for each device. CC ID 04828 | Technical Security | Preventive | |
Decrypt restricted data for the minimum time required. CC ID 12308 | Data and Information Management | Preventive | |
Decrypt personal data only on dedicated networks, not on public networks. CC ID 12309 | Data and Information Management | Preventive | |
Accept only trusted keys and/or certificates. CC ID 11988 | Technical Security | Preventive | |
Establish, implement, and maintain cryptographic key creation domain parameter requirements. CC ID 06575 | Data and Information Management | Preventive | |
Define the asymmetric signature field for the CHUID container on identification cards or badges. CC ID 06584 | Process or Activity | Preventive | |
Implement cryptographic operations and support functions on identification cards or badges. CC ID 06585 | Process or Activity | Preventive | |
Disseminate and communicate the encryption management and cryptographic controls policy to all interested personnel and affected parties. CC ID 15476 | Communicate | Preventive | |
Define the format of the biometric data on identification cards or badges. CC ID 06586 | Process or Activity | Preventive | |
Protect salt values and hash values in accordance with organizational standards. CC ID 16471 | Data and Information Management | Preventive | |
Provide guidance to customers on how to securely transmit, store, and update cryptographic keys. CC ID 12040 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the encryption management procedures to all interested personnel and affected parties. CC ID 15477 | Communicate | Preventive | |
Establish, implement, and maintain encryption management procedures. CC ID 15475 | Establish/Maintain Documentation | Preventive | |
Define and assign cryptographic, encryption and key management roles and responsibilities. CC ID 15470 | Establish Roles | Preventive | |
Establish, implement, and maintain cryptographic key management procedures. CC ID 00571 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30] | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate cryptographic key management procedures to interested personnel and affected parties. CC ID 13164 | Communicate | Preventive | |
Bind keys to each identity. CC ID 12337 | Technical Security | Preventive | |
Include recommended cryptographic key management procedures for cloud service providers in the cryptographic key management procedures. CC ID 13152 | Establish/Maintain Documentation | Preventive | |
Include requesting cryptographic key types in the cryptographic key management procedures. CC ID 13151 | Establish/Maintain Documentation | Preventive | |
Recover encrypted data for lost cryptographic keys, compromised cryptographic keys, or damaged cryptographic keys. CC ID 01301 | Data and Information Management | Preventive | |
Generate strong cryptographic keys. CC ID 01299 | Data and Information Management | Preventive | |
Generate unique cryptographic keys for each user. CC ID 12169 | Technical Security | Preventive | |
Use approved random number generators for creating cryptographic keys. CC ID 06574 | Data and Information Management | Preventive | |
Implement decryption keys so that they are not linked to user accounts. CC ID 06851 | Technical Security | Preventive | |
Include the establishment of cryptographic keys in the cryptographic key management procedures. CC ID 06540 | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate cryptographic keys securely. CC ID 01300 | Data and Information Management | Preventive | |
Control the input and output of cryptographic keys from a cryptographic module. CC ID 06541 | Data and Information Management | Preventive | |
Store cryptographic keys securely. CC ID 01298 | Data and Information Management | Preventive | |
Restrict access to cryptographic keys. CC ID 01297 | Data and Information Management | Preventive | |
Store cryptographic keys in encrypted format. CC ID 06084 | Data and Information Management | Preventive | |
Store key-encrypting keys and data-encrypting keys in different locations. CC ID 06085 | Technical Security | Preventive | |
Include offsite backups of cryptographic keys in the cryptographic key management procedures. CC ID 13127 | Establish/Maintain Documentation | Preventive | |
Change cryptographic keys in accordance with organizational standards. CC ID 01302 | Data and Information Management | Preventive | |
Destroy cryptographic keys promptly after the retention period. CC ID 01303 | Data and Information Management | Preventive | |
Control cryptographic keys with split knowledge and dual control. CC ID 01304 | Data and Information Management | Preventive | |
Prevent the unauthorized substitution of cryptographic keys. CC ID 01305 | Data and Information Management | Preventive | |
Manage outdated cryptographic keys, compromised cryptographic keys, or revoked cryptographic keys. CC ID 06852 | Technical Security | Preventive | |
Revoke old cryptographic keys or invalid cryptographic keys immediately. CC ID 01307 | Data and Information Management | Corrective | |
Replace known or suspected compromised cryptographic keys immediately. CC ID 01306 | Data and Information Management | Corrective | |
Archive outdated cryptographic keys. CC ID 06884 | Data and Information Management | Preventive | |
Archive revoked cryptographic keys. CC ID 11819 | Data and Information Management | Preventive | |
Require key custodians to sign the cryptographic key management policy. CC ID 01308 | Establish/Maintain Documentation | Preventive | |
Require key custodians to sign the key custodian's roles and responsibilities. CC ID 11820 | Human Resources Management | Preventive | |
Test cryptographic key management applications, as necessary. CC ID 04829 | Testing | Detective | |
Manage the digital signature cryptographic key pair. CC ID 06576 | Data and Information Management | Preventive | |
Establish, implement, and maintain requirements for Personal Identity Verification authentication certificates. CC ID 06587 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain Public Key certificate application procedures. CC ID 07079 | Establish/Maintain Documentation | Preventive | |
Establish a Registration Authority to support the Public Key Infrastructure. CC ID 15725 | Establish Roles | Preventive | |
Include the Identification and Authentication of individuals or entities in the Public Key certificate application procedures. CC ID 07080 | Establish/Maintain Documentation | Preventive | |
Include approving or rejecting Public Key certificate applications in the Public Key certificate application procedure. CC ID 07081 | Establish/Maintain Documentation | Preventive | |
Include revocation of Public Key certificates in the Public Key certificate procedures. CC ID 07082 | Establish/Maintain Documentation | Preventive | |
Publish revoked Public Key certificates in the Certificate Revocation List. CC ID 07089 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain Public Key renewal or rekeying request procedures. CC ID 07083 | Establish/Maintain Documentation | Preventive | |
Include identification and authentication in Public Key renewal or rekeying request procedures. CC ID 11816 | Establish/Maintain Documentation | Preventive | |
Issue authentication mechanisms that support the Public Key Infrastructure. CC ID 07092 | Technical Security | Preventive | |
Establish a Root Certification Authority to support the Public Key Infrastructure. CC ID 07084 | Technical Security | Preventive | |
Establish, implement, and maintain Public Key certificate procedures. CC ID 07085 | Establish/Maintain Documentation | Preventive | |
Include signing and issuing Public Key certificates in the Public Key certificate procedures. CC ID 11817 | Establish/Maintain Documentation | Preventive | |
Include publishing Public Key certificates in the Public Key certificate procedures. CC ID 07087 | Establish/Maintain Documentation | Preventive | |
Include access to issued Public Key certificates in the Public Key certificate procedures. CC ID 07086 | Establish/Maintain Documentation | Preventive | |
Connect the Public Key Infrastructure to the organization's identity and access management system. CC ID 07091 | Technical Security | Preventive | |
Archive Public Key certificate records according to organizational Records Management rules. CC ID 07090 | Records Management | Preventive | |
Refrain from storing encryption keys with cloud service providers when cryptographic key management services are in place locally. CC ID 13153 | Technical Security | Preventive | |
Refrain from permitting cloud service providers to manage encryption keys when cryptographic key management services are in place locally. CC ID 13154 | Technical Security | Preventive | |
Use strong data encryption to transmit in scope data or in scope information, as necessary. CC ID 00564 | Technical Security | Preventive | |
Ensure restricted data or restricted information are encrypted prior to or at the time of transmission. CC ID 01749 | Configuration | Preventive | |
Configure the encryption strength to be appropriate for the encryption methodology of the cryptographic controls. CC ID 12492 | Technical Security | Preventive | |
Encrypt traffic over networks with trusted cryptographic keys. CC ID 12490 | Technical Security | Preventive | |
Authorize transactions of data transmitted over public networks or shared data networks. CC ID 00566 | Establish/Maintain Documentation | Preventive | |
Implement non-repudiation for transactions. CC ID 00567 | Testing | Detective | |
Treat data messages that do not receive an acknowledgment as never been sent. CC ID 14416 | Technical Security | Preventive | |
Establish trusted paths to transmit restricted data or restricted information over public networks or wireless networks. CC ID 00568 | Technical Security | Preventive | |
Protect application services information transmitted over a public network from unauthorized modification. CC ID 12021 | Technical Security | Preventive | |
Protect application services information transmitted over a public network from unauthorized disclosure. CC ID 12020 | Technical Security | Preventive | |
Protect application services information transmitted over a public network from contract disputes. CC ID 12019 | Technical Security | Preventive | |
Protect application services information transmitted over a public network from fraudulent activity. CC ID 12018 | Technical Security | Preventive | |
Establish, implement, and maintain a malicious code protection program. CC ID 00574 [Determine whether management has implemented defense-in-depth to protect, detect, and respond to malware. App A Objective 6.17] | Establish/Maintain Documentation | Preventive | |
Disseminate and communicate the malicious code protection policy to all interested personnel and affected parties. CC ID 15485 | Communicate | Preventive | |
Disseminate and communicate the malicious code protection procedures to all interested personnel and affected parties. CC ID 15484 | Communicate | Preventive | |
Establish, implement, and maintain malicious code protection procedures. CC ID 15483 | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain a malicious code protection policy. CC ID 15478 | Establish/Maintain Documentation | Preventive | |
Restrict downloading to reduce malicious code attacks. CC ID 04576 | Behavior | Preventive | |
Install security and protection software, as necessary. CC ID 00575 [Determine whether the institution's security operations activities include the following: Security software and device management (e.g., maintaining the signatures on signaturebased devices and firewall rules). App A Objective 8.1.a {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Configuration | Preventive | |
Install and maintain container security solutions. CC ID 16178 | Technical Security | Preventive | |
Scan for malicious code, as necessary. CC ID 11941 | Investigate | Detective | |
Test all removable storage media for viruses and malicious code. CC ID 11861 | Testing | Detective | |
Test all untrusted files or unverified files for viruses and malicious code. CC ID 01311 | Testing | Detective | |
Remove malware when malicious code is discovered. CC ID 13691 | Process or Activity | Corrective | |
Notify interested personnel and affected parties when malware is detected. CC ID 13689 | Communicate | Corrective | |
Protect the system against replay attacks. CC ID 04552 | Technical Security | Preventive | |
Define and assign roles and responsibilities for malicious code protection. CC ID 15474 | Establish Roles | Preventive | |
Establish, implement, and maintain a malicious code outbreak recovery plan. CC ID 01310 | Establish/Maintain Documentation | Corrective | |
Log and react to all malicious code activity. CC ID 07072 | Monitor and Evaluate Occurrences | Detective | |
Analyze the behavior and characteristics of the malicious code. CC ID 10672 | Technical Security | Detective | |
Incorporate the malicious code analysis into the patch management program. CC ID 10673 | Technical Security | Corrective | |
Lock antivirus configurations. CC ID 10047 | Configuration | Preventive | |
Establish, implement, and maintain an application security policy. CC ID 06438 | Establish/Maintain Documentation | Preventive | |
Conduct application security reviews, as necessary. CC ID 06298 [With respect to developed software, determine whether institution management does the following: Reviews mitigation of potential flaws in applications. App A Objective 6.28.a Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Testing | Detective | |
Include all vulnerabilities in the application security review. CC ID 12036 | Process or Activity | Preventive | |
Assign application security reviews for web-facing applications to an organization that specializes in application security. CC ID 12035 | Establish Roles | Preventive | |
Correct all found deficiencies according to organizational standards after a web application policy compliance review. CC ID 06299 | Technical Security | Corrective | |
Re-evaluate the web application after deficiencies have been corrected. CC ID 06300 | Technical Security | Corrective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | TYPE | CLASS | |
---|---|---|---|
Third Party and supply chain oversight CC ID 08807 | IT Impact Zone | IT Impact Zone | |
Establish, implement, and maintain a supply chain management program. CC ID 11742 | Establish/Maintain Documentation | Preventive | |
Formalize client and third party relationships with contracts or nondisclosure agreements. CC ID 00794 | Process or Activity | Detective | |
Include a nondisclosure agreement in third party contracts if a separate nondisclosure agreement does not exist. CC ID 06505 [{nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e] | Establish/Maintain Documentation | Preventive | |
Include incident management procedures and incident reporting procedures in third party contracts. CC ID 01214 [Review whether management does the following: Plans and coordinates with ISPs and third parties to minimize exposure to incidents and continue services when faced with an incident (e.g., monitors threat alerts, service availability, applications, and network traffic for indicators of nefarious activity, and ensures traffic filtering). App A Objective 6.25.b] | Establish/Maintain Documentation | Preventive | |
Include third party acknowledgment of their data protection responsibilities in third party contracts. CC ID 01364 | Testing | Detective | |
Establish the third party's service continuity. CC ID 00797 [Review whether management does the following: Plans and coordinates with ISPs and third parties to minimize exposure to incidents and continue services when faced with an incident (e.g., monitors threat alerts, service availability, applications, and network traffic for indicators of nefarious activity, and ensures traffic filtering). App A Objective 6.25.b] | Testing | Detective | |
Determine the adequacy of a third party's alternate site preparations. CC ID 06879 | Testing | Detective | |
Establish, implement, and maintain Service Level Agreements with the organization's supply chain. CC ID 00838 | Process or Activity | Preventive | |
Approve all Service Level Agreements. CC ID 00843 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Service provider arrangements. App A Objective 2.4.c] | Establish/Maintain Documentation | Detective | |
Include risk management procedures in the supply chain management policy. CC ID 08811 [Determine whether management identifies factors that may increase risk from supply chain attacks and responds with appropriate risk mitigation. Review whether management implements the following as appropriate: App A Objective 6.19 Determine whether management identifies factors that may increase risk from supply chain attacks and responds with appropriate risk mitigation. Review whether management implements the following as appropriate: App A Objective 6.19] | Establish/Maintain Documentation | Preventive | |
Perform risk assessments of third parties, as necessary. CC ID 06454 | Testing | Detective | |
Include a determination of the complexity of the third party relationships in the supply chain risk assessment. CC ID 10024 | Business Processes | Preventive | |
Include a determination of financial benefits over actual costs of third party relationships in the supply chain risk assessment report. CC ID 10025 | Establish/Maintain Documentation | Preventive | |
Include a determination of how third party relationships affect strategic initiatives in the supply chain risk assessment report. CC ID 10026 | Establish/Maintain Documentation | Preventive | |
Include a determination if the third party relationship will affect employees in the supply chain risk assessment report. CC ID 10027 | Business Processes | Preventive | |
Include a determination of customer interactions with third parties in the supply chain risk assessment report. CC ID 10028 | Establish/Maintain Documentation | Preventive | |
Include a determination on the risks third parties pose to Information Security in the supply chain risk assessment report. CC ID 10029 | Establish/Maintain Documentation | Preventive | |
Re-evaluate risk assessments of third parties, as necessary. CC ID 12158 | Audits and Risk Management | Detective | |
Establish, implement, and maintain a supply chain management policy. CC ID 08808 | Establish/Maintain Documentation | Preventive | |
Include the third party selection process in the supply chain management policy. CC ID 13132 | Establish/Maintain Documentation | Preventive | |
Select suppliers based on their qualifications. CC ID 00795 [Review whether management implements the following as appropriate: Purchases are made only through reputable sellers. App A Objective 6.19.a] | Establish/Maintain Documentation | Preventive | |
Establish, implement, and maintain supply chain due diligence standards. CC ID 08846 [{information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Business Processes | Preventive | |
Provide management support for third party due diligence. CC ID 08847 | Business Processes | Preventive | |
Commit to the supply chain due diligence process. CC ID 08849 | Business Processes | Preventive | |
Structure the organization to support supply chain due diligence. CC ID 08850 | Business Processes | Preventive | |
Schedule supply chain audits, as necessary. CC ID 10015 | Audits and Risk Management | Preventive | |
Establish, implement, and maintain internal accountability for the supply chain due diligence process. CC ID 08851 [Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31] | Business Processes | Preventive | |
Establish, implement, and maintain supply chain due diligence requirements. CC ID 08853 | Business Processes | Preventive | |
Document and maintain records of supply chain transactions in a transaction file. CC ID 08858 | Establish/Maintain Documentation | Preventive | |
Cross-check the supply chain due diligence practices against the supply chain management policy. CC ID 08859 | Business Processes | Preventive | |
Exclude suppliers that have passed the conflict-free smelter program from the conflict materials report. CC ID 10016 | Business Processes | Preventive | |
Assign the appropriate individuals or groups to oversee and support supply chain due diligence. CC ID 08861 | Business Processes | Preventive | |
Develop and implement supply chain due diligence capability training program. CC ID 08862 | Business Processes | Preventive | |
Determine if additional supply chain due diligence processes are required. CC ID 08863 | Business Processes | Preventive | |
Review transaction files for compliance with the supply chain audit standard. CC ID 08864 | Establish/Maintain Documentation | Preventive | |
Provide additional documentation to validate and approve the use of non-compliant materials. CC ID 08865 | Establish/Maintain Documentation | Preventive | |
Define ways a third party may be non-compliant with the organization's supply chain due diligence requirements. CC ID 08870 | Business Processes | Preventive | |
Calculate and report the margin of error in the supply chain due diligence report. CC ID 08871 | Business Processes | Preventive | |
Conduct all parts of the supply chain due diligence process. CC ID 08854 | Business Processes | Preventive | |
Identify all service providers in the supply chain. CC ID 12213 [{network connection} Review whether management does the following: Identifies connections with third parties. App A Objective 6.7.a Determine the degree of reliance on service providers for information processing and technology support, including security operation management. App A Objective 1.4.a] | Business Processes | Preventive | |
Include a provision in outsourcing contracts that requires supply chain members' security requirements comply with organizational security requirements. CC ID 00359 [Review the institution's policies, standards, and procedures related to the use of the following: Third-party service providers that facilitate operational activities (e.g., core processing, mobile financial services, cloud storage and computing, and managed security services). App A Objective 6.31.a {outsourced process} If the institution outsources activities to a third-party service provider, determine whether management integrates those activities with the information security program. Verify that the third-party management program evidences expectations that align with the institution's information security program. App A Objective 3.3 {third party security} Determine whether the institution's security operations activities include the following: Third-party integration (e.g., managed security services and incident detection services). App A Objective 8.1.g Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Testing | Detective | |
Include a requirement in outsourcing contracts that supply chain members must implement security controls to protect information. CC ID 13353 | Establish/Maintain Documentation | Preventive | |
Assess third parties' compliance environment during due diligence. CC ID 13134 | Process or Activity | Detective | |
Request attestation of compliance from third parties. CC ID 12067 | Establish/Maintain Documentation | Detective | |
Assess third parties' compliance with the organization's third party security policies during due diligence. CC ID 12075 [Review the institution's policies, standards, and procedures related to the use of the following: Independent review of the third-party service provider's security through appropriate reports from audits and tests. App A Objective 6.31.e Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Business Processes | Detective | |
Assess the effectiveness of third party services provided to the organization. CC ID 13142 | Business Processes | Detective | |
Monitor third parties for performance and effectiveness, as necessary. CC ID 00799 [{technical capability} Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Oversight of third parties when they supplement an institution's technical and managerial capabilities. App A Objective 2.9.d Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Monitor and Evaluate Occurrences | Detective | |
Monitor third parties' financial conditions. CC ID 13170 | Monitor and Evaluate Occurrences | Detective | |
Review the supply chain's service delivery on a regular basis. CC ID 12010 | Business Processes | Preventive | |
Establish, implement, and maintain information security controls for the supply chain. CC ID 13109 [Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Establish/Maintain Documentation | Preventive |
Each Common Control is assigned a meta-data type to help you determine the objective of the Control and associated Authority Document mandates aligned with it. These types include behavioral controls, process controls, records management, technical security, configuration management, etc. They are provided as another tool to dissect the Authority Document’s mandates and assign them effectively within your organization.
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Implement automated audit tools. CC ID 04882 | Monitoring and measurement | Preventive | |
Purchase insurance on behalf of interested personnel and affected parties. CC ID 16571 | Audits and risk management | Corrective | |
Establish, implement, and maintain a fuel supply large enough to support the generators during an emergency. CC ID 06376 | Operational and Systems Continuity | Preventive | |
Transfer legal ownership of assets when the system is redeployed to a third party. CC ID 06698 | Operational management | Preventive | |
Employ tools and mechanisms to support the organization's Incident Response program. CC ID 13182 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Operational management | Preventive | |
Plan for acquiring facilities, technology, or services. CC ID 06892 [Review the institution's policies, standards, and procedures related to the use of the following: Due diligence in research and selection of third-party service providers. App A Objective 6.31.b {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain acquisition notices. CC ID 16682 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include the geographic locations of the organization in the acquisition notice. CC ID 16723 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include certification that the organizations meet applicable requirements in the acquisition notice. CC ID 16714 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include the capital ratios in the acquisition notice. CC ID 16712 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include the relevant authorities in the acquisition notice. CC ID 16711 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include a description of the subsidiary's activities in the acquisition notice. CC ID 16707 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include the subsidiary's contact information in the acquisition notice. CC ID 16704 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include in scope transactions in the acquisition notice. CC ID 16700 | Acquisition or sale of facilities, technology, and services | Preventive | |
Perform a due diligence assessment on bidding suppliers prior to acquiring assets. CC ID 15714 | Acquisition or sale of facilities, technology, and services | Preventive | |
Allocate sufficient resources to protect Information Systems during capital planning. CC ID 01444 | Acquisition or sale of facilities, technology, and services | Preventive | |
Obtain user documentation before acquiring products and services. CC ID 14283 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include the acceptance criteria in system acquisition contracts. CC ID 14288 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include audit record generation capabilities in system acquisition contracts. CC ID 16427 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include a description of the development environment and operational environment in system acquisition contracts. CC ID 14256 | Acquisition or sale of facilities, technology, and services | Preventive | |
Identify and include alternatives to meeting the security requirements when acquiring assets. CC ID 01128 | Acquisition or sale of facilities, technology, and services | Detective | |
Conduct an acquisition feasibility study prior to acquiring assets. CC ID 01129 | Acquisition or sale of facilities, technology, and services | Detective | |
Include a Business Impact Analysis in the acquisition feasibility study. CC ID 16231 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include environmental considerations in the acquisition feasibility study. CC ID 16224 | Acquisition or sale of facilities, technology, and services | Preventive | |
Refrain from implementing systems that are beyond the organization's risk acceptance level. CC ID 13054 | Acquisition or sale of facilities, technology, and services | Preventive | |
Analyze the proposed Information Architecture as it pertains to acquisition feasibility. CC ID 01132 | Acquisition or sale of facilities, technology, and services | Detective | |
Include chain of custody procedures in the product and services acquisition program. CC ID 10058 | Acquisition or sale of facilities, technology, and services | Preventive | |
Review and update the acquisition contracts, as necessary. CC ID 14279 | Acquisition or sale of facilities, technology, and services | Corrective | |
Promote joint acquisition of products or services. CC ID 11453 | Acquisition or sale of facilities, technology, and services | Preventive | |
Acquire products or services. CC ID 11450 | Acquisition or sale of facilities, technology, and services | Preventive | |
Acquire products through suppliers, as necessary. CC ID 13171 [Review whether management implements the following as appropriate: Purchases are made through a third party to shield the institution's identity. App A Objective 6.19.b] | Acquisition or sale of facilities, technology, and services | Preventive | |
Pay suppliers in a timely manner. CC ID 06891 | Acquisition or sale of facilities, technology, and services | Preventive | |
Correct defective acquired goods or services. CC ID 06911 | Acquisition or sale of facilities, technology, and services | Corrective | |
Acquire enough insurance to cover the liability for damages due to data leakage. CC ID 06408 | Privacy protection for information and data | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Report to management and stakeholders on the findings and information gathered from all types of inquiries. CC ID 12797 [Discuss findings with management and obtain proposed corrective action for significant deficiencies. App A Objective 11.2] | Leadership and high level objectives | Preventive | |
Establish and maintain an Information Technology plan status report that covers both Strategic Information Technology Plans and tactical Information Technology plans. CC ID 06839 | Leadership and high level objectives | Preventive | |
Include key personnel status changes in the Information Technology Plan status reports. CC ID 06840 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Loss, addition, or change in duties of key personnel. App A Objective 1.3.d] | Leadership and high level objectives | Preventive | |
Monitor and evaluate system telemetry data. CC ID 14929 | Monitoring and measurement | Detective | |
Report on the percentage of critical assets for which an assurance strategy is implemented. CC ID 01657 | Monitoring and measurement | Detective | |
Report on the percentage of key organizational functions for which an assurance strategy is implemented. CC ID 01658 | Monitoring and measurement | Detective | |
Report on the percentage of key compliance requirements for which an assurance strategy has been implemented. CC ID 01659 | Monitoring and measurement | Detective | |
Report on the percentage of the Information System budget allocated to Information Security. CC ID 04571 | Monitoring and measurement | Detective | |
Report on the policies and controls that have been implemented by management. CC ID 01670 [Determine whether management implements an integrated control system characterized by the use of different control types that mitigates identified risks. Review whether management does the following: App A Objective 6.4] | Monitoring and measurement | Detective | |
Report on the percentage of known Information Security risks that are related to supply chain relationships. CC ID 02044 | Monitoring and measurement | Detective | |
Report on the percentage of critical information assets or critical functions for which access by supply chain personnel is disallowed. CC ID 02045 | Monitoring and measurement | Detective | |
Report on the percentage of supply chain personnel who have current information asset user privileges. CC ID 02046 | Monitoring and measurement | Detective | |
Report on the percentage of systems with critical information assets or functions for which electronic connection by supply chain assets is disallowed. CC ID 02047 | Monitoring and measurement | Detective | |
Report on the percentage of security incidents that involved supply chain personnel. CC ID 02048 | Monitoring and measurement | Detective | |
Report on the percentage of third party contracts that include a requirement to externally verify policies and procedures. CC ID 02049 | Monitoring and measurement | Detective | |
Report on the percentage of supply chain relationships that have been reviewed for compliance with information security requirements. CC ID 02050 | Monitoring and measurement | Detective | |
Report on the estimated damage or loss resulting from all security incidents. CC ID 01674 | Monitoring and measurement | Detective | |
Report on the percentage of security incidents that did not cause confidentiality, integrity, or availability losses beyond the Service Level Agreement thresholds. CC ID 01673 | Monitoring and measurement | Detective | |
Report on the percentage of operational time that critical services were unavailable due to security incidents. CC ID 02124 | Monitoring and measurement | Detective | |
Report on the percentage of security incidents that exploited existing security vulnerabilities with known solutions, patches, or workarounds. CC ID 02125 | Monitoring and measurement | Detective | |
Report on the percentage of systems affected by security incidents that exploited existing security vulnerabilities with known solutions, patches, or workarounds. CC ID 02126 | Monitoring and measurement | Detective | |
Report on the percentage of security incidents that were managed according to established policies, procedures, and processes. CC ID 02127 | Monitoring and measurement | Detective | |
Report on the number of security incidents reported to FedCIRC, NIPC, the Payment Card Industry, or local law enforcement. CC ID 02154 | Monitoring and measurement | Detective | |
Report on the percentage of systems with critical information assets or critical functions that have been assessed for security vulnerabilities. CC ID 02128 | Monitoring and measurement | Detective | |
Report on the percentage of vulnerability assessment findings that have been addressed since the last reporting period. CC ID 02129 | Monitoring and measurement | Detective | |
Report on the average elapsed time between the discovery of a new vulnerability and implementing corrective action. CC ID 02140 | Monitoring and measurement | Detective | |
Report on the percentage of physical security incidents that involved entry into a facility containing Information Systems. CC ID 04564 | Monitoring and measurement | Detective | |
Collect all work papers for the audit and audit report into an engagement file. CC ID 07001 [Organize work papers to ensure clear support for significant findings by examination objective. App A Objective 11.4] | Audits and risk management | Preventive | |
Include the word independent in the title of audit reports. CC ID 07003 | Audits and risk management | Preventive | |
Include the date of the audit in the audit report. CC ID 07024 | Audits and risk management | Preventive | |
Include information about the organization being audited and the auditor performing the audit in the audit report. CC ID 07004 | Audits and risk management | Preventive | |
Include a statement that access to the report is restricted based on least privilege in the audit report. CC ID 07023 | Audits and risk management | Preventive | |
Include the organization's audit assertion of the in scope system in the audit report. CC ID 07005 | Audits and risk management | Preventive | |
Disclose any audit irregularities in the audit report. CC ID 06995 | Audits and risk management | Preventive | |
Monitor and report on the status of mitigation actions in the corrective action plan. CC ID 15250 | Audits and risk management | Corrective | |
Assess the potential level of business impact risk associated with natural disasters. CC ID 06470 | Audits and risk management | Detective | |
Measure policy compliance when reviewing the internal control framework. CC ID 06442 [Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Operational management | Corrective | |
Refrain from including restricted information in the incident response notification. CC ID 16806 | Operational management | Preventive | |
Mitigate reported incidents. CC ID 12973 | Operational management | Preventive | |
Disseminate and communicate the final incident report, which includes the investigation results and any remediation activity results. CC ID 12306 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Operational management | Preventive | |
Document the results of incident response tests and provide them to senior management. CC ID 14857 | Operational management | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Address operational anomalies within the incident management system. CC ID 11633 | Monitoring and measurement | Preventive | |
Incorporate an Identity Theft Prevention Program into the organization's incident management system. CC ID 11634 | Monitoring and measurement | Preventive | |
Compile the event logs of multiple components into a system-wide time-correlated audit trail. CC ID 01424 [Review whether management has the following: Processes to effectively collect, aggregate, analyze, and correlate security event information from discrete systems and applications. App A Objective 6.35.d] | Monitoring and measurement | Preventive | |
Verify segmentation controls are operational and effective. CC ID 12545 | Monitoring and measurement | Detective | |
Provide cross-organizational audit information based on the cross-organizational audit sharing agreement. CC ID 10596 | Monitoring and measurement | Preventive | |
Define what constitutes a threat to independence. CC ID 16824 | Audits and risk management | Preventive | |
Determine if requested services create a threat to independence. CC ID 16823 | Audits and risk management | Detective | |
Include provisions for legislative plurality and legislative domain in the audit program. CC ID 06959 | Audits and risk management | Preventive | |
Include in scope procedures in the audit assertion's in scope system description. CC ID 16551 | Audits and risk management | Preventive | |
Include roles and responsibilities in the audit assertion's in scope system description. CC ID 16558 | Audits and risk management | Preventive | |
Include the audit criteria in the audit assertion's in scope system description. CC ID 16548 | Audits and risk management | Preventive | |
Include third party data in the audit assertion's in scope system description. CC ID 16554 | Audits and risk management | Preventive | |
Include third party personnel in the audit assertion's in scope system description. CC ID 16552 | Audits and risk management | Preventive | |
Include compliance requirements in the audit assertion's in scope system description. CC ID 16506 | Audits and risk management | Preventive | |
Include third party assets in the audit assertion's in scope system description. CC ID 16550 | Audits and risk management | Preventive | |
Include deviations and the corrective actions taken in the audit assertion's in scope system description. CC ID 16549 | Audits and risk management | Preventive | |
Determine the appropriateness of the audit assertion's in scope system description. CC ID 16449 | Audits and risk management | Detective | |
Hold an opening meeting with interested personnel and affected parties prior to an audit. CC ID 15256 | Audits and risk management | Preventive | |
Confirm audit requirements during the opening meeting. CC ID 15255 | Audits and risk management | Detective | |
Include discussions about how particular situations will be handled in the opening meeting. CC ID 15254 | Audits and risk management | Preventive | |
Include third party assets in the audit scope. CC ID 16504 | Audits and risk management | Preventive | |
Determine the appropriateness of the audit subject matter. CC ID 16505 | Audits and risk management | Preventive | |
Include the in scope material or in scope products in the audit program. CC ID 08961 | Audits and risk management | Preventive | |
Include the date of the audit in the representation letter. CC ID 16517 | Audits and risk management | Preventive | |
Include the criteria for determining the desired level of assurance in the audit program. CC ID 12795 [Determine the appropriate scope and objectives for the examination. App A Objective 1] | Audits and risk management | Preventive | |
Refrain from performing an attestation engagement under defined conditions. CC ID 13952 | Audits and risk management | Detective | |
Refrain from accepting an attestation engagement when all parties disagree on the procedures. CC ID 13951 | Audits and risk management | Preventive | |
Audit in scope audit items and compliance documents. CC ID 06730 | Audits and risk management | Preventive | |
Identify hypothetical assumptions in forecasts and projections during an audit. CC ID 13946 | Audits and risk management | Detective | |
Refrain from examining forecasts and projections which refrain from disclosing assumptions during an audit. CC ID 13932 | Audits and risk management | Detective | |
Audit policies, standards, and procedures. CC ID 12927 | Audits and risk management | Preventive | |
Investigate the nature and causes of misstatements in the audit assertion's in scope system description. CC ID 16557 | Audits and risk management | Detective | |
Review incident management audit logs to determine the effectiveness of in scope controls. CC ID 12157 | Audits and risk management | Detective | |
Review audit reports to determine the effectiveness of in scope controls. CC ID 12156 | Audits and risk management | Detective | |
Observe processes to determine the effectiveness of in scope controls. CC ID 12155 | Audits and risk management | Detective | |
Interview stakeholders to determine the effectiveness of in scope controls. CC ID 12154 | Audits and risk management | Detective | |
Review policies and procedures to determine the effectiveness of in scope controls. CC ID 12144 | Audits and risk management | Detective | |
Evaluate personnel status changes to determine the effectiveness of in scope controls. CC ID 16556 | Audits and risk management | Detective | |
Determine whether individuals performing a control have the appropriate staff qualifications, staff clearances, and staff competencies. CC ID 16555 | Audits and risk management | Detective | |
Implement procedures that collect sufficient audit evidence. CC ID 07153 | Audits and risk management | Preventive | |
Collect evidence about the in scope audit items of the audit assertion. CC ID 07154 | Audits and risk management | Preventive | |
Collect audit evidence sufficient to avoid misstatements. CC ID 07155 | Audits and risk management | Preventive | |
Collect audit evidence at the level of the organization's competence in the subject matter. CC ID 07156 | Audits and risk management | Preventive | |
Collect audit evidence sufficient to overcome inadequacies in the organization's attestation. CC ID 07157 | Audits and risk management | Preventive | |
Include audit evidence obtained from previous engagements in the work papers. CC ID 16518 | Audits and risk management | Preventive | |
Include if the audit evidence has identified in scope control deficiencies in the work papers. CC ID 07152 | Audits and risk management | Detective | |
Include any subsequent events related to the audit assertion or audit subject matter in the work papers. CC ID 07177 | Audits and risk management | Preventive | |
Review the subject matter expert's findings. CC ID 16559 | Audits and risk management | Detective | |
Provide auditors access to all in scope records, in scope assets, personnel and in scope procedures. CC ID 06966 | Audits and risk management | Preventive | |
Solve any access problems auditors encounter during the audit. CC ID 08959 | Audits and risk management | Corrective | |
Notify interested personnel and affected parties when an auditee refuses to provide access or participate in the audit. CC ID 08960 | Audits and risk management | Preventive | |
Include the justification for not following the applicable requirements in the audit report. CC ID 16822 | Audits and risk management | Preventive | |
Include a statement that the applicable requirements were not followed in the audit report. CC ID 16821 | Audits and risk management | Preventive | |
Refrain from referencing previous engagements in the audit report. CC ID 16516 | Audits and risk management | Preventive | |
Identify the participants from the organization being audited in the audit report. CC ID 15258 | Audits and risk management | Detective | |
Include the timing of controls in the description of tests of controls and results in the audit report. CC ID 16553 | Audits and risk management | Preventive | |
Include the organization's in scope system description in the audit report. CC ID 11626 | Audits and risk management | Preventive | |
Include the scope and work performed in the audit report. CC ID 11621 | Audits and risk management | Preventive | |
Review the adequacy of the internal auditor's work papers. CC ID 01146 | Audits and risk management | Detective | |
Review the adequacy of the internal auditor's audit reports. CC ID 11620 | Audits and risk management | Detective | |
Review management's response to issues raised in past audit reports. CC ID 01149 [Review management's response to issues raised at, or since, the last examination. Consider the following: App A Objective 1.2 Review management's response to issues raised at, or since, the last examination. Consider the following: Adequacy and timing of corrective action. App A Objective 1.2.a Review management's response to issues raised at, or since, the last examination. Consider the following: Adequacy and timing of corrective action. App A Objective 1.2.a Review management's response to issues raised at, or since, the last examination. Consider the following: Existence of any outstanding issues. App A Objective 1.2.c With respect to developed software, determine whether institution management does the following: Reviews available audit reports, and considers and implements appropriate control recommendations. App A Objective 6.28.e] | Audits and risk management | Detective | |
Review the audit program scope as it relates to the organization's profile. CC ID 01159 | Audits and risk management | Detective | |
Assess the quality of the audit program in regards to its documentation. CC ID 11622 | Audits and risk management | Preventive | |
Take into account if the system will be accessed by or have an impact on children in the risk management program. CC ID 14992 | Audits and risk management | Preventive | |
Analyze the risk management strategy for addressing requirements. CC ID 12926 | Audits and risk management | Detective | |
Analyze the risk management strategy for addressing threats. CC ID 12925 [Determine whether management effectively identifies threats and vulnerabilities continuously. App A Objective 4.1] | Audits and risk management | Detective | |
Analyze the risk management strategy for addressing opportunities. CC ID 12924 | Audits and risk management | Detective | |
Address past incidents in the risk assessment program. CC ID 12743 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: App A Objective 5.1] | Audits and risk management | Preventive | |
Establish and maintain the factors and context for risk to the organization. CC ID 12230 | Audits and risk management | Preventive | |
Employ risk assessment procedures that take into account risk factors. CC ID 16560 | Audits and risk management | Preventive | |
Categorize the systems, information, and data by risk profile in the threat and risk classification scheme. CC ID 01443 [Review whether management has the following: A process to determine the institution's information security risk profile. App A Objective 4.2.c] | Audits and risk management | Preventive | |
Review the risk profiles, as necessary. CC ID 16561 | Audits and risk management | Detective | |
Include risks to critical personnel and assets in the threat and risk classification scheme. CC ID 00698 | Audits and risk management | Preventive | |
Assign a probability of occurrence to all types of threats in the threat and risk classification scheme. CC ID 01173 | Audits and risk management | Preventive | |
Establish, implement, and maintain risk profiling procedures for internal risk assessments. CC ID 01157 | Audits and risk management | Preventive | |
Automate as much of the risk assessment program, as necessary. CC ID 06459 | Audits and risk management | Preventive | |
Approve the results of the risk assessment as documented in the risk assessment report. CC ID 07109 | Audits and risk management | Preventive | |
Review risks to the organization's audit function when changes in the supply chain occur. CC ID 01154 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Technology service providers and software vendor listings. App A Objective 1.3.e Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Technology service providers and software vendor listings. App A Objective 1.3.e] | Audits and risk management | Preventive | |
Review the risk to the audit function when the audit personnel status changes. CC ID 01153 | Audits and risk management | Preventive | |
Conduct external audits of risk assessments, as necessary. CC ID 13308 | Audits and risk management | Detective | |
Correlate the business impact of identified risks in the risk assessment report. CC ID 00686 [Review preliminary conclusions with the examiner-in-charge regarding the following: The proposed Uniform Rating System for Information Technology management component rating and the potential impact of the conclusion on the composite or other component IT ratings. App A Objective 11.1.c Review preliminary conclusions with the examiner-in-charge regarding the following: Potential impact of conclusions on the institution's risk assessment. App A Objective 11.1.d] | Audits and risk management | Preventive | |
Conduct a Business Impact Analysis, as necessary. CC ID 01147 | Audits and risk management | Detective | |
Analyze and quantify the risks to in scope systems and information. CC ID 00701 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: App A Objective 1.3 Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Audits and risk management | Preventive | |
Establish and maintain a Risk Scoping and Measurement Definitions Document. CC ID 00703 | Audits and risk management | Preventive | |
Identify the material risks in the risk assessment report. CC ID 06482 [Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3] | Audits and risk management | Preventive | |
Assess the potential level of business impact risk associated with each business process. CC ID 06463 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Changes to internal business processes. App A Objective 1.3.h Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Internal reorganizations. App A Objective 1.3.i] | Audits and risk management | Detective | |
Assess the potential level of business impact risk associated with the business environment. CC ID 06464 | Audits and risk management | Detective | |
Assess the potential level of business impact risk associated with business information of in scope systems. CC ID 06465 | Audits and risk management | Detective | |
Assess the potential business impact risk of in scope systems caused by deliberate threats to their confidentiality, integrity, and availability. CC ID 06466 | Audits and risk management | Detective | |
Assess the potential level of business impact risk caused by accidental threats to the confidentiality, integrity and availability of critical systems. CC ID 06467 | Audits and risk management | Detective | |
Assess the potential level of business impact risk associated with reputational damage. CC ID 15335 | Audits and risk management | Detective | |
Assess the potential level of business impact risk associated with insider threats. CC ID 06468 | Audits and risk management | Detective | |
Assess the potential level of business impact risk associated with external entities. CC ID 06469 | Audits and risk management | Detective | |
Assess the potential level of business impact risk associated with control weaknesses. CC ID 06471 | Audits and risk management | Detective | |
Prioritize and select controls based on the risk assessment findings. CC ID 00707 [Specifically, review whether management does the following: Implements controls based on the institution's risk assessment to mitigate risk from information security threats and vulnerabilities, such as interconnectivity risk. App A Objective 6.5.a Determine whether management measures the risk to guide its recommendations for and use of mitigating controls. App A Objective 5 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Audits and risk management | Preventive | |
Prioritize and categorize the effects of opportunities, threats and requirements on control activities. CC ID 12822 | Audits and risk management | Preventive | |
Develop key indicators to inform management on the effectiveness of risk control measures. CC ID 12946 | Audits and risk management | Preventive | |
Include the release status of the risk assessment in the risk treatment plan. CC ID 16320 | Audits and risk management | Preventive | |
Identify the planned actions and controls that address high risk in the risk treatment plan. CC ID 12835 | Audits and risk management | Preventive | |
Identify the current actions and controls that address high risk in the risk treatment plan. CC ID 12834 | Audits and risk management | Preventive | |
Approve the risk treatment plan. CC ID 13495 | Audits and risk management | Preventive | |
Analyze the impact of artificial intelligence systems on society. CC ID 16317 | Audits and risk management | Detective | |
Analyze the impact of artificial intelligence systems on individuals. CC ID 16316 | Audits and risk management | Detective | |
Establish, implement, and maintain a cybersecurity risk management program. CC ID 16827 | Audits and risk management | Preventive | |
Configure firewalls to generate an audit log. CC ID 12038 | Technical security | Preventive | |
Conduct external audits of the physical security plan. CC ID 13314 | Physical and environmental protection | Detective | |
Configure the "audit file ownership changes" setting to organizational standards. CC ID 08966 | System hardening through configuration management | Preventive | |
Re-evaluate risk assessments of third parties, as necessary. CC ID 12158 | Third Party and supply chain oversight | Detective | |
Schedule supply chain audits, as necessary. CC ID 10015 | Third Party and supply chain oversight | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Establish and maintain a rapport with business and technical communities throughout the organization to promote the value and importance of Information Security. CC ID 06493 [Determine whether management promotes effective governance of the information security program through a strong information security culture, defined information security responsibilities and accountability, and adequate resources to support the program. App A Objective 2] | Leadership and high level objectives | Preventive | |
Protect each person's right to privacy and civil liberties during intrusion management operations. CC ID 10035 | Monitoring and measurement | Preventive | |
Do not intercept communications of any kind when providing a service to clients. CC ID 09985 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a testing program. CC ID 00654 [Determine whether management considers the following key testing factors when developing and implementing independent tests: App A Objective 10.2 {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a penetration test program. CC ID 01105 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a Verify whether management ensures the following are done: Penetration tests that subject a system to real-world attacks and identify weaknesses. App A Objective 10.3.b Verify whether management ensures the following are done: Penetration tests that subject a system to real-world attacks and identify weaknesses. App A Objective 10.3.b] | Monitoring and measurement | Preventive | |
Notify the interested personnel and affected parties after the failure of an automated security test. CC ID 06748 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Notifications. App A Objective 10.2.c] | Monitoring and measurement | Corrective | |
Carry out disciplinary actions when a compliance violation is detected. CC ID 06675 | Monitoring and measurement | Corrective | |
Exercise due professional care during the planning and performance of the audit. CC ID 07119 | Audits and risk management | Preventive | |
Refrain from accepting an attestation engagement unless the prospective financial information includes a summary of significant assumptions. CC ID 13954 | Audits and risk management | Preventive | |
Verify statements made by interviewees are correct. CC ID 16299 | Audits and risk management | Detective | |
Explain the goals of the interview to the interviewee. CC ID 07189 | Audits and risk management | Detective | |
Resolve disputes before creating the audit summary. CC ID 08964 | Audits and risk management | Preventive | |
Disseminate and communicate to the organization that access and use of audit reports are based on least privilege. CC ID 07171 | Audits and risk management | Preventive | |
Use the risk taxonomy when managing risk. CC ID 12280 | Audits and risk management | Preventive | |
Disseminate and communicate information about risks to all interested personnel and affected parties. CC ID 06718 | Audits and risk management | Preventive | |
Disseminate and communicate the risk acceptance level in the risk treatment plan to all interested personnel and affected parties. CC ID 06849 | Audits and risk management | Preventive | |
Revoke asset access when a personnel status change occurs or an individual is terminated. CC ID 00516 | Technical security | Corrective | |
Review and update accounts and access rights when notified of personnel status changes. CC ID 00788 | Technical security | Corrective | |
Implement information flow control policies when making decisions about information sharing or collaboration. CC ID 10094 | Technical security | Preventive | |
Restrict downloading to reduce malicious code attacks. CC ID 04576 | Technical security | Preventive | |
Refrain from providing access to facilities that transmit, process, or store restricted data until the contract for accessing the facility is signed. CC ID 12311 | Physical and environmental protection | Preventive | |
Disseminate and communicate the right of the organization to search visitors while at the facility. CC ID 06702 | Physical and environmental protection | Preventive | |
Manage constituent identification inside the facility. CC ID 02215 | Physical and environmental protection | Preventive | |
Issue visitor identification badges to all non-employees. CC ID 00543 | Physical and environmental protection | Preventive | |
Retrieve visitor identification badges prior to the exit of a visitor from the facility. CC ID 01331 | Physical and environmental protection | Preventive | |
Require all visitors to sign out of the visitor log before the exit of a visitor from the facility. CC ID 06649 | Physical and environmental protection | Preventive | |
Refrain from search and seizure inside organizational facilities absent a warrant. CC ID 09980 | Physical and environmental protection | Preventive | |
Disallow either search or seizure of any person inside organizational facilities absent a warrant. CC ID 09981 | Physical and environmental protection | Preventive | |
Disallow inspecting computers or searching computer records inside organizational facilities absent a warrant. CC ID 09983 | Physical and environmental protection | Preventive | |
Do nothing to help during a search and seizure inside organizational facilities absent a warrant and being legally compelled to assist. CC ID 09984 | Physical and environmental protection | Preventive | |
Require removable storage media be in the custody of an authorized individual. CC ID 12319 | Physical and environmental protection | Preventive | |
Request the return of all appropriate assets upon notification of a personnel status change. CC ID 06678 | Physical and environmental protection | Preventive | |
Require the return of all assets upon notification an individual is terminated. CC ID 06679 | Physical and environmental protection | Preventive | |
Prohibit the use of recording devices near restricted data or restricted information, absent authorization. CC ID 04598 | Physical and environmental protection | Preventive | |
Prohibit usage of cell phones near restricted data or restricted information, absent authorization. CC ID 06354 | Physical and environmental protection | Preventive | |
Prohibit mobile device usage near restricted data or restricted information, absent authorization. CC ID 04597 | Physical and environmental protection | Preventive | |
Notify customers about payment card usage security measures. CC ID 06407 | Physical and environmental protection | Preventive | |
Refrain from adopting impromptu measures when continuity procedures exist. CC ID 13093 | Operational and Systems Continuity | Preventive | |
Delegate authority for specific processes, as necessary. CC ID 06780 | Human Resources management | Preventive | |
Train all personnel and third parties, as necessary. CC ID 00785 [(train} Review whether the institution has the following: Training to prepare staff for their short- and long-term security responsibilities. App A Objective 2.9.c] | Human Resources management | Preventive | |
Retrain all personnel, as necessary. CC ID 01362 | Human Resources management | Preventive | |
Tailor training to meet published guidance on the subject being taught. CC ID 02217 [{training} Determine whether management develops customer awareness and education efforts that address both retail (consumer) and commercial account holders. App A Objective 6.26] | Human Resources management | Preventive | |
Tailor training to be taught at each person's level of responsibility. CC ID 06674 | Human Resources management | Preventive | |
Conduct cross-training or staff backup training to minimize dependency on critical individuals. CC ID 00786 | Human Resources management | Preventive | |
Use automated mechanisms in the training environment, where appropriate. CC ID 06752 | Human Resources management | Preventive | |
Conduct Archives and Records Management training. CC ID 00975 | Human Resources management | Preventive | |
Disseminate and communicate the security awareness program to all interested personnel and affected parties. CC ID 00823 [{facilitate} Determine whether management responsibilities are appropriate and include the following: Facilitation of annual information security and awareness training and ongoing security-related communications to employees. App A Objective 2.5.l] | Human Resources management | Preventive | |
Train all personnel and third parties on how to recognize and report security incidents. CC ID 01211 | Human Resources management | Preventive | |
Conduct secure coding and development training for developers. CC ID 06822 | Human Resources management | Corrective | |
Conduct crime prevention training. CC ID 06350 | Human Resources management | Preventive | |
Refrain from accepting instant messages from unknown senders. CC ID 12537 | Operational management | Preventive | |
Notify interested personnel and affected parties prior to when the system is redeployed or the system is disposed. CC ID 06400 | Operational management | Preventive | |
Notify interested personnel and affected parties of the privacy breach that affects their personal data. CC ID 00365 [{preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Operational management | Corrective | |
Determine whether or not incident response notifications are necessary during the privacy breach investigation. CC ID 00801 | Operational management | Detective | |
Delay sending incident response notifications under predetermined conditions. CC ID 00804 | Operational management | Corrective | |
Avoid false positive incident response notifications. CC ID 04732 | Operational management | Detective | |
Send paper incident response notifications to affected parties, as necessary. CC ID 00366 | Operational management | Corrective | |
Determine if a substitute incident response notification is permitted if notifying affected parties. CC ID 00803 | Operational management | Corrective | |
Use a substitute incident response notification to notify interested personnel and affected parties of the privacy breach that affects their personal data. CC ID 00368 | Operational management | Corrective | |
Telephone incident response notifications to affected parties, as necessary. CC ID 04650 | Operational management | Corrective | |
Send electronic substitute incident response notifications to affected parties, as necessary. CC ID 04747 | Operational management | Preventive | |
Send substitute incident response notifications to breach notification organizations, as necessary. CC ID 04750 | Operational management | Preventive | |
Publish the incident response notification in a general circulation periodical. CC ID 04651 | Operational management | Corrective | |
Publish the substitute incident response notification in a general circulation periodical, as necessary. CC ID 04769 | Operational management | Preventive | |
Send electronic incident response notifications to affected parties, as necessary. CC ID 00367 | Operational management | Corrective | |
Incorporate simulated events into the incident response training program. CC ID 06751 | Operational management | Preventive | |
Incorporate realistic exercises that are tested into the incident response training program. CC ID 06753 [{information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Operational management | Preventive | |
Maintain contact with breach notification organizations for notification purposes in the event a privacy breach has occurred. CC ID 01213 | Operational management | Preventive | |
Disseminate and communicate proposed changes to all interested personnel and affected parties. CC ID 06807 | Operational management | Preventive | |
Disseminate and communicate software update information to users and regulators. CC ID 06602 | Operational management | Preventive | |
Notify affected parties to keep authenticators confidential. CC ID 06787 | System hardening through configuration management | Preventive | |
Discourage affected parties from recording authenticators. CC ID 06788 | System hardening through configuration management | Preventive | |
Train BlackBerry handheld device users on the Bluetooth Smart Card Reader's proper usage. CC ID 04603 | System hardening through configuration management | Preventive | |
Prohibit the use of Personal Electronic Devices, absent approval. CC ID 04599 | Acquisition or sale of facilities, technology, and services | Detective | |
Use the contact information on file to contact the individual identified in an account change request. CC ID 04857 | Privacy protection for information and data | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Establish, implement, and maintain a reporting methodology program. CC ID 02072 | Leadership and high level objectives | Preventive | |
Analyze the business environment in which the organization operates. CC ID 12798 | Leadership and high level objectives | Preventive | |
Analyze the external environment in which the organization operates. CC ID 12799 | Leadership and high level objectives | Preventive | |
Include industry forces in the analysis of the external environment. CC ID 12904 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Leadership and high level objectives | Preventive | |
Include legal requirements in the analysis of the external environment. CC ID 12896 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Leadership and high level objectives | Preventive | |
Identify threats that could affect achieving organizational objectives. CC ID 12827 [Review whether management has the following: Visibility to assess the likelihood of threats and potential damage to the institution. App A Objective 3.2.d {threat identification process}{threat assessment process} Determine whether management has effective threat identification and assessment processes, including the following: App A Objective 8.3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Leadership and high level objectives | Preventive | |
Review the organization's approach to managing information security, as necessary. CC ID 12005 [Review for indicators of an effective information security culture (e.g., method of introducing new business initiatives and manner in which the institution holds lines of business and employees accountable for promoting information security). App A Objective 2.1.c Review whether management does the following: Implements and assesses the adequacy of appropriate controls to ensure the security of connections. App A Objective 6.7.e {information security culture} Determine whether the institution has a culture that contributes to the effectiveness of the information security program. App A Objective 2.1 Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Leadership and high level objectives | Preventive | |
Establish, implement, and maintain a Governance, Risk, and Compliance awareness and training program. CC ID 06492 [Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Leadership and high level objectives | Preventive | |
Implement a fraud detection system. CC ID 13081 | Monitoring and measurement | Preventive | |
Approve the system security plan. CC ID 14241 | Monitoring and measurement | Preventive | |
Employ an approved third party to perform external vulnerability scans on the organization's systems. CC ID 12467 | Monitoring and measurement | Preventive | |
Align enforcement reviews for non-compliance with organizational risk tolerance. CC ID 13063 | Monitoring and measurement | Detective | |
Establish, implement, and maintain an incident management and vulnerability management metrics program. CC ID 02085 [{software development} With respect to developed software, determine whether institution management does the following: Collects data to build metrics and reporting of configuration management compliance, and vulnerability management. App A Objective 6.28.f] | Monitoring and measurement | Preventive | |
Identify personnel who should attend the closing meeting. CC ID 15261 | Audits and risk management | Preventive | |
Schedule attestation engagement meetings with interested personnel and affected parties, as necessary. CC ID 15263 | Audits and risk management | Preventive | |
Refrain from accepting an attestation engagement when the engaging party refuses to sign the engagement letter. CC ID 14912 | Audits and risk management | Preventive | |
Accept the attestation engagement when all preconditions are met. CC ID 13933 | Audits and risk management | Preventive | |
Respond to questions or clarification requests regarding the audit. CC ID 08902 | Audits and risk management | Preventive | |
Review the need for organizational efficiency as balanced against the needs of compliance and security. CC ID 07111 | Audits and risk management | Preventive | |
Provide auditors access to affected parties during the audit, as necessary. CC ID 07187 | Audits and risk management | Preventive | |
Disclaim the audit opinion in the audit report, as necessary. CC ID 13901 | Audits and risk management | Corrective | |
Notify interested personnel and affected parties after bribes are offered during the audit. CC ID 08872 | Audits and risk management | Preventive | |
Document and justify any exclusions from the scope of the risk management activities in the risk management program. CC ID 15336 | Audits and risk management | Detective | |
Integrate the risk management program with the organization's business activities. CC ID 13661 | Audits and risk management | Preventive | |
Integrate the risk management program into daily business decision-making. CC ID 13659 | Audits and risk management | Preventive | |
Include regular updating in the risk management system. CC ID 14990 | Audits and risk management | Preventive | |
Design a portfolio of insurance options in accordance with risk decision-making criteria. CC ID 12878 | Audits and risk management | Preventive | |
Design a portfolio of loans in accordance with risk decision-making criteria. CC ID 12877 | Audits and risk management | Preventive | |
Design a portfolio of risk limiting and mitigating approaches in organizational contracts in accordance with risk decision-making criteria. CC ID 12903 | Audits and risk management | Preventive | |
Approve the threat and risk classification scheme. CC ID 15693 | Audits and risk management | Preventive | |
Establish, implement, and maintain a risk assessment awareness and training program. CC ID 06453 | Audits and risk management | Preventive | |
Align organizational risk tolerance to that of industry peers in the risk register. CC ID 09962 | Audits and risk management | Preventive | |
Review the Business Impact Analysis, as necessary. CC ID 12774 | Audits and risk management | Preventive | |
Review and approve material risks documented in the residual risk report, as necessary. CC ID 13672 | Audits and risk management | Preventive | |
Analyze the impact of artificial intelligence systems on business operations. CC ID 16356 | Audits and risk management | Preventive | |
Evaluate the cyber insurance market. CC ID 12695 | Audits and risk management | Preventive | |
Evaluate the usefulness of cyber insurance to the organization. CC ID 12694 | Audits and risk management | Preventive | |
Acquire cyber insurance, as necessary. CC ID 12693 | Audits and risk management | Preventive | |
Comply with the encryption laws of the local country. CC ID 16377 | Technical security | Preventive | |
Include an appeal process in the identification issuance procedures. CC ID 15428 | Physical and environmental protection | Preventive | |
Disallow copying or excerpting from documents, books, or records that are on or in the premises of an organizational facility absent a warrant. CC ID 09982 | Physical and environmental protection | Preventive | |
Transport restricted media using a delivery method that can be tracked. CC ID 11777 | Physical and environmental protection | Preventive | |
Require users to refrain from leaving mobile devices unattended. CC ID 16446 | Physical and environmental protection | Preventive | |
Refrain from distributing returned cards to staff with the responsibility for payment card issuance. CC ID 13572 | Physical and environmental protection | Preventive | |
Activate payment cards sent to customers upon receiving instructions to activate the payment card. CC ID 13052 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain an education methodology. CC ID 06671 | Human Resources management | Preventive | |
Manage cloud services. CC ID 13144 [Review whether management does the following: Requires appropriate controls over data stored in a cloud environment. App A Objective 6.18.c {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Operational management | Preventive | |
Define the scope for the internal control framework. CC ID 16325 | Operational management | Preventive | |
Review the relevance of information supporting internal controls. CC ID 12420 | Operational management | Detective | |
Assign resources to implement the internal control framework. CC ID 00816 [Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: App A Objective 2.9 Determine whether the institution's board and management understand and support information security and provide appropriate resources for the implementation of an effective security program. App A Objective 2.1.a Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Operational management | Preventive | |
Establish, implement, and maintain a baseline of internal controls. CC ID 12415 | Operational management | Preventive | |
Leverage actionable information to support internal controls. CC ID 12414 | Operational management | Preventive | |
Align the information security policy with the organization's risk acceptance level. CC ID 13042 | Operational management | Preventive | |
Establish, implement, and maintain information security procedures. CC ID 12006 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Operational management | Preventive | |
Refrain from requiring supervision when users are accessing social media applications. CC ID 14011 | Operational management | Preventive | |
Refrain from requiring users to disclose social media account usernames or authenticators. CC ID 14009 | Operational management | Preventive | |
Establish, implement, and maintain information sharing agreements. CC ID 15645 | Operational management | Preventive | |
Adhere to operating procedures as defined in the Standard Operating Procedures Manual. CC ID 06328 | Operational management | Preventive | |
Establish, implement, and maintain domain name registration and renewal procedures. CC ID 07075 | Operational management | Preventive | |
Implement and comply with the Governance, Risk, and Compliance framework. CC ID 00818 | Operational management | Preventive | |
Review systems for compliance with organizational information security policies. CC ID 12004 [Determine whether management does the following: Identifies all system components affected by the changes. App A Objective 6.11.e] | Operational management | Preventive | |
Establish, implement, and maintain an Asset Management program. CC ID 06630 | Operational management | Preventive | |
Classify virtual systems by type and purpose. CC ID 16332 | Operational management | Preventive | |
Establish, implement, and maintain an asset inventory. CC ID 06631 [{asset inventory} Review whether management does the following: Updates the inventory(ies) appropriately. App A Objective 6.6.e] | Operational management | Preventive | |
Destroy systems in accordance with the system disposal program. CC ID 16457 | Operational management | Preventive | |
Approve the release of systems and waste material into the public domain. CC ID 16461 | Operational management | Preventive | |
Establish, implement, and maintain an Incident Management program. CC ID 00853 | Operational management | Preventive | |
Refrain from charging for providing incident response notifications. CC ID 13876 | Operational management | Preventive | |
Offer identity theft prevention services or identity theft mitigation services at no cost to the affected parties. CC ID 13766 | Operational management | Corrective | |
Eradicate the cause of the incident after the incident has been contained. CC ID 01757 | Operational management | Corrective | |
Analyze and respond to security alerts. CC ID 12504 | Operational management | Detective | |
Include the reimbursement of customers for financial losses due to incidents in the Incident Response program. CC ID 12756 | Operational management | Preventive | |
Collect evidence from the incident scene. CC ID 02236 | Operational management | Corrective | |
Manage change requests. CC ID 00887 | Operational management | Preventive | |
Examine all changes to ensure they correspond with the change request. CC ID 12345 | Operational management | Detective | |
Implement changes according to the change control program. CC ID 11776 [Determine whether management does the following: Defines change requirements. App A Objective 6.11.b] | Operational management | Preventive | |
Prioritize deploying patches according to vulnerability risk metrics. CC ID 06796 [{patch prioritization} Review whether patch management processes include the following: A prioritization process to determine which patches to apply across classes of computers and applications. App A Objective 6.15.c] | Operational management | Preventive | |
Mitigate the adverse effects of unauthorized changes. CC ID 12244 | Operational management | Corrective | |
Establish, implement, and maintain configuration control and Configuration Status Accounting. CC ID 00863 | System hardening through configuration management | Preventive | |
Approve the configuration management plan. CC ID 14717 | System hardening through configuration management | Preventive | |
Change the authenticator for shared accounts when the group membership changes. CC ID 14249 | System hardening through configuration management | Corrective | |
Review the use of utility and device driver software, as necessary. CC ID 13145 | System hardening through configuration management | Detective | |
Supervise media destruction in accordance with organizational standards. CC ID 16456 | Records management | Preventive | |
Use approved media sanitization equipment for destruction. CC ID 16459 | Records management | Preventive | |
Establish, implement, and maintain payment and settlement functions for selling products and services. CC ID 13538 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain an electronic commerce program. CC ID 08617 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain a list of approved third parties for payment transactions. CC ID 16349 | Acquisition or sale of facilities, technology, and services | Preventive | |
Restrict transaction activities, as necessary. CC ID 16334 | Acquisition or sale of facilities, technology, and services | Preventive | |
Reset transaction limits to zero after no activity within N* time period, as necessary. CC ID 13683 | Acquisition or sale of facilities, technology, and services | Preventive | |
Preset transaction limits for high-risk funds transfers, as necessary. CC ID 13682 | Acquisition or sale of facilities, technology, and services | Preventive | |
Implement dual authorization for high-risk funds transfers, as necessary. CC ID 13671 | Acquisition or sale of facilities, technology, and services | Preventive | |
Obtain cardholder authorization prior to completing payment transactions. CC ID 13108 | Acquisition or sale of facilities, technology, and services | Preventive | |
Protect the integrity of application service transactions. CC ID 12017 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain telephone-initiated transaction security measures. CC ID 13566 | Acquisition or sale of facilities, technology, and services | Preventive | |
Obtain authorization for marketing new products. CC ID 16805 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain Consumer Reporting Agency notification procedures. CC ID 04851 | Privacy protection for information and data | Preventive | |
Include a determination of the complexity of the third party relationships in the supply chain risk assessment. CC ID 10024 | Third Party and supply chain oversight | Preventive | |
Include a determination if the third party relationship will affect employees in the supply chain risk assessment report. CC ID 10027 | Third Party and supply chain oversight | Preventive | |
Establish, implement, and maintain supply chain due diligence standards. CC ID 08846 [{information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Third Party and supply chain oversight | Preventive | |
Provide management support for third party due diligence. CC ID 08847 | Third Party and supply chain oversight | Preventive | |
Commit to the supply chain due diligence process. CC ID 08849 | Third Party and supply chain oversight | Preventive | |
Structure the organization to support supply chain due diligence. CC ID 08850 | Third Party and supply chain oversight | Preventive | |
Establish, implement, and maintain internal accountability for the supply chain due diligence process. CC ID 08851 [Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31] | Third Party and supply chain oversight | Preventive | |
Establish, implement, and maintain supply chain due diligence requirements. CC ID 08853 | Third Party and supply chain oversight | Preventive | |
Cross-check the supply chain due diligence practices against the supply chain management policy. CC ID 08859 | Third Party and supply chain oversight | Preventive | |
Exclude suppliers that have passed the conflict-free smelter program from the conflict materials report. CC ID 10016 | Third Party and supply chain oversight | Preventive | |
Assign the appropriate individuals or groups to oversee and support supply chain due diligence. CC ID 08861 | Third Party and supply chain oversight | Preventive | |
Develop and implement supply chain due diligence capability training program. CC ID 08862 | Third Party and supply chain oversight | Preventive | |
Determine if additional supply chain due diligence processes are required. CC ID 08863 | Third Party and supply chain oversight | Preventive | |
Define ways a third party may be non-compliant with the organization's supply chain due diligence requirements. CC ID 08870 | Third Party and supply chain oversight | Preventive | |
Calculate and report the margin of error in the supply chain due diligence report. CC ID 08871 | Third Party and supply chain oversight | Preventive | |
Conduct all parts of the supply chain due diligence process. CC ID 08854 | Third Party and supply chain oversight | Preventive | |
Identify all service providers in the supply chain. CC ID 12213 [{network connection} Review whether management does the following: Identifies connections with third parties. App A Objective 6.7.a Determine the degree of reliance on service providers for information processing and technology support, including security operation management. App A Objective 1.4.a] | Third Party and supply chain oversight | Preventive | |
Assess third parties' compliance with the organization's third party security policies during due diligence. CC ID 12075 [Review the institution's policies, standards, and procedures related to the use of the following: Independent review of the third-party service provider's security through appropriate reports from audits and tests. App A Objective 6.31.e Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Third Party and supply chain oversight | Detective | |
Assess the effectiveness of third party services provided to the organization. CC ID 13142 | Third Party and supply chain oversight | Detective | |
Review the supply chain's service delivery on a regular basis. CC ID 12010 | Third Party and supply chain oversight | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Disseminate and communicate emerging threats to all interested personnel and affected parties. CC ID 12185 | Leadership and high level objectives | Preventive | |
Disseminate and communicate updated guidance documentation to interested personnel and affected parties upon discovery of a new threat. CC ID 12191 | Leadership and high level objectives | Corrective | |
Disseminate and communicate the organization’s policies, standards, and procedures to all interested personnel and affected parties. CC ID 12901 | Leadership and high level objectives | Preventive | |
Disseminate and communicate the audit and accountability policy to interested personnel and affected parties. CC ID 14095 | Monitoring and measurement | Preventive | |
Disseminate and communicate the audit and accountability procedures to interested personnel and affected parties. CC ID 14137 | Monitoring and measurement | Preventive | |
Disseminate and communicate information to customers about clock synchronization methods used by the organization. CC ID 13044 | Monitoring and measurement | Preventive | |
Disseminate and communicate monitoring capabilities with interested personnel and affected parties. CC ID 13156 | Monitoring and measurement | Preventive | |
Disseminate and communicate statistics on resource usage with interested personnel and affected parties. CC ID 13155 | Monitoring and measurement | Preventive | |
Notify the appropriate personnel after identifying dormant accounts. CC ID 12125 | Monitoring and measurement | Detective | |
Report inappropriate usage of user accounts to the appropriate personnel. CC ID 14243 | Monitoring and measurement | Detective | |
Disseminate and communicate the system security plan to interested personnel and affected parties. CC ID 14275 | Monitoring and measurement | Preventive | |
Disseminate and communicate the security assessment and authorization policy to interested personnel and affected parties. CC ID 14218 | Monitoring and measurement | Preventive | |
Disseminate and communicate security assessment and authorization procedures to interested personnel and affected parties. CC ID 14224 | Monitoring and measurement | Preventive | |
Share conformity assessment results with affected parties and interested personnel. CC ID 15113 | Monitoring and measurement | Preventive | |
Notify affected parties and interested personnel of technical documentation assessment certificates that have been issued. CC ID 15112 | Monitoring and measurement | Preventive | |
Notify affected parties and interested personnel of technical documentation assessment certificates that have been refused, withdrawn, suspended or restricted. CC ID 15111 | Monitoring and measurement | Preventive | |
Disseminate and communicate the testing program to all interested personnel and affected parties. CC ID 11871 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Personnel. App A Objective 10.2.b] | Monitoring and measurement | Preventive | |
Disseminate and communicate the vulnerability scan results to interested personnel and affected parties. CC ID 16418 | Monitoring and measurement | Preventive | |
Disseminate and communicate the disciplinary action notice to interested personnel and affected parties. CC ID 16585 | Monitoring and measurement | Preventive | |
Delay the reporting of incident management metrics, as necessary. CC ID 15501 | Monitoring and measurement | Preventive | |
Include the scope for the desired level of assurance in the audit program. CC ID 12793 | Audits and risk management | Preventive | |
Hold a closing meeting following an audit to present audit findings and conclusions. CC ID 15248 | Audits and risk management | Preventive | |
Report that audit evidence collected was not sufficient to the proper authorities. CC ID 16847 | Audits and risk management | Preventive | |
Disseminate and communicate the reasons the audit report was delayed to interested personnel and affected parties. CC ID 15257 | Audits and risk management | Preventive | |
Notify auditees if disclosure of audit documentation is required by law. CC ID 15249 | Audits and risk management | Preventive | |
Disseminate and communicate the audit plan to interested personnel and affected parties. CC ID 15238 | Audits and risk management | Preventive | |
Disseminate and communicate insurance options to interested personnel and affected parties. CC ID 16572 | Audits and risk management | Preventive | |
Disseminate and communicate insurance requirements to interested personnel and affected parties. CC ID 16567 | Audits and risk management | Preventive | |
Disseminate and communicate the Data Protection Impact Assessment to interested personnel and affected parties. CC ID 15313 | Audits and risk management | Preventive | |
Disseminate and communicate the risk assessment policy to interested personnel and affected parties. CC ID 14115 | Audits and risk management | Preventive | |
Disseminate and communicate the risk assessment procedures to interested personnel and affected parties. CC ID 14136 | Audits and risk management | Preventive | |
Disseminate and communicate the approved risk assessment report to interested personnel and affected parties. CC ID 10633 | Audits and risk management | Preventive | |
Notify the organization upon completion of the external audits of the organization's risk assessment. CC ID 13313 | Audits and risk management | Preventive | |
Disseminate and communicate the Business Impact Analysis to interested personnel and affected parties. CC ID 15300 | Audits and risk management | Preventive | |
Disseminate and communicate the risk treatment plan to interested personnel and affected parties. CC ID 15694 | Audits and risk management | Preventive | |
Disseminate and communicate the cybersecurity risk management policy to interested personnel and affected parties. CC ID 16832 | Audits and risk management | Preventive | |
Disseminate and communicate the cybersecurity risk management program to interested personnel and affected parties. CC ID 16829 | Audits and risk management | Preventive | |
Disseminate and communicate the cybersecurity risk management strategy to interested personnel and affected parties. CC ID 16825 | Audits and risk management | Preventive | |
Disseminate and communicate the supply chain risk management policy to all interested personnel and affected parties. CC ID 14662 | Audits and risk management | Preventive | |
Disseminate and communicate the supply chain risk management procedures to all interested personnel and affected parties. CC ID 14712 | Audits and risk management | Preventive | |
Disseminate and communicate the risk management policy to interested personnel and affected parties. CC ID 13792 | Audits and risk management | Preventive | |
Notify the user when an authentication is attempted using an expired authenticator. CC ID 13818 | Technical security | Corrective | |
Notify interested personnel when user accounts are added or deleted. CC ID 14327 | Technical security | Detective | |
Disseminate and communicate the access control log to interested personnel and affected parties. CC ID 16442 | Technical security | Preventive | |
Disseminate and communicate the access control procedures to all interested personnel and affected parties. CC ID 14123 | Technical security | Corrective | |
Disseminate and communicate the identification and authentication policy to interested personnel and affected parties. CC ID 14197 | Technical security | Preventive | |
Disseminate and communicate the identification and authentication procedures to interested personnel and affected parties. CC ID 14223 | Technical security | Preventive | |
Notify a user when an authenticator for a user account is changed. CC ID 13820 | Technical security | Preventive | |
Disseminate and communicate the network security policy to interested personnel and affected parties. CC ID 14199 | Technical security | Preventive | |
Disseminate and communicate the system and communications protection procedures to interested personnel and affected parties. CC ID 14206 | Technical security | Preventive | |
Disseminate and communicate network diagrams to interested personnel and affected parties. CC ID 13137 | Technical security | Preventive | |
Disseminate and communicate the data flow diagrams to interested personnel and affected parties. CC ID 16407 | Technical security | Preventive | |
Authorize the disclosure of private Internet Protocol addresses and routing information to external entities. CC ID 12034 | Technical security | Preventive | |
Disseminate and communicate the encryption management and cryptographic controls policy to all interested personnel and affected parties. CC ID 15476 | Technical security | Preventive | |
Disseminate and communicate the encryption management procedures to all interested personnel and affected parties. CC ID 15477 | Technical security | Preventive | |
Disseminate and communicate cryptographic key management procedures to interested personnel and affected parties. CC ID 13164 | Technical security | Preventive | |
Disseminate and communicate the malicious code protection policy to all interested personnel and affected parties. CC ID 15485 | Technical security | Preventive | |
Disseminate and communicate the malicious code protection procedures to all interested personnel and affected parties. CC ID 15484 | Technical security | Preventive | |
Notify interested personnel and affected parties when malware is detected. CC ID 13689 | Technical security | Corrective | |
Report damaged property to interested personnel and affected parties. CC ID 13702 | Physical and environmental protection | Corrective | |
Alert interested personnel and affected parties when evidence of tampering is discovered. CC ID 15319 | Physical and environmental protection | Preventive | |
Post floor plans of critical facilities in secure locations. CC ID 16138 | Physical and environmental protection | Preventive | |
Disseminate and communicate the camera installation policy to interested personnel and affected parties. CC ID 15461 | Physical and environmental protection | Preventive | |
Disseminate and communicate the media protection policy to interested personnel and affected parties. CC ID 14165 | Physical and environmental protection | Preventive | |
Disseminate and communicate the media protection procedures to interested personnel and affected parties. CC ID 14186 | Physical and environmental protection | Preventive | |
Disseminate and communicate the asset removal policy to interested personnel and affected parties. CC ID 13160 | Physical and environmental protection | Preventive | |
Report changes in the continuity plan to senior management. CC ID 12757 | Operational and Systems Continuity | Corrective | |
Notify interested personnel and affected parties upon activation of the continuity plan. CC ID 16777 | Operational and Systems Continuity | Preventive | |
Disseminate and communicate the continuity procedures to interested personnel and affected parties. CC ID 14055 | Operational and Systems Continuity | Preventive | |
Notify interested personnel and affected parties of updates to the recovery plan. CC ID 13302 | Operational and Systems Continuity | Preventive | |
Disseminate and communicate the recovery plan to interested personnel and affected parties. CC ID 14859 | Operational and Systems Continuity | Preventive | |
Disseminate and communicate the recovery status of the contingency plan to interested personnel and affected parties. CC ID 12758 | Operational and Systems Continuity | Preventive | |
Disseminate and communicate screening results to interested personnel and affected parties. CC ID 16445 | Human Resources management | Preventive | |
Disseminate and communicate the security awareness and training procedures to interested personnel and affected parties. CC ID 14138 | Human Resources management | Preventive | |
Notify cloud customers of the geographic locations of the cloud service organization and its assets. CC ID 13037 | Operational management | Preventive | |
Disseminate and communicate documentation of pertinent monitoring capabilities to interested personnel and affected parties. CC ID 13159 | Operational management | Preventive | |
Disseminate and communicate the legal jurisdiction of cloud services to interested personnel and affected parties. CC ID 13147 | Operational management | Preventive | |
Share security information with interested personnel and affected parties. CC ID 11732 | Operational management | Preventive | |
Disseminate and communicate the internal control framework to all interested personnel and affected parties. CC ID 15229 | Operational management | Preventive | |
Disseminate and communicate the information security procedures to all interested personnel and affected parties. CC ID 16303 | Operational management | Preventive | |
Disseminate and communicate the information security policy to interested personnel and affected parties. CC ID 11739 [Review whether policies, standards, and procedures have the following characteristics: Are reviewed and agreed to by employees. App A Objective 6.1.d] | Operational management | Preventive | |
Disseminate and communicate the Standard Operating Procedures Manual to all interested personnel and affected parties. CC ID 12026 | Operational management | Preventive | |
Disseminate and communicate the Acceptable Use Policy to all interested personnel and affected parties. CC ID 12431 | Operational management | Preventive | |
Provide assurance to interested personnel and affected parties that the Governance, Risk, and Compliance capability is reliable, effective, efficient, and responsive. CC ID 12788 [{is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Operational management | Preventive | |
Disseminate and communicate the Asset Classification Policy to interested personnel and affected parties. CC ID 14851 | Operational management | Preventive | |
Submit written requests to delay the notification of affected parties. CC ID 16783 | Operational management | Preventive | |
Provide enrollment information for identity theft prevention services or identity theft mitigation services. CC ID 13767 | Operational management | Corrective | |
Include a copy of the incident response notification in breach notifications, as necessary. CC ID 13085 | Operational management | Preventive | |
Notify interested personnel and affected parties of the privacy breach about any recovered restricted data. CC ID 13347 | Operational management | Corrective | |
Establish, implement, and maintain incident reporting time frame standards. CC ID 12142 | Operational management | Preventive | |
Submit the incident response report to the proper authorities in a timely manner. CC ID 12705 | Operational management | Preventive | |
Disseminate and communicate the cyber incident response plan to interested personnel and affected parties. CC ID 16838 | Operational management | Preventive | |
Notify interested personnel and affected parties that a security breach was detected. CC ID 11788 | Operational management | Corrective | |
Assign the distribution of incident response procedures to the appropriate role in the incident response program. CC ID 12474 | Operational management | Preventive | |
Disseminate and communicate the incident response policy to interested personnel and affected parties. CC ID 14099 | Operational management | Preventive | |
Contact affected parties to participate in forensic investigations, as necessary. CC ID 12343 | Operational management | Detective | |
Disseminate and communicate the local environment security profile to interested personnel and affected parties. CC ID 15716 | Operational management | Preventive | |
Disseminate and communicate the configuration management procedures to interested personnel and affected parties. CC ID 14139 | System hardening through configuration management | Preventive | |
Disseminate and communicate the configuration management policy to interested personnel and affected parties. CC ID 14066 | System hardening through configuration management | Preventive | |
Disseminate and communicate the configuration management program to all interested personnel and affected parties. CC ID 11946 | System hardening through configuration management | Preventive | |
Include risk information when communicating critical security updates. CC ID 14948 | System hardening through configuration management | Preventive | |
Disseminate and communicate with the end user when a memorized secret entered into an authenticator field matches one found in the memorized secret list. CC ID 13807 | System hardening through configuration management | Preventive | |
Disseminate and communicate the system testing procedures to interested personnel and affected parties. CC ID 15471 | Systems design, build, and implementation | Preventive | |
Notify affected parties prior to initiating high-risk funds transfer transactions. CC ID 13687 | Acquisition or sale of facilities, technology, and services | Preventive | |
Disseminate and communicate confirmations of telephone-initiated transactions to affected parties. CC ID 13571 | Acquisition or sale of facilities, technology, and services | Preventive | |
Require third parties to disclose all known vulnerabilities in third party products and services. CC ID 15491 | Acquisition or sale of facilities, technology, and services | Preventive | |
Disseminate and communicate the system documentation to interested personnel and affected parties. CC ID 14285 | Acquisition or sale of facilities, technology, and services | Preventive | |
Disseminate and communicate the product and services acquisition policy to interested personnel and affected parties. CC ID 14157 | Acquisition or sale of facilities, technology, and services | Preventive | |
Disseminate and communicate the product and services acquisition procedures to interested personnel and affected parties. CC ID 14152 | Acquisition or sale of facilities, technology, and services | Preventive | |
Disseminate and communicate acquisition approval requirements to all affected parties. CC ID 13706 | Acquisition or sale of facilities, technology, and services | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Protect continuous security management systems from unauthorized use. CC ID 13097 | Monitoring and measurement | Preventive | |
Install and maintain an Intrusion Detection System and/or Intrusion Prevention System. CC ID 00581 | Monitoring and measurement | Preventive | |
Document the event information to be logged in the event information log specification. CC ID 00639 | Monitoring and measurement | Preventive | |
Enable the logging capability to capture enough information to ensure the system is functioning according to its intended purpose throughout its life cycle. CC ID 15001 | Monitoring and measurement | Preventive | |
Enable and configure logging on all network access controls. CC ID 01963 | Monitoring and measurement | Preventive | |
Synchronize system clocks to an accurate and universal time source on all devices. CC ID 01340 | Monitoring and measurement | Preventive | |
Centralize network time servers to as few as practical. CC ID 06308 | Monitoring and measurement | Preventive | |
Deny network access to rogue devices until network access approval has been received. CC ID 11852 | Monitoring and measurement | Preventive | |
Isolate rogue devices after a rogue device has been detected. CC ID 07061 | Monitoring and measurement | Corrective | |
Update the vulnerability scanners' vulnerability list. CC ID 10634 | Monitoring and measurement | Corrective | |
Test in scope systems for compliance with the Configuration Baseline Documentation Record. CC ID 12130 | Monitoring and measurement | Detective | |
Disallow the use of payment applications when a vulnerability scan report indicates vulnerabilities are present. CC ID 12188 | Monitoring and measurement | Corrective | |
Enforce dual authorization as a part of information flow control for logs. CC ID 10098 | Monitoring and measurement | Preventive | |
Match user accounts to authorized parties. CC ID 12126 | Technical security | Detective | |
Configure access control lists in accordance with organizational standards. CC ID 16465 | Technical security | Preventive | |
Disallow application IDs from running as privileged users. CC ID 10050 | Technical security | Detective | |
Separate processing domains to segregate user privileges and enhance information flow control. CC ID 06767 | Technical security | Preventive | |
Configure the lockout procedure to disregard failed logon attempts after the user is authenticated. CC ID 13822 | Technical security | Preventive | |
Establish, implement, and maintain session lock capabilities. CC ID 01417 | Technical security | Preventive | |
Limit concurrent sessions according to account type. CC ID 01416 | Technical security | Preventive | |
Configure the "tlsverify" argument to organizational standards. CC ID 14460 | Technical security | Preventive | |
Configure the "tlscacert" argument to organizational standards. CC ID 14521 | Technical security | Preventive | |
Configure the "tlscert" argument to organizational standards. CC ID 14520 | Technical security | Preventive | |
Configure the "tlskey" argument to organizational standards. CC ID 14519 | Technical security | Preventive | |
Enable access control for objects and users on each system. CC ID 04553 | Technical security | Preventive | |
Display previous logon information in the logon banner. CC ID 01415 | Technical security | Preventive | |
Encrypt files and move them to a secure file server when a user account is disabled. CC ID 07065 | Technical security | Preventive | |
Limit superuser accounts to designated System Administrators. CC ID 06766 | Technical security | Preventive | |
Grant access to authorized personnel or systems. CC ID 12186 | Technical security | Preventive | |
Assign authenticators to user accounts. CC ID 06855 | Technical security | Preventive | |
Assign authentication mechanisms for user account authentication. CC ID 06856 | Technical security | Preventive | |
Limit account credential reuse as a part of digital identification procedures. CC ID 12357 | Technical security | Preventive | |
Tune the biometric identification equipment, as necessary. CC ID 07077 | Technical security | Corrective | |
Prohibit systems from connecting directly to external networks. CC ID 08709 | Technical security | Preventive | |
Secure the Domain Name System. CC ID 00540 | Technical security | Preventive | |
Configure the network to limit zone transfers to trusted servers. CC ID 01876 | Technical security | Preventive | |
Place firewalls between all security domains and between any Demilitarized Zone and internal network zones. CC ID 01274 | Technical security | Preventive | |
Place firewalls between wireless networks and applications or databases that contain restricted data or restricted information. CC ID 01293 | Technical security | Preventive | |
Place firewalls between all security domains and between any secure subnet and internal network zones. CC ID 11784 | Technical security | Preventive | |
Establish, implement, and maintain a firewall and router configuration standard. CC ID 00541 | Technical security | Preventive | |
Deny or strictly control wireless traffic to applications or databases that contain restricted data or restricted information. CC ID 11847 | Technical security | Preventive | |
Configure network ports to organizational standards. CC ID 14007 | Technical security | Preventive | |
Install and configure firewalls to be enabled on all mobile devices, if possible. CC ID 00550 | Technical security | Preventive | |
Configure network access and control points to protect restricted data or restricted information. CC ID 01284 | Technical security | Preventive | |
Configure security alerts in firewalls to include the source Internet protocol address and destination Internet protocol address associated with long sessions. CC ID 12174 | Technical security | Detective | |
Configure firewalls to deny all traffic by default, except explicitly designated traffic. CC ID 00547 | Technical security | Preventive | |
Allow local program exceptions on the firewall, as necessary. CC ID 01956 | Technical security | Preventive | |
Allow remote administration exceptions on the firewall, as necessary. CC ID 01957 | Technical security | Preventive | |
Allow file sharing exceptions on the firewall, as necessary. CC ID 01958 | Technical security | Preventive | |
Allow printer sharing exceptions on the firewall, as necessary. CC ID 11849 | Technical security | Preventive | |
Allow Internet Control Message Protocol exceptions on the firewall, as necessary. CC ID 01959 | Technical security | Preventive | |
Allow Remote Desktop Connection exceptions on the firewall, as necessary. CC ID 01960 | Technical security | Preventive | |
Allow UPnP framework exceptions on the firewall, as necessary. CC ID 01961 | Technical security | Preventive | |
Allow notification exceptions on the firewall, as necessary. CC ID 01962 | Technical security | Preventive | |
Allow unicast response to multicast or broadcast exceptions on the firewall, as necessary. CC ID 01964 | Technical security | Preventive | |
Allow protocol port exceptions on the firewall, as necessary. CC ID 01965 | Technical security | Preventive | |
Allow local port exceptions on the firewall, as necessary. CC ID 01966 | Technical security | Preventive | |
Establish, implement, and maintain ingress address filters on the firewall, as necessary. CC ID 01287 | Technical security | Preventive | |
Synchronize and secure all router configuration files. CC ID 01291 | Technical security | Preventive | |
Synchronize and secure all firewall configuration files. CC ID 11851 | Technical security | Preventive | |
Configure firewalls to generate an alert when a potential security incident is detected. CC ID 12165 | Technical security | Preventive | |
Configure network access and control points to organizational standards. CC ID 12442 | Technical security | Detective | |
Install and configure application layer firewalls for all key web-facing applications. CC ID 01450 | Technical security | Preventive | |
Configure third party Wireless Local Area Network services in accordance with organizational Information Assurance standards. CC ID 00751 | Technical security | Preventive | |
Remove all unauthorized Wireless Local Area Networks. CC ID 06309 | Technical security | Preventive | |
Refrain from using Wired Equivalent Privacy for Wireless Local Area Networks that use Wi-Fi Protected Access. CC ID 01648 | Technical security | Preventive | |
Configure Intrusion Detection Systems and Intrusion Prevention Systems to continuously check and send alerts for rogue devices connected to Wireless Local Area Networks. CC ID 04830 | Technical security | Preventive | |
Remove all unauthorized wireless access points. CC ID 11856 | Technical security | Preventive | |
Configure network flow monitoring to organizational standards. CC ID 16364 | Technical security | Preventive | |
Deploy sender policy framework records in the organization's Domain Name Servers. CC ID 12183 | Technical security | Preventive | |
Secure access to each system component operating system. CC ID 00551 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts operating system access to specific terminals in physically secure and monitored locations. App A Objective 6.21.c] | Technical security | Preventive | |
Segregate electronically stored information from operating system access. CC ID 00552 | Technical security | Preventive | |
Control remote administration in accordance with organizational standards. CC ID 04459 | Technical security | Preventive | |
Install and maintain remote control software and other remote control mechanisms on critical systems. CC ID 06371 | Technical security | Preventive | |
Implement multifactor authentication techniques. CC ID 00561 | Technical security | Preventive | |
Protect remote access accounts with encryption. CC ID 00562 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Prohibits remote access to operating system and system utilities, where feasible, and, at a minimum, requires strong authentication and encrypted sessions before allowing such remote access. App A Objective 6.21.e] | Technical security | Preventive | |
Refrain from allowing the use of cleartext for input or output of restricted data or restricted information. CC ID 04823 | Technical security | Preventive | |
Ensure restricted data or restricted information are encrypted prior to or at the time of transmission. CC ID 01749 | Technical security | Preventive | |
Install security and protection software, as necessary. CC ID 00575 [Determine whether the institution's security operations activities include the following: Security software and device management (e.g., maintaining the signatures on signaturebased devices and firewall rules). App A Objective 8.1.a {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Technical security | Preventive | |
Lock antivirus configurations. CC ID 10047 | Technical security | Preventive | |
Disallow disabling tamper detection and response mechanisms, absent authorization. CC ID 12211 | Physical and environmental protection | Preventive | |
Prevent security mechanisms from being compromised by adverse physical conditions. CC ID 12215 | Physical and environmental protection | Preventive | |
Install doors so that exposed hinges are on the secured side. CC ID 06687 | Physical and environmental protection | Preventive | |
Install emergency doors to permit egress only. CC ID 06688 | Physical and environmental protection | Preventive | |
Install contact alarms on doors, as necessary. CC ID 06710 | Physical and environmental protection | Preventive | |
Use locks with electronic authentication systems or cipher locks, as necessary. CC ID 06650 | Physical and environmental protection | Preventive | |
Install contact alarms on openable windows, as necessary. CC ID 06690 | Physical and environmental protection | Preventive | |
Install glass break alarms on windows, as necessary. CC ID 06691 | Physical and environmental protection | Preventive | |
Configure video cameras to cover all physical entry points. CC ID 06302 | Physical and environmental protection | Preventive | |
Configure video cameras to prevent physical tampering or disablement. CC ID 06303 | Physical and environmental protection | Preventive | |
Design interior walls that provide security to extend from true floor to true ceiling. CC ID 06693 | Physical and environmental protection | Preventive | |
Serialize all removable storage media. CC ID 00949 | Physical and environmental protection | Preventive | |
Prohibit wireless technology usage near restricted data or restricted information, absent authorization. CC ID 08706 | Physical and environmental protection | Preventive | |
Provide a physical disconnect of collaborative computing devices in a way that supports ease of use. CC ID 06769 | Physical and environmental protection | Preventive | |
Enable network jacks at the patch panel, as necessary. CC ID 06305 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain redundant systems. CC ID 16354 | Operational and Systems Continuity | Preventive | |
Install an Uninterruptible Power Supply sized to support all critical systems. CC ID 00725 | Operational and Systems Continuity | Preventive | |
Install a generator sized to support the facility. CC ID 06709 | Operational and Systems Continuity | Preventive | |
Automate threat assessments, as necessary. CC ID 06877 | Operational management | Preventive | |
Automate vulnerability management, as necessary. CC ID 11730 [{analyze} Determine whether management has effective threat identification and assessment processes, including the following: Using tools to assist in the analysis of vulnerabilities (e.g., design of system, operation of the system, security procedures, business line controls, and implementation of the system and controls). App A Objective 8.3.c] | Operational management | Preventive | |
Disallow systems from processing information, disseminating and communicating information, or storing information that is above the system's assigned asset classification. CC ID 06606 | Operational management | Preventive | |
Deploy software patches in accordance with organizational standards. CC ID 07032 | Operational management | Corrective | |
Deploy software patches in the disaster recovery environment to mirror those in the production environment. CC ID 13174 [Review whether patch management processes include the following: A process to ensure that all patches installed in the production environment are also installed in the disaster recovery environment. App A Objective 6.15.f] | Operational management | Corrective | |
Remove outdated software after software has been updated. CC ID 11792 | Operational management | Corrective | |
Update computer firmware, as necessary. CC ID 11755 | Operational management | Corrective | |
Remove outdated computer firmware after the computer firmware has been updated. CC ID 10671 | Operational management | Corrective | |
Establish, implement, and maintain a configuration change log. CC ID 08710 [{system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Operational management | Detective | |
Verify configuration files requiring passwords for automation do not contain those passwords after the installation process is complete. CC ID 06555 | System hardening through configuration management | Preventive | |
Employ the Configuration Management program. CC ID 11904 | System hardening through configuration management | Preventive | |
Document external connections for all systems. CC ID 06415 | System hardening through configuration management | Preventive | |
Configure the Intrusion Detection System and Intrusion Prevention System in accordance with organizational standards. CC ID 04831 | System hardening through configuration management | Preventive | |
Configure automatic logoff to terminate the sessions based on inactivity according to organizational standards. CC ID 04490 | System hardening through configuration management | Preventive | |
Enable historical logging on the Intrusion Detection System and Intrusion Prevention System. CC ID 04836 | System hardening through configuration management | Preventive | |
Configure the Intrusion Detection System and the Intrusion Prevention System to detect rogue devices and unauthorized connections. CC ID 04837 | System hardening through configuration management | Preventive | |
Configure the Intrusion Detection System and the Intrusion Prevention System to alert upon finding rogue devices and unauthorized connections. CC ID 07062 | System hardening through configuration management | Preventive | |
Display an explicit logout message when disconnecting an authenticated communications session. CC ID 10093 | System hardening through configuration management | Preventive | |
Configure “Docker” to organizational standards. CC ID 14457 | System hardening through configuration management | Preventive | |
Configure the "autolock" argument to organizational standards. CC ID 14547 | System hardening through configuration management | Preventive | |
Configure the "COPY" instruction to organizational standards. CC ID 14515 | System hardening through configuration management | Preventive | |
Configure the "memory" argument to organizational standards. CC ID 14497 | System hardening through configuration management | Preventive | |
Configure the "docker0" bridge to organizational standards. CC ID 14504 | System hardening through configuration management | Preventive | |
Configure the "docker exec commands" to organizational standards. CC ID 14502 | System hardening through configuration management | Preventive | |
Configure the "health-cmd" argument to organizational standards. CC ID 14527 | System hardening through configuration management | Preventive | |
Configure the "HEALTHCHECK" to organizational standards. CC ID 14511 | System hardening through configuration management | Detective | |
Configure the maximum number of images to organizational standards. CC ID 14545 | System hardening through configuration management | Preventive | |
Configure the minimum number of manager nodes to organizational standards. CC ID 14543 | System hardening through configuration management | Preventive | |
Configure the "on-failure" restart policy to organizational standards. CC ID 14542 | System hardening through configuration management | Preventive | |
Configure the maximum number of containers to organizational standards. CC ID 14540 | System hardening through configuration management | Preventive | |
Configure the "lifetime_minutes" to organizational standards. CC ID 14539 | System hardening through configuration management | Preventive | |
Configure the "Linux kernel capabilities" to organizational standards. CC ID 14531 | System hardening through configuration management | Preventive | |
Configure the "Docker socket" to organizational standards. CC ID 14506 | System hardening through configuration management | Preventive | |
Configure the "read-only" argument to organizational standards. CC ID 14498 | System hardening through configuration management | Preventive | |
Configure the signed image enforcement to organizational standards. CC ID 14517 | System hardening through configuration management | Preventive | |
Configure the "storage-opt" argument to organizational standards. CC ID 14658 | System hardening through configuration management | Preventive | |
Configure the "swarm services" to organizational standards. CC ID 14516 | System hardening through configuration management | Preventive | |
Configure the "experimental" argument to organizational standards. CC ID 14494 | System hardening through configuration management | Preventive | |
Configure the cluster role-based access control policies to organizational standards. CC ID 14514 | System hardening through configuration management | Preventive | |
Configure the "secret management commands" to organizational standards. CC ID 14512 | System hardening through configuration management | Preventive | |
Configure the "renewal_threshold_minutes" to organizational standards. CC ID 14538 | System hardening through configuration management | Preventive | |
Configure the "docker swarm unlock-key" command to organizational standards. CC ID 14490 | System hardening through configuration management | Preventive | |
Configure the "per_user_limit" to organizational standards. CC ID 14523 | System hardening through configuration management | Preventive | |
Configure the "privileged" argument to organizational standards. CC ID 14510 | System hardening through configuration management | Preventive | |
Configure the "update instructions" to organizational standards. CC ID 14525 | System hardening through configuration management | Preventive | |
Configure the "swarm mode" to organizational standards. CC ID 14508 | System hardening through configuration management | Preventive | |
Configure the "USER" directive to organizational standards. CC ID 14507 | System hardening through configuration management | Preventive | |
Configure the "DOCKER_CONTENT_TRUST" to organizational standards. CC ID 14488 | System hardening through configuration management | Preventive | |
Configure the "no-new-privileges" argument to organizational standards. CC ID 14474 | System hardening through configuration management | Preventive | |
Configure the "seccomp-profile" argument to organizational standards. CC ID 14503 | System hardening through configuration management | Preventive | |
Configure the "cpu-shares" argument to organizational standards. CC ID 14489 | System hardening through configuration management | Preventive | |
Configure the "volume" argument to organizational standards. CC ID 14533 | System hardening through configuration management | Preventive | |
Configure the "cgroup-parent" to organizational standards. CC ID 14466 | System hardening through configuration management | Preventive | |
Configure the "live-restore" argument to organizational standards. CC ID 14465 | System hardening through configuration management | Preventive | |
Configure the "userland-proxy" argument to organizational standards. CC ID 14464 | System hardening through configuration management | Preventive | |
Configure the "user namespace support" to organizational standards. CC ID 14462 | System hardening through configuration management | Preventive | |
Configure "etcd" to organizational standards. CC ID 14535 | System hardening through configuration management | Preventive | |
Configure the "auto-tls" argument to organizational standards. CC ID 14621 | System hardening through configuration management | Preventive | |
Configure the "peer-auto-tls" argument to organizational standards. CC ID 14636 | System hardening through configuration management | Preventive | |
Configure the "peer-client-cert-auth" argument to organizational standards. CC ID 14614 | System hardening through configuration management | Preventive | |
Configure the "peer-cert-file" argument to organizational standards. CC ID 14606 | System hardening through configuration management | Preventive | |
Configure the "key-file" argument to organizational standards. CC ID 14604 | System hardening through configuration management | Preventive | |
Configure the "cert-file" argument to organizational standards. CC ID 14602 | System hardening through configuration management | Preventive | |
Configure the "client-cert-auth" argument to organizational standards. CC ID 14596 | System hardening through configuration management | Preventive | |
Configure the "peer-key-file" argument to organizational standards. CC ID 14595 | System hardening through configuration management | Preventive | |
Configure "Kubernetes" to organizational standards. CC ID 14528 | System hardening through configuration management | Preventive | |
Configure the "ImagePolicyWebhook" admission controller to organizational standards. CC ID 14657 | System hardening through configuration management | Preventive | |
Configure the "allowedCapabilities" to organizational standards. CC ID 14653 | System hardening through configuration management | Preventive | |
Configure the "allowPrivilegeEscalation" flag to organizational standards. CC ID 14645 | System hardening through configuration management | Preventive | |
Configure the "Security Context" to organizational standards. CC ID 14656 | System hardening through configuration management | Preventive | |
Configure the "cluster-admin" role to organizational standards. CC ID 14642 | System hardening through configuration management | Preventive | |
Configure the "automountServiceAccountToken" to organizational standards. CC ID 14639 | System hardening through configuration management | Preventive | |
Configure the "audit-log-maxsize" argument to organizational standards. CC ID 14624 | System hardening through configuration management | Detective | |
Configure the "seccomp" profile to organizational standards. CC ID 14652 | System hardening through configuration management | Preventive | |
Configure the "securityContext.privileged" flag to organizational standards. CC ID 14641 | System hardening through configuration management | Preventive | |
Configure the "audit-log-path" argument to organizational standards. CC ID 14622 | System hardening through configuration management | Detective | |
Configure the "audit-log-maxbackup" argument to organizational standards. CC ID 14613 | System hardening through configuration management | Detective | |
Configure the "audit-policy-file" to organizational standards. CC ID 14610 | System hardening through configuration management | Preventive | |
Configure the "audit-log-maxage" argument to organizational standards. CC ID 14605 | System hardening through configuration management | Detective | |
Configure the "bind-address" argument to organizational standards. CC ID 14601 | System hardening through configuration management | Preventive | |
Configure the "request-timeout" argument to organizational standards. CC ID 14583 | System hardening through configuration management | Preventive | |
Configure the "secure-port" argument to organizational standards. CC ID 14582 | System hardening through configuration management | Preventive | |
Configure the "service-account-key-file" argument to organizational standards. CC ID 14581 | System hardening through configuration management | Preventive | |
Configure the "insecure-bind-address" argument to organizational standards. CC ID 14580 | System hardening through configuration management | Preventive | |
Configure the "service-account-lookup" argument to organizational standards. CC ID 14579 | System hardening through configuration management | Preventive | |
Configure the "admission control plugin PodSecurityPolicy" to organizational standards. CC ID 14578 | System hardening through configuration management | Preventive | |
Configure the "profiling" argument to organizational standards. CC ID 14577 | System hardening through configuration management | Preventive | |
Configure the "hostNetwork" flag to organizational standards. CC ID 14649 | System hardening through configuration management | Preventive | |
Configure the "hostPID" flag to organizational standards. CC ID 14648 | System hardening through configuration management | Preventive | |
Configure the "etcd-certfile" argument to organizational standards. CC ID 14584 | System hardening through configuration management | Preventive | |
Configure the "runAsUser.rule" to organizational standards. CC ID 14651 | System hardening through configuration management | Preventive | |
Configure the "requiredDropCapabilities" to organizational standards. CC ID 14650 | System hardening through configuration management | Preventive | |
Configure the "hostIPC" flag to organizational standards. CC ID 14643 | System hardening through configuration management | Preventive | |
Configure the "admission control plugin ServiceAccount" to organizational standards. CC ID 14576 | System hardening through configuration management | Preventive | |
Configure the "insecure-port" argument to organizational standards. CC ID 14575 | System hardening through configuration management | Preventive | |
Configure the "admission control plugin AlwaysPullImages" to organizational standards. CC ID 14574 | System hardening through configuration management | Preventive | |
Configure the "pod" to organizational standards. CC ID 14644 | System hardening through configuration management | Preventive | |
Configure the "ClusterRoles" to organizational standards. CC ID 14637 | System hardening through configuration management | Preventive | |
Configure the "event-qps" argument to organizational standards. CC ID 14633 | System hardening through configuration management | Preventive | |
Configure the "Kubelet" to organizational standards. CC ID 14635 | System hardening through configuration management | Preventive | |
Configure the "NET_RAW" to organizational standards. CC ID 14647 | System hardening through configuration management | Preventive | |
Configure the "make-iptables-util-chains" argument to organizational standards. CC ID 14638 | System hardening through configuration management | Preventive | |
Configure the "hostname-override" argument to organizational standards. CC ID 14631 | System hardening through configuration management | Preventive | |
Configure the "admission control plugin NodeRestriction" to organizational standards. CC ID 14573 | System hardening through configuration management | Preventive | |
Configure the "admission control plugin AlwaysAdmit" to organizational standards. CC ID 14572 | System hardening through configuration management | Preventive | |
Configure the "etcd-cafile" argument to organizational standards. CC ID 14592 | System hardening through configuration management | Preventive | |
Configure the "encryption-provider-config" argument to organizational standards. CC ID 14587 | System hardening through configuration management | Preventive | |
Configure the "rotate-certificates" argument to organizational standards. CC ID 14640 | System hardening through configuration management | Preventive | |
Configure the "etcd-keyfile" argument to organizational standards. CC ID 14586 | System hardening through configuration management | Preventive | |
Configure the "client-ca-file" argument to organizational standards. CC ID 14585 | System hardening through configuration management | Preventive | |
Configure the "kube-apiserver" to organizational standards. CC ID 14589 | System hardening through configuration management | Preventive | |
Configure the "tls-private-key-file" argument to organizational standards. CC ID 14590 | System hardening through configuration management | Preventive | |
Configure the "streaming-connection-idle-timeout" argument to organizational standards. CC ID 14634 | System hardening through configuration management | Preventive | |
Configure the "RotateKubeletServerCertificate" argument to organizational standards. CC ID 14626 | System hardening through configuration management | Preventive | |
Configure the "protect-kernel-defaults" argument to organizational standards. CC ID 14629 | System hardening through configuration management | Preventive | |
Configure the "read-only-port" argument to organizational standards. CC ID 14627 | System hardening through configuration management | Preventive | |
Configure the "admission control plugin NamespaceLifecycle" to organizational standards. CC ID 14571 | System hardening through configuration management | Preventive | |
Configure the "terminated-pod-gc-threshold" argument to organizational standards. CC ID 14593 | System hardening through configuration management | Preventive | |
Configure the "tls-cert-file" argument to organizational standards. CC ID 14588 | System hardening through configuration management | Preventive | |
Configure the "kubelet-certificate-authority" argument to organizational standards. CC ID 14570 | System hardening through configuration management | Preventive | |
Configure the "service-account-private-key-file" argument to organizational standards. CC ID 14607 | System hardening through configuration management | Preventive | |
Configure the "admission control plugin SecurityContextDeny" to organizational standards. CC ID 14569 | System hardening through configuration management | Preventive | |
Configure the "kubelet-client-certificate" argument to organizational standards. CC ID 14568 | System hardening through configuration management | Preventive | |
Configure the "root-ca-file" argument to organizational standards. CC ID 14599 | System hardening through configuration management | Preventive | |
Configure the "admission control plugin EventRateLimit" to organizational standards. CC ID 14567 | System hardening through configuration management | Preventive | |
Configure the "use-service-account-credentials" argument to organizational standards. CC ID 14594 | System hardening through configuration management | Preventive | |
Configure the "token-auth-file" argument to organizational standards. CC ID 14566 | System hardening through configuration management | Preventive | |
Configure the "authorization-mode" argument to organizational standards. CC ID 14565 | System hardening through configuration management | Preventive | |
Configure the "anonymous-auth" argument to organizational standards. CC ID 14564 | System hardening through configuration management | Preventive | |
Configure the "kubelet-client-key" argument to organizational standards. CC ID 14563 | System hardening through configuration management | Preventive | |
Configure the "kubelet-https" argument to organizational standards. CC ID 14561 | System hardening through configuration management | Preventive | |
Configure the "basic-auth-file" argument to organizational standards. CC ID 14559 | System hardening through configuration management | Preventive | |
Configure the Remote Deposit Capture system to organizational standards. CC ID 13569 | System hardening through configuration management | Preventive | |
Block and/or remove unnecessary software and unauthorized software. CC ID 00865 | System hardening through configuration management | Preventive | |
Install the most current Windows Service Pack. CC ID 01695 | System hardening through configuration management | Preventive | |
Install critical security updates and important security updates in a timely manner. CC ID 01696 | System hardening through configuration management | Preventive | |
Change default configurations, as necessary. CC ID 00877 [Review whether applications in use provide the following capabilities: Provide the ability to change and disable default application accounts upon installation. App A Objective 6.27.c] | System hardening through configuration management | Preventive | |
Configure custom security parameters for X-Windows. CC ID 02168 | System hardening through configuration management | Preventive | |
Configure custom security settings for Lotus Domino. CC ID 02171 | System hardening through configuration management | Preventive | |
Configure custom security settings for the Automated Security Enhancement Tool. CC ID 02177 | System hardening through configuration management | Preventive | |
Configure custom Security settings for Sun Answerbook2. CC ID 02178 | System hardening through configuration management | Preventive | |
Configure custom security settings for Command (PROM) Monitor. CC ID 02180 | System hardening through configuration management | Preventive | |
Configure and secure each interface for Executive Interfaces. CC ID 02182 | System hardening through configuration management | Preventive | |
Reconfigure the default settings and configure the system security for Site Management Complex. CC ID 02183 | System hardening through configuration management | Preventive | |
Configure the unisys executive (GENNED) GEN tags. CC ID 02184 | System hardening through configuration management | Preventive | |
Reconfigure the default Console Mode privileges. CC ID 02189 | System hardening through configuration management | Preventive | |
Restrict access to security-related Console Mode key-in groups based on the security profiles. CC ID 02190 | System hardening through configuration management | Preventive | |
Configure security profiles for the various Console Mode levels. CC ID 02191 | System hardening through configuration management | Preventive | |
Configure custom access privileges for all mapper files. CC ID 02194 | System hardening through configuration management | Preventive | |
Configure custom access privileges for the PSERVER configuration file. CC ID 02195 | System hardening through configuration management | Preventive | |
Configure custom access privileges for the DEPCON configuration file. CC ID 02196 | System hardening through configuration management | Preventive | |
Disable the default NetWare user web page unless absolutely necessary. CC ID 04447 | System hardening through configuration management | Preventive | |
Enable and reset the primary administrator names, primary administrator passwords, root names, and root passwords. CC ID 04448 | System hardening through configuration management | Preventive | |
Remove unnecessary documentation or unprotected documentation from installed applications. CC ID 04452 | System hardening through configuration management | Preventive | |
Complete the NetWare eGuide configuration. CC ID 04449 | System hardening through configuration management | Preventive | |
Verify the usr/aset/masters/uid_aliases file exists and contains an appropriate aliases list. CC ID 04902 | System hardening through configuration management | Preventive | |
Set the low security directory list properly. CC ID 04903 | System hardening through configuration management | Preventive | |
Set the medium security directory list properly. CC ID 04904 | System hardening through configuration management | Preventive | |
Set the high security directory list properly. CC ID 04905 | System hardening through configuration management | Preventive | |
Set the UID aliases pointer properly. CC ID 04906 | System hardening through configuration management | Preventive | |
Reconfigure the encryption keys from their default setting or previous setting. CC ID 06079 | System hardening through configuration management | Preventive | |
Change the default Service Set Identifier for Wireless Access Points and wireless bridges. CC ID 06086 | System hardening through configuration management | Preventive | |
Revoke public execute privileges for all processes or applications that allow such privileges. CC ID 06568 | System hardening through configuration management | Preventive | |
Configure the system's booting configuration. CC ID 10656 | System hardening through configuration management | Preventive | |
Configure the system to boot directly to the correct Operating System. CC ID 04509 | System hardening through configuration management | Preventive | |
Verify an appropriate bootloader is used. CC ID 04900 | System hardening through configuration management | Preventive | |
Configure the ability to boot from USB devices, as appropriate. CC ID 04901 | System hardening through configuration management | Preventive | |
Configure the system to boot from hardware enforced read-only media. CC ID 10657 | System hardening through configuration management | Preventive | |
Configure the "Approved Installation Sites for ActiveX Controls" security mechanism properly. CC ID 04909 | System hardening through configuration management | Preventive | |
Configure Least Functionality and Least Privilege settings to organizational standards. CC ID 07599 | System hardening through configuration management | Preventive | |
Prohibit directories from having read/write capability, as appropriate. CC ID 16313 | System hardening through configuration management | Preventive | |
Configure "Block public access (bucket settings)" to organizational standards. CC ID 15444 | System hardening through configuration management | Preventive | |
Configure S3 Bucket Policies to organizational standards. CC ID 15431 | System hardening through configuration management | Preventive | |
Configure "Allow suggested apps in Windows Ink Workspace" to organizational standards. CC ID 15417 | System hardening through configuration management | Preventive | |
Configure "Allow Cloud Search" to organizational standards. CC ID 15416 | System hardening through configuration management | Preventive | |
Configure "Configure Watson events" to organizational standards. CC ID 15414 | System hardening through configuration management | Preventive | |
Configure "Allow Clipboard synchronization across devices" to organizational standards. CC ID 15412 | System hardening through configuration management | Preventive | |
Configure "Prevent users from modifying settings" to organizational standards. CC ID 15411 | System hardening through configuration management | Preventive | |
Configure "Prevent users from sharing files within their profile" to organizational standards. CC ID 15408 | System hardening through configuration management | Preventive | |
Configure "Manage preview builds" to organizational standards. CC ID 15405 | System hardening through configuration management | Preventive | |
Configure "Turn off Help Experience Improvement Program" to organizational standards. CC ID 15403 | System hardening through configuration management | Preventive | |
Configure "Sign-in and lock last interactive user automatically after a restart" to organizational standards. CC ID 15402 | System hardening through configuration management | Preventive | |
Configure "Hardened UNC Paths" to organizational standards. CC ID 15400 | System hardening through configuration management | Preventive | |
Configure "Turn off all Windows spotlight features" to organizational standards. CC ID 15397 | System hardening through configuration management | Preventive | |
Configure "Allow Message Service Cloud Sync" to organizational standards. CC ID 15396 | System hardening through configuration management | Preventive | |
Configure "Configure local setting override for reporting to Microsoft MAPS" to organizational standards. CC ID 15394 | System hardening through configuration management | Preventive | |
Configure "Configure Windows spotlight on lock screen" to organizational standards. CC ID 15391 | System hardening through configuration management | Preventive | |
Configure "Do not suggest third-party content in Windows spotlight" to organizational standards. CC ID 15389 | System hardening through configuration management | Preventive | |
Configure "Enable Font Providers" to organizational standards. CC ID 15388 | System hardening through configuration management | Preventive | |
Configure "Disallow copying of user input methods to the system account for sign-in" to organizational standards. CC ID 15386 | System hardening through configuration management | Preventive | |
Configure "Do not display network selection UI" to organizational standards. CC ID 15381 | System hardening through configuration management | Preventive | |
Configure "Turn off KMS Client Online AVS Validation" to organizational standards. CC ID 15380 | System hardening through configuration management | Preventive | |
Configure "Allow Telemetry" to organizational standards. CC ID 15378 | System hardening through configuration management | Preventive | |
Configure "Allow users to enable online speech recognition services" to organizational standards. CC ID 15377 | System hardening through configuration management | Preventive | |
Configure "Prevent enabling lock screen camera" to organizational standards. CC ID 15373 | System hardening through configuration management | Preventive | |
Configure "Continue experiences on this device" to organizational standards. CC ID 15372 | System hardening through configuration management | Preventive | |
Configure "Prevent the usage of OneDrive for file storage" to organizational standards. CC ID 15369 | System hardening through configuration management | Preventive | |
Configure "Do not use diagnostic data for tailored experiences" to organizational standards. CC ID 15367 | System hardening through configuration management | Preventive | |
Configure "Network access: Restrict clients allowed to make remote calls to SAM" to organizational standards. CC ID 15365 | System hardening through configuration management | Preventive | |
Configure "Turn off Microsoft consumer experiences" to organizational standards. CC ID 15363 | System hardening through configuration management | Preventive | |
Configure "Allow Use of Camera" to organizational standards. CC ID 15362 | System hardening through configuration management | Preventive | |
Configure "Allow Online Tips" to organizational standards. CC ID 15360 | System hardening through configuration management | Preventive | |
Configure "Turn off cloud optimized content" to organizational standards. CC ID 15357 | System hardening through configuration management | Preventive | |
Configure "Apply UAC restrictions to local accounts on network logons" to organizational standards. CC ID 15356 | System hardening through configuration management | Preventive | |
Configure "Toggle user control over Insider builds" to organizational standards. CC ID 15354 | System hardening through configuration management | Preventive | |
Configure "Allow network connectivity during connected-standby (plugged in)" to organizational standards. CC ID 15353 | System hardening through configuration management | Preventive | |
Configure "Do not show feedback notifications" to organizational standards. CC ID 15350 | System hardening through configuration management | Preventive | |
Configure "Prevent enabling lock screen slide show" to organizational standards. CC ID 15349 | System hardening through configuration management | Preventive | |
Configure "Turn off the advertising ID" to organizational standards. CC ID 15348 | System hardening through configuration management | Preventive | |
Configure "Allow Windows Ink Workspace" to organizational standards. CC ID 15346 | System hardening through configuration management | Preventive | |
Configure "Allow a Windows app to share application data between users" to organizational standards. CC ID 15345 | System hardening through configuration management | Preventive | |
Configure "Turn off handwriting personalization data sharing" to organizational standards. CC ID 15339 | System hardening through configuration management | Preventive | |
Configure the "Devices: Prevent users from installing printer drivers" to organizational standards. CC ID 07600 | System hardening through configuration management | Preventive | |
Configure the "Log on as a service" to organizational standards. CC ID 07609 | System hardening through configuration management | Preventive | |
Configure "Restore files and directories" to organizational standards. CC ID 07610 | System hardening through configuration management | Preventive | |
Configure the "Back up files and directories" to organizational standards. CC ID 07629 | System hardening through configuration management | Preventive | |
Configure the "Change the system time" to organizational standards. CC ID 07633 | System hardening through configuration management | Preventive | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts" to organizational standards. CC ID 07635 | System hardening through configuration management | Preventive | |
Configure the "Perform volume maintenance tasks" to organizational standards. CC ID 07653 | System hardening through configuration management | Preventive | |
Configure the "Create global objects" to organizational standards. CC ID 07659 | System hardening through configuration management | Preventive | |
Configure the "System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies" to organizational standards. CC ID 07660 | System hardening through configuration management | Preventive | |
Configure the "DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax" to organizational standards. CC ID 07671 | System hardening through configuration management | Preventive | |
Configure the "Network access: Named Pipes that can be accessed anonymously" to organizational standards. CC ID 07676 | System hardening through configuration management | Preventive | |
Configure the "Change the time zone" to organizational standards. CC ID 07677 | System hardening through configuration management | Preventive | |
Configure the "Adjust memory quotas for a process" to organizational standards. CC ID 07685 | System hardening through configuration management | Preventive | |
Configure the "Add workstations to domain" to organizational standards. CC ID 07689 | System hardening through configuration management | Preventive | |
Configure the "Take ownership of files or other objects" to organizational standards. CC ID 07691 | System hardening through configuration management | Preventive | |
Configure the "Access this computer from the network" to organizational standards. CC ID 07706 | System hardening through configuration management | Preventive | |
Configure the "MSS: (AutoReboot) Allow Windows to automatically restart after a system crash (recommended except for highly secure environments)" to organizational standards. CC ID 07710 | System hardening through configuration management | Preventive | |
Configure the "Shutdown: Allow system to be shut down without having to log on" to organizational standards. CC ID 07717 | System hardening through configuration management | Preventive | |
Configure the "System objects: Require case insensitivity for non-Windows subsystems" to organizational standards. CC ID 07718 | System hardening through configuration management | Preventive | |
Configure the "Domain controller: Allow server operators to schedule tasks" to organizational standards. CC ID 07722 | System hardening through configuration management | Preventive | |
Configure the "Debug programs" to organizational standards. CC ID 07729 | System hardening through configuration management | Preventive | |
Configure the "Increase scheduling priority" to organizational standards. CC ID 07739 | System hardening through configuration management | Preventive | |
Configure the "Load and unload device drivers" to organizational standards. CC ID 07745 | System hardening through configuration management | Preventive | |
Configure the "Modify an object label" to organizational standards. CC ID 07755 | System hardening through configuration management | Preventive | |
Configure the "Deny log on as a service" to organizational standards. CC ID 07762 | System hardening through configuration management | Preventive | |
Configure the "Recovery console: Allow automatic administrative logon" to organizational standards. CC ID 07770 | System hardening through configuration management | Preventive | |
Configure the "Create a token object" to organizational standards. CC ID 07774 | System hardening through configuration management | Preventive | |
Configure the "Create symbolic links" to organizational standards. CC ID 07778 | System hardening through configuration management | Preventive | |
Configure the "Deny access to this computer from the network" to organizational standards. CC ID 07779 | System hardening through configuration management | Preventive | |
Configure the "Deny log on locally" to organizational standards. CC ID 07781 | System hardening through configuration management | Preventive | |
Configure the "Manage auditing and security log" to organizational standards. CC ID 07783 | System hardening through configuration management | Preventive | |
Configure the "Lock pages in memory" to organizational standards. CC ID 07784 | System hardening through configuration management | Preventive | |
Configure the "Shutdown: Clear virtual memory pagefile" to organizational standards. CC ID 07787 | System hardening through configuration management | Preventive | |
Configure the "Increase a process working set" to organizational standards. CC ID 07788 | System hardening through configuration management | Preventive | |
Configure the "Generate security audits" to organizational standards. CC ID 07796 | System hardening through configuration management | Preventive | |
Configure the "Remove computer from docking station" to organizational standards. CC ID 07802 | System hardening through configuration management | Preventive | |
Configure the "System settings: Optional subsystems" to organizational standards. CC ID 07804 | System hardening through configuration management | Preventive | |
Configure the "Shut down the system" to organizational standards. CC ID 07808 | System hardening through configuration management | Preventive | |
Configure the "Bypass traverse checking" to organizational standards. CC ID 07809 | System hardening through configuration management | Preventive | |
Configure the "Always install with elevated privileges" to organizational standards. CC ID 07811 | System hardening through configuration management | Preventive | |
Configure the "Allow log on through Remote Desktop Services" to organizational standards. CC ID 07813 | System hardening through configuration management | Preventive | |
Configure the "MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)" to organizational standards. CC ID 07814 | System hardening through configuration management | Preventive | |
Configure the "Create permanent shared objects" to organizational standards. CC ID 07818 | System hardening through configuration management | Preventive | |
Configure the "Devices: Allow undock without having to log on" to organizational standards. CC ID 07821 | System hardening through configuration management | Preventive | |
Configure the "Devices: Restrict floppy access to locally logged-on user only" to organizational standards. CC ID 07823 | System hardening through configuration management | Preventive | |
Configure the "Log on as a batch job" to organizational standards. CC ID 07838 | System hardening through configuration management | Preventive | |
Configure the "MSS: (AutoShareServer) Enable Administrative Shares (recommended except for highly secure environments)" to organizational standards. CC ID 07841 | System hardening through configuration management | Preventive | |
Configure the "DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax" to organizational standards. CC ID 07842 | System hardening through configuration management | Preventive | |
Configure the "Replace a process level token" to organizational standards. CC ID 07845 | System hardening through configuration management | Preventive | |
Configure the "Modify firmware environment values" to organizational standards. CC ID 07847 | System hardening through configuration management | Preventive | |
Configure the "Deny log on through Remote Desktop Services" to organizational standards. CC ID 07854 | System hardening through configuration management | Preventive | |
Configure the "Devices: Allowed to format and eject removable media" to organizational standards. CC ID 07862 | System hardening through configuration management | Preventive | |
Configure the "Profile single process" to organizational standards. CC ID 07866 | System hardening through configuration management | Preventive | |
Configure the "Turn off Autoplay" to organizational standards. CC ID 07867 | System hardening through configuration management | Preventive | |
Configure the "Devices: Restrict CD-ROM access to locally logged-on user only" to organizational standards. CC ID 07871 | System hardening through configuration management | Preventive | |
Configure the "Deny log on as a batch job" to organizational standards. CC ID 07876 | System hardening through configuration management | Preventive | |
Configure the "Create a pagefile" to organizational standards. CC ID 07878 | System hardening through configuration management | Preventive | |
Configure the "Profile system performance" to organizational standards. CC ID 07879 | System hardening through configuration management | Preventive | |
Configure the "Impersonate a client after authentication" to organizational standards. CC ID 07882 | System hardening through configuration management | Preventive | |
Configure the "MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)" to organizational standards. CC ID 07886 | System hardening through configuration management | Preventive | |
Configure the "Force shutdown from a remote system" to organizational standards. CC ID 07889 | System hardening through configuration management | Preventive | |
Configure the "Act as part of the operating system" to organizational standards. CC ID 07891 | System hardening through configuration management | Preventive | |
Configure the "Allow log on locally" to organizational standards. CC ID 07894 | System hardening through configuration management | Preventive | |
Configure the "Synchronize directory service data" to organizational standards. CC ID 07897 | System hardening through configuration management | Preventive | |
Configure the "Access Credential Manager as a trusted caller" to organizational standards. CC ID 07898 | System hardening through configuration management | Preventive | |
Configure the "Enable computer and user accounts to be trusted for delegation" to organizational standards. CC ID 07900 | System hardening through configuration management | Preventive | |
Configure the "Recovery console: Allow floppy copy and access to all drives and all folders" to organizational standards. CC ID 07901 | System hardening through configuration management | Preventive | |
Configure the "Software channel permissions" to organizational standards. CC ID 07910 | System hardening through configuration management | Preventive | |
Configure the "Allow drag and drop or copy and paste files" to organizational standards. CC ID 07915 | System hardening through configuration management | Preventive | |
Configure the "Disable Per-User Installation of ActiveX Controls" to organizational standards. CC ID 07918 | System hardening through configuration management | Preventive | |
Configure the "Download signed ActiveX controls" to organizational standards. CC ID 07921 | System hardening through configuration management | Preventive | |
Configure the "Disable "Configuring History"" to organizational standards. CC ID 07922 | System hardening through configuration management | Preventive | |
Configure the "Turn off ActiveX opt-in prompt" to organizational standards. CC ID 07928 | System hardening through configuration management | Preventive | |
Configure the "Allow installation of desktop items" to organizational standards. CC ID 07931 | System hardening through configuration management | Preventive | |
Configure the "Only allow approved domains to use ActiveX controls without prompt" to organizational standards. CC ID 07936 | System hardening through configuration management | Preventive | |
Configure the "Initialize and script ActiveX controls not marked as safe" to organizational standards. CC ID 07945 | System hardening through configuration management | Preventive | |
Configure the "Allow file downloads" to organizational standards. CC ID 07960 | System hardening through configuration management | Preventive | |
Configure the "Turn off the Security Settings Check feature" to organizational standards. CC ID 07979 | System hardening through configuration management | Preventive | |
Configure the "Disable the Advanced page" to organizational standards. CC ID 07981 | System hardening through configuration management | Preventive | |
Configure the "Intranet Sites: Include all network paths (UNCs)" to organizational standards. CC ID 07986 | System hardening through configuration management | Preventive | |
Configure the "Disable changing Automatic Configuration settings" to organizational standards. CC ID 07992 | System hardening through configuration management | Preventive | |
Configure the "Turn off "Delete Browsing History" functionality" to organizational standards. CC ID 07993 | System hardening through configuration management | Preventive | |
Configure the "Allow META REFRESH" to organizational standards. CC ID 07998 | System hardening through configuration management | Preventive | |
Configure the "Prevent Deleting Temporary Internet Files" to organizational standards. CC ID 08000 | System hardening through configuration management | Preventive | |
Configure the "Security Zones: Do not allow users to change policies" to organizational standards. CC ID 08001 | System hardening through configuration management | Preventive | |
Configure the "Only use the ActiveX Installer Service for installation of ActiveX Controls" to organizational standards. CC ID 08003 | System hardening through configuration management | Preventive | |
Configure the "Prevent "Fix settings" functionality" to organizational standards. CC ID 08010 | System hardening through configuration management | Preventive | |
Configure the "XAML browser applications" to organizational standards. CC ID 08011 | System hardening through configuration management | Preventive | |
Configure the "Run .NET Framework-reliant components signed with Authenticode" to organizational standards CC ID 08014 | System hardening through configuration management | Preventive | |
Configure the "Access data sources across domains" to organizational standards. CC ID 08018 | System hardening through configuration management | Preventive | |
Configure the "Allow script-initiated windows without size or position constraints" to organizational standards. CC ID 08020 | System hardening through configuration management | Preventive | |
Configure the "Disable Save this program to disk option" to organizational standards. CC ID 08021 | System hardening through configuration management | Preventive | |
Configure the "Security Zones: Do not allow users to add/delete sites" to organizational standards. CC ID 08061 | System hardening through configuration management | Preventive | |
Configure the "Script ActiveX controls marked safe for scripting" to organizational standards. CC ID 08067 | System hardening through configuration management | Preventive | |
Configure the "Prevent Deleting Cookies" to organizational standards. CC ID 08069 | System hardening through configuration management | Preventive | |
Configure the "Allow binary and script behaviors" to organizational standards. CC ID 08070 | System hardening through configuration management | Preventive | |
Configure the "Launching applications and files in an IFRAME" to organizational standards. CC ID 08078 | System hardening through configuration management | Preventive | |
Configure the "Allow status bar updates via script" to organizational standards. CC ID 08081 | System hardening through configuration management | Preventive | |
Configure the "Turn off Crash Detection" to organizational standards. CC ID 08085 | System hardening through configuration management | Preventive | |
Configure the "Security Zones: Use only machine settings" to organizational standards. CC ID 08088 | System hardening through configuration management | Preventive | |
Configure the "Web sites in less privileged Web content zones can navigate into this zone" to organizational standards. CC ID 08089 | System hardening through configuration management | Preventive | |
Configure the "Disable the Security page" to organizational standards. CC ID 08090 | System hardening through configuration management | Preventive | |
Configure the "Automatically check for Internet Explorer updates" to organizational standards. CC ID 08094 | System hardening through configuration management | Preventive | |
Configure the "Navigate windows and frames across different domains" to organizational standards. CC ID 08107 | System hardening through configuration management | Preventive | |
Configure the "Allow active scripting" setting to organizational standards. CC ID 08115 | System hardening through configuration management | Preventive | |
Configure the "Allow font downloads" to organizational standards. CC ID 08116 | System hardening through configuration management | Preventive | |
Configure the "Disable changing proxy settings" to organizational standards. CC ID 08126 | System hardening through configuration management | Preventive | |
Configure the "Disable changing connection settings" to organizational standards. CC ID 08129 | System hardening through configuration management | Preventive | |
Configure the "Run .NET Framework-reliant components not signed with Authenticode" to organizational standards CC ID 08130 | System hardening through configuration management | Preventive | |
Configure the "Turn off printing over HTTP" to organizational standards. CC ID 08162 | System hardening through configuration management | Preventive | |
Configure the "Registry policy processing" to organizational standards. CC ID 08169 | System hardening through configuration management | Preventive | |
Configure the "Disable remote Desktop Sharing" to organizational standards. CC ID 08186 | System hardening through configuration management | Preventive | |
Configure the "Report operating system errors" to organizational standards. CC ID 08187 | System hardening through configuration management | Preventive | |
Configure the "Enumerate administrator accounts on elevation" to organizational standards. CC ID 08190 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Update device driver searching" to organizational standards. CC ID 08193 | System hardening through configuration management | Preventive | |
Configure the "Do not allow drive redirection" to organizational standards. CC ID 08199 | System hardening through configuration management | Preventive | |
Configure the "Turn off the Windows Messenger Customer Experience Improvement Program" to organizational standards. CC ID 08204 | System hardening through configuration management | Preventive | |
Configure the "Turn off downloading of print drivers over HTTP" to organizational standards. CC ID 08218 | System hardening through configuration management | Preventive | |
Configure the "Do not process the run once list" to organizational standards. CC ID 08219 | System hardening through configuration management | Preventive | |
Configure the "Deny log on through Terminal Services" to organizational standards. CC ID 08220 | System hardening through configuration management | Preventive | |
Configure the "Offer Remote Assistance" to organizational standards. CC ID 08222 | System hardening through configuration management | Preventive | |
Configure the "Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box" to organizational standards. CC ID 08228 | System hardening through configuration management | Preventive | |
Configure the "Allow users to connect remotely using Remote Desktop Services" to organizational standards. CC ID 08234 | System hardening through configuration management | Preventive | |
Configure the "MSS: (AutoShareWks) Enable Administrative Shares (recommended except for highly secure environments)" to organizational standards. CC ID 08247 | System hardening through configuration management | Preventive | |
Configure the "MSS: (NtfsDisable8dot3NameCreation) Enable the computer to stop generating 8.3 style filenames" to organizational standards. CC ID 08253 | System hardening through configuration management | Preventive | |
Configure the "Solicited Remote Assistance" to organizational standards. CC ID 08265 | System hardening through configuration management | Preventive | |
Configure "Turn off the "Publish to Web" task for files and folders" to organizational standards. CC ID 08285 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Windows Messenger to be run" to organizational standards. CC ID 08288 | System hardening through configuration management | Preventive | |
Configure the "Allow log on through Terminal Services" to organizational standards. CC ID 08291 | System hardening through configuration management | Preventive | |
Configure the "Require trusted path for credential entry." to organizational standards CC ID 08293 | System hardening through configuration management | Preventive | |
Configure the "Turn off Search Companion content file updates" to organizational standards. CC ID 08302 | System hardening through configuration management | Preventive | |
Configure the "Prevent access to registry editing tools" to organizational standards. CC ID 08331 | System hardening through configuration management | Preventive | |
Configure the "Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet" to organizational standards. CC ID 08347 | System hardening through configuration management | Preventive | |
Configure the "Turn on SmartScreen Filter scan" to organizational standards. CC ID 08357 | System hardening through configuration management | Preventive | |
Configure the "Disallow WinRM from storing RunAs credentials" to organizational standards. CC ID 08362 | System hardening through configuration management | Preventive | |
Configure the "Turn off URL Suggestions" to organizational standards. CC ID 08372 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from bypassing SmartScreen Filter's application reputation warnings about files that are not commonly downloaded from the Internet" to organizational standards. CC ID 08385 | System hardening through configuration management | Preventive | |
Configure the "Prevent access to Delete Browsing History" to organizational standards. CC ID 08387 | System hardening through configuration management | Preventive | |
Configure the "Turn off InPrivate Browsing" to organizational standards. CC ID 08421 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Location Provider" to organizational standards. CC ID 08427 | System hardening through configuration management | Preventive | |
Configure the "Turn on Suggested Sites" to organizational standards. CC ID 08434 | System hardening through configuration management | Preventive | |
Configure the "Turn off access to the Store" to organizational standards. CC ID 08436 | System hardening through configuration management | Preventive | |
Configure the "Point and Print Restrictions" to organizational standards. CC ID 08441 | System hardening through configuration management | Preventive | |
Configure the "Prevent changing proxy settings" to organizational standards. CC ID 08447 | System hardening through configuration management | Preventive | |
Configure the "Allow deleting browsing history on exit" to organizational standards. CC ID 08456 | System hardening through configuration management | Preventive | |
Configure the "Allow scripting of Internet Explorer WebBrowser controls" to organizational standards. CC ID 08464 | System hardening through configuration management | Preventive | |
Configure the "Turn off Managing SmartScreen Filter for Internet Explorer 9" to organizational standards. CC ID 08472 | System hardening through configuration management | Preventive | |
Configure the "Check Administrator Group Membership" to organizational standards. CC ID 08473 | System hardening through configuration management | Preventive | |
Configure the "Check if AppLocker is Enabled" to organizational standards. CC ID 08475 | System hardening through configuration management | Preventive | |
Configure the "Prevent the computer from joining a homegroup" to organizational standards. CC ID 08486 | System hardening through configuration management | Preventive | |
Configure the "Disable Browser Geolocation" to organizational standards. CC ID 08491 | System hardening through configuration management | Preventive | |
Configure the "Allow Remote Shell Access" to organizational standards. CC ID 08496 | System hardening through configuration management | Preventive | |
Configure the "Turn Off the Display (Plugged In)" to organizational standards. CC ID 08502 | System hardening through configuration management | Preventive | |
Configure the "Do not enumerate connected users on domain-joined computers" to organizational standards. CC ID 08507 | System hardening through configuration management | Preventive | |
Configure the "Enable dragging of content from different domains across windows" to organizational standards. CC ID 08517 | System hardening through configuration management | Preventive | |
Configure the "Turn off first-run prompt" to organizational standards. CC ID 08521 | System hardening through configuration management | Preventive | |
Configure the "Allow Scriptlets" to organizational standards. CC ID 08523 | System hardening through configuration management | Preventive | |
Configure the "Turn on ActiveX Filtering" to organizational standards. CC ID 08524 | System hardening through configuration management | Preventive | |
Configure the "Userdata persistence" to organizational standards. CC ID 08533 | System hardening through configuration management | Preventive | |
Configure the "Enable dragging of content from different domains within a window" to organizational standards. CC ID 08535 | System hardening through configuration management | Preventive | |
Configure the "Turn off app notifications on the lock screen" to organizational standards. CC ID 08536 | System hardening through configuration management | Preventive | |
Configure the "Allow updates to status bar via script" to organizational standards. CC ID 08540 | System hardening through configuration management | Preventive | |
Configure the "Enumerate local users on domain-joined computers" to organizational standards. CC ID 08546 | System hardening through configuration management | Preventive | |
Configure the "Prevent deleting websites that the user has visited" to organizational standards. CC ID 08547 | System hardening through configuration management | Preventive | |
Configure the "Install new versions of Internet Explorer automatically" to organizational standards. CC ID 08551 | System hardening through configuration management | Preventive | |
Configure the "Make proxy settings per-machine (rather than per-user)" to organizational standards. CC ID 08553 | System hardening through configuration management | Preventive | |
Configure the "Disable external branding of Internet Explorer" to organizational standards. CC ID 08555 | System hardening through configuration management | Preventive | |
Configure the "Include local path when user is uploading files to a server" to organizational standards. CC ID 08557 | System hardening through configuration management | Preventive | |
Configure the "Configure Solicited Remote Assistance" to organizational standards. CC ID 08561 | System hardening through configuration management | Preventive | |
Configure the "Allow loading of XAML files" to organizational standards. CC ID 08562 | System hardening through configuration management | Preventive | |
Configure the "Do not display the password reveal button" to organizational standards. CC ID 08567 | System hardening through configuration management | Preventive | |
Configure the "Prevent running First Run wizard" to organizational standards. CC ID 08572 | System hardening through configuration management | Preventive | |
Configure the "Turn off location" to organizational standards. CC ID 08575 | System hardening through configuration management | Preventive | |
Configure the "Turn on Enhanced Protected Mode" to organizational standards. CC ID 08577 | System hardening through configuration management | Preventive | |
Configure the "Turn off browser geolocation" to organizational standards. CC ID 08580 | System hardening through configuration management | Preventive | |
Configure the "Do not display the reveal password button" to organizational standards. CC ID 08583 | System hardening through configuration management | Preventive | |
Configure the "Include updated website lists from Microsoft" to organizational standards. CC ID 08593 | System hardening through configuration management | Preventive | |
Configure the "Turn off Event Viewer "Events.asp" links" to organizational standards. CC ID 08604 | System hardening through configuration management | Preventive | |
Configure the "Configure Offer Remote Assistance" to organizational standards. CC ID 08605 | System hardening through configuration management | Preventive | |
Configure the "Prevent specifying the update check interval (in days)" to organizational standards. CC ID 08608 | System hardening through configuration management | Preventive | |
Configure the "Turn Off the Display (On Battery)" to organizational standards. CC ID 08609 | System hardening through configuration management | Preventive | |
Configure the "Prevent participation in the Customer Experience Improvement Program" to organizational standards. CC ID 08611 | System hardening through configuration management | Preventive | |
Configure the "Add a specific list of search providers to the user's search provider list" setting to organizational standards. CC ID 10420 | System hardening through configuration management | Preventive | |
Configure the "Admin-approved behaviors" setting to organizational standards. CC ID 10421 | System hardening through configuration management | Preventive | |
Configure the "Allow the display of image download placeholders" setting to organizational standards. CC ID 10422 | System hardening through configuration management | Preventive | |
Configure the "Allow the printing of background colors and images" setting to organizational standards. CC ID 10423 | System hardening through configuration management | Preventive | |
Configure the "Audio/Video Player" setting to organizational standards. CC ID 10424 | System hardening through configuration management | Preventive | |
Configure the "Auto-hide the Toolbars" setting to organizational standards. CC ID 10425 | System hardening through configuration management | Preventive | |
Configure the "Binary Behavior Security Restriction: All Processes" setting to organizational standards. CC ID 10426 | System hardening through configuration management | Preventive | |
Configure the "Binary Behavior Security Restriction: Internet Explorer Processes" setting to organizational standards. CC ID 10427 | System hardening through configuration management | Preventive | |
Configure the "Binary Behavior Security Restriction: Process List" setting to organizational standards. CC ID 10428 | System hardening through configuration management | Preventive | |
Configure the "Carpoint" setting to organizational standards. CC ID 10429 | System hardening through configuration management | Preventive | |
Configure the "Configure new tab page default behavior" setting to organizational standards. CC ID 10430 | System hardening through configuration management | Preventive | |
Configure the "Customize Command Labels" setting to organizational standards. CC ID 10431 | System hardening through configuration management | Preventive | |
Configure the "Customize User Agent String" setting to organizational standards. CC ID 10432 | System hardening through configuration management | Preventive | |
Configure the "Deploy default Accelerators" setting to organizational standards. CC ID 10433 | System hardening through configuration management | Preventive | |
Configure the "Deploy non-default Accelerators" setting to organizational standards. CC ID 10434 | System hardening through configuration management | Preventive | |
Configure the "DHTML Edit Control" setting to organizational standards. CC ID 10435 | System hardening through configuration management | Preventive | |
Configure the "Disable caching of Auto-Proxy scripts" setting to organizational standards. CC ID 10436 | System hardening through configuration management | Preventive | |
Configure the "Disable changing accessibility settings" setting to organizational standards. CC ID 10437 | System hardening through configuration management | Preventive | |
Configure the "Disable changing Calendar and Contact settings" setting to organizational standards. CC ID 10438 | System hardening through configuration management | Preventive | |
Configure the "Disable changing color settings" setting to organizational standards. CC ID 10439 | System hardening through configuration management | Preventive | |
Configure the "Disable changing default browser check" setting to organizational standards. CC ID 10440 | System hardening through configuration management | Preventive | |
Configure the "Disable changing font settings" setting to organizational standards. CC ID 10441 | System hardening through configuration management | Preventive | |
Configure the "Disable changing home page settings" setting to organizational standards. CC ID 10442 | System hardening through configuration management | Preventive | |
Configure the "Disable changing language settings" setting to organizational standards. CC ID 10443 | System hardening through configuration management | Preventive | |
Configure the "Disable changing link color settings" setting to organizational standards. CC ID 10444 | System hardening through configuration management | Preventive | |
Configure the "Disable changing Messaging settings" setting to organizational standards. CC ID 10445 | System hardening through configuration management | Preventive | |
Configure the "Disable changing ratings settings" setting to organizational standards. CC ID 10446 | System hardening through configuration management | Preventive | |
Configure the "Disable changing secondary home page settings" setting to organizational standards. CC ID 10447 | System hardening through configuration management | Preventive | |
Configure the "Disable changing Temporary Internet files settings" setting to organizational standards. CC ID 10448 | System hardening through configuration management | Preventive | |
Configure the "Disable Context menu" setting to organizational standards. CC ID 10449 | System hardening through configuration management | Preventive | |
Configure the "Disable customizing browser toolbar buttons" setting to organizational standards. CC ID 10450 | System hardening through configuration management | Preventive | |
Configure the "Disable customizing browser toolbars" setting to organizational standards. CC ID 10451 | System hardening through configuration management | Preventive | |
Configure the "Disable Import/Export Settings wizard" setting to organizational standards. CC ID 10452 | System hardening through configuration management | Preventive | |
Configure the "Disable Open in New Window menu option" setting to organizational standards. CC ID 10453 | System hardening through configuration management | Preventive | |
Configure the "Disable the Connections page" setting to organizational standards. CC ID 10454 | System hardening through configuration management | Preventive | |
Configure the "Disable the Content page" setting to organizational standards. CC ID 10455 | System hardening through configuration management | Preventive | |
Configure the "Disable the General page" setting to organizational standards. CC ID 10456 | System hardening through configuration management | Preventive | |
Configure the "Disable the Programs page" setting to organizational standards. CC ID 10457 | System hardening through configuration management | Preventive | |
Configure the "Disable toolbars and extensions when InPrivate Browsing starts" setting to organizational standards. CC ID 10458 | System hardening through configuration management | Preventive | |
Configure the "Display error message on proxy script download failure" setting to organizational standards. CC ID 10459 | System hardening through configuration management | Preventive | |
Configure the "Do not collect InPrivate Filtering data" setting to organizational standards. CC ID 10460 | System hardening through configuration management | Preventive | |
Configure the "Do not save encrypted pages to disk" setting to organizational standards. CC ID 10461 | System hardening through configuration management | Preventive | |
Configure the "Empty Temporary Internet Files folder when browser is closed" setting to organizational standards. CC ID 10462 | System hardening through configuration management | Preventive | |
Configure the "Enforce Full Screen Mode" setting to organizational standards. CC ID 10463 | System hardening through configuration management | Preventive | |
Configure the "File menu: Disable closing the browser and Explorer windows" setting to organizational standards. CC ID 10464 | System hardening through configuration management | Preventive | |
Configure the "File menu: Disable New menu option" setting to organizational standards. CC ID 10465 | System hardening through configuration management | Preventive | |
Configure the "File menu: Disable Open menu option" setting to organizational standards. CC ID 10466 | System hardening through configuration management | Preventive | |
Configure the "File menu: Disable Save As Web Page Complete" setting to organizational standards. CC ID 10467 | System hardening through configuration management | Preventive | |
Configure the "File menu: Disable Save As.. menu option" setting to organizational standards. CC ID 10468 | System hardening through configuration management | Preventive | |
Configure the "File size limits for Internet zone" setting to organizational standards. CC ID 10469 | System hardening through configuration management | Preventive | |
Configure the "File size limits for Intranet zone" setting to organizational standards. CC ID 10470 | System hardening through configuration management | Preventive | |
Configure the "File size limits for Local Machine zone" setting to organizational standards. CC ID 10471 | System hardening through configuration management | Preventive | |
Configure the "File size limits for Restricted Sites zone" setting to organizational standards. CC ID 10472 | System hardening through configuration management | Preventive | |
Configure the "File size limits for Trusted Sites zone" setting to organizational standards. CC ID 10473 | System hardening through configuration management | Preventive | |
Configure the "Help menu: Remove 'Send Feedback' menu option" setting to organizational standards. CC ID 10474 | System hardening through configuration management | Preventive | |
Configure the "Help menu: Remove 'Tour' menu option" setting to organizational standards. CC ID 10475 | System hardening through configuration management | Preventive | |
Configure the "Hide Favorites menu" setting to organizational standards. CC ID 10476 | System hardening through configuration management | Preventive | |
Configure the "Hide the Command Bar" setting to organizational standards. CC ID 10477 | System hardening through configuration management | Preventive | |
Configure the "Hide the Status Bar" setting to organizational standards. CC ID 10478 | System hardening through configuration management | Preventive | |
Configure the "InPrivate Filtering Threshold" setting to organizational standards. CC ID 10479 | System hardening through configuration management | Preventive | |
Configure the "Internet Zone Restricted Protocols" setting to organizational standards. CC ID 10480 | System hardening through configuration management | Preventive | |
Configure the "Internet Zone Template" setting to organizational standards. CC ID 10481 | System hardening through configuration management | Preventive | |
Configure the "Intranet Sites: Include all local (intranet) sites not listed in other zones" setting to organizational standards. CC ID 10482 | System hardening through configuration management | Preventive | |
Configure the "Intranet Sites: Include all sites that bypass the proxy server" setting to organizational standards. CC ID 10483 | System hardening through configuration management | Preventive | |
Configure the "Intranet Zone Restricted Protocols" setting to organizational standards. CC ID 10484 | System hardening through configuration management | Preventive | |
Configure the "Intranet Zone Template" setting to organizational standards. CC ID 10485 | System hardening through configuration management | Preventive | |
Configure the "Investor" setting to organizational standards. CC ID 10486 | System hardening through configuration management | Preventive | |
Configure the "Local Machine Zone Restricted Protocols" setting to organizational standards. CC ID 10487 | System hardening through configuration management | Preventive | |
Configure the "Local Machine Zone Template" setting to organizational standards. CC ID 10488 | System hardening through configuration management | Preventive | |
Configure the "Lock all Toolbars" setting to organizational standards. CC ID 10489 | System hardening through configuration management | Preventive | |
Configure the "Locked-Down Internet Zone Template" setting to organizational standards. CC ID 10490 | System hardening through configuration management | Preventive | |
Configure the "Locked-Down Intranet Zone Template" setting to organizational standards. CC ID 10491 | System hardening through configuration management | Preventive | |
Configure the "Locked-Down Local Machine Zone Template" setting to organizational standards. CC ID 10492 | System hardening through configuration management | Preventive | |
Configure the "Locked-Down Restricted Sites Zone Template" setting to organizational standards. CC ID 10493 | System hardening through configuration management | Preventive | |
Configure the "Locked-Down Trusted Sites Zone Template" setting to organizational standards. CC ID 10494 | System hardening through configuration management | Preventive | |
Configure the "Maximum number of connections per server (HTTP 1.0)" setting to organizational standards. CC ID 10495 | System hardening through configuration management | Preventive | |
Configure the "Maximum number of connections per server (HTTP 1.1)" setting to organizational standards. CC ID 10496 | System hardening through configuration management | Preventive | |
Configure the "Menu Controls" setting to organizational standards. CC ID 10497 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Agent" setting to organizational standards. CC ID 10498 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Chat" setting to organizational standards. CC ID 10499 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Scriptlet Component" setting to organizational standards. CC ID 10500 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Survey Control" setting to organizational standards. CC ID 10501 | System hardening through configuration management | Preventive | |
Configure the "Moving the menu bar above the navigation bar" setting to organizational standards. CC ID 10502 | System hardening through configuration management | Preventive | |
Configure the "MSNBC" setting to organizational standards. CC ID 10503 | System hardening through configuration management | Preventive | |
Configure the "NetShow File Transfer Control" setting to organizational standards. CC ID 10504 | System hardening through configuration management | Preventive | |
Configure the "Network Protocol Lockdown: All Processes" setting to organizational standards. CC ID 10505 | System hardening through configuration management | Preventive | |
Configure the "Network Protocol Lockdown: Internet Explorer Processes" setting to organizational standards. CC ID 10506 | System hardening through configuration management | Preventive | |
Configure the "Network Protocol Lockdown: Process List" setting to organizational standards. CC ID 10507 | System hardening through configuration management | Preventive | |
Configure the "Play animations in web pages" setting to organizational standards. CC ID 10508 | System hardening through configuration management | Preventive | |
Configure the "Play sounds in web pages" setting to organizational standards. CC ID 10509 | System hardening through configuration management | Preventive | |
Configure the "Pop-up allow list" setting to organizational standards. CC ID 10510 | System hardening through configuration management | Preventive | |
Configure the "Prevent configuration of search from the Address bar" setting to organizational standards. CC ID 10511 | System hardening through configuration management | Preventive | |
Configure the "Prevent Deleting Favorites Site Data" setting to organizational standards. CC ID 10512 | System hardening through configuration management | Preventive | |
Configure the "Prevent Deleting Form Data" setting to organizational standards. CC ID 10513 | System hardening through configuration management | Preventive | |
Configure the "Prevent Deleting InPrivate Filtering data" setting to organizational standards. CC ID 10514 | System hardening through configuration management | Preventive | |
Configure the "Prevent Deleting Passwords" setting to organizational standards. CC ID 10515 | System hardening through configuration management | Preventive | |
Configure the "Prevent Internet Explorer Search box from displaying" setting to organizational standards. CC ID 10516 | System hardening through configuration management | Preventive | |
Configure the "Prevent setting of the code download path for each machine" setting to organizational standards. CC ID 10517 | System hardening through configuration management | Preventive | |
Configure the "Prevent the configuration of cipher strength update information URLs" setting to organizational standards. CC ID 10518 | System hardening through configuration management | Preventive | |
Configure the "Prevent the use of Windows colors" setting to organizational standards. CC ID 10519 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from choosing default text size" setting to organizational standards. CC ID 10520 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from configuring background color" setting to organizational standards. CC ID 10521 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from configuring text color" setting to organizational standards. CC ID 10522 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from configuring the color of links that have already been clicked" setting to organizational standards. CC ID 10523 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from configuring the color of links that have not yet been clicked" setting to organizational standards. CC ID 10524 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from configuring the hover color" setting to organizational standards. CC ID 10525 | System hardening through configuration management | Preventive | |
Configure the "Restrict changing the default search provider" setting to organizational standards. CC ID 10526 | System hardening through configuration management | Preventive | |
Configure the "Restrict search providers to a specific list of providers" setting to organizational standards. CC ID 10527 | System hardening through configuration management | Preventive | |
Configure the "Restricted Sites Zone Restricted Protocols" setting to organizational standards. CC ID 10528 | System hardening through configuration management | Preventive | |
Configure the "Restricted Sites Zone Template" setting to organizational standards. CC ID 10529 | System hardening through configuration management | Preventive | |
Configure the "Send internationalized domain names" setting to organizational standards. CC ID 10530 | System hardening through configuration management | Preventive | |
Configure the "Set location of Stop and Refresh buttons" setting to organizational standards. CC ID 10531 | System hardening through configuration management | Preventive | |
Configure the "Set tab process growth" setting to organizational standards. CC ID 10532 | System hardening through configuration management | Preventive | |
Configure the "Flash" setting to organizational standards. CC ID 10533 | System hardening through configuration management | Preventive | |
Configure the "Tools menu: Disable Internet Options.. menu option" setting to organizational standards. CC ID 10534 | System hardening through configuration management | Preventive | |
Configure the "Trusted Sites Zone Restricted Protocols" setting to organizational standards. CC ID 10535 | System hardening through configuration management | Preventive | |
Configure the "Trusted Sites Zone Template" setting to organizational standards. CC ID 10536 | System hardening through configuration management | Preventive | |
Configure the "Turn off Accelerators" setting to organizational standards. CC ID 10537 | System hardening through configuration management | Preventive | |
Configure the "Turn off Automatic Crash Recovery Prompt" setting to organizational standards. CC ID 10538 | System hardening through configuration management | Preventive | |
Configure the "Turn off automatic image resizing" setting to organizational standards. CC ID 10539 | System hardening through configuration management | Preventive | |
Configure the "Turn off ClearType" setting to organizational standards. CC ID 10540 | System hardening through configuration management | Preventive | |
Configure the "Turn off Compatibility View button" setting to organizational standards. CC ID 10541 | System hardening through configuration management | Preventive | |
Configure the "Turn off Compatibility View" setting to organizational standards. CC ID 10542 | System hardening through configuration management | Preventive | |
Configure the "Turn off configuration of default behavior of new tab creation" setting to organizational standards. CC ID 10543 | System hardening through configuration management | Preventive | |
Configure the "Turn off configuration of tabbed browsing pop-up behavior" setting to organizational standards. CC ID 10544 | System hardening through configuration management | Preventive | |
Configure the "Turn off configuration of window reuse" setting to organizational standards. CC ID 10545 | System hardening through configuration management | Preventive | |
Configure the "Turn off configuring underline links" setting to organizational standards. CC ID 10546 | System hardening through configuration management | Preventive | |
Configure the "Turn off Cross Document Messaging" setting to organizational standards. CC ID 10547 | System hardening through configuration management | Preventive | |
Configure the "Turn off Data URI Support" setting to organizational standards. CC ID 10548 | System hardening through configuration management | Preventive | |
Configure the "Turn off Developer Tools" setting to organizational standards. CC ID 10549 | System hardening through configuration management | Preventive | |
Configure the "Turn off displaying the Internet Explorer Help Menu" setting to organizational standards. CC ID 10550 | System hardening through configuration management | Preventive | |
Configure the "Turn off Favorites bar" setting to organizational standards. CC ID 10551 | System hardening through configuration management | Preventive | |
Configure the "Turn off friendly http error messages" setting to organizational standards. CC ID 10552 | System hardening through configuration management | Preventive | |
Configure the "Turn off InPrivate Filtering" setting to organizational standards. CC ID 10553 | System hardening through configuration management | Preventive | |
Configure the "Turn off Managing Pop-up Allow list" setting to organizational standards. CC ID 10554 | System hardening through configuration management | Preventive | |
Configure the "Turn off managing Pop-up filter level" setting to organizational standards. CC ID 10555 | System hardening through configuration management | Preventive | |
Configure the "Turn off page zooming functionality" setting to organizational standards. CC ID 10556 | System hardening through configuration management | Preventive | |
Configure the "Turn off picture display" setting to organizational standards. CC ID 10557 | System hardening through configuration management | Preventive | |
Configure the "Turn off pop-up management" setting to organizational standards. CC ID 10558 | System hardening through configuration management | Preventive | |
Configure the "Turn off Print Menu" setting to organizational standards. CC ID 10559 | System hardening through configuration management | Preventive | |
Configure the "Turn off Quick Tabs functionality" setting to organizational standards. CC ID 10560 | System hardening through configuration management | Preventive | |
Configure the "Turn off Reopen Last Browsing Session" setting to organizational standards. CC ID 10561 | System hardening through configuration management | Preventive | |
Configure the "Turn off sending URLs as UTF-8 (requires restart)" setting to organizational standards. CC ID 10562 | System hardening through configuration management | Preventive | |
Configure the "Turn off smart image dithering" setting to organizational standards. CC ID 10563 | System hardening through configuration management | Preventive | |
Configure the "Turn off smooth scrolling" setting to organizational standards. CC ID 10564 | System hardening through configuration management | Preventive | |
Configure the "Turn off suggestions for all user-installed providers" setting to organizational standards. CC ID 10565 | System hardening through configuration management | Preventive | |
Configure the "Turn off Tab Grouping" setting to organizational standards. CC ID 10566 | System hardening through configuration management | Preventive | |
Configure the "Turn off tabbed browsing" setting to organizational standards. CC ID 10567 | System hardening through configuration management | Preventive | |
Configure the "Turn off the activation of the quick pick menu" setting to organizational standards. CC ID 10568 | System hardening through configuration management | Preventive | |
Configure the "Turn off the auto-complete feature for web addresses" setting to organizational standards. CC ID 10569 | System hardening through configuration management | Preventive | |
Configure the "Turn off the XDomainRequest Object" setting to organizational standards. CC ID 10570 | System hardening through configuration management | Preventive | |
Configure the "Turn off toolbar upgrade tool" setting to organizational standards. CC ID 10571 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Search AutoComplete" setting to organizational standards. CC ID 10572 | System hardening through configuration management | Preventive | |
Configure the "Turn on automatic detection of the intranet" setting to organizational standards. CC ID 10573 | System hardening through configuration management | Preventive | |
Configure the "Turn on Automatic Signup" setting to organizational standards. CC ID 10574 | System hardening through configuration management | Preventive | |
Configure the "Turn on Caret Browsing support" setting to organizational standards. CC ID 10575 | System hardening through configuration management | Preventive | |
Configure the "Turn on Compatibility Logging" setting to organizational standards. CC ID 10576 | System hardening through configuration management | Preventive | |
Configure the "Turn on Information bar notification for intranet content" setting to organizational standards. CC ID 10577 | System hardening through configuration management | Preventive | |
Configure the "Turn on inline AutoComplete for Web addresses" setting to organizational standards. CC ID 10578 | System hardening through configuration management | Preventive | |
Configure the "Turn on Internet Explorer 7 Standards Mode" setting to organizational standards. CC ID 10579 | System hardening through configuration management | Preventive | |
Configure the "Turn on Internet Explorer Standards Mode for Local Intranet" setting to organizational standards. CC ID 10580 | System hardening through configuration management | Preventive | |
Configure the "Turn on menu bar by default" setting to organizational standards. CC ID 10581 | System hardening through configuration management | Preventive | |
Configure the "Turn on the display of a notification about every script error" setting to organizational standards. CC ID 10582 | System hardening through configuration management | Preventive | |
Configure the "Turn on the hover color option" setting to organizational standards. CC ID 10583 | System hardening through configuration management | Preventive | |
Configure the "Use Automatic Detection for dial-up connections" setting to organizational standards. CC ID 10584 | System hardening through configuration management | Preventive | |
Configure the "Use HTTP 1.1 through proxy connections" setting to organizational standards. CC ID 10585 | System hardening through configuration management | Preventive | |
Configure the "Use HTTP 1.1" setting to organizational standards. CC ID 10586 | System hardening through configuration management | Preventive | |
Configure the "Use large Icons for Command Buttons" setting to organizational standards. CC ID 10587 | System hardening through configuration management | Preventive | |
Configure the "Use Policy Accelerators" setting to organizational standards. CC ID 10588 | System hardening through configuration management | Preventive | |
Configure the "Use Policy List of Internet Explorer 7 sites" setting to organizational standards. CC ID 10589 | System hardening through configuration management | Preventive | |
Configure the "Use UTF-8 for mailto links" setting to organizational standards. CC ID 10590 | System hardening through configuration management | Preventive | |
Configure the "View menu: Disable Full Screen menu option" setting to organizational standards. CC ID 10591 | System hardening through configuration management | Preventive | |
Configure the "View menu: Disable Source menu option" setting to organizational standards. CC ID 10592 | System hardening through configuration management | Preventive | |
Configure the "MSS: (NoDriveTypeAutoRun) Disable Autorun for all drives (recommended)" setting to organizational standards. CC ID 10607 | System hardening through configuration management | Preventive | |
Configure the "AutoRun" setting to organizational standards. CC ID 10608 | System hardening through configuration management | Preventive | |
Configure the "Disable binding directly to IPropertySetStorage without intermediate layers." setting to organizational standards. CC ID 10861 | System hardening through configuration management | Preventive | |
Configure the "Disable delete notifications on all volumes" setting to organizational standards. CC ID 10862 | System hardening through configuration management | Preventive | |
Configure the "Disable IE security prompt for Windows Installer scripts" setting to organizational standards. CC ID 10863 | System hardening through configuration management | Preventive | |
Configure the "Disable or enable software Secure Attention Sequence" setting to organizational standards. CC ID 10865 | System hardening through configuration management | Preventive | |
Configure the "Disable text prediction" setting to organizational standards. CC ID 10867 | System hardening through configuration management | Preventive | |
Configure the "Disable Windows Error Reporting" machine setting should be configured correctly. to organizational standards. CC ID 10868 | System hardening through configuration management | Preventive | |
Configure the "Disable Windows Installer" setting to organizational standards. CC ID 10869 | System hardening through configuration management | Preventive | |
Configure the "Display a custom message when installation is prevented by a policy setting" setting to organizational standards. CC ID 10886 | System hardening through configuration management | Preventive | |
Configure the "Enable/Disable PerfTrack" setting to organizational standards. CC ID 10953 | System hardening through configuration management | Preventive | |
Configure the "Enforce disk quota limit" setting to organizational standards. CC ID 10956 | System hardening through configuration management | Preventive | |
Configure the "Limit audio playback quality" setting to organizational standards. CC ID 11006 | System hardening through configuration management | Preventive | |
Configure the "Limit disk space used by offline files" setting to organizational standards. CC ID 11007 | System hardening through configuration management | Preventive | |
Configure the "Limit maximum color depth" setting to organizational standards. CC ID 11008 | System hardening through configuration management | Preventive | |
Configure the "Limit maximum display resolution" setting to organizational standards. CC ID 11009 | System hardening through configuration management | Preventive | |
Configure the "Limit maximum number of monitors" setting to organizational standards. CC ID 11010 | System hardening through configuration management | Preventive | |
Configure the "Limit outstanding packets" setting to organizational standards. CC ID 11012 | System hardening through configuration management | Preventive | |
Configure the "Limit reservable bandwidth" setting to organizational standards. CC ID 11013 | System hardening through configuration management | Preventive | |
Configure the "Limit the age of files in the BITS Peercache" setting to organizational standards. CC ID 11014 | System hardening through configuration management | Preventive | |
Configure the "Limit the BITS Peercache size" setting to organizational standards. CC ID 11015 | System hardening through configuration management | Preventive | |
Configure the "Limit the maximum BITS job download time" setting to organizational standards. CC ID 11016 | System hardening through configuration management | Preventive | |
Configure the "Limit the maximum number of BITS jobs for each user" setting to organizational standards. CC ID 11018 | System hardening through configuration management | Preventive | |
Configure the "Limit the maximum number of BITS jobs for this computer" setting to organizational standards. CC ID 11019 | System hardening through configuration management | Preventive | |
Configure the "Limit the maximum number of ranges that can be added to the file in a BITS job" setting to organizational standards. CC ID 11021 | System hardening through configuration management | Preventive | |
Configure the "Limit the size of the entire roaming user profile cache" setting to organizational standards. CC ID 11022 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Support Diagnostic Tool: Restrict tool download" setting to organizational standards. CC ID 11044 | System hardening through configuration management | Preventive | |
Configure the "Prevent access to 16-bit applications" setting to organizational standards. CC ID 11066 | System hardening through configuration management | Preventive | |
Configure the "Prevent Automatic Updates" setting to organizational standards. CC ID 11067 | System hardening through configuration management | Preventive | |
Configure the "Prevent Back-ESC mapping" setting to organizational standards. CC ID 11068 | System hardening through configuration management | Preventive | |
Configure the "Prevent backing up to local disks" setting to organizational standards. CC ID 11069 | System hardening through configuration management | Preventive | |
Configure the "Prevent backing up to optical media (CD/DVD)" setting to organizational standards. CC ID 11071 | System hardening through configuration management | Preventive | |
Configure the "Prevent display of the user interface for critical errors" setting to organizational standards. CC ID 11074 | System hardening through configuration management | Preventive | |
Configure the "Prevent flicks" setting to organizational standards. CC ID 11075 | System hardening through configuration management | Preventive | |
Configure the "Prevent Flicks Learning Mode" setting to organizational standards. CC ID 11076 | System hardening through configuration management | Preventive | |
Configure the "Prevent Input Panel tab from appearing" setting to organizational standards. CC ID 11077 | System hardening through configuration management | Preventive | |
Configure the "Prevent launch an application" setting to organizational standards. CC ID 11081 | System hardening through configuration management | Preventive | |
Configure the "Prevent license upgrade" setting to organizational standards. CC ID 11082 | System hardening through configuration management | Preventive | |
Configure the "Prevent Media Sharing" setting to organizational standards. CC ID 11083 | System hardening through configuration management | Preventive | |
Configure the "Prevent plaintext PINs from being returned by Credential Manager" setting to organizational standards. CC ID 11084 | System hardening through configuration management | Preventive | |
Configure the "Prevent press and hold" setting to organizational standards. CC ID 11085 | System hardening through configuration management | Preventive | |
Configure the "Prevent Quick Launch Toolbar Shortcut Creation" setting to organizational standards. CC ID 11086 | System hardening through configuration management | Preventive | |
Configure the "Prevent restoring local previous versions" setting to organizational standards. CC ID 11087 | System hardening through configuration management | Preventive | |
Configure the "Prevent restoring previous versions from backups" setting to organizational standards. CC ID 11088 | System hardening through configuration management | Preventive | |
Configure the "Prevent Roaming Profile changes from propagating to the server" setting to organizational standards. CC ID 11090 | System hardening through configuration management | Preventive | |
Configure the "Prevent Video Smoothing" setting to organizational standards. CC ID 11091 | System hardening through configuration management | Preventive | |
Configure the "Prevent Windows Anytime Upgrade from running." setting to organizational standards. CC ID 11092 | System hardening through configuration management | Preventive | |
Configure the "Prohibit Access of the Windows Connect Now wizards" setting to organizational standards. CC ID 11100 | System hardening through configuration management | Preventive | |
Configure the "Prohibit Flyweight Patching" setting to organizational standards. CC ID 11101 | System hardening through configuration management | Preventive | |
Configure the "Prohibit installing or uninstalling color profiles" setting to organizational standards. CC ID 11103 | System hardening through configuration management | Preventive | |
Configure the "Prohibit patching" setting to organizational standards. CC ID 11104 | System hardening through configuration management | Preventive | |
Configure the "Prohibit removal of updates" setting to organizational standards. CC ID 11105 | System hardening through configuration management | Preventive | |
Configure the "Prohibit rollback" setting to organizational standards. CC ID 11106 | System hardening through configuration management | Preventive | |
Configure the "Prohibit Use of Restart Manager" setting to organizational standards. CC ID 11107 | System hardening through configuration management | Preventive | |
Configure the "Restrict Internet communication" setting to organizational standards. CC ID 11140 | System hardening through configuration management | Preventive | |
Configure the "Restrict potentially unsafe HTML Help functions to specified folders" setting to organizational standards. CC ID 11141 | System hardening through configuration management | Preventive | |
Configure the "Restrict system locales" setting to organizational standards. CC ID 11143 | System hardening through configuration management | Preventive | |
Configure the "Restrict these programs from being launched from Help" setting to organizational standards. CC ID 11144 | System hardening through configuration management | Preventive | |
Configure the "Restrict unpacking and installation of gadgets that are not digitally signed." setting to organizational standards. CC ID 11145 | System hardening through configuration management | Preventive | |
Configure the "Restrict user locales" setting to organizational standards. CC ID 11146 | System hardening through configuration management | Preventive | |
Configure the "Terminate session when time limits are reached" setting to organizational standards. CC ID 11241 | System hardening through configuration management | Preventive | |
Configure the "Turn off access to all Windows Update features" setting to organizational standards. CC ID 11254 | System hardening through configuration management | Preventive | |
Configure the "Turn off access to the OEM and Microsoft branding section" setting to organizational standards. CC ID 11255 | System hardening through configuration management | Preventive | |
Configure the "Turn off access to the performance center core section" setting to organizational standards. CC ID 11256 | System hardening through configuration management | Preventive | |
Configure the "Turn off access to the solutions to performance problems section" setting to organizational standards. CC ID 11257 | System hardening through configuration management | Preventive | |
Configure the "Turn off Active Help" setting to organizational standards. CC ID 11258 | System hardening through configuration management | Preventive | |
Configure the "Turn off Application Compatibility Engine" setting to organizational standards. CC ID 11261 | System hardening through configuration management | Preventive | |
Configure the "Turn off Application Telemetry" setting to organizational standards. CC ID 11262 | System hardening through configuration management | Preventive | |
Configure the "Turn off AutoComplete integration with Input Panel" setting to organizational standards. CC ID 11263 | System hardening through configuration management | Preventive | |
Configure the "Turn off automatic learning" setting to organizational standards. CC ID 11264 | System hardening through configuration management | Preventive | |
Configure the "Turn off Automatic Root Certificates Update" setting to organizational standards. CC ID 11265 | System hardening through configuration management | Preventive | |
Configure the "Turn off automatic termination of applications that block or cancel shutdown" setting to organizational standards. CC ID 11266 | System hardening through configuration management | Preventive | |
Configure the "Turn off automatic wake" setting to organizational standards. CC ID 11267 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Boot and Resume Optimizations" setting to organizational standards. CC ID 11269 | System hardening through configuration management | Preventive | |
Configure the "Turn off Configuration" setting to organizational standards. CC ID 11271 | System hardening through configuration management | Preventive | |
Configure the "Turn off creation of System Restore Checkpoints" setting to organizational standards. CC ID 11273 | System hardening through configuration management | Preventive | |
Configure the "Turn off Data Execution Prevention for HTML Help Executible" setting to organizational standards. CC ID 11274 | System hardening through configuration management | Preventive | |
Configure the "Turn off downloading of game information" setting to organizational standards. CC ID 11276 | System hardening through configuration management | Preventive | |
Configure the "Turn off Fair Share CPU Scheduling" setting to organizational standards. CC ID 11277 | System hardening through configuration management | Preventive | |
Configure the "Turn off game updates" setting to organizational standards. CC ID 11279 | System hardening through configuration management | Preventive | |
Configure the "Turn off hardware buttons" setting to organizational standards. CC ID 11280 | System hardening through configuration management | Preventive | |
Configure the "Turn off location scripting" setting to organizational standards. CC ID 11287 | System hardening through configuration management | Preventive | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Global" to organizational standards. CC ID 11290 | System hardening through configuration management | Preventive | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Site Local" to organizational standards. CC ID 11292 | System hardening through configuration management | Preventive | |
Configure the "Turn off Multicast Name Resolution" setting to organizational standards. CC ID 11293 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Non Volatile Cache Feature" setting to organizational standards. CC ID 11294 | System hardening through configuration management | Preventive | |
Configure the "Turn off numerical sorting in Windows Explorer" setting to organizational standards. CC ID 11295 | System hardening through configuration management | Preventive | |
Configure the "Turn off pen feedback" setting to organizational standards. CC ID 11297 | System hardening through configuration management | Preventive | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Global" to organizational standards. CC ID 11298 | System hardening through configuration management | Preventive | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Site Local" to organizational standards. CC ID 11300 | System hardening through configuration management | Preventive | |
Configure the "Turn off Problem Steps Recorder" setting to organizational standards. CC ID 11301 | System hardening through configuration management | Preventive | |
Configure the "Turn off Program Compatibility Assistant" setting to organizational standards. CC ID 11302 | System hardening through configuration management | Preventive | |
Configure the "Turn off Program Inventory" setting to organizational standards. CC ID 11303 | System hardening through configuration management | Preventive | |
Configure the "Turn off Real-Time Monitoring" setting to organizational standards. CC ID 11304 | System hardening through configuration management | Preventive | |
Configure the "Turn off restore functionality" setting to organizational standards. CC ID 11306 | System hardening through configuration management | Preventive | |
Configure the "Turn off Routinely Taking Action" setting to organizational standards. CC ID 11308 | System hardening through configuration management | Preventive | |
Configure the "Turn off sensors" setting to organizational standards. CC ID 11309 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Solid State Mode" setting to organizational standards. CC ID 11310 | System hardening through configuration management | Preventive | |
Configure the "Turn off SwitchBack Compatibility Engine" setting to organizational standards. CC ID 11311 | System hardening through configuration management | Preventive | |
Configure the "Turn off System Restore" setting to organizational standards. CC ID 11312 | System hardening through configuration management | Preventive | |
Configure the "Turn off Tablet PC touch input" setting to organizational standards. CC ID 11313 | System hardening through configuration management | Preventive | |
Configure the "Turn off the ability to back up data files" setting to organizational standards. CC ID 11315 | System hardening through configuration management | Preventive | |
Configure the "Turn off the ability to create a system image" setting to organizational standards. CC ID 11316 | System hardening through configuration management | Preventive | |
Configure the "Turn off the communities features" setting to organizational standards. CC ID 11317 | System hardening through configuration management | Preventive | |
Configure the "Turn off Touch Panning" setting to organizational standards. CC ID 11320 | System hardening through configuration management | Preventive | |
Configure the "Turn off tracking of last play time of games in the Games folder" setting to organizational standards. CC ID 11321 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Customer Experience Improvement Program" setting to organizational standards. CC ID 11323 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Defender" setting to organizational standards. CC ID 11324 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows HotStart" setting to organizational standards. CC ID 11325 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Installer RDS Compatibility" setting to organizational standards. CC ID 11326 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Mobility Center" setting to organizational standards. CC ID 11327 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows presentation settings" setting to organizational standards. CC ID 11329 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows SideShow" setting to organizational standards. CC ID 11330 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Startup Sound" setting to organizational standards. CC ID 11331 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain idle session termination and logout capabilities. CC ID 01418 | System hardening through configuration management | Preventive | |
Configure Session Configuration settings in accordance with organizational standards. CC ID 07698 | System hardening through configuration management | Preventive | |
Invalidate unexpected session identifiers. CC ID 15307 | System hardening through configuration management | Preventive | |
Configure the "MaxStartups" settings to organizational standards. CC ID 15329 | System hardening through configuration management | Preventive | |
Reject session identifiers that are not valid. CC ID 15306 | System hardening through configuration management | Preventive | |
Configure the "MaxSessions" settings to organizational standards. CC ID 15330 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Message title for users attempting to log on" to organizational standards. CC ID 07699 | System hardening through configuration management | Preventive | |
Configure the "LoginGraceTime" settings to organizational standards. CC ID 15328 | System hardening through configuration management | Preventive | |
Configure the "Network security: Force logoff when logon hours expire" to organizational standards. CC ID 07738 | System hardening through configuration management | Preventive | |
Configure the "MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)" to organizational standards. CC ID 07758 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network server: Disconnect clients when logon hours expire" to organizational standards. CC ID 07824 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network server: Amount of idle time required before suspending session" to organizational standards. CC ID 07826 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Do not display last user name" to organizational standards. CC ID 07832 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Display user information when the session is locked" to organizational standards. CC ID 07848 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Message text for users attempting to log on" to organizational standards. CC ID 07870 | System hardening through configuration management | Preventive | |
Configure the "Always prompt for password upon connection" to organizational standards. CC ID 08229 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Machine inactivity limit" to organizational standards. CC ID 08350 | System hardening through configuration management | Preventive | |
Install custom applications, only if they are trusted. CC ID 04822 | System hardening through configuration management | Preventive | |
Configure virtual networks in accordance with the information security policy. CC ID 13165 | System hardening through configuration management | Preventive | |
Configure Simple Network Management Protocol (SNMP) to organizational standards. CC ID 12423 | System hardening through configuration management | Preventive | |
Configure Simple Network Management Protocol to enable authentication and privacy. CC ID 12427 | System hardening through configuration management | Preventive | |
Change the community string for Simple Network Management Protocol, as necessary. CC ID 01872 | System hardening through configuration management | Preventive | |
Configure the system's storage media. CC ID 10618 | System hardening through configuration management | Preventive | |
Configure the system's electronic storage media's encryption settings. CC ID 11927 | System hardening through configuration management | Preventive | |
Prohibit the use of sanitization-resistant media in Information Systems. CC ID 10617 | System hardening through configuration management | Preventive | |
Configure Internet Browser security options according to organizational standards. CC ID 02166 | System hardening through configuration management | Preventive | |
Configure the "Internet Explorer Maintenance Policy Processing - Allow processing across a slow network connection" setting. CC ID 04910 | System hardening through configuration management | Preventive | |
Configure the "Disable Internet Connection wizard" setting. CC ID 02242 | System hardening through configuration management | Preventive | |
Configure the "Disable Automatic Install of Internet Explorer components" setting. CC ID 04337 | System hardening through configuration management | Preventive | |
Configure the "Disable Periodic Check for Internet Explorer software updates" setting. CC ID 04338 | System hardening through configuration management | Preventive | |
Configure the "Do not allow users to enable or disable add-ons" setting in Internet Explorer properly. CC ID 04340 | System hardening through configuration management | Preventive | |
Configure the "Turn off Crash Detection" setting in Internet Explorer properly. CC ID 04345 | System hardening through configuration management | Preventive | |
Configure the "internet explorer processes (mk protocol)" setting. CC ID 04347 | System hardening through configuration management | Preventive | |
Configure the "internet explorer processes (consistent MIME handling)" setting. CC ID 04348 | System hardening through configuration management | Preventive | |
Configure the "internet explorer processes (MIME sniffing)" setting. CC ID 04349 | System hardening through configuration management | Preventive | |
Configure the "Internet Explorer Processes (Restrict ActiveX Install)" setting. CC ID 04352 | System hardening through configuration management | Preventive | |
Configure the "internet explorer processes (restrict file download)" setting. CC ID 04353 | System hardening through configuration management | Preventive | |
Configure the "Deny all add-ons unless specifically allowed in the Add-on List" setting. CC ID 04354 | System hardening through configuration management | Preventive | |
Configure the "Disable Save this program to disk option" setting in limited functionality environments properly. CC ID 04366 | System hardening through configuration management | Preventive | |
Configure the "Disable the Advanced Page" setting in limited functionality environments. CC ID 04367 | System hardening through configuration management | Preventive | |
Configure the "Disable the Security Page" setting in limited functionality environments properly. CC ID 04368 | System hardening through configuration management | Preventive | |
Configure the "Disable adding channels" setting in Internet Explorer properly. CC ID 04369 | System hardening through configuration management | Preventive | |
Configure the "Disable adding schedules for offline pages" setting. CC ID 04370 | System hardening through configuration management | Preventive | |
Configure the "Disable all scheduled offline pages" setting. CC ID 04371 | System hardening through configuration management | Preventive | |
Configure the "Disable channel user interface completely" setting. CC ID 04372 | System hardening through configuration management | Preventive | |
Configure the "Disable downloading of site subscription content" setting. CC ID 04373 | System hardening through configuration management | Preventive | |
Configure the "Disable editing and creating of schedule groups" setting. CC ID 04374 | System hardening through configuration management | Preventive | |
Configure the "Disable editing schedules for offline pages" setting. CC ID 04375 | System hardening through configuration management | Preventive | |
Configure the "Disable offline page hit logging" setting. CC ID 04376 | System hardening through configuration management | Preventive | |
Configure the "Disable removing channels" setting. CC ID 04377 | System hardening through configuration management | Preventive | |
Configure the "Disable removing schedules for offline pages" setting. CC ID 04378 | System hardening through configuration management | Preventive | |
Configure the "Disable 'Configuring History'" setting in specialized security environments properly. CC ID 04405 | System hardening through configuration management | Preventive | |
Configure the "Disable AutoComplete for forms" setting in limited functionality environments properly. CC ID 04406 | System hardening through configuration management | Preventive | |
Configure the "Prevent 'fix settings' functionality" setting in limited functionality environments properly. CC ID 04407 | System hardening through configuration management | Preventive | |
Configure the "Prevent deletion of 'Temporary Internet Files and Cookies'" setting in limited functionality environments properly. CC ID 04408 | System hardening through configuration management | Preventive | |
Configure the "Turn Off 'Delete Browsing History' Functionality" setting in limited functionality environments properly. CC ID 04409 | System hardening through configuration management | Preventive | |
Configure the "Turn off the Security Settings Check feature" setting in limited functionality environments properly. CC ID 04410 | System hardening through configuration management | Preventive | |
Configure the "Prevent ignoring certificate errors" setting in limited functionality environments properly. CC ID 04411 | System hardening through configuration management | Preventive | |
Configure the "allow install on demand (Internet Explorer)" setting in limited functionality environments properly. CC ID 04412 | System hardening through configuration management | Preventive | |
Configure the "Check for server certificate revocation" setting in limited functionality environments properly. CC ID 04413 | System hardening through configuration management | Preventive | |
Configure the "Access data sources across domains" setting. CC ID 04415 | System hardening through configuration management | Preventive | |
Configure the "Allow active scripting" setting in limited functionality environments properly. CC ID 04416 | System hardening through configuration management | Preventive | |
Configure the "Allow binary and script behaviors" setting in limited functionality environments properly. CC ID 04417 | System hardening through configuration management | Preventive | |
Configure the "Allow cut, copy, or paste operations from the clipboard via script" setting. CC ID 04418 | System hardening through configuration management | Preventive | |
Configure the "Allow drag and drop or copy and paste files" setting. CC ID 04419 | System hardening through configuration management | Preventive | |
Configure the "Allow file downloads" setting in limited functionality environments properly. CC ID 04420 | System hardening through configuration management | Preventive | |
Configure the "Allow font downloads" setting in limited functionality environments properly. CC ID 04421 | System hardening through configuration management | Preventive | |
Configure the "Allow installation of desktop items" setting in limited functionality environments properly. CC ID 04422 | System hardening through configuration management | Preventive | |
Configure the "Allow META REFRESH" setting in limited functionality environments properly. CC ID 04423 | System hardening through configuration management | Preventive | |
Configure the "Allow script-initiated windows without size or position constraints" setting in limited functionality environments properly. CC ID 04424 | System hardening through configuration management | Preventive | |
Configure the "Allow status bar updates via script" setting in limited functionality environments properly. CC ID 04425 | System hardening through configuration management | Preventive | |
Configure the "Automatic prompting for file downloads" setting in limited functionality environments properly. CC ID 04426 | System hardening through configuration management | Preventive | |
Configure the "Download signed ActiveX controls" setting in limited functionality environments properly. CC ID 04427 | System hardening through configuration management | Preventive | |
Configure the "Download unsigned ActiveX controls" setting in limited functionality environments properly. CC ID 04428 | System hardening through configuration management | Preventive | |
Configure the "Initialize and script ActiveX controls not marked as safe" setting in limited functionality environments properly. CC ID 04429 | System hardening through configuration management | Preventive | |
Configure the "Java permissions" setting in limited functionality environments properly. CC ID 04430 | System hardening through configuration management | Preventive | |
Configure the "Launching applications and files in an IFRAME" setting in limited functionality environments properly. CC ID 04431 | System hardening through configuration management | Preventive | |
Configure the "Logon Options" setting in limited functionality environments. CC ID 04432 | System hardening through configuration management | Preventive | |
Configure the "Navigate sub-frames across different domains" setting in limited functionality environments properly. CC ID 04433 | System hardening through configuration management | Preventive | |
Configure the "Open file based on content, not on file extension" setting in limited functionality environments properly. CC ID 04434 | System hardening through configuration management | Preventive | |
Configure the "Run.NET Framework-reliant components not signed with Authenticode" setting in limited functionality environments properly. CC ID 04435 | System hardening through configuration management | Preventive | |
Configure the "Run.NET Framework-reliant components signed with Authenticode" setting in limited functionality environments properly. CC ID 04436 | System hardening through configuration management | Preventive | |
Configure the "Run ActiveX controls and plugins" setting in limited functionality environments properly. CC ID 04437 | System hardening through configuration management | Preventive | |
Configure the "Script ActiveX controls marked safe for scripting" setting in limited functionality environments properly. CC ID 04438 | System hardening through configuration management | Preventive | |
Configure the "Scripting of Java applets" setting in limited functionality environments properly. CC ID 04439 | System hardening through configuration management | Preventive | |
Configure the "Software channel permissions" setting in limited functionality environments properly. CC ID 04440 | System hardening through configuration management | Preventive | |
Configure the "Use Pop-up Blocker" setting in limited functionality environments properly. CC ID 04441 | System hardening through configuration management | Preventive | |
Configure the "Web sites in less privileged Web content zones could navigate into this zone" setting in limited functionality environments properly. CC ID 04442 | System hardening through configuration management | Preventive | |
Configure the .NET Framework to prevent unauthorized mobile code from executing. CC ID 04531 | System hardening through configuration management | Preventive | |
Configure the "Turn off changing the URL to be displayed for checking updates to Internet Explorer and Internet Tools" setting. CC ID 04644 | System hardening through configuration management | Preventive | |
Configure the "Prevent performance of first run customize settings" setting. CC ID 04645 | System hardening through configuration management | Preventive | |
Configure the "Allow Scriptlets" setting in limited functionality environments properly. CC ID 02237 | System hardening through configuration management | Preventive | |
Configure the "Disable showing the splash screen" setting. CC ID 02238 | System hardening through configuration management | Preventive | |
Configure the "Add-on List" setting. CC ID 02239 | System hardening through configuration management | Preventive | |
Configure the "Loose XAML" setting in limited functionality environments properly. CC ID 02240 | System hardening through configuration management | Preventive | |
Configure the "Disable the Privacy page" setting. CC ID 02241 | System hardening through configuration management | Preventive | |
Configure the "XPS documents" setting in limited functionality environments properly. CC ID 02243 | System hardening through configuration management | Preventive | |
Configure the "Turn off Managing Phishing filter" setting. CC ID 02244 | System hardening through configuration management | Preventive | |
Configure the "Turn on Protected Mode" setting in limited functionality environments properly. CC ID 02245 | System hardening through configuration management | Preventive | |
Configure the "Userdata persistence" setting in limited functionality environments properly. CC ID 02246 | System hardening through configuration management | Preventive | |
Configure the "Display mixed content" setting in limited functionality environments properly. CC ID 02247 | System hardening through configuration management | Preventive | |
Configure the "Check for signature on download programs" setting. CC ID 02250 | System hardening through configuration management | Preventive | |
Configure the "Turn on the Internet Connection Wizard Auto Detect" setting. CC ID 02252 | System hardening through configuration management | Preventive | |
Configure the "Web Browser Applications" setting for the Restricted Sites Zone properly. CC ID 02254 | System hardening through configuration management | Preventive | |
Configure the "Turn off page transitions" setting. CC ID 02255 | System hardening through configuration management | Preventive | |
Configure the "Turn off configuring the update check interval (in days)" setting. CC ID 02257 | System hardening through configuration management | Preventive | |
Configure the "Web Browser Applications" setting for the Internet Zone properly. CC ID 02259 | System hardening through configuration management | Preventive | |
Configure the "Turn Off First-Run Opt-In" setting in limited functionality environments properly. CC ID 02261 | System hardening through configuration management | Preventive | |
Configure the "Do not allow resetting Internet Explorer settings" setting. CC ID 02262 | System hardening through configuration management | Preventive | |
Configure the "Enable third-party browser extensions" setting. CC ID 02263 | System hardening through configuration management | Preventive | |
Configure the "Disable the reset Web settings feature" setting. CC ID 02264 | System hardening through configuration management | Preventive | |
Configure the "Disable external branding of Internet Explorer" setting. CC ID 02266 | System hardening through configuration management | Preventive | |
Configure the "Enable Native XMLHttp Support" setting. CC ID 02267 | System hardening through configuration management | Preventive | |
Configure the "Site to Zone Assignment List" to organizational standards. CC ID 08650 | System hardening through configuration management | Preventive | |
Configure the "Notification bar" setting to organizational standards. CC ID 10008 | System hardening through configuration management | Preventive | |
Remove all unnecessary functionality. CC ID 00882 | System hardening through configuration management | Preventive | |
Find and eradicate unauthorized world writable files. CC ID 01541 | System hardening through configuration management | Preventive | |
Strip dangerous/unneeded SUID/SGID system executables. CC ID 01542 | System hardening through configuration management | Preventive | |
Find and eradicate unauthorized SUID/SGID system executables. CC ID 01543 | System hardening through configuration management | Preventive | |
Find and eradicate unowned files and unowned directories. CC ID 01544 | System hardening through configuration management | Preventive | |
Disable logon prompts on serial ports. CC ID 01553 | System hardening through configuration management | Preventive | |
Disable "nobody" access for Secure RPC. CC ID 01554 | System hardening through configuration management | Preventive | |
Disable all unnecessary interfaces. CC ID 04826 | System hardening through configuration management | Preventive | |
Enable or disable all unused USB ports as appropriate. CC ID 06042 | System hardening through configuration management | Preventive | |
Disable all user-mounted removable file systems. CC ID 01536 | System hardening through configuration management | Preventive | |
Set the Bluetooth Security Mode to the organizational standard. CC ID 00587 | System hardening through configuration management | Preventive | |
Secure the Bluetooth headset connections. CC ID 00593 | System hardening through configuration management | Preventive | |
Disable automatic dial-in access to computers that have installed modems. CC ID 02036 | System hardening through configuration management | Preventive | |
Configure the "Turn off AutoPlay" setting. CC ID 01787 | System hardening through configuration management | Preventive | |
Configure the "Devices: Restrict floppy access to locally logged on users only" setting. CC ID 01732 | System hardening through configuration management | Preventive | |
Configure the "Devices: Restrict CD-ROM access to locally logged on users" setting. CC ID 01731 | System hardening through configuration management | Preventive | |
Configure the "Remove CD Burning features" setting. CC ID 04379 | System hardening through configuration management | Preventive | |
Disable Autorun. CC ID 01790 | System hardening through configuration management | Preventive | |
Disable USB devices (aka hotplugger). CC ID 01545 | System hardening through configuration management | Preventive | |
Enable or disable all unused auxiliary ports as appropriate. CC ID 06414 | System hardening through configuration management | Preventive | |
Remove rhosts support unless absolutely necessary. CC ID 01555 | System hardening through configuration management | Preventive | |
Remove weak authentication services from Pluggable Authentication Modules. CC ID 01556 | System hardening through configuration management | Preventive | |
Remove the /etc/hosts.equiv file. CC ID 01559 | System hardening through configuration management | Preventive | |
Create the /etc/ftpd/ftpusers file. CC ID 01560 | System hardening through configuration management | Preventive | |
Remove the X Wrapper and enable the X Display Manager. CC ID 01564 | System hardening through configuration management | Preventive | |
Remove empty crontab files and restrict file permissions to the file. CC ID 01571 | System hardening through configuration management | Preventive | |
Remove all compilers and assemblers from the system. CC ID 01594 | System hardening through configuration management | Preventive | |
Disable all unnecessary applications unless otherwise noted in a policy exception. CC ID 04827 | System hardening through configuration management | Preventive | |
Disable the storing of movies in cache in Apple's QuickTime. CC ID 04489 | System hardening through configuration management | Preventive | |
Install and enable file sharing utilities, as necessary. CC ID 02174 | System hardening through configuration management | Preventive | |
Disable boot services unless boot services are absolutely necessary. CC ID 01481 | System hardening through configuration management | Preventive | |
Disable File Services for Macintosh unless File Services for Macintosh are absolutely necessary. CC ID 04279 | System hardening through configuration management | Preventive | |
Configure the Trivial FTP Daemon service to organizational standards. CC ID 01484 | System hardening through configuration management | Preventive | |
Disable printer daemons or the printer service unless printer daemons or the printer service is absolutely necessary. CC ID 01487 | System hardening through configuration management | Preventive | |
Disable web server unless web server is absolutely necessary. CC ID 01490 | System hardening through configuration management | Preventive | |
Disable portmapper unless portmapper is absolutely necessary. CC ID 01492 | System hardening through configuration management | Preventive | |
Disable writesrv, pmd, and httpdlite unless writesrv, pmd, and httpdlite are absolutely necessary. CC ID 01498 | System hardening through configuration management | Preventive | |
Disable hwscan hardware detection unless hwscan hardware detection is absolutely necessary. CC ID 01504 | System hardening through configuration management | Preventive | |
Configure the “xinetd” service to organizational standards. CC ID 01509 | System hardening through configuration management | Preventive | |
Configure the /etc/xinetd.conf file permissions as appropriate. CC ID 01568 | System hardening through configuration management | Preventive | |
Disable inetd unless inetd is absolutely necessary. CC ID 01508 | System hardening through configuration management | Preventive | |
Disable Network Computing System unless it is absolutely necessary. CC ID 01497 | System hardening through configuration management | Preventive | |
Disable print server for macintosh unless print server for macintosh is absolutely necessary. CC ID 04284 | System hardening through configuration management | Preventive | |
Disable Print Server unless Print Server is absolutely necessary. CC ID 01488 | System hardening through configuration management | Preventive | |
Disable ruser/remote login/remote shell/rcp command, unless it is absolutely necessary. CC ID 01480 | System hardening through configuration management | Preventive | |
Disable xfsmd unless xfsmd is absolutely necessary. CC ID 02179 | System hardening through configuration management | Preventive | |
Disable RPC-based services unless RPC-based services are absolutely necessary. CC ID 01455 | System hardening through configuration management | Preventive | |
Disable netfs script unless netfs script is absolutely necessary. CC ID 01495 | System hardening through configuration management | Preventive | |
Disable Remote Procedure Calls unless Remote Procedure Calls are absolutely necessary and if enabled, set restrictions. CC ID 01456 | System hardening through configuration management | Preventive | |
Configure the "RPC Endpoint Mapper Client Authentication" setting. CC ID 04327 | System hardening through configuration management | Preventive | |
Disable ncpfs Script unless ncpfs Script is absolutely necessary. CC ID 01494 | System hardening through configuration management | Preventive | |
Disable sendmail server unless sendmail server is absolutely necessary. CC ID 01511 | System hardening through configuration management | Preventive | |
Disable postfix unless postfix is absolutely necessary. CC ID 01512 | System hardening through configuration management | Preventive | |
Disable directory server unless directory server is absolutely necessary. CC ID 01464 | System hardening through configuration management | Preventive | |
Disable Windows-compatibility client processes unless Windows-compatibility client processes are absolutely necessary. CC ID 01471 | System hardening through configuration management | Preventive | |
Disable Windows-compatibility servers unless Windows-compatibility servers are absolutely necessary. CC ID 01470 | System hardening through configuration management | Preventive | |
Configure the “Network File System” server to organizational standards CC ID 01472 | System hardening through configuration management | Preventive | |
Configure NFS to respond or not as appropriate to NFS client requests that do not include a User ID. CC ID 05981 | System hardening through configuration management | Preventive | |
Configure NFS with appropriate authentication methods. CC ID 05982 | System hardening through configuration management | Preventive | |
Configure the "AUTH_DES authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08971 | System hardening through configuration management | Preventive | |
Configure the "AUTH_KERB authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08972 | System hardening through configuration management | Preventive | |
Configure the "AUTH_NONE authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08973 | System hardening through configuration management | Preventive | |
Configure the "AUTH_UNIX authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08974 | System hardening through configuration management | Preventive | |
Disable webmin processes unless the webmin process is absolutely necessary. CC ID 01501 | System hardening through configuration management | Preventive | |
Disable automount daemon unless automount daemon is absolutely necessary. CC ID 01476 | System hardening through configuration management | Preventive | |
Disable CDE-related daemons unless CDE-related daemons are absolutely necessary. CC ID 01474 | System hardening through configuration management | Preventive | |
Disable finger unless finger is absolutely necessary. CC ID 01505 | System hardening through configuration management | Preventive | |
Disable Rexec unless Rexec is absolutely necessary. CC ID 02164 | System hardening through configuration management | Preventive | |
Disable Squid cache server unless Squid cache server is absolutely necessary. CC ID 01502 | System hardening through configuration management | Preventive | |
Disable Kudzu hardware detection unless Kudzu hardware detection is absolutely necessary. CC ID 01503 | System hardening through configuration management | Preventive | |
Install and enable public Instant Messaging clients as necessary. CC ID 02173 | System hardening through configuration management | Preventive | |
Disable x font server unless x font server is absolutely necessary. CC ID 01499 | System hardening through configuration management | Preventive | |
Disable NFS client processes unless NFS client processes are absolutely necessary. CC ID 01475 | System hardening through configuration management | Preventive | |
Disable removable storage media daemon unless the removable storage media daemon is absolutely necessary. CC ID 01477 | System hardening through configuration management | Preventive | |
Disable GSS daemon unless GSS daemon is absolutely necessary. CC ID 01465 | System hardening through configuration management | Preventive | |
Disable Computer Browser unless Computer Browser is absolutely necessary. CC ID 01814 | System hardening through configuration management | Preventive | |
Configure the Computer Browser ResetBrowser Frames as appropriate. CC ID 05984 | System hardening through configuration management | Preventive | |
Configure the /etc/samba/smb.conf file file permissions as appropriate. CC ID 05989 | System hardening through configuration management | Preventive | |
Disable NetMeeting remote desktop sharing unless NetMeeting remote desktop sharing is absolutely necessary. CC ID 01821 | System hardening through configuration management | Preventive | |
Disable web directory browsing on all web-enabled devices. CC ID 01874 | System hardening through configuration management | Preventive | |
Disable WWW publishing services unless WWW publishing services are absolutely necessary. CC ID 01833 | System hardening through configuration management | Preventive | |
Install and enable samba, as necessary. CC ID 02175 | System hardening through configuration management | Preventive | |
Configure the samba hosts allow option with an appropriate set of networks. CC ID 05985 | System hardening through configuration management | Preventive | |
Configure the samba security option option as appropriate. CC ID 05986 | System hardening through configuration management | Preventive | |
Configure the samba encrypt passwords option as appropriate. CC ID 05987 | System hardening through configuration management | Preventive | |
Configure the Samba 'smb passwd file' option with an appropriate password file or no password file. CC ID 05988 | System hardening through configuration management | Preventive | |
Disable Usenet Internet news package file capabilities unless Usenet Internet news package file capabilities are absolutely necessary. CC ID 02176 | System hardening through configuration management | Preventive | |
Disable iPlanet Web Server unless iPlanet Web Server is absolutely necessary. CC ID 02172 | System hardening through configuration management | Preventive | |
Disable volume manager unless volume manager is absolutely necessary. CC ID 01469 | System hardening through configuration management | Preventive | |
Disable Solaris Management Console unless Solaris Management Console is absolutely necessary. CC ID 01468 | System hardening through configuration management | Preventive | |
Disable the Graphical User Interface unless it is absolutely necessary. CC ID 01466 | System hardening through configuration management | Preventive | |
Disable help and support unless help and support is absolutely necessary. CC ID 04280 | System hardening through configuration management | Preventive | |
Disable speech recognition unless speech recognition is absolutely necessary. CC ID 04491 | System hardening through configuration management | Preventive | |
Disable or secure the NetWare QuickFinder search engine. CC ID 04453 | System hardening through configuration management | Preventive | |
Disable messenger unless messenger is absolutely necessary. CC ID 01819 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Windows Messenger to be run" setting. CC ID 04516 | System hardening through configuration management | Preventive | |
Configure the "Do not automatically start Windows Messenger initially" setting. CC ID 04517 | System hardening through configuration management | Preventive | |
Configure the "Turn off the Windows Messenger Customer Experience Improvement Program" setting. CC ID 04330 | System hardening through configuration management | Preventive | |
Disable automatic updates unless automatic updates are absolutely necessary. CC ID 01811 | System hardening through configuration management | Preventive | |
Configure automatic update installation and shutdown/restart options and shutdown/restart procedures to organizational standards. CC ID 05979 | System hardening through configuration management | Preventive | |
Disable Name Service Cache Daemon unless Name Service Cache Daemon is absolutely necessary. CC ID 04846 | System hardening through configuration management | Preventive | |
Prohibit R-command files from existing for root or administrator. CC ID 16322 | System hardening through configuration management | Preventive | |
Verify the /bin/rsh file exists or not, as appropriate. CC ID 05101 | System hardening through configuration management | Preventive | |
Verify the /sbin/rsh file exists or not, as appropriate. CC ID 05102 | System hardening through configuration management | Preventive | |
Verify the /usr/bin/rsh file exists or not, as appropriate. CC ID 05103 | System hardening through configuration management | Preventive | |
Verify the /etc/ftpusers file exists or not, as appropriate. CC ID 05104 | System hardening through configuration management | Preventive | |
Verify the /etc/rsh file exists or not, as appropriate. CC ID 05105 | System hardening through configuration management | Preventive | |
Install or uninstall the AIDE package, as appropriate. CC ID 05106 | System hardening through configuration management | Preventive | |
Enable the GNOME automounter (gnome-volume-manager) as necessary. CC ID 05107 | System hardening through configuration management | Preventive | |
Install or uninstall the setroubleshoot package, as appropriate. CC ID 05108 | System hardening through configuration management | Preventive | |
Configure Avahi properly. CC ID 05109 | System hardening through configuration management | Preventive | |
Install or uninstall OpenNTPD, as appropriate. CC ID 05110 | System hardening through configuration management | Preventive | |
Configure the "httpd" service to organizational standards. CC ID 05111 | System hardening through configuration management | Preventive | |
Install or uninstall the net-smtp package properly. CC ID 05112 | System hardening through configuration management | Preventive | |
Configure the apache web service properly. CC ID 05113 | System hardening through configuration management | Preventive | |
Configure the vlock package properly. CC ID 05114 | System hardening through configuration management | Preventive | |
Configure the daemon account properly. CC ID 05115 | System hardening through configuration management | Preventive | |
Configure the bin account properly. CC ID 05116 | System hardening through configuration management | Preventive | |
Configure the nuucp account properly. CC ID 05117 | System hardening through configuration management | Preventive | |
Configure the smmsp account properly. CC ID 05118 | System hardening through configuration management | Preventive | |
Configure the listen account properly. CC ID 05119 | System hardening through configuration management | Preventive | |
Configure the gdm account properly. CC ID 05120 | System hardening through configuration management | Preventive | |
Configure the webservd account properly. CC ID 05121 | System hardening through configuration management | Preventive | |
Configure the nobody account properly. CC ID 05122 | System hardening through configuration management | Preventive | |
Configure the noaccess account properly. CC ID 05123 | System hardening through configuration management | Preventive | |
Configure the nobody4 account properly. CC ID 05124 | System hardening through configuration management | Preventive | |
Configure the sys account properly. CC ID 05125 | System hardening through configuration management | Preventive | |
Configure the adm account properly. CC ID 05126 | System hardening through configuration management | Preventive | |
Configure the lp account properly. CC ID 05127 | System hardening through configuration management | Preventive | |
Configure the uucp account properly. CC ID 05128 | System hardening through configuration management | Preventive | |
Install or uninstall the tftp-server package, as appropriate. CC ID 05130 | System hardening through configuration management | Preventive | |
Enable the web console as necessary. CC ID 05131 | System hardening through configuration management | Preventive | |
Enable rlogin auth by Pluggable Authentication Modules or pam.d properly. CC ID 05132 | System hardening through configuration management | Preventive | |
Enable rsh auth by Pluggable Authentication Modules properly. CC ID 05133 | System hardening through configuration management | Preventive | |
Enable the listening sendmail daemon, as appropriate. CC ID 05134 | System hardening through configuration management | Preventive | |
Configure Squid properly. CC ID 05135 | System hardening through configuration management | Preventive | |
Configure the "/etc/shells" file to organizational standards. CC ID 08978 | System hardening through configuration management | Preventive | |
Configure the LDAP package to organizational standards. CC ID 09937 | System hardening through configuration management | Preventive | |
Configure the "FTP server" package to organizational standards. CC ID 09938 | System hardening through configuration management | Preventive | |
Configure the "HTTP Proxy Server" package to organizational standards. CC ID 09939 | System hardening through configuration management | Preventive | |
Configure the "prelink" package to organizational standards. CC ID 11379 | System hardening through configuration management | Preventive | |
Configure the Network Information Service (NIS) package to organizational standards. CC ID 11380 | System hardening through configuration management | Preventive | |
Configure the "time" setting to organizational standards. CC ID 11381 | System hardening through configuration management | Preventive | |
Configure the "biosdevname" package to organizational standards. CC ID 11383 | System hardening through configuration management | Preventive | |
Configure the "ufw" setting to organizational standards. CC ID 11384 | System hardening through configuration management | Preventive | |
Configure the "Devices: Allow undock without having to log on" setting. CC ID 01728 | System hardening through configuration management | Preventive | |
Limit the user roles that are allowed to format and eject removable storage media. CC ID 01729 | System hardening through configuration management | Preventive | |
Prevent users from installing printer drivers. CC ID 01730 | System hardening through configuration management | Preventive | |
Minimize the inetd.conf file and set the file to the appropriate permissions. CC ID 01506 | System hardening through configuration management | Preventive | |
Configure the unsigned driver installation behavior. CC ID 01733 | System hardening through configuration management | Preventive | |
Configure the unsigned non-driver installation behavior. CC ID 02038 | System hardening through configuration management | Preventive | |
Remove all demonstration applications on the system. CC ID 01875 | System hardening through configuration management | Preventive | |
Configure the system to disallow optional Subsystems. CC ID 04265 | System hardening through configuration management | Preventive | |
Configure the "Remove Security tab" setting. CC ID 04380 | System hardening through configuration management | Preventive | |
Disable all unnecessary services unless otherwise noted in a policy exception. CC ID 00880 | System hardening through configuration management | Preventive | |
Disable rquotad unless rquotad is absolutely necessary. CC ID 01473 | System hardening through configuration management | Preventive | |
Configure the rquotad service to use a static port or a dynamic portmapper port as appropriate. CC ID 05983 | System hardening through configuration management | Preventive | |
Disable telnet unless telnet use is absolutely necessary. CC ID 01478 | System hardening through configuration management | Preventive | |
Disable File Transfer Protocol unless File Transfer Protocol use is absolutely necessary. CC ID 01479 | System hardening through configuration management | Preventive | |
Configure anonymous FTP to restrict the use of restricted data. CC ID 16314 | System hardening through configuration management | Preventive | |
Disable anonymous access to File Transfer Protocol. CC ID 06739 | System hardening through configuration management | Preventive | |
Disable Internet Message Access Protocol unless Internet Message Access Protocol use is absolutely necessary. CC ID 01485 | System hardening through configuration management | Preventive | |
Disable Post Office Protocol unless its use is absolutely necessary. CC ID 01486 | System hardening through configuration management | Preventive | |
Disable SQLServer processes unless SQLServer processes use is absolutely necessary. CC ID 01500 | System hardening through configuration management | Preventive | |
Disable alerter unless alerter use is absolutely necessary. CC ID 01810 | System hardening through configuration management | Preventive | |
Disable Background Intelligent Transfer Service unless Background Intelligent Transfer Service use is absolutely necessary. CC ID 01812 | System hardening through configuration management | Preventive | |
Disable ClipBook unless ClipBook use is absolutely necessary. CC ID 01813 | System hardening through configuration management | Preventive | |
Disable Fax Service unless Fax Service use is absolutely necessary. CC ID 01815 | System hardening through configuration management | Preventive | |
Disable IIS admin service unless IIS admin service use is absolutely necessary. CC ID 01817 | System hardening through configuration management | Preventive | |
Disable indexing service unless indexing service use is absolutely necessary. CC ID 01818 | System hardening through configuration management | Preventive | |
Disable net logon unless net logon use is absolutely necessary. CC ID 01820 | System hardening through configuration management | Preventive | |
Disable Remote Desktop Help Session Manager unless Remote Desktop Help Session Manager use is absolutely necessary. CC ID 01822 | System hardening through configuration management | Preventive | |
Disable the "Offer Remote Assistance" setting. CC ID 04325 | System hardening through configuration management | Preventive | |
Disable the "Solicited Remote Assistance" setting. CC ID 04326 | System hardening through configuration management | Preventive | |
Disable Remote Registry Service unless Remote Registry Service use is absolutely necessary. CC ID 01823 | System hardening through configuration management | Preventive | |
Disable Routing and Remote Access unless Routing and Remote Access use is necessary. CC ID 01824 | System hardening through configuration management | Preventive | |
Disable task scheduler unless task scheduler use is absolutely necessary. CC ID 01829 | System hardening through configuration management | Preventive | |
Disable Terminal Services unless Terminal Services use is absolutely necessary. CC ID 01831 | System hardening through configuration management | Preventive | |
Disable Universal Plug and Play device host unless Universal Plug and Play device host use is absolutely necessary. CC ID 01832 | System hardening through configuration management | Preventive | |
Disable File Service Protocol. CC ID 02167 | System hardening through configuration management | Preventive | |
Disable the License Logging Service unless unless it is absolutely necessary. CC ID 04282 | System hardening through configuration management | Preventive | |
Disable Remote Access Auto Connection Manager unless Remote Access Auto Connection Manager use is absolutely necessary. CC ID 04285 | System hardening through configuration management | Preventive | |
Disable Remote Access Connection Manager unless Remote Access Connection Manager use is absolutely necessary. CC ID 04286 | System hardening through configuration management | Preventive | |
Disable Remote Administration Service unless remote administration management is absolutely necessary. CC ID 04287 | System hardening through configuration management | Preventive | |
Disable remote installation unless remote installation is absolutely necessary. CC ID 04288 | System hardening through configuration management | Preventive | |
Disable Remote Server Manager unless Remote Server Manager is absolutely necessary. CC ID 04289 | System hardening through configuration management | Preventive | |
Disable Remote Server Monitor unless Remote Server Monitor use is absolutely necessary. CC ID 04290 | System hardening through configuration management | Preventive | |
Disable Remote Storage Notification unless Remote Storage Notification use is absolutely necessary. CC ID 04291 | System hardening through configuration management | Preventive | |
Disable Remote Storage Server unless Remote Storage Server use is absolutely necessary. CC ID 04292 | System hardening through configuration management | Preventive | |
Disable telephony services unless telephony services use is absolutely necessary. CC ID 04293 | System hardening through configuration management | Preventive | |
Disable Wireless Zero Configuration service unless Wireless Zero Configuration service use is absolutely necessary. CC ID 04294 | System hardening through configuration management | Preventive | |
Disable SSDP/UPnp unless SSDP/UPnP is absolutely necessary. CC ID 04315 | System hardening through configuration management | Preventive | |
Configure the "ntpd service" setting to organizational standards. CC ID 04911 | System hardening through configuration management | Preventive | |
Configure the "echo service" setting to organizational standards. CC ID 04912 | System hardening through configuration management | Preventive | |
Configure the "echo-dgram service" setting to organizational standards. CC ID 09927 | System hardening through configuration management | Preventive | |
Configure the "echo-stream service" setting to organizational standards. CC ID 09928 | System hardening through configuration management | Preventive | |
Configure the "AllowTcpForwarding" to organizational standards. CC ID 15327 | System hardening through configuration management | Preventive | |
Configure the "tcpmux-server" setting to organizational standards. CC ID 09929 | System hardening through configuration management | Preventive | |
Configure the "netstat service" setting to organizational standards. CC ID 04913 | System hardening through configuration management | Preventive | |
Configure the "character generator protocol (chargen)" setting to organizational standards. CC ID 04914 | System hardening through configuration management | Preventive | |
Configure the "tftpd service" setting to organizational standards. CC ID 04915 | System hardening through configuration management | Preventive | |
Configure the "walld service" setting to organizational standards. CC ID 04916 | System hardening through configuration management | Preventive | |
Configure the "rstatd service" setting to organizational standards. CC ID 04917 | System hardening through configuration management | Preventive | |
Configure the "sprayd service" setting to organizational standards. CC ID 04918 | System hardening through configuration management | Preventive | |
Configure the "rusersd service" setting to organizational standards. CC ID 04919 | System hardening through configuration management | Preventive | |
Configure the "inn service" setting to organizational standards. CC ID 04920 | System hardening through configuration management | Preventive | |
Configure the "font service" setting to organizational standards. CC ID 04921 | System hardening through configuration management | Preventive | |
Configure the "ident service" setting to organizational standards. CC ID 04922 | System hardening through configuration management | Preventive | |
Configure the "rexd service" setting to organizational standards. CC ID 04923 | System hardening through configuration management | Preventive | |
Configure the "daytime service" setting to organizational standards. CC ID 04924 | System hardening through configuration management | Preventive | |
Configure the "dtspc (cde-spc) service" setting to organizational standards. CC ID 04925 | System hardening through configuration management | Preventive | |
Configure the "cmsd service" setting to organizational standards. CC ID 04926 | System hardening through configuration management | Preventive | |
Configure the "ToolTalk service" setting to organizational standards. CC ID 04927 | System hardening through configuration management | Preventive | |
Configure the "discard service" setting to organizational standards. CC ID 04928 | System hardening through configuration management | Preventive | |
Configure the "vino-server service" setting to organizational standards. CC ID 04929 | System hardening through configuration management | Preventive | |
Configure the "bind service" setting to organizational standards. CC ID 04930 | System hardening through configuration management | Preventive | |
Configure the "nfsd service" setting to organizational standards. CC ID 04931 | System hardening through configuration management | Preventive | |
Configure the "mountd service" setting to organizational standards. CC ID 04932 | System hardening through configuration management | Preventive | |
Configure the "statd service" setting to organizational standards. CC ID 04933 | System hardening through configuration management | Preventive | |
Configure the "lockd service" setting to organizational standards. CC ID 04934 | System hardening through configuration management | Preventive | |
Configure the lockd service to use a static port or a dynamic portmapper port for User Datagram Protocol as appropriate. CC ID 05980 | System hardening through configuration management | Preventive | |
Configure the "decode sendmail alias" setting to organizational standards. CC ID 04935 | System hardening through configuration management | Preventive | |
Configure the sendmail vrfy command, as appropriate. CC ID 04936 | System hardening through configuration management | Preventive | |
Configure the sendmail expn command, as appropriate. CC ID 04937 | System hardening through configuration management | Preventive | |
Configure .netrc with an appropriate set of services. CC ID 04938 | System hardening through configuration management | Preventive | |
Enable NFS insecure locks as necessary. CC ID 04939 | System hardening through configuration management | Preventive | |
Configure the "X server ac" setting to organizational standards. CC ID 04940 | System hardening through configuration management | Preventive | |
Configure the "X server core" setting to organizational standards. CC ID 04941 | System hardening through configuration management | Preventive | |
Enable or disable the setroubleshoot service, as appropriate. CC ID 05540 | System hardening through configuration management | Preventive | |
Configure the "X server nolock" setting to organizational standards. CC ID 04942 | System hardening through configuration management | Preventive | |
Enable or disable the mcstrans service, as appropriate. CC ID 05541 | System hardening through configuration management | Preventive | |
Configure the "PAM console" setting to organizational standards. CC ID 04943 | System hardening through configuration management | Preventive | |
Enable or disable the restorecond service, as appropriate. CC ID 05542 | System hardening through configuration management | Preventive | |
Enable the rhnsd service as necessary. CC ID 04944 | System hardening through configuration management | Preventive | |
Enable the yum-updatesd service as necessary. CC ID 04945 | System hardening through configuration management | Preventive | |
Enable the autofs service as necessary. CC ID 04946 | System hardening through configuration management | Preventive | |
Enable the ip6tables service as necessary. CC ID 04947 | System hardening through configuration management | Preventive | |
Configure syslog to organizational standards. CC ID 04949 | System hardening through configuration management | Preventive | |
Enable the auditd service as necessary. CC ID 04950 | System hardening through configuration management | Preventive | |
Enable the logwatch service as necessary. CC ID 04951 | System hardening through configuration management | Preventive | |
Enable the logrotate (syslog rotator) service as necessary. CC ID 04952 | System hardening through configuration management | Preventive | |
Install or uninstall the telnet server package, only if absolutely necessary. CC ID 04953 | System hardening through configuration management | Preventive | |
Enable the ypbind service as necessary. CC ID 04954 | System hardening through configuration management | Preventive | |
Enable the ypserv service as necessary. CC ID 04955 | System hardening through configuration management | Preventive | |
Enable the firstboot service as necessary. CC ID 04956 | System hardening through configuration management | Preventive | |
Enable the gpm service as necessary. CC ID 04957 | System hardening through configuration management | Preventive | |
Enable the irqbalance service as necessary. CC ID 04958 | System hardening through configuration management | Preventive | |
Enable the isdn service as necessary. CC ID 04959 | System hardening through configuration management | Preventive | |
Enable the kdump service as necessary. CC ID 04960 | System hardening through configuration management | Preventive | |
Enable the mdmonitor service as necessary. CC ID 04961 | System hardening through configuration management | Preventive | |
Enable the microcode_ctl service as necessary. CC ID 04962 | System hardening through configuration management | Preventive | |
Enable the pcscd service as necessary. CC ID 04963 | System hardening through configuration management | Preventive | |
Enable the smartd service as necessary. CC ID 04964 | System hardening through configuration management | Preventive | |
Enable the readahead_early service as necessary. CC ID 04965 | System hardening through configuration management | Preventive | |
Enable the readahead_later service as necessary. CC ID 04966 | System hardening through configuration management | Preventive | |
Enable the messagebus service as necessary. CC ID 04967 | System hardening through configuration management | Preventive | |
Enable the haldaemon service as necessary. CC ID 04968 | System hardening through configuration management | Preventive | |
Enable the apmd service as necessary. CC ID 04969 | System hardening through configuration management | Preventive | |
Enable the acpid service as necessary. CC ID 04970 | System hardening through configuration management | Preventive | |
Enable the cpuspeed service as necessary. CC ID 04971 | System hardening through configuration management | Preventive | |
Enable the network service as necessary. CC ID 04972 | System hardening through configuration management | Preventive | |
Enable the hidd service as necessary. CC ID 04973 | System hardening through configuration management | Preventive | |
Enable the crond service as necessary. CC ID 04974 | System hardening through configuration management | Preventive | |
Install and enable the anacron service as necessary. CC ID 04975 | System hardening through configuration management | Preventive | |
Enable the xfs service as necessary. CC ID 04976 | System hardening through configuration management | Preventive | |
Install and enable the Avahi daemon service, as necessary. CC ID 04977 | System hardening through configuration management | Preventive | |
Enable the CUPS service, as necessary. CC ID 04978 | System hardening through configuration management | Preventive | |
Enable the hplip service as necessary. CC ID 04979 | System hardening through configuration management | Preventive | |
Enable the dhcpd service as necessary. CC ID 04980 | System hardening through configuration management | Preventive | |
Enable the nfslock service as necessary. CC ID 04981 | System hardening through configuration management | Preventive | |
Enable the rpcgssd service as necessary. CC ID 04982 | System hardening through configuration management | Preventive | |
Enable the rpcidmapd service as necessary. CC ID 04983 | System hardening through configuration management | Preventive | |
Enable the rpcsvcgssd service as necessary. CC ID 04985 | System hardening through configuration management | Preventive | |
Configure root squashing for all NFS shares, as appropriate. CC ID 04986 | System hardening through configuration management | Preventive | |
Configure write access to NFS shares, as appropriate. CC ID 04987 | System hardening through configuration management | Preventive | |
Configure the named service, as appropriate. CC ID 04988 | System hardening through configuration management | Preventive | |
Configure the vsftpd service, as appropriate. CC ID 04989 | System hardening through configuration management | Preventive | |
Configure the “dovecot” service to organizational standards. CC ID 04990 | System hardening through configuration management | Preventive | |
Configure Server Message Block (SMB) to organizational standards. CC ID 04991 | System hardening through configuration management | Preventive | |
Enable the snmpd service as necessary. CC ID 04992 | System hardening through configuration management | Preventive | |
Enable the calendar manager as necessary. CC ID 04993 | System hardening through configuration management | Preventive | |
Enable the GNOME logon service as necessary. CC ID 04994 | System hardening through configuration management | Preventive | |
Enable the WBEM services as necessary. CC ID 04995 | System hardening through configuration management | Preventive | |
Enable the keyserv service as necessary. CC ID 04996 | System hardening through configuration management | Preventive | |
Enable the Generic Security Service daemon as necessary. CC ID 04997 | System hardening through configuration management | Preventive | |
Enable the volfs service as necessary. CC ID 04998 | System hardening through configuration management | Preventive | |
Enable the smserver service as necessary. CC ID 04999 | System hardening through configuration management | Preventive | |
Enable the mpxio-upgrade service as necessary. CC ID 05000 | System hardening through configuration management | Preventive | |
Enable the metainit service as necessary. CC ID 05001 | System hardening through configuration management | Preventive | |
Enable the meta service as necessary. CC ID 05003 | System hardening through configuration management | Preventive | |
Enable the metaed service as necessary. CC ID 05004 | System hardening through configuration management | Preventive | |
Enable the metamh service as necessary. CC ID 05005 | System hardening through configuration management | Preventive | |
Enable the Local RPC Port Mapping Service as necessary. CC ID 05006 | System hardening through configuration management | Preventive | |
Enable the Kerberos kadmind service as necessary. CC ID 05007 | System hardening through configuration management | Preventive | |
Enable the Kerberos krb5kdc service as necessary. CC ID 05008 | System hardening through configuration management | Preventive | |
Enable the Kerberos kpropd service as necessary. CC ID 05009 | System hardening through configuration management | Preventive | |
Enable the Kerberos ktkt_warnd service as necessary. CC ID 05010 | System hardening through configuration management | Preventive | |
Enable the sadmin service as necessary. CC ID 05011 | System hardening through configuration management | Preventive | |
Enable the IPP listener as necessary. CC ID 05012 | System hardening through configuration management | Preventive | |
Enable the serial port listener as necessary. CC ID 05013 | System hardening through configuration management | Preventive | |
Enable the Smart Card Helper service as necessary. CC ID 05014 | System hardening through configuration management | Preventive | |
Enable the Application Management service as necessary. CC ID 05015 | System hardening through configuration management | Preventive | |
Enable the Resultant Set of Policy (RSoP) Provider service as necessary. CC ID 05016 | System hardening through configuration management | Preventive | |
Enable the Network News Transport Protocol service as necessary. CC ID 05017 | System hardening through configuration management | Preventive | |
Enable the network Dynamic Data Exchange service as necessary. CC ID 05018 | System hardening through configuration management | Preventive | |
Enable the Distributed Link Tracking Server service as necessary. CC ID 05019 | System hardening through configuration management | Preventive | |
Enable the RARP service as necessary. CC ID 05020 | System hardening through configuration management | Preventive | |
Configure the ".NET Framework service" setting to organizational standards. CC ID 05021 | System hardening through configuration management | Preventive | |
Enable the Network DDE Share Database Manager service as necessary. CC ID 05022 | System hardening through configuration management | Preventive | |
Enable the Certificate Services service as necessary. CC ID 05023 | System hardening through configuration management | Preventive | |
Configure the ATI hotkey poller service properly. CC ID 05024 | System hardening through configuration management | Preventive | |
Configure the Interix Subsystem Startup service properly. CC ID 05025 | System hardening through configuration management | Preventive | |
Configure the Cluster Service service properly. CC ID 05026 | System hardening through configuration management | Preventive | |
Configure the IAS Jet Database Access service properly. CC ID 05027 | System hardening through configuration management | Preventive | |
Configure the IAS service properly. CC ID 05028 | System hardening through configuration management | Preventive | |
Configure the IP Version 6 Helper service properly. CC ID 05029 | System hardening through configuration management | Preventive | |
Configure "Message Queuing service" to organizational standards. CC ID 05030 | System hardening through configuration management | Preventive | |
Configure the Message Queuing Down Level Clients service properly. CC ID 05031 | System hardening through configuration management | Preventive | |
Configure the Windows Management Instrumentation Driver Extensions service properly. CC ID 05033 | System hardening through configuration management | Preventive | |
Configure the TCP/IP NetBIOS Helper Service properly. CC ID 05034 | System hardening through configuration management | Preventive | |
Configure the Utility Manager service properly. CC ID 05035 | System hardening through configuration management | Preventive | |
Configure the secondary logon service properly. CC ID 05036 | System hardening through configuration management | Preventive | |
Configure the Windows Management Instrumentation service properly. CC ID 05037 | System hardening through configuration management | Preventive | |
Configure the Workstation service properly. CC ID 05038 | System hardening through configuration management | Preventive | |
Configure the Windows Installer service properly. CC ID 05039 | System hardening through configuration management | Preventive | |
Configure the Windows System Resource Manager service properly. CC ID 05040 | System hardening through configuration management | Preventive | |
Configure the WinHTTP Web Proxy Auto-Discovery Service properly. CC ID 05041 | System hardening through configuration management | Preventive | |
Configure the Services for Unix Client for NFS service properly. CC ID 05042 | System hardening through configuration management | Preventive | |
Configure the Services for Unix Server for PCNFS service properly. CC ID 05043 | System hardening through configuration management | Preventive | |
Configure the Services for Unix Perl Socket service properly. CC ID 05044 | System hardening through configuration management | Preventive | |
Configure the Services for Unix User Name Mapping service properly. CC ID 05045 | System hardening through configuration management | Preventive | |
Configure the Services for Unix Windows Cron service properly. CC ID 05046 | System hardening through configuration management | Preventive | |
Configure the Windows Media Services service properly. CC ID 05047 | System hardening through configuration management | Preventive | |
Configure the Services for Netware Service Advertising Protocol (SAP) Agent properly. CC ID 05048 | System hardening through configuration management | Preventive | |
Configure the Web Element Manager service properly. CC ID 05049 | System hardening through configuration management | Preventive | |
Configure the Remote Installation Services Single Instance Storage (SIS) Groveler service properly. CC ID 05050 | System hardening through configuration management | Preventive | |
Configure the Terminal Services Licensing service properly. CC ID 05051 | System hardening through configuration management | Preventive | |
Configure the COM+ Event System service properly. CC ID 05052 | System hardening through configuration management | Preventive | |
Configure the Event Log service properly. CC ID 05053 | System hardening through configuration management | Preventive | |
Configure the Infrared Monitor service properly. CC ID 05054 | System hardening through configuration management | Preventive | |
Configure the Services for Unix Server for NFS service properly. CC ID 05055 | System hardening through configuration management | Preventive | |
Configure the System Event Notification Service properly. CC ID 05056 | System hardening through configuration management | Preventive | |
Configure the NTLM Security Support Provider service properly. CC ID 05057 | System hardening through configuration management | Preventive | |
Configure the Performance Logs and Alerts service properly. CC ID 05058 | System hardening through configuration management | Preventive | |
Configure the Protected Storage service properly. CC ID 05059 | System hardening through configuration management | Preventive | |
Configure the QoS Admission Control (RSVP) service properly. CC ID 05060 | System hardening through configuration management | Preventive | |
Configure the Remote Procedure Call service properly. CC ID 05061 | System hardening through configuration management | Preventive | |
Configure the Removable Storage service properly. CC ID 05062 | System hardening through configuration management | Preventive | |
Configure the Server service properly. CC ID 05063 | System hardening through configuration management | Preventive | |
Configure the Security Accounts Manager service properly. CC ID 05064 | System hardening through configuration management | Preventive | |
Configure the “Network Connections” service to organizational standards. CC ID 05065 | System hardening through configuration management | Preventive | |
Configure the Logical Disk Manager service properly. CC ID 05066 | System hardening through configuration management | Preventive | |
Configure the Logical Disk Manager Administrative Service properly. CC ID 05067 | System hardening through configuration management | Preventive | |
Configure the File Replication service properly. CC ID 05068 | System hardening through configuration management | Preventive | |
Configure the Kerberos Key Distribution Center service properly. CC ID 05069 | System hardening through configuration management | Preventive | |
Configure the Intersite Messaging service properly. CC ID 05070 | System hardening through configuration management | Preventive | |
Configure the Remote Procedure Call locator service properly. CC ID 05071 | System hardening through configuration management | Preventive | |
Configure the Distributed File System service properly. CC ID 05072 | System hardening through configuration management | Preventive | |
Configure the Windows Internet Name Service service properly. CC ID 05073 | System hardening through configuration management | Preventive | |
Configure the FTP Publishing Service properly. CC ID 05074 | System hardening through configuration management | Preventive | |
Configure the Windows Search service properly. CC ID 05075 | System hardening through configuration management | Preventive | |
Configure the Microsoft Peer-to-Peer Networking Services service properly. CC ID 05076 | System hardening through configuration management | Preventive | |
Configure the Remote Shell service properly. CC ID 05077 | System hardening through configuration management | Preventive | |
Configure Simple TCP/IP services to organizational standards. CC ID 05078 | System hardening through configuration management | Preventive | |
Configure the Print Services for Unix service properly. CC ID 05079 | System hardening through configuration management | Preventive | |
Configure the File Shares service to organizational standards. CC ID 05080 | System hardening through configuration management | Preventive | |
Configure the NetMeeting service properly. CC ID 05081 | System hardening through configuration management | Preventive | |
Configure the Application Layer Gateway service properly. CC ID 05082 | System hardening through configuration management | Preventive | |
Configure the Cryptographic Services service properly. CC ID 05083 | System hardening through configuration management | Preventive | |
Configure the Help and Support Service properly. CC ID 05084 | System hardening through configuration management | Preventive | |
Configure the Human Interface Device Access service properly. CC ID 05085 | System hardening through configuration management | Preventive | |
Configure the IMAPI CD-Burning COM service properly. CC ID 05086 | System hardening through configuration management | Preventive | |
Configure the MS Software Shadow Copy Provider service properly. CC ID 05087 | System hardening through configuration management | Preventive | |
Configure the Network Location Awareness service properly. CC ID 05088 | System hardening through configuration management | Preventive | |
Configure the Portable Media Serial Number Service service properly. CC ID 05089 | System hardening through configuration management | Preventive | |
Configure the System Restore Service service properly. CC ID 05090 | System hardening through configuration management | Preventive | |
Configure the Themes service properly. CC ID 05091 | System hardening through configuration management | Preventive | |
Configure the Uninterruptible Power Supply service properly. CC ID 05092 | System hardening through configuration management | Preventive | |
Configure the Upload Manager service properly. CC ID 05093 | System hardening through configuration management | Preventive | |
Configure the Volume Shadow Copy Service properly. CC ID 05094 | System hardening through configuration management | Preventive | |
Configure the WebClient service properly. CC ID 05095 | System hardening through configuration management | Preventive | |
Configure the Windows Audio service properly. CC ID 05096 | System hardening through configuration management | Preventive | |
Configure the Windows Image Acquisition service properly. CC ID 05097 | System hardening through configuration management | Preventive | |
Configure the WMI Performance Adapter service properly. CC ID 05098 | System hardening through configuration management | Preventive | |
Enable file uploads via vsftpd service, as appropriate. CC ID 05100 | System hardening through configuration management | Preventive | |
Disable or remove sadmind unless use of sadmind is absolutely necessary. CC ID 06885 | System hardening through configuration management | Preventive | |
Configure the "SNMP version 1" setting to organizational standards. CC ID 08976 | System hardening through configuration management | Preventive | |
Configure the "xdmcp service" setting to organizational standards. CC ID 08985 | System hardening through configuration management | Preventive | |
Disable the automatic display of remote images in HTML-formatted e-mail. CC ID 04494 | System hardening through configuration management | Preventive | |
Disable Remote Apply Events unless Remote Apply Events are absolutely necessary. CC ID 04495 | System hardening through configuration management | Preventive | |
Disable Xgrid unless Xgrid is absolutely necessary. CC ID 04496 | System hardening through configuration management | Preventive | |
Configure the "Do Not Show First Use Dialog Boxes" setting for Windows Media Player properly. CC ID 05136 | System hardening through configuration management | Preventive | |
Disable Core dumps unless absolutely necessary. CC ID 01507 | System hardening through configuration management | Preventive | |
Set hard core dump size limits, as appropriate. CC ID 05990 | System hardening through configuration management | Preventive | |
Configure the "Prevent Desktop Shortcut Creation" setting for Windows Media Player properly. CC ID 05137 | System hardening through configuration management | Preventive | |
Set the Squid EUID and Squid GUID to an appropriate user and group. CC ID 05138 | System hardening through configuration management | Preventive | |
Verify groups referenced in /etc/passwd are included in /etc/group, as appropriate. CC ID 05139 | System hardening through configuration management | Preventive | |
Use of the cron.allow file should be enabled or disabled as appropriate. CC ID 06014 | System hardening through configuration management | Preventive | |
Use of the at.allow file should be enabled or disabled as appropriate. CC ID 06015 | System hardening through configuration management | Preventive | |
Enable or disable the Dynamic DNS feature of the DHCP Server as appropriate. CC ID 06039 | System hardening through configuration management | Preventive | |
Enable or disable each user's Screen saver software, as necessary. CC ID 06050 | System hardening through configuration management | Preventive | |
Disable any unnecessary scripting languages, as necessary. CC ID 12137 | System hardening through configuration management | Preventive | |
Configure the system to refrain from completing authentication methods when a security breach is detected. CC ID 13790 | System hardening through configuration management | Preventive | |
Allow logon to privileged accounts, as appropriate. CC ID 05281 | System hardening through configuration management | Preventive | |
Verify the logon accounts include an appropriate GECOS identifier, as appropriate. CC ID 05280 | System hardening through configuration management | Preventive | |
Configure the "/etc/shadow" settings to organizational standards. CC ID 15332 | System hardening through configuration management | Preventive | |
Set the default su console properly. CC ID 05279 | System hardening through configuration management | Preventive | |
Set the default logon console properly. CC ID 05278 | System hardening through configuration management | Preventive | |
Enable or disable local user logon to the vsftpd service, as appropriate. CC ID 05277 | System hardening through configuration management | Preventive | |
Enable or disable anonymous root logons, as appropriate. CC ID 05276 | System hardening through configuration management | Preventive | |
Enable or disable interactive logon to non-root system accounts, as necessary. CC ID 05275 | System hardening through configuration management | Preventive | |
Enable or disable logins through the primary console device, as appropriate. CC ID 05274 | System hardening through configuration management | Preventive | |
Enable or disable logins through the named virtual console device, as appropriate. CC ID 05273 | System hardening through configuration management | Preventive | |
Enable or disable logons through the named virtual console interface, as appropriate. CC ID 05272 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Do not display last user name" setting to organizational standards. CC ID 01740 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Do not require CTRL+ALT+DEL" setting. CC ID 01741 | System hardening through configuration management | Preventive | |
Configure the system logon banner. CC ID 01742 | System hardening through configuration management | Preventive | |
Configure the system logon banner message title. CC ID 01743 | System hardening through configuration management | Preventive | |
Configure the "interactive logon: number of previous logons to cache (in case domain controller is not available" setting. CC ID 01744 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Require Domain Controller authentication to unlock workstation" setting. CC ID 01746 | System hardening through configuration management | Preventive | |
Configure the Prompt for password on resume from hibernate / suspend setting. CC ID 04356 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Smart card removal behavior" setting. CC ID 01747 | System hardening through configuration management | Preventive | |
Configure the "Recovery console: Allow automatic administrative logon" setting. CC ID 01776 | System hardening through configuration management | Preventive | |
Configure the "Recovery console: Allow floppy copy and access to all drivers and all folders" setting. CC ID 01777 | System hardening through configuration management | Preventive | |
Configure the system to require an Open Firmware password on system startup. CC ID 04479 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Require removal card" setting. CC ID 06053 | System hardening through configuration management | Preventive | |
Configure the settings of the system registry and the systems objects (for Windows OS only). CC ID 01781 | System hardening through configuration management | Preventive | |
Configure ICMP timestamp request responses properly. CC ID 05150 | System hardening through configuration management | Preventive | |
Configure the Administrators group as the default owner for all new objects. CC ID 01782 | System hardening through configuration management | Preventive | |
Configure the "System objects: Require case-insensitivity for non-Windows systems" setting. CC ID 01783 | System hardening through configuration management | Preventive | |
Configure the "System objects: Strengthen default permissions of internal system objects" setting. CC ID 01784 | System hardening through configuration management | Preventive | |
Configure the system to suppress Dr. Watson Crash dumps. CC ID 01785 | System hardening through configuration management | Preventive | |
Disable automatic execution of the system debugger. CC ID 01786 | System hardening through configuration management | Preventive | |
Disable automatic logon. CC ID 01788 | System hardening through configuration management | Preventive | |
Disable automatic reboots after a Blue Screen of Death. CC ID 01789 | System hardening through configuration management | Preventive | |
Remove administrative shares on workstations. CC ID 01791 | System hardening through configuration management | Preventive | |
Configure the system to protect against Browser Spoofing attacks. CC ID 01792 | System hardening through configuration management | Preventive | |
Configure the system to protect against source-routing spoofing. CC ID 01793 | System hardening through configuration management | Preventive | |
Configure the system to protect the default gateway network setting. CC ID 01794 | System hardening through configuration management | Preventive | |
Configure the TCP/IP Dead Gateway Detection as appropriate. CC ID 06025 | System hardening through configuration management | Preventive | |
Configure the system to ensure ICMP routing via the shortest path first. CC ID 01795 | System hardening through configuration management | Preventive | |
Configure the system to protect against packet fragmentation. CC ID 01796 | System hardening through configuration management | Preventive | |
Configure the keep-alive times. CC ID 01797 | System hardening through configuration management | Preventive | |
Configure the system to protect against malicious Name-Release Attacks. CC ID 01798 | System hardening through configuration management | Preventive | |
Disable Internet Router Discovery Protocol. CC ID 01799 | System hardening through configuration management | Preventive | |
Configure the system to protect against SYN Flood attacks. CC ID 01800 | System hardening through configuration management | Preventive | |
Configure the TCP Maximum half-open sockets. CC ID 01801 | System hardening through configuration management | Preventive | |
Configure the TCP Maximum half-open retired sockets. CC ID 01802 | System hardening through configuration management | Preventive | |
Configure the number of dropped connect requests to a set maximum. CC ID 04272 | System hardening through configuration management | Preventive | |
Enable Internet Protocol Security to protect Kerberos RSVP communication. CC ID 01803 | System hardening through configuration management | Preventive | |
Configure the system to hide workstations from the network browser listing. CC ID 01804 | System hardening through configuration management | Preventive | |
Enable the safe DSS search mode. CC ID 01805 | System hardening through configuration management | Preventive | |
Disable WebDAV basic authentication (sp 2 only). CC ID 01806 | System hardening through configuration management | Preventive | |
Disable basic authentication over a clear channel (sp 2 only). CC ID 01807 | System hardening through configuration management | Preventive | |
Enable the usb block storage device policy (sp 2 only). CC ID 01808 | System hardening through configuration management | Preventive | |
Block the Distributed Transaction Coordinator service and set additional Distributed Transaction Coordinator parameters, if necessary. CC ID 01809 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software\Classes. CC ID 02010 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software. CC ID 02011 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\NetDDE. CC ID 02012 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\OS/2 Subsystem for NT. CC ID 02013 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows NT\CurrentVersion\AsrCommands. CC ID 02014 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib. CC ID 02015 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Group Policy. CC ID 02016 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Installer. CC ID 02017 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Policies. CC ID 02018 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System. CC ID 02019 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\Clone. CC ID 02020 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\ControlSet001. CC ID 02021 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\ControlSet00x. CC ID 02022 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Control\SecurePipeServers\WinReg. CC ID 02023 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Control\WMI\Security. CC ID 02024 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Enum. CC ID 02025 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Hardware Profiles. CC ID 02026 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Services\SNMP\Parameters\PermittedManagers. CC ID 02027 | System hardening through configuration management | Preventive | |
Set the registry permission for HKLM\System\CurrentControlSet\Services\SNMP\Parameters\ValidCommunities. CC ID 02028 | System hardening through configuration management | Preventive | |
Set the registry permission for HKU\.Default. CC ID 02029 | System hardening through configuration management | Preventive | |
Set the registry permission for HKU\.Default\Software\Microsoft\NetDDE. CC ID 02030 | System hardening through configuration management | Preventive | |
Set the registry permission for HKU\.Default\Software\Microsoft\Protected Storage System Provider. CC ID 02031 | System hardening through configuration management | Preventive | |
Set the registry permission for %SystemDrive%. CC ID 02032 | System hardening through configuration management | Preventive | |
Enable auditing for HKLM\Software and set its registry permission. CC ID 02033 | System hardening through configuration management | Preventive | |
Enable auditing for HKLM\System and set its registry permission. CC ID 02034 | System hardening through configuration management | Preventive | |
Configure the system to a set number of unacknowledged data retransmissions. CC ID 04271 | System hardening through configuration management | Preventive | |
Configure the system to remap folder types to Notepad. CC ID 04312 | System hardening through configuration management | Preventive | |
Configure the system to show hidden file types. CC ID 04313 | System hardening through configuration management | Preventive | |
Configure the "Do not process the legacy run list" setting. CC ID 04322 | System hardening through configuration management | Preventive | |
Configure the "Do not process the run once list" setting. CC ID 04323 | System hardening through configuration management | Preventive | |
Configure "Registry policy processing" to organizational standards. CC ID 04324 | System hardening through configuration management | Preventive | |
Configure the "Restrict Terminal Server users to a single remote session" setting to organizational standards. CC ID 04510 | System hardening through configuration management | Preventive | |
Configure the "Do not use temporary folders per session" setting to organizational standards. CC ID 04513 | System hardening through configuration management | Preventive | |
Configure the "Do not delete temp folder upon exit" setting to organizational standards. CC ID 04514 | System hardening through configuration management | Preventive | |
Configure the "Turn off background refresh of Group Policy" setting to organizational standards. CC ID 04520 | System hardening through configuration management | Preventive | |
Configure the "Configure Windows NTP Client" setting. CC ID 04522 | System hardening through configuration management | Preventive | |
Configure the "Disallow installation of printers using kernel-mode drivers" setting to organizational standards. CC ID 04523 | System hardening through configuration management | Preventive | |
Configure the "Prevent codec download" setting to organizational standards. CC ID 04524 | System hardening through configuration management | Preventive | |
Verify the Posix registry key does not exist. CC ID 04525 | System hardening through configuration management | Preventive | |
Configure the Recycle Bin to delete files on assets running Windows Server 2003. CC ID 04526 | System hardening through configuration management | Preventive | |
Configure the system to allow only administrators with permissions to change the security settings of Distributed Component Object Model objects. CC ID 04529 | System hardening through configuration management | Preventive | |
Configure the system to allow Distributed Component Object Model calls to be executed only under the calling user's security context. CC ID 04530 | System hardening through configuration management | Preventive | |
Configure the version string reported by the bind service properly. CC ID 05140 | System hardening through configuration management | Preventive | |
Enable or disable performing source validation by reverse path, as appropriate. CC ID 05141 | System hardening through configuration management | Preventive | |
Verify the environment variable "Os2LibPath" exists, as appropriate. CC ID 05142 | System hardening through configuration management | Preventive | |
Define the path to the Microsoft OS/2 version 1.x library properly. CC ID 05143 | System hardening through configuration management | Preventive | |
Set the "Specify intranet Microsoft update service location" properly. CC ID 05144 | System hardening through configuration management | Preventive | |
Set the path to the debugger used for Just-In-Time debugging properly. CC ID 05145 | System hardening through configuration management | Preventive | |
Set the OS/2 Subsystem location properly. CC ID 05146 | System hardening through configuration management | Preventive | |
Configure extended TCP reserved ports properly. CC ID 05147 | System hardening through configuration management | Preventive | |
Enable or disable ICMPv4 redirects, as appropriate. CC ID 05148 | System hardening through configuration management | Preventive | |
Enable or disable ICMPv6 redirects, as appropriate. CC ID 05149 | System hardening through configuration management | Preventive | |
Configure ICMP timestamp broadcast request responses properly. CC ID 05151 | System hardening through configuration management | Preventive | |
Configure Internet Control Message Protocol echo (ping) request responses properly. CC ID 05152 | System hardening through configuration management | Preventive | |
Configure ICMP netmask request responses properly. CC ID 05153 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_CLASSES_ROOT properly. CC ID 05154 | System hardening through configuration management | Preventive | |
Set the registry key HKLM\System\CurrentControlSet\Control\Session Manager\SubSystems\Os2 properly. CC ID 05155 | System hardening through configuration management | Preventive | |
Set the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AEDebug\Debugger properly. CC ID 05156 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Regfile\Shell\Open\Command properly. CC ID 05157 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography properly. CC ID 05158 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.hlp properly. CC ID 05159 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\helpfile properly. CC ID 05160 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing properly. CC ID 05161 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais properly. CC ID 05162 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell properly. CC ID 05163 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Telephony properly. CC ID 05164 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability properly. CC ID 05165 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell properly. CC ID 05166 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion properly. CC ID 05167 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech properly. CC ID 05168 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC properly. CC ID 05169 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EventSystem properly. CC ID 05170 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates properly. CC ID 05171 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports properly. CC ID 05172 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Driver Signing properly. CC ID 05173 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Policies properly. CC ID 05174 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor properly. CC ID 05175 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ads\Providers\WinNT properly. CC ID 05176 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\NWCOMPAT properly. CC ID 05177 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\NDS properly. CC ID 05178 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\LDAP\Extensions properly. CC ID 05179 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_USERS\.DEFAULT\Software\Microsoft\SystemCertificates\Root\ProtectedRoots properly. CC ID 05180 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager properly. CC ID 05181 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Help properly. CC ID 05182 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip properly. CC ID 05183 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Non-Driver Signing properly. CC ID 05184 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DeviceManager properly. CC ID 05185 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSrv\Security properly. CC ID 05186 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCP properly. CC ID 05187 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent properly. CC ID 05188 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security properly. CC ID 05189 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMI\Security properly. CC ID 05190 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Security properly. CC ID 05191 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TapiSrv\Security properly. CC ID 05192 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SCardSvr\Security properly. CC ID 05193 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Samss\Security properly. CC ID 05194 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Security properly. CC ID 05195 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetDDEdsdm\Security properly. CC ID 05196 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility properly. CC ID 05197 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kdc\Security properly. CC ID 05198 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AppMgmt\Security properly. CC ID 05199 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services properly. CC ID 05200 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers properly. CC ID 05201 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network properly. CC ID 05202 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\LSA\Data properly. CC ID 05203 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\GBG properly. CC ID 05204 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Skew1 properly. CC ID 05205 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\JD properly. CC ID 05206 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control properly. CC ID 05207 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\wbem properly. CC ID 05208 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetDDE\Security properly. CC ID 05209 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Font properly. CC ID 05210 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog properly. CC ID 05211 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares properly. CC ID 05212 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Windows 3.1 Migration Status properly. CC ID 05213 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Secure properly. CC ID 05214 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups properly. CC ID 05215 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon properly. CC ID 05216 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones properly. CC ID 05217 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping properly. CC ID 05218 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPS properly. CC ID 05219 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontMapper properly. CC ID 05220 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Compatibility properly. CC ID 05221 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AEDebug properly. CC ID 05222 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx properly. CC ID 05223 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce properly. CC ID 05224 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run properly. CC ID 05225 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows properly. CC ID 05226 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Secure properly. CC ID 05227 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RPC properly. CC ID 05228 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options properly. CC ID 05229 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole properly. CC ID 05230 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ProductOptions properly. CC ID 05231 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout properly. CC ID 05232 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex properly. CC ID 05233 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName properly. CC ID 05234 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy properly. CC ID 05235 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Schedule properly. CC ID 05236 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost properly. CC ID 05237 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SecEdit properly. CC ID 05238 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList properly. CC ID 05239 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\EFS properly. CC ID 05240 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32 properly. CC ID 05241 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Classes properly. CC ID 05242 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion properly. CC ID 05243 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates properly. CC ID 05244 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows properly. CC ID 05245 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole properly. CC ID 05246 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Printers properly. CC ID 05247 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies properly. CC ID 05248 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security\XAKey properly. CC ID 05249 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UPnP Device Host properly. CC ID 05250 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings properly. CC ID 05251 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class properly. CC ID 05252 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Security properly. CC ID 05253 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNSCache properly. CC ID 05254 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ersvc\Security properly. CC ID 05255 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IRENUM\Security properly. CC ID 05256 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netbt properly. CC ID 05257 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess properly. CC ID 05259 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Scarddrv\Security properly. CC ID 05260 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Stisvc\Security properly. CC ID 05261 | System hardening through configuration management | Preventive | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysmonLog\Log Queries properly. CC ID 05262 | System hardening through configuration management | Preventive | |
Configure the "audit the %SystemDrive% directory" setting to organizational standards. CC ID 10099 | System hardening through configuration management | Preventive | |
Configure the "audit the HKEY_LOCAL_MACHINESOFTWARE registry key" setting to organizational standards. CC ID 10100 | System hardening through configuration management | Preventive | |
Configure the "audit the HKEY_LOCAL_MACHINESYSTEM registry key" setting to organizational standards. CC ID 10101 | System hardening through configuration management | Preventive | |
Configure the "%ProgramFiles%" directory permissions to organizational standards. CC ID 10102 | System hardening through configuration management | Preventive | |
Configure the "%ProgramFiles%Resource Kit" directory permissions to organizational standards. CC ID 10103 | System hardening through configuration management | Preventive | |
Configure the "%ProgramFiles%Resource Pro Kit" directory permissions to organizational standards. CC ID 10104 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%" directory permissions to organizational standards. CC ID 10105 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%AUTOEXEC.BAT" file permissions to organizational standards. CC ID 10106 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%BOOT.INI" file permissions to organizational standards. CC ID 10107 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%CONFIG.SYS" file permissions to organizational standards. CC ID 10108 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%Documents and Settings" file permissions to organizational standards. CC ID 10109 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAdministrator" directory permissions to organizational standards. CC ID 10110 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAll Users" directory permissions to organizational standards. CC ID 10111 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAll UsersDocumentsDrWatson" directory permissions to organizational standards. CC ID 10112 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAll UsersDocumentsDrWatsondrwtsn32.log" file permissions to organizational standards. CC ID 10113 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%Documents and SettingsDefault User" directory permissions to organizational standards. CC ID 10114 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%IO.SYS" file permissions to organizational standards. CC ID 10115 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%MSDOS.SYS" file permissions to organizational standards. CC ID 10116 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%NTBOOTDD.SYS" file permissions to organizational standards. CC ID 10117 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%NTDETECT.COM" file permissions to organizational standards. CC ID 10118 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%NTLDR" file permissions to organizational standards. CC ID 10119 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%Temp" directory permissions to organizational standards. CC ID 10120 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%My Download Files" directory permissions to organizational standards. CC ID 10121 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%System Volume Information" file permissions to organizational standards. CC ID 10122 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%" directory permissions to organizational standards. CC ID 10123 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Driver CacheI386Driver.cab" directory permissions to organizational standards. CC ID 10124 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%$NtServicePackUninstall$" directory permissions to organizational standards. CC ID 10125 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%$NtServicePackUninstall$" directory permissions to organizational standards. CC ID 10126 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%$NtUninstall*" directories permissions to organizational standards. CC ID 10127 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%CSC" directory permissions to organizational standards. CC ID 10128 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Debug" directory permissions to organizational standards. CC ID 10129 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%DebugUserMode" directory permissions to organizational standards. CC ID 10130 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot% egedit.exe" file permissions to organizational standards. CC ID 10131 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%NTDS" directory permissions to organizational standards. CC ID 10132 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Offline Web Pages" directory permissions to organizational standards. CC ID 10133 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Registration" directory permissions to organizational standards. CC ID 10134 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot% epair" directory permissions to organizational standards. CC ID 10135 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%security" directory permissions to organizational standards. CC ID 10136 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%SYSVOL" directory permissions to organizational standards. CC ID 10137 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%SYSVOLdomainPolicies" directory permissions to organizational standards. CC ID 10138 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Temp" directory permissions to organizational standards. CC ID 10139 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32" directory permissions to organizational standards. CC ID 10140 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32arp.exe" directory permissions to organizational standards. CC ID 10141 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32at.exe" file permissions to organizational standards. CC ID 10142 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32CONFIG" file permissions to organizational standards. CC ID 10143 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32CONFIGAppEvent.evt" file permissions to organizational standards. CC ID 10144 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32CONFIG*.evt" file permissions to organizational standards. CC ID 10145 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32dllcache" directory permissions to organizational standards. CC ID 10146 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32DTCLog" directory permissions to organizational standards. CC ID 10147 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32GroupPolicy" directory permissions to organizational standards. CC ID 10148 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32ias" directory permissions to organizational standards. CC ID 10149 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32Ntbackup.exe" file permissions to organizational standards. CC ID 10150 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32NTMSData" directory permissions to organizational standards. CC ID 10151 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32Rcp.exe" file permissions to organizational standards. CC ID 10152 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32Regedt32.exe" file permissions to organizational standards. CC ID 10153 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%system32ReinstallBackups" directory permissions to organizational standards. CC ID 10154 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32Rexec.exe" file permissions to organizational standards. CC ID 10155 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32Rsh.exe" file permissions to organizational standards. CC ID 10156 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32Secedit.exe" file permissions to organizational standards. CC ID 10157 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32Setup" directory permissions to organizational standards. CC ID 10158 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 epl" directory permissions to organizational standards. CC ID 10159 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 eplexport" directory permissions to organizational standards. CC ID 10160 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 eplimport" directory permissions to organizational standards. CC ID 10161 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32spoolPrinters" directory permissions to organizational standards. CC ID 10162 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Tasks" directory permissions to organizational standards. CC ID 10163 | System hardening through configuration management | Preventive | |
Configure the "%ALL%Program FilesMQSeries" directory permissions to organizational standards. CC ID 10164 | System hardening through configuration management | Preventive | |
Configure the "%ALL%Program FilesMQSeriesqmggr" directory permissions to organizational standards. CC ID 10165 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%Documents and SettingsAll UsersApplication DataMicrosoftHTML Help ACL" directory permissions to organizational standards. CC ID 10166 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%WINNTSECURITYDatabaseSECEDIT.SDB ACL" directory permissions to organizational standards. CC ID 10167 | System hardening through configuration management | Preventive | |
Configure the "HKEY_CLASSES_ROOT" registry key permissions to organizational standards. CC ID 10168 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWARE" registry key permissions to organizational standards. CC ID 10169 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasses" registry key permissions to organizational standards. CC ID 10170 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClassesRegfileShellOpenCommand" registry key permissions to organizational standards. CC ID 10171 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftNetDDE" registry key permissions to organizational standards. CC ID 10172 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftOS/2 Subsystem for NT" registry key permissions to organizational standards. CC ID 10173 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAsrCommands" registry key permissions to organizational standards. CC ID 10174 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionPerflib" registry key permissions to organizational standards. CC ID 10175 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionGroup Policy" registry key permissions to organizational standards. CC ID 10176 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInstaller" registry key permissions to organizational standards. CC ID 10177 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPolicies" registry key permissions to organizational standards. CC ID 10178 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEM" registry key permissions to organizational standards. CC ID 10179 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMclone" registry key permissions to organizational standards. CC ID 10180 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset001" registry key permissions to organizational standards. CC ID 10181 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset002" registry key permissions to organizational standards. CC ID 10182 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset003" registry key permissions to organizational standards. CC ID 10183 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset004" registry key permissions to organizational standards. CC ID 10184 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset005" registry key permissions to organizational standards. CC ID 10185 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset006" registry key permissions to organizational standards. CC ID 10186 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset007" registry key permissions to organizational standards. CC ID 10187 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset008" registry key permissions to organizational standards. CC ID 10188 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset009" registry key permissions to organizational standards. CC ID 10189 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset010" registry key permissions to organizational standards. CC ID 10190 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurePipeServerswinreg" registry key permissions to organizational standards. CC ID 10191 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlWmiSecurity" registry key permissions to organizational standards. CC ID 10192 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnum" registry key permissions to organizational standards. CC ID 10193 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetHardware Profiles" registry key permissions to organizational standards. CC ID 10194 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSNMPParametersPermittedManagers" registry key permissions to organizational standards. CC ID 10195 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSNMPParametersValidCommunities" registry key permissions to organizational standards. CC ID 10196 | System hardening through configuration management | Preventive | |
Configure the "HKEY_USERS.DEFAULT " registry key permissions to organizational standards. CC ID 10197 | System hardening through configuration management | Preventive | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftNetDDE" registry key permissions to organizational standards. CC ID 10198 | System hardening through configuration management | Preventive | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftProtected Storage System Provider" registry key permissions to organizational standards. CC ID 10199 | System hardening through configuration management | Preventive | |
Configure the "HKEY_CLASSES_ROOT" registry key permissions to organizational standards. CC ID 10200 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 unas.exe" file permissions to organizational standards. CC ID 10222 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAEDebugDebugger" registry key to organizational standards. CC ID 10233 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%perflogs" directory permissions to organizational standards. CC ID 10266 | System hardening through configuration management | Preventive | |
Configure the "%SystemDrive%i386" directory permissions to organizational standards. CC ID 10267 | System hardening through configuration management | Preventive | |
Configure the "%ProgramFiles%Common FilesSpeechEnginesTTS" directory permissions to organizational standards. CC ID 10268 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%\_default.plf" file permissions to organizational standards. CC ID 10269 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%addins" directory permissions to organizational standards. CC ID 10270 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%appPatch" directory permissions to organizational standards. CC ID 10271 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%clock.avi" file permissions to organizational standards. CC ID 10272 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Connection Wizard" directory permissions to organizational standards. CC ID 10273 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Driver Cache" file permissions to organizational standards. CC ID 10274 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%explorer.scf" file permissions to organizational standards. CC ID 10275 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%explorer.exe" file permissions to organizational standards. CC ID 10276 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Help" directory permissions to organizational standards. CC ID 10277 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%infunregmp2.exe" file permissions to organizational standards. CC ID 10278 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Java" directory permissions to organizational standards. CC ID 10279 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%mib.bin" file permissions to organizational standards. CC ID 10280 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%msagent" directory permissions to organizational standards. CC ID 10281 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%msdfmap.ini" file permissions to organizational standards. CC ID 10282 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%mui" directory permissions to organizational standards. CC ID 10283 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%security emplates" directory permissions to organizational standards. CC ID 10284 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%speech" directory permissions to organizational standards. CC ID 10285 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%system.ini" file permissions to organizational standards. CC ID 10286 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%systemsetup.inf" file permissions to organizational standards. CC ID 10287 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%systemstdole.tlb" file permissions to organizational standards. CC ID 10288 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot% wain_32" directory permissions to organizational standards. CC ID 10289 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32cacls.exe" directory permissions to organizational standards. CC ID 10290 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32attrib.exe" directory permissions to organizational standards. CC ID 10291 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32CatRoot" directory permissions to organizational standards. CC ID 10292 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32configsystemprofile" directory permissions to organizational standards. CC ID 10293 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32debug.exe" file permissions to organizational standards. CC ID 10294 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32dhcp" directory permissions to organizational standards. CC ID 10295 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32drivers" directory permissions to organizational standards. CC ID 10296 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32eventtriggers.exe" file permissions to organizational standards. CC ID 10297 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32edlin.exe" file permissions to organizational standards. CC ID 10298 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32eventcreate.exe" file permissions to organizational standards. CC ID 10299 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32Export" directory permissions to organizational standards. CC ID 10300 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32ipconfig.exe" file permissions to organizational standards. CC ID 10301 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32\nslookup.exe" file permissions to organizational standards CC ID 10302 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 etstat.exe" file permissions to organizational standards. CC ID 10303 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 btstat.exe" file permissions to organizational standards. CC ID 10304 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32ftp.exe" file permissions to organizational standards. CC ID 10305 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32LogFiles" directory permissions to organizational standards. CC ID 10306 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32mshta.exe" file permissions to organizational standards. CC ID 10307 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32mui" directory permissions to organizational standards. CC ID 10308 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 et.exe" file permissions to organizational standards. CC ID 10309 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 etsh.exe" file permissions to organizational standards. CC ID 10310 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 et1.exe" file permissions to organizational standards. CC ID 10311 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 eg.exe" file permissions to organizational standards. CC ID 10312 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 egini.exe" file permissions to organizational standards. CC ID 10313 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 egsvr32.exe" file permissions to organizational standards. CC ID 10314 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 oute.exe" file permissions to organizational standards. CC ID 10315 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32sc.exe" file permissions to organizational standards. CC ID 10316 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32ShellExt" directory permissions to organizational standards. CC ID 10317 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32subst.exe" file permissions to organizational standards. CC ID 10318 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32systeminfo.exe" file permissions to organizational standards. CC ID 10319 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 elnet.exe" file permissions to organizational standards. CC ID 10320 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 ftp.exe" file permissions to organizational standards. CC ID 10321 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32wbem" directory permissions to organizational standards. CC ID 10322 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32 lntsvr.exe" file permissions to organizational standards. CC ID 10323 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32wbemmof" directory permissions to organizational standards. CC ID 10324 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32wbem epository" directory permissions to organizational standards. CC ID 10325 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32wbemlogs" directory permissions to organizational standards. CC ID 10326 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptography" registry key permissions to organizational standards. CC ID 10327 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasses.hlp" registry key permissions to organizational standards. CC ID 10328 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasseshelpfile" registry key permissions to organizational standards. CC ID 10329 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftTracing" registry key permissions to organizational standards. CC ID 10330 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyCalais" registry key permissions to organizational standards. CC ID 10331 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionShell" registry key permissions to organizational standards. CC ID 10332 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionTelephony" registry key permissions to organizational standards. CC ID 10333 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionReliability" registry key permissions to organizational standards. CC ID 10334 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerUser Shell" registry key permissions to organizational standards. CC ID 10335 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion" registry key permissions to organizational standards. CC ID 10336 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSpeech" registry key permissions to organizational standards. CC ID 10337 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftMSDTC" registry key permissions to organizational standards. CC ID 10338 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftEventSystem" registry key permissions to organizational standards. CC ID 10339 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftEnterpriseCertificates" registry key permissions to organizational standards. CC ID 10340 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionPorts" registry key permissions to organizational standards. CC ID 10341 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftDriver Signing" registry key permissions to organizational standards. CC ID 10342 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREPolicies" registry key permissions to organizational standards. CC ID 10343 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor" registry key permissions to organizational standards. CC ID 10344 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftAdsProvidersWinNT" registry key permissions to organizational standards. CC ID 10345 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersNWCOMPAT" registry key permissions to organizational standards. CC ID 10346 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersNDS" registry key permissions to organizational standards. CC ID 10347 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersLDAPExtensions" registry key permissions to organizational standards. CC ID 10348 | System hardening through configuration management | Preventive | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftSystemCertificatesRootProtectedRoots" registry key permissions to organizational standards. CC ID 10349 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession Manager" registry key permissions to organizational standards. CC ID 10350 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsHelp" registry key permissions to organizational standards. CC ID 10351 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpip" registry key permissions to organizational standards. CC ID 10352 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftNon-Driver Signing" registry key permissions to organizational standards. CC ID 10353 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftDeviceManager" registry key permissions to organizational standards. CC ID 10354 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesClipSrvSecurity" registry key permissions to organizational standards. CC ID 10355 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesDHCP" registry key permissions to organizational standards. CC ID 10356 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlServiceCurrent" registry key permissions to organizational standards. CC ID 10357 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLogSecurity" registry key permissions to organizational standards. CC ID 10358 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWMISecurity" registry key permissions to organizational standards. CC ID 10359 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeSecurity" registry key permissions to organizational standards. CC ID 10360 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTapiSrvSecurity" registry key permissions to organizational standards. CC ID 10361 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSCardSvrSecurity" registry key permissions to organizational standards. CC ID 10362 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSamssSecurity" registry key permissions to organizational standards. CC ID 10363 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesRpcSsSecurity" registry key permissions to organizational standards. CC ID 10364 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNetDDEdsdmSecurity" registry key permissions to organizational standards. CC ID 10365 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAccessibility" registry key permissions to organizational standards. CC ID 10366 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServiceskdcSecurity" registry key permissions to organizational standards. CC ID 10367 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesAppMgmtSecurity" registry key permissions to organizational standards. CC ID 10368 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices" registry key permissions to organizational standards. CC ID 10369 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurePipeServers" registry key permissions to organizational standards. CC ID 10370 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlNetwork" registry key permissions to organizational standards. CC ID 10371 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAData" registry key permissions to organizational standards. CC ID 10372 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAGBG" registry key permissions to organizational standards. CC ID 10373 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSASkew1" registry key permissions to organizational standards. CC ID 10374 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAJD" registry key permissions to organizational standards. CC ID 10375 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControl" registry key permissions to organizational standards. CC ID 10376 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftwbem" registry key permissions to organizational standards. CC ID 10377 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNetDDESecurity" registry key permissions to organizational standards. CC ID 10378 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionFont" registry key permissions to organizational standards. CC ID 10379 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLog" registry key permissions to organizational standards. CC ID 10380 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerShares" registry key permissions to organizational standards. CC ID 10381 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREWindows 3.1 Migration Status" registry key permissions to organizational standards. CC ID 10382 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWARESecure" registry key permissions to organizational standards. CC ID 10383 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREProgram Groups" registry key permissions to organizational standards. CC ID 10384 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon" registry key permissions to organizational standards. CC ID 10385 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTime Zones" registry key permissions to organizational standards. CC ID 10386 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIniFileMapping" registry key permissions to organizational standards. CC ID 10387 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUPS" registry key permissions to organizational standards. CC ID 10388 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionFontMapper" registry key permissions to organizational standards. CC ID 10389 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionCompatibility" registry key permissions to organizational standards. CC ID 10390 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAEDebug" registry key permissions to organizational standards. CC ID 10391 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunOnceEx" registry key permissions to organizational standards. CC ID 10392 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunOnce" registry key permissions to organizational standards. CC ID 10393 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun" registry key permissions to organizational standards. CC ID 10394 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows" registry key permissions to organizational standards. CC ID 10395 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecure" registry key permissions to organizational standards. CC ID 10396 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftRPC" registry key permissions to organizational standards. CC ID 10397 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options" registry key permissions to organizational standards. CC ID 10398 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSetupRecoveryConsole" registry key permissions to organizational standards. CC ID 10399 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlProductOptions" registry key permissions to organizational standards. CC ID 10400 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlKeyboard Layout" registry key permissions to organizational standards. CC ID 10401 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlContentIndex" registry key permissions to organizational standards. CC ID 10402 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlComputerName" registry key permissions to organizational standards. CC ID 10403 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionGroup Policy" registry key permissions to organizational standards. CC ID 10404 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSchedule" registry key permissions to organizational standards. CC ID 10405 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSvchost" registry key permissions to organizational standards. CC ID 10406 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSecEdit" registry key permissions to organizational standards. CC ID 10407 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionProfileList" registry key permissions to organizational standards. CC ID 10408 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionEFS" registry key permissions to organizational standards. CC ID 10409 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionDrivers32" registry key permissions to organizational standards. CC ID 10410 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionClasses" registry key permissions to organizational standards. CC ID 10411 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion" registry key permissions to organizational standards. CC ID 10412 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSystemCertificates" registry key permissions to organizational standards. CC ID 10413 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows" registry key permissions to organizational standards. CC ID 10414 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%Web" directory permissions to organizational standards. CC ID 10415 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle" registry key permissions to organizational standards. CC ID 10416 | System hardening through configuration management | Preventive | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlPrintPrinters" registry key permissions to organizational standards. CC ID 10417 | System hardening through configuration management | Preventive | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftWindowsCurrentVersionPolicies" registry key permissions to organizational standards. CC ID 10418 | System hardening through configuration management | Preventive | |
Apply the appropriate warning message to systems. CC ID 01596 | System hardening through configuration management | Preventive | |
Create a warning message for standard logon services. CC ID 01597 | System hardening through configuration management | Preventive | |
Create a warning message for graphical logons. CC ID 01598 | System hardening through configuration management | Preventive | |
Create a warning message for terminal session logons. CC ID 06564 | System hardening through configuration management | Preventive | |
Create a warning message for FTP daemon. CC ID 01599 | System hardening through configuration management | Preventive | |
Create a warning message for telnet daemon. CC ID 01600 | System hardening through configuration management | Preventive | |
Create a power on warning message. CC ID 01601 | System hardening through configuration management | Preventive | |
Enable the Kerberos TGT expiration warning, as appropriate. CC ID 05263 | System hardening through configuration management | Preventive | |
Configure the sendmail greeting properly. CC ID 05264 | System hardening through configuration management | Preventive | |
Set the Electrically-Erasable Programmable Read-Only Memory warning message properly. CC ID 05265 | System hardening through configuration management | Preventive | |
Set the warning messages switchpoint distance to an appropriate value. CC ID 05266 | System hardening through configuration management | Preventive | |
Enable logon authentication management techniques. CC ID 00553 | System hardening through configuration management | Preventive | |
Configure the system to log all access attempts to all systems. CC ID 00554 | System hardening through configuration management | Preventive | |
Configure devices and users to re-authenticate, as necessary. CC ID 10609 | System hardening through configuration management | Preventive | |
Configure the "Lockout Enabled" setting to organizational standards. CC ID 09859 | System hardening through configuration management | Preventive | |
Prohibit the use of cached authenticators and credentials after a defined period of time. CC ID 10610 | System hardening through configuration management | Preventive | |
Configure authenticators to comply with organizational standards. CC ID 06412 | System hardening through configuration management | Preventive | |
Configure the system to require new users to change their authenticator on first use. CC ID 05268 | System hardening through configuration management | Preventive | |
Configure authenticators so that group authenticators or shared authenticators are prohibited. CC ID 00519 | System hardening through configuration management | Preventive | |
Configure the system to prevent unencrypted authenticator use. CC ID 04457 | System hardening through configuration management | Preventive | |
Disable store passwords using reversible encryption. CC ID 01708 | System hardening through configuration management | Preventive | |
Configure the system to encrypt authenticators. CC ID 06735 | System hardening through configuration management | Preventive | |
Configure the system to mask authenticators. CC ID 02037 | System hardening through configuration management | Preventive | |
Configure the authenticator policy to ban the use of usernames or user identifiers in authenticators. CC ID 05992 | System hardening through configuration management | Preventive | |
Configure the system to refrain from specifying the type of information used as password hints. CC ID 13783 | System hardening through configuration management | Preventive | |
Disable machine account password changes. CC ID 01737 | System hardening through configuration management | Preventive | |
Configure the "Disable Remember Password" setting. CC ID 05270 | System hardening through configuration management | Preventive | |
Configure the "Minimum password age" to organizational standards. CC ID 01703 | System hardening through configuration management | Preventive | |
Configure the LILO/GRUB password. CC ID 01576 | System hardening through configuration management | Preventive | |
Configure the system to use Apple's Keychain Access to store passwords and certificates. CC ID 04481 | System hardening through configuration management | Preventive | |
Change the default password to Apple's Keychain. CC ID 04482 | System hardening through configuration management | Preventive | |
Configure Apple's Keychain items to ask for the Keychain password. CC ID 04483 | System hardening through configuration management | Preventive | |
Configure the Syskey Encryption Key and associated password. CC ID 05978 | System hardening through configuration management | Preventive | |
Configure the "Accounts: Limit local account use of blank passwords to console logon only" setting. CC ID 04505 | System hardening through configuration management | Preventive | |
Configure the "System cryptography: Force strong key protection for user keys stored in the computer" setting. CC ID 04534 | System hardening through configuration management | Preventive | |
Configure interactive logon for accounts that do not have assigned authenticators in accordance with organizational standards. CC ID 05267 | System hardening through configuration management | Preventive | |
Enable or disable remote connections from accounts with empty authenticators, as appropriate. CC ID 05269 | System hardening through configuration management | Preventive | |
Configure the "Send LanMan compatible password" setting. CC ID 05271 | System hardening through configuration management | Preventive | |
Configure the authenticator policy to ban or allow authenticators as words found in dictionaries, as appropriate. CC ID 05993 | System hardening through configuration management | Preventive | |
Set the most number of characters required for the BitLocker Startup PIN correctly. CC ID 06054 | System hardening through configuration management | Preventive | |
Set the default folder for BitLocker recovery passwords correctly. CC ID 06055 | System hardening through configuration management | Preventive | |
Configure the "Disable password strength validation for Peer Grouping" setting to organizational standards. CC ID 10866 | System hardening through configuration management | Preventive | |
Configure the "Set the interval between synchronization retries for Password Synchronization" setting to organizational standards. CC ID 11185 | System hardening through configuration management | Preventive | |
Configure the "Set the number of synchronization retries for servers running Password Synchronization" setting to organizational standards. CC ID 11187 | System hardening through configuration management | Preventive | |
Configure the "Turn off password security in Input Panel" setting to organizational standards. CC ID 11296 | System hardening through configuration management | Preventive | |
Configure the "Turn on the Windows to NIS password synchronization for users that have been migrated to Active Directory" setting to organizational standards. CC ID 11355 | System hardening through configuration management | Preventive | |
Configure the authenticator display screen to organizational standards. CC ID 13794 | System hardening through configuration management | Preventive | |
Configure the authenticator field to disallow memorized secrets found in the memorized secret list. CC ID 13808 | System hardening through configuration management | Preventive | |
Configure the authenticator display screen to display the memorized secret as an option. CC ID 13806 | System hardening through configuration management | Preventive | |
Configure the look-up secret authenticator to dispose of memorized secrets after their use. CC ID 13817 | System hardening through configuration management | Corrective | |
Configure the memorized secret verifiers to refrain from allowing anonymous users to access memorized secret hints. CC ID 13823 | System hardening through configuration management | Preventive | |
Configure the system to allow paste functionality for the authenticator field. CC ID 13819 | System hardening through configuration management | Preventive | |
Configure the system to require successful authentication before an authenticator for a user account is changed. CC ID 13821 | System hardening through configuration management | Preventive | |
Obscure authentication information during the login process. CC ID 15316 | System hardening through configuration management | Preventive | |
Change authenticators, as necessary. CC ID 15315 | System hardening through configuration management | Preventive | |
Change all default authenticators. CC ID 15309 [{default password} {default account} Review whether management has the following: A process to change or disable default user accounts and passwords. App A Objective 6.20.e Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | System hardening through configuration management | Preventive | |
Configure the system to issue a security alert when an administrator account is created. CC ID 12122 | System hardening through configuration management | Preventive | |
Configure the system security parameters to prevent system misuse or information misappropriation. CC ID 00881 | System hardening through configuration management | Preventive | |
Configure Hypertext Transfer Protocol headers in accordance with organizational standards. CC ID 16851 | System hardening through configuration management | Preventive | |
Configure Hypertext Transfer Protocol security headers in accordance with organizational standards. CC ID 16488 | System hardening through configuration management | Preventive | |
Configure "Enable Structured Exception Handling Overwrite Protection (SEHOP)" to organizational standards. CC ID 15385 | System hardening through configuration management | Preventive | |
Configure Microsoft Attack Surface Reduction rules in accordance with organizational standards. CC ID 16478 | System hardening through configuration management | Preventive | |
Configure "Remote host allows delegation of non-exportable credentials" to organizational standards. CC ID 15379 | System hardening through configuration management | Preventive | |
Configure "Configure enhanced anti-spoofing" to organizational standards. CC ID 15376 | System hardening through configuration management | Preventive | |
Configure "Block user from showing account details on sign-in" to organizational standards. CC ID 15374 | System hardening through configuration management | Preventive | |
Configure "Configure Attack Surface Reduction rules" to organizational standards. CC ID 15370 | System hardening through configuration management | Preventive | |
Configure "Turn on e-mail scanning" to organizational standards. CC ID 15361 | System hardening through configuration management | Preventive | |
Configure "Prevent users and apps from accessing dangerous websites" to organizational standards. CC ID 15359 | System hardening through configuration management | Preventive | |
Configure "Enumeration policy for external devices incompatible with Kernel DMA Protection" to organizational standards. CC ID 15352 | System hardening through configuration management | Preventive | |
Configure "Prevent Internet Explorer security prompt for Windows Installer scripts" to organizational standards. CC ID 15351 | System hardening through configuration management | Preventive | |
Store state information from applications and software separately. CC ID 14767 | System hardening through configuration management | Preventive | |
Configure the "aufs storage" to organizational standards. CC ID 14461 | System hardening through configuration management | Preventive | |
Configure the "AppArmor Profile" to organizational standards. CC ID 14496 | System hardening through configuration management | Preventive | |
Configure the "device" argument to organizational standards. CC ID 14536 | System hardening through configuration management | Preventive | |
Configure the "Docker" group ownership to organizational standards. CC ID 14495 | System hardening through configuration management | Preventive | |
Configure the "Docker" user ownership to organizational standards. CC ID 14505 | System hardening through configuration management | Preventive | |
Configure "Allow upload of User Activities" to organizational standards. CC ID 15338 | System hardening through configuration management | Preventive | |
Configure the system to restrict Core dumps to a protected directory. CC ID 01513 | System hardening through configuration management | Preventive | |
Configure the system to enable Stack protection. CC ID 01514 | System hardening through configuration management | Preventive | |
Configure the system to restrict NFS client requests to privileged ports. CC ID 01515 | System hardening through configuration management | Preventive | |
Configure the system to use better TCP Sequence Numbers. CC ID 01516 | System hardening through configuration management | Preventive | |
Configure the system to a default secure level. CC ID 01519 | System hardening through configuration management | Preventive | |
Configure the system to block users from viewing un-owned processes. CC ID 01520 | System hardening through configuration management | Preventive | |
Configure the system to block users from viewing processes in other groups. CC ID 01521 | System hardening through configuration management | Preventive | |
Add the "nosuid" option to /etc/rmmount.conf. CC ID 01532 | System hardening through configuration management | Preventive | |
Configure the system to block non-privileged mountd requests. CC ID 01533 | System hardening through configuration management | Preventive | |
Use host-based or Internet Protocol-based export lists for mountd. CC ID 06887 | System hardening through configuration management | Preventive | |
Add the "nodev" option to the appropriate partitions in /etc/fstab. CC ID 01534 | System hardening through configuration management | Preventive | |
Add the "nosuid" option and "nodev" option for removable storage media in the /etc/fstab file. CC ID 01535 | System hardening through configuration management | Preventive | |
Configure the sticky bit on world-writable directories. CC ID 01540 | System hardening through configuration management | Preventive | |
Run hp_checkperms. CC ID 01548 | System hardening through configuration management | Preventive | |
Run fix-modes. CC ID 01549 | System hardening through configuration management | Preventive | |
Convert the system to "Trusted Mode", if possible. CC ID 01550 | System hardening through configuration management | Preventive | |
Configure the sadmind service to a higher Security level. CC ID 01551 | System hardening through configuration management | Preventive | |
Use host-based or Internet Protocol-based export lists for sadmind. CC ID 06886 | System hardening through configuration management | Preventive | |
Configure all.rhosts files to be readable only by their owners. CC ID 01557 | System hardening through configuration management | Preventive | |
Set the symlink /etc/hosts.equiv file to /dev/null. CC ID 01558 | System hardening through configuration management | Preventive | |
Configure the default locking Screen saver timeout to a predetermined time period. CC ID 01570 | System hardening through configuration management | Preventive | |
Configure the Security Center (Domain PCs only). CC ID 01967 | System hardening through configuration management | Preventive | |
Configure the system to immediately protect the computer after the Screen saver is activated by setting the time before the Screen saver grace period expires to a predefined amount. CC ID 04276 | System hardening through configuration management | Preventive | |
Configure the system to require a password before it unlocks the Screen saver software. CC ID 04443 | System hardening through configuration management | Preventive | |
Enable the safe DLL search mode. CC ID 04273 | System hardening through configuration management | Preventive | |
Configure the computer to stop generating 8.3 filename formats. CC ID 04274 | System hardening through configuration management | Preventive | |
Configure the system to use certificate rules for software restriction policies. CC ID 04266 | System hardening through configuration management | Preventive | |
Configure the "Do not allow drive redirection" setting. CC ID 04316 | System hardening through configuration management | Preventive | |
Configure the "Turn off the 'Publish to Web' task for files and folders" setting. CC ID 04328 | System hardening through configuration management | Preventive | |
Configure the "Turn off Internet download for Web publishing and online ordering wizards" setting. CC ID 04329 | System hardening through configuration management | Preventive | |
Configure the "Turn off Search Companion content file updates" setting. CC ID 04331 | System hardening through configuration management | Preventive | |
Configure the "Turn off printing over HTTP" setting. CC ID 04332 | System hardening through configuration management | Preventive | |
Configure the "Turn off downloading of print drivers over HTTP" setting. CC ID 04333 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Update device driver searching" setting. CC ID 04334 | System hardening through configuration management | Preventive | |
Configure the "Display Error Notification" setting to organizational standards. CC ID 04335 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows error reporting" setting to organizational standards. CC ID 04336 | System hardening through configuration management | Preventive | |
Configure the "Disable software update shell notifications on program launch" setting. CC ID 04339 | System hardening through configuration management | Preventive | |
Configure the "Make proxy settings per-machine (rather than per-user)" setting. CC ID 04341 | System hardening through configuration management | Preventive | |
Configure the "Security Zones: Do not allow users to add/delete sites" setting. CC ID 04342 | System hardening through configuration management | Preventive | |
Configure the "Security Zones: Do not allow users to change policies" setting. CC ID 04343 | System hardening through configuration management | Preventive | |
Configure the "Security Zones: Use only machine settings" setting. CC ID 04344 | System hardening through configuration management | Preventive | |
Configure the "Allow software to run or install even if the signature is invalid" setting. CC ID 04346 | System hardening through configuration management | Preventive | |
Configure the "internet explorer processes (scripted window security restrictions)" setting. CC ID 04350 | System hardening through configuration management | Preventive | |
Configure the "internet explorer processes (zone elevation protection)" setting. CC ID 04351 | System hardening through configuration management | Preventive | |
Configure the "Prevent access to registry editing tools" setting. CC ID 04355 | System hardening through configuration management | Preventive | |
Configure the "Do not preserve zone information in file attachments" setting. CC ID 04357 | System hardening through configuration management | Preventive | |
Configure the "Hide mechanisms to remove zone information" setting. CC ID 04358 | System hardening through configuration management | Preventive | |
Configure the "Notify antivirus programs when opening attachments" setting. CC ID 04359 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook Express" setting. CC ID 04360 | System hardening through configuration management | Preventive | |
Configure the "Disable Changing Automatic Configuration settings" setting. CC ID 04361 | System hardening through configuration management | Preventive | |
Configure the "Disable changing certificate settings" setting. CC ID 04362 | System hardening through configuration management | Preventive | |
Configure the "Disable changing connection settings" setting. CC ID 04363 | System hardening through configuration management | Preventive | |
Configure the "Disable changing proxy settings" setting. CC ID 04364 | System hardening through configuration management | Preventive | |
Configure the "Turn on the auto-complete feature for user names and passwords on forms" setting. CC ID 04365 | System hardening through configuration management | Preventive | |
Configure the NetWare bindery contexts. CC ID 04444 | System hardening through configuration management | Preventive | |
Configure the NetWare console's SECURE.NCF settings. CC ID 04445 | System hardening through configuration management | Preventive | |
Configure the CPU Hog Timeout setting. CC ID 04446 | System hardening through configuration management | Preventive | |
Configure the "Check Equivalent to Me" setting. CC ID 04463 | System hardening through configuration management | Preventive | |
Configure the /etc/sshd_config file. CC ID 04475 | System hardening through configuration management | Preventive | |
Configure the .Mac preferences. CC ID 04484 | System hardening through configuration management | Preventive | |
Configure the Fast User Switching setting. CC ID 04485 | System hardening through configuration management | Preventive | |
Configure the Recent Items List (servers, applications, documents) setting. CC ID 04486 | System hardening through configuration management | Preventive | |
Configure Apple's Dock preferences. CC ID 04487 | System hardening through configuration management | Preventive | |
Configure the "ulimit" to organizational standards. CC ID 14499 | System hardening through configuration management | Preventive | |
Configure the Energy Saver preferences. CC ID 04488 | System hardening through configuration management | Preventive | |
Configure the local system search preferences to directories that do not contain restricted data or restricted information. CC ID 04492 | System hardening through configuration management | Preventive | |
Configure the computer-wide, rather than per-user, use of Microsoft Spynet Reporting for Windows Defender properly. CC ID 05282 | System hardening through configuration management | Preventive | |
Enable or disable the ability of users to perform interactive startups, as appropriate. CC ID 05283 | System hardening through configuration management | Preventive | |
Set the /etc/passwd file's NIS file inclusions properly. CC ID 05284 | System hardening through configuration management | Preventive | |
Configure the "Turn off Help Ratings" setting. CC ID 05285 | System hardening through configuration management | Preventive | |
Configure the "Decoy Admin Account Not Disabled" policy properly. CC ID 05286 | System hardening through configuration management | Preventive | |
Configure the "Additional restrictions for anonymous connections" policy properly. CC ID 05287 | System hardening through configuration management | Preventive | |
Configure the "Anonymous access to the registry" policy properly. CC ID 05288 | System hardening through configuration management | Preventive | |
Configure the File System Checker and Popups setting. CC ID 05289 | System hardening through configuration management | Preventive | |
Configure the System File Checker setting. CC ID 05290 | System hardening through configuration management | Preventive | |
Configure the System File Checker Progress Meter setting. CC ID 05291 | System hardening through configuration management | Preventive | |
Configure the Protect Kernel object attributes properly. CC ID 05292 | System hardening through configuration management | Preventive | |
Configure the "Deleted Cached Copies of Roaming Profiles" policy properly. CC ID 05293 | System hardening through configuration management | Preventive | |
Verify that the X*.hosts file lists all authorized X-clients. CC ID 05294 | System hardening through configuration management | Preventive | |
Verify all files are owned by an existing account and group. CC ID 05295 | System hardening through configuration management | Preventive | |
Verify programs executed through the aliases file are owned by an appropriate user or group. CC ID 05296 | System hardening through configuration management | Preventive | |
Verify programs executed through the aliases file are stored in a directory with an appropriate owner. CC ID 05297 | System hardening through configuration management | Preventive | |
Verify the at directory is owned by an appropriate user or group. CC ID 05298 | System hardening through configuration management | Preventive | |
Verify the at.allow file is owned by an appropriate user or group. CC ID 05299 | System hardening through configuration management | Preventive | |
Verify the at.deny file is owned by an appropriate user or group. CC ID 05300 | System hardening through configuration management | Preventive | |
Verify the crontab directories are owned by an appropriate user or group. CC ID 05302 | System hardening through configuration management | Preventive | |
Verify the cron.allow file is owned by an appropriate user or group. CC ID 05303 | System hardening through configuration management | Preventive | |
Verify the cron.deny file is owned by an appropriate user or group. CC ID 05304 | System hardening through configuration management | Preventive | |
Verify crontab files are owned by an appropriate user or group. CC ID 05305 | System hardening through configuration management | Preventive | |
Verify the /etc/resolv.conf file is owned by an appropriate user or group. CC ID 05306 | System hardening through configuration management | Preventive | |
Verify the /etc/named.boot file is owned by an appropriate user or group. CC ID 05307 | System hardening through configuration management | Preventive | |
Verify the /etc/named.conf file is owned by an appropriate user or group. CC ID 05308 | System hardening through configuration management | Preventive | |
Verify the /var/named/chroot/etc/named.conf file is owned by an appropriate user or group. CC ID 05309 | System hardening through configuration management | Preventive | |
Verify home directories are owned by an appropriate user or group. CC ID 05310 | System hardening through configuration management | Preventive | |
Verify the inetd.conf file is owned by an appropriate user or group. CC ID 05311 | System hardening through configuration management | Preventive | |
Verify /etc/exports are owned by an appropriate user or group. CC ID 05312 | System hardening through configuration management | Preventive | |
Verify exported files and exported directories are owned by an appropriate user or group. CC ID 05313 | System hardening through configuration management | Preventive | |
Verify the /etc/services file is owned by an appropriate user or group. CC ID 05314 | System hardening through configuration management | Preventive | |
Verify the /etc/notrouter file is owned by an appropriate user or group. CC ID 05315 | System hardening through configuration management | Preventive | |
Verify the /etc/samba/smb.conf file is owned by an appropriate user or group. CC ID 05316 | System hardening through configuration management | Preventive | |
Verify the smbpasswd file and smbpasswd executable are owned by an appropriate user or group. CC ID 05317 | System hardening through configuration management | Preventive | |
Verify the aliases file is owned by an appropriate user or group. CC ID 05318 | System hardening through configuration management | Preventive | |
Verify Shell files are owned by an appropriate user or group. CC ID 05320 | System hardening through configuration management | Preventive | |
Verify the snmpd.conf file is owned by an appropriate user or group. CC ID 05321 | System hardening through configuration management | Preventive | |
Verify the /etc/syslog.conf file is owned by an appropriate user or group. CC ID 05322 | System hardening through configuration management | Preventive | |
Verify the traceroute executable is owned by an appropriate user or group. CC ID 05323 | System hardening through configuration management | Preventive | |
Verify the /etc/passwd file is owned by an appropriate user or group. CC ID 05325 | System hardening through configuration management | Preventive | |
Verify the /etc/shadow file is owned by an appropriate user or group. CC ID 05326 | System hardening through configuration management | Preventive | |
Verify the /etc/security/audit/config file is owned by an appropriate user or group. CC ID 05327 | System hardening through configuration management | Preventive | |
Verify the /etc/securit/audit/events file is owned by an appropriate user or group. CC ID 05328 | System hardening through configuration management | Preventive | |
Verify the /etc/security/audit/objects file is owned by an appropriate user or group. CC ID 05329 | System hardening through configuration management | Preventive | |
Verify the /usr/lib/trcload file is owned by an appropriate user or group. CC ID 05330 | System hardening through configuration management | Preventive | |
Verify the /usr/lib/semutil file is owned by an appropriate user or group. CC ID 05331 | System hardening through configuration management | Preventive | |
Verify system files are owned by an appropriate user or group. CC ID 05332 | System hardening through configuration management | Preventive | |
Verify the default/skeleton dot files are owned by an appropriate user or group. CC ID 05333 | System hardening through configuration management | Preventive | |
Verify the global initialization files are owned by an appropriate user or group. CC ID 05334 | System hardening through configuration management | Preventive | |
Verify the /etc/rc.config.d/auditing file is owned by an appropriate user or group. CC ID 05335 | System hardening through configuration management | Preventive | |
Verify the /etc/init.d file is owned by an appropriate user or group. CC ID 05336 | System hardening through configuration management | Preventive | |
Verify the /etc/hosts.lpd file is owned by an appropriate user or group. CC ID 05337 | System hardening through configuration management | Preventive | |
Verify the /etc/auto.master file is owned by an appropriate user or group. CC ID 05338 | System hardening through configuration management | Preventive | |
Verify the /etc/auto.misc file is owned by an appropriate user or group. CC ID 05339 | System hardening through configuration management | Preventive | |
Verify the /etc/auto.net file is owned by an appropriate user or group. CC ID 05340 | System hardening through configuration management | Preventive | |
Verify the boot/grub/grub.conf file is owned by an appropriate user or group. CC ID 05341 | System hardening through configuration management | Preventive | |
Verify the /etc/lilo.conf file is owned by an appropriate user or group. CC ID 05342 | System hardening through configuration management | Preventive | |
Verify the /etc/login.access file is owned by an appropriate user or group. CC ID 05343 | System hardening through configuration management | Preventive | |
Verify the /etc/security/access.conf file is owned by an appropriate user or group. CC ID 05344 | System hardening through configuration management | Preventive | |
Verify the /etc/sysctl.conf file is owned by an appropriate user or group. CC ID 05345 | System hardening through configuration management | Preventive | |
Configure the "secure_redirects" setting to organizational standards. CC ID 09941 | System hardening through configuration management | Preventive | |
Configure the "icmp_ignore_bogus_error_responses" setting to organizational standards. CC ID 09942 | System hardening through configuration management | Preventive | |
Configure the "rp_filter" setting to organizational standards. CC ID 09943 | System hardening through configuration management | Preventive | |
Verify the /etc/securetty file is owned by an appropriate user or group. CC ID 05346 | System hardening through configuration management | Preventive | |
Verify the /etc/audit/auditd.conf file is owned by an appropriate user or group. CC ID 05347 | System hardening through configuration management | Preventive | |
Verify the audit.rules file is owned by an appropriate user or group. CC ID 05348 | System hardening through configuration management | Preventive | |
Verify the /etc/group file is owned by an appropriate user or group. CC ID 05349 | System hardening through configuration management | Preventive | |
Verify the /etc/gshadow file is owned by an appropriate user or group. CC ID 05350 | System hardening through configuration management | Preventive | |
Verify the /usr/sbin/userhelper file is owned by an appropriate user or group. CC ID 05351 | System hardening through configuration management | Preventive | |
Verify all syslog log files are owned by an appropriate user or group. CC ID 05352 | System hardening through configuration management | Preventive | |
Verify the /etc/anacrontab file is owned by an appropriate user or group. CC ID 05353 | System hardening through configuration management | Preventive | |
Verify the /etc/pki/tls/ldap file is owned by an appropriate user or group. CC ID 05354 | System hardening through configuration management | Preventive | |
Verify the /etc/pki/tls/ldap/serverkey.pem file is owned by an appropriate user or group. CC ID 05355 | System hardening through configuration management | Preventive | |
Verify the /etc/pki/tls/CA/cacert.pem file is owned by an appropriate user or group. CC ID 05356 | System hardening through configuration management | Preventive | |
Verify the /etc/pki/tls/ldap/servercert.pem file is owned by an appropriate user or group. CC ID 05357 | System hardening through configuration management | Preventive | |
Verify the var/lib/ldap/* files are owned by an appropriate user or group. CC ID 05358 | System hardening through configuration management | Preventive | |
Verify the /etc/httpd/conf/* files are owned by an appropriate user or group. CC ID 05359 | System hardening through configuration management | Preventive | |
Verify the /etc/auto_* file is owned by an appropriate user. CC ID 05360 | System hardening through configuration management | Preventive | |
Verify the /etc/rmmount.conf file is owned by an appropriate user or group. CC ID 05361 | System hardening through configuration management | Preventive | |
Verify the /var/log/pamlog log is owned by an appropriate user or group. CC ID 05362 | System hardening through configuration management | Preventive | |
Verify the /etc/security/audit_control file is owned by an appropriate user or group. CC ID 05363 | System hardening through configuration management | Preventive | |
Verify the /etc/security/audit_class file is owned by an appropriate user or group. CC ID 05364 | System hardening through configuration management | Preventive | |
Verify the /etc/security/audit_event file is owned by an appropriate user or group. CC ID 05365 | System hardening through configuration management | Preventive | |
Verify the ASET userlist file is owned by an appropriate user or group. CC ID 05366 | System hardening through configuration management | Preventive | |
Verify the /var directory is owned by an appropriate user. CC ID 05367 | System hardening through configuration management | Preventive | |
Verify the /var/log directory is owned by an appropriate user. CC ID 05368 | System hardening through configuration management | Preventive | |
Verify the /var/adm directory is owned by an appropriate user. CC ID 05369 | System hardening through configuration management | Preventive | |
Restrict the debug level daemon logging file owner and daemon debug group owner. CC ID 05370 | System hardening through configuration management | Preventive | |
Restrict the Cron log file owner and Cron group owner. CC ID 05371 | System hardening through configuration management | Preventive | |
Restrict the system accounting file owner and system accounting group owner. CC ID 05372 | System hardening through configuration management | Preventive | |
Restrict audit log file ownership and audit group ownership. CC ID 05373 | System hardening through configuration management | Preventive | |
Set the X server timeout properly. CC ID 05374 | System hardening through configuration management | Preventive | |
Configure each user's authentication mechanism (system attribute) properly. CC ID 05375 | System hardening through configuration management | Preventive | |
Enable or disable SeLinux, as appropriate. CC ID 05376 | System hardening through configuration management | Preventive | |
Set the SELinux state properly. CC ID 05377 | System hardening through configuration management | Preventive | |
Set the SELinux policy properly. CC ID 05378 | System hardening through configuration management | Preventive | |
Configure Dovecot properly. CC ID 05379 | System hardening through configuration management | Preventive | |
Configure the "Prohibit Access of the Windows Connect Now Wizards" setting. CC ID 05380 | System hardening through configuration management | Preventive | |
Configure the "Allow remote access to the PnP interface" setting. CC ID 05381 | System hardening through configuration management | Preventive | |
Configure the "Do not create system restore point when new device driver installed" setting. CC ID 05382 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Access to All Windows Update Feature" setting. CC ID 05383 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Automatic Root Certificates Update" setting. CC ID 05384 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Event Views 'Events.asp' Links" setting. CC ID 05385 | System hardening through configuration management | Preventive | |
Configure "Turn Off Handwriting Recognition Error Reporting" to organizational standards. CC ID 05386 | System hardening through configuration management | Preventive | |
Configure the "Turn off Help and Support Center 'Did You Know?' content" setting. CC ID 05387 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Help and Support Center Microsoft Knowledge Base Search" setting. CC ID 05388 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Internet File Association Service" setting. CC ID 05389 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Registration if URL Connection is Referring to Microsoft.com" setting. CC ID 05390 | System hardening through configuration management | Preventive | |
Configure the "Turn off the 'Order Prints' Picture task" setting. CC ID 05391 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Windows Movie Maker Online Web Links" setting. CC ID 05392 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Windows Movie Maker Saving to Online Video Hosting Provider" setting. CC ID 05393 | System hardening through configuration management | Preventive | |
Configure the "Don't Display the Getting Started Welcome Screen at Logon" setting. CC ID 05394 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Startup Sound" setting. CC ID 05395 | System hardening through configuration management | Preventive | |
Configure the "Allow only Vista or later connections" setting. CC ID 05396 | System hardening through configuration management | Preventive | |
Configure the "Turn on bandwidth optimization" setting. CC ID 05397 | System hardening through configuration management | Preventive | |
Configure the "Prevent IIS Installation" setting. CC ID 05398 | System hardening through configuration management | Preventive | |
Configure the "Turn off Active Help" setting. CC ID 05399 | System hardening through configuration management | Preventive | |
Configure the "Turn off Untrusted Content" setting. CC ID 05400 | System hardening through configuration management | Preventive | |
Configure the "Turn off downloading of enclosures" setting. CC ID 05401 | System hardening through configuration management | Preventive | |
Configure "Allow indexing of encrypted files" to organizational standards. CC ID 05402 | System hardening through configuration management | Preventive | |
Configure the "Prevent indexing uncached Exchange folders" setting. CC ID 05403 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Calendar" setting. CC ID 05404 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Defender" setting. CC ID 05405 | System hardening through configuration management | Preventive | |
Configure the "Turn off Heap termination on corruption" setting to organizational standards. CC ID 05406 | System hardening through configuration management | Preventive | |
Configure the "Turn off shell protocol protected mode" setting to organizational standards. CC ID 05407 | System hardening through configuration management | Preventive | |
Configure the "Prohibit non-administrators from applying vendor signed updates" setting. CC ID 05408 | System hardening through configuration management | Preventive | |
Configure the "Report when logon server was not available during user logon" setting. CC ID 05409 | System hardening through configuration management | Preventive | |
Configure the "Turn off the communication features" setting. CC ID 05410 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Mail application" setting. CC ID 05411 | System hardening through configuration management | Preventive | |
Configure the "Prevent Windows Media DRM Internet Access" setting. CC ID 05412 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Meeting Space" setting. CC ID 05413 | System hardening through configuration management | Preventive | |
Configure the "Turn on Windows Meeting Space auditing" setting. CC ID 05414 | System hardening through configuration management | Preventive | |
Configure the "Disable unpacking and installation of gadgets that are not digitally signed" setting. CC ID 05415 | System hardening through configuration management | Preventive | |
Configure the "Override the More Gadgets Link" setting. CC ID 05416 | System hardening through configuration management | Preventive | |
Configure the "Turn Off User Installed Windows Sidebar Gadgets" setting. CC ID 05417 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Digital Locker to run" setting. CC ID 05418 | System hardening through configuration management | Preventive | |
Configure the "Turn off Downloading of Game Information" setting. CC ID 05419 | System hardening through configuration management | Preventive | |
Configure "Turn on Responder (RSPNDR) driver" to organizational standards. CC ID 05420 | System hardening through configuration management | Preventive | |
Verify ExecShield has been randomly placed in Virtual Memory regions. CC ID 05436 | System hardening through configuration management | Preventive | |
Enable the ExecShield, as appropriate. CC ID 05421 | System hardening through configuration management | Preventive | |
Configure Kernel support for the XD/NX processor feature, as appropriate. CC ID 05422 | System hardening through configuration management | Preventive | |
Configure the XD/NX processor feature in the BIOS, as appropriate. CC ID 05423 | System hardening through configuration management | Preventive | |
Configure the Shell for the bin account properly. CC ID 05424 | System hardening through configuration management | Preventive | |
Configure the Shell for the nuucp account properly. CC ID 05425 | System hardening through configuration management | Preventive | |
Configure the Shell for the smmsp account properly. CC ID 05426 | System hardening through configuration management | Preventive | |
Configure the Shell for the listen account properly. CC ID 05427 | System hardening through configuration management | Preventive | |
Configure the Shell for the gdm account properly. CC ID 05428 | System hardening through configuration management | Preventive | |
Configure the Shell for the webservd account properly. CC ID 05429 | System hardening through configuration management | Preventive | |
Configure the Shell for the nobody account properly. CC ID 05430 | System hardening through configuration management | Preventive | |
Configure the Shell for the noaccess account properly. CC ID 05431 | System hardening through configuration management | Preventive | |
Configure the Shell for the nobody4 account properly. CC ID 05432 | System hardening through configuration management | Preventive | |
Configure the Shell for the adm account properly. CC ID 05433 | System hardening through configuration management | Preventive | |
Configure the Shell for the lp account properly. CC ID 05434 | System hardening through configuration management | Preventive | |
Configure the Shell for the uucp account properly. CC ID 05435 | System hardening through configuration management | Preventive | |
Set the noexec_user_stack parameter properly. CC ID 05437 | System hardening through configuration management | Preventive | |
Set the no_exec_user_stack_log parameter properly. CC ID 05438 | System hardening through configuration management | Preventive | |
Set the noexec_user_stack flag on the user stack properly. CC ID 05439 | System hardening through configuration management | Preventive | |
Set the TCP max connection limit properly. CC ID 05440 | System hardening through configuration management | Preventive | |
Set the TCP abort interval properly. CC ID 05441 | System hardening through configuration management | Preventive | |
Enable or disable the GNOME screenlock, as appropriate. CC ID 05442 | System hardening through configuration management | Preventive | |
Set the ARP cache cleanup interval properly. CC ID 05443 | System hardening through configuration management | Preventive | |
Set the ARP IRE scan rate properly. CC ID 05444 | System hardening through configuration management | Preventive | |
Disable proxy ARP on all interfaces. CC ID 06570 | System hardening through configuration management | Preventive | |
Set the FileSpaceSwitch variable to an appropriate value. CC ID 05445 | System hardening through configuration management | Preventive | |
Set the wakeup switchpoint frequency to an appropriate time interval. CC ID 05446 | System hardening through configuration management | Preventive | |
Enable or disable the setuid option on removable storage media, as appropriate. CC ID 05447 | System hardening through configuration management | Preventive | |
Configure TCP/IP PMTU Discovery, as appropriate. CC ID 05991 | System hardening through configuration management | Preventive | |
Configure Secure Shell to enable or disable empty passwords, as appropriate. CC ID 06016 | System hardening through configuration management | Preventive | |
Configure each user's Screen Saver Executable Name. CC ID 06027 | System hardening through configuration management | Preventive | |
Configure the NIS+ server to operate at an appropriate security level. CC ID 06038 | System hardening through configuration management | Preventive | |
Configure the "restrict guest access to system log" policy, as appropriate. CC ID 06047 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Open XML file types" setting, as appropriate. CC ID 06048 | System hardening through configuration management | Preventive | |
Enable or disable user-initiated system crashes via the CTRL+SCROLL LOCK+SCROLL LOCK sequence for keyboards. CC ID 06051 | System hardening through configuration management | Preventive | |
Configure the "Syskey mode" to organizational standards. CC ID 06052 | System hardening through configuration management | Preventive | |
Configure the Trusted Platform Module (TPM) platform validation profile, as appropriate. CC ID 06056 | System hardening through configuration management | Preventive | |
Configure the "Allow Remote Shell Access" setting, as appropriate. CC ID 06057 | System hardening through configuration management | Preventive | |
Configure the "Prevent the computer from joining a homegroup" setting, as appropriate. CC ID 06058 | System hardening through configuration management | Preventive | |
Enable or disable the authenticator requirement after waking, as appropriate. CC ID 06059 | System hardening through configuration management | Preventive | |
Enable or disable the standby states, as appropriate. CC ID 06060 | System hardening through configuration management | Preventive | |
Configure the Trusted Platform Module startup options properly. CC ID 06061 | System hardening through configuration management | Preventive | |
Configure the system to purge Policy Caches. CC ID 06569 | System hardening through configuration management | Preventive | |
Separate authenticator files and application system data on different file systems. CC ID 06790 | System hardening through configuration management | Preventive | |
Configure Application Programming Interfaces to limit or shut down interactivity based upon a rate limit. CC ID 06811 | System hardening through configuration management | Preventive | |
Configure the "Executable stack" setting to organizational standards. CC ID 08969 | System hardening through configuration management | Preventive | |
Configure the "smbpasswd executable" user ownership to organizational standards. CC ID 08975 | System hardening through configuration management | Preventive | |
Configure the "traceroute executable" group ownership to organizational standards. CC ID 08980 | System hardening through configuration management | Preventive | |
Configure the "traceroute executable" user ownership to organizational standards. CC ID 08981 | System hardening through configuration management | Preventive | |
Configure the "Apache configuration" directory group ownership to organizational standards. CC ID 08991 | System hardening through configuration management | Preventive | |
Configure the "Apache configuration" directory user ownership to organizational standards. CC ID 08992 | System hardening through configuration management | Preventive | |
Configure the "/var/log/httpd/" file group ownership to organizational standards. CC ID 09027 | System hardening through configuration management | Preventive | |
Configure the "/etc/httpd/conf.d" file group ownership to organizational standards. CC ID 09028 | System hardening through configuration management | Preventive | |
Configure the "/etc/httpd/conf/passwd" file group ownership to organizational standards. CC ID 09029 | System hardening through configuration management | Preventive | |
Configure the "/usr/sbin/apachectl" file group ownership to organizational standards. CC ID 09030 | System hardening through configuration management | Preventive | |
Configure the "/usr/sbin/httpd" file group ownership to organizational standards. CC ID 09031 | System hardening through configuration management | Preventive | |
Configure the "/var/www/html" file group ownership to organizational standards. CC ID 09032 | System hardening through configuration management | Preventive | |
Configure the "log files" the "/var/log/httpd/" directory user ownership to organizational standards. CC ID 09034 | System hardening through configuration management | Preventive | |
Configure the "/etc/httpd/conf.d" file ownership to organizational standards. CC ID 09035 | System hardening through configuration management | Preventive | |
Configure the "/etc/httpd/conf/passwd" file ownership to organizational standards. CC ID 09036 | System hardening through configuration management | Preventive | |
Configure the "/usr/sbin/apachectl" file ownership to organizational standards. CC ID 09037 | System hardening through configuration management | Preventive | |
Configure the "/usr/sbin/httpd" file ownership to organizational standards. CC ID 09038 | System hardening through configuration management | Preventive | |
Configure the "/var/www/html" file ownership to organizational standards. CC ID 09039 | System hardening through configuration management | Preventive | |
Configure the "httpd.conf" file user ownership to organizational standards. CC ID 09055 | System hardening through configuration management | Preventive | |
Configure the "httpd.conf" group ownership to organizational standards. CC ID 09056 | System hardening through configuration management | Preventive | |
Configure the "htpasswd" file user ownership to organizational standards. CC ID 09058 | System hardening through configuration management | Preventive | |
Configure the "htpasswd" file group ownership to organizational standards. CC ID 09059 | System hardening through configuration management | Preventive | |
Configure the "files specified by CustomLog" user ownership to organizational standards. CC ID 09074 | System hardening through configuration management | Preventive | |
Configure the "files specified by CustomLog" group ownership to organizational standards. CC ID 09075 | System hardening through configuration management | Preventive | |
Configure the "files specified by ErrorLog" user ownership to organizational standards. CC ID 09076 | System hardening through configuration management | Preventive | |
Configure the "files specified by ErrorLog" group ownership to organizational standards. CC ID 09077 | System hardening through configuration management | Preventive | |
Configure the "directories specified by ScriptAlias" user ownership to organizational standards. CC ID 09079 | System hardening through configuration management | Preventive | |
Configure the "directories specified by ScriptAlias" group ownership to organizational standards. CC ID 09080 | System hardening through configuration management | Preventive | |
Configure the "directories specified by ScriptAliasMatch" user ownership to organizational standards. CC ID 09082 | System hardening through configuration management | Preventive | |
Configure the "directories specified by ScriptAliasMatch" group ownership to organizational standards. CC ID 09083 | System hardening through configuration management | Preventive | |
Configure the "directories specified by DocumentRoot" user ownership to organizational standards. CC ID 09085 | System hardening through configuration management | Preventive | |
Configure the "directories specified by DocumentRoot" group ownership to organizational standards. CC ID 09086 | System hardening through configuration management | Preventive | |
Configure the "directories specified by Alias" user ownership to organizational standards. CC ID 09088 | System hardening through configuration management | Preventive | |
Configure the "directories specified by Alias" group ownership to organizational standards. CC ID 09089 | System hardening through configuration management | Preventive | |
Configure the "directories specified by ServerRoot" user ownership to organizational standards. CC ID 09091 | System hardening through configuration management | Preventive | |
Configure the "directories specified by ServerRoot" group ownership to organizational standards. CC ID 09092 | System hardening through configuration management | Preventive | |
Configure the "apache /bin" directory user ownership to organizational standards. CC ID 09094 | System hardening through configuration management | Preventive | |
Configure the "apache /bin" directory group ownership to organizational standards. CC ID 09095 | System hardening through configuration management | Preventive | |
Configure the "apache /logs" directory user ownership to organizational standards. CC ID 09097 | System hardening through configuration management | Preventive | |
Configure the "apache /logs" directory group ownership to organizational standards. CC ID 09098 | System hardening through configuration management | Preventive | |
Configure the "apache /htdocs" directory user ownership to organizational standards. CC ID 09100 | System hardening through configuration management | Preventive | |
Configure the "apache /htdocs" directory group ownership to organizational standards. CC ID 09101 | System hardening through configuration management | Preventive | |
Configure the "apache /cgi-bin" directory group ownership to organizational standards. CC ID 09104 | System hardening through configuration management | Preventive | |
Configure the "User-specific directories" setting to organizational standards. CC ID 09123 | System hardening through configuration management | Preventive | |
Configure the "apache process ID" file user ownership to organizational standards. CC ID 09125 | System hardening through configuration management | Preventive | |
Configure the "apache process ID" file group ownership to organizational standards. CC ID 09126 | System hardening through configuration management | Preventive | |
Configure the "apache scoreboard" file user ownership to organizational standards. CC ID 09128 | System hardening through configuration management | Preventive | |
Configure the "apache scoreboard" file group ownership to organizational standards. CC ID 09129 | System hardening through configuration management | Preventive | |
Configure the "Ownership of the asymmetric keys" setting to organizational standards. CC ID 09289 | System hardening through configuration management | Preventive | |
Configure the "SQLServer2005ReportServerUser" registry key permissions to organizational standards. CC ID 09326 | System hardening through configuration management | Preventive | |
Configure the "SQLServerADHelperUser" registry key permissions to organizational standards. CC ID 09329 | System hardening through configuration management | Preventive | |
Configure the "Tomcat home" directory user ownership to organizational standards. CC ID 09772 | System hardening through configuration management | Preventive | |
Configure the "group" setting for the "Tomcat installation" to organizational standards. CC ID 09773 | System hardening through configuration management | Preventive | |
Configure the "tomcat conf/" directory user ownership to organizational standards. CC ID 09774 | System hardening through configuration management | Preventive | |
Configure the "tomcat conf/" directory group ownership to organizational standards. CC ID 09775 | System hardening through configuration management | Preventive | |
Configure the "tomcat-users.xml" file user ownership to organizational standards. CC ID 09776 | System hardening through configuration management | Preventive | |
Configure the "tomcat-users.xml" file group ownership to organizational standards. CC ID 09777 | System hardening through configuration management | Preventive | |
Configure the "group membership" setting for "Tomcat" to organizational standards. CC ID 09793 | System hardening through configuration management | Preventive | |
Configure the "Tomcat home" directory group ownership to organizational standards. CC ID 09798 | System hardening through configuration management | Preventive | |
Configure the "Tomcat home/conf/" directory user ownership to organizational standards. CC ID 09800 | System hardening through configuration management | Preventive | |
Configure the "Tomcat home/conf/" directory group ownership to organizational standards. CC ID 09801 | System hardening through configuration management | Preventive | |
Configure the "system" files permissions to organizational standards. CC ID 09922 | System hardening through configuration management | Preventive | |
Configure the "size limit" setting for the "application log" to organizational standards. CC ID 10063 | System hardening through configuration management | Preventive | |
Configure the "restrict guest access to security log" setting to organizational standards. CC ID 10064 | System hardening through configuration management | Preventive | |
Configure the "size limit" setting for the "system log" to organizational standards. CC ID 10065 | System hardening through configuration management | Preventive | |
Configure the "Automatic Update service" setting to organizational standards. CC ID 10066 | System hardening through configuration management | Preventive | |
Configure the "Safe DLL Search Mode" setting to organizational standards. CC ID 10067 | System hardening through configuration management | Preventive | |
Configure the "screensaver" setting to organizational standards. CC ID 10068 | System hardening through configuration management | Preventive | |
Configure the "screensaver" setting for the "default" user to organizational standards. CC ID 10069 | System hardening through configuration management | Preventive | |
Configure the "Enable User Control Over Installs" setting to organizational standards. CC ID 10070 | System hardening through configuration management | Preventive | |
Configure the "Enable User to Browser for Source While Elevated" setting to organizational standards. CC ID 10071 | System hardening through configuration management | Preventive | |
Configure the "Enable User to Use Media Source While Elevated" setting to organizational standards. CC ID 10072 | System hardening through configuration management | Preventive | |
Configure the "Allow Administrator to Install from Terminal Services Session" setting to organizational standards. CC ID 10073 | System hardening through configuration management | Preventive | |
Configure the "Enable User to Patch Elevated Products" setting to organizational standards. CC ID 10074 | System hardening through configuration management | Preventive | |
Configure the "Cache Transforms in Secure Location" setting to organizational standards. CC ID 10075 | System hardening through configuration management | Preventive | |
Configure the "Disable Media Player for automatic updates" setting to organizational standards. CC ID 10076 | System hardening through configuration management | Preventive | |
Configure the "Internet access for Windows Messenger" setting to organizational standards. CC ID 10077 | System hardening through configuration management | Preventive | |
Configure the "Do Not Automatically Start Windows Messenger" setting to organizational standards. CC ID 10078 | System hardening through configuration management | Preventive | |
Configure the "Hide Property Pages" setting for the "task scheduler" to organizational standards. CC ID 10079 | System hardening through configuration management | Preventive | |
Configure the "Prohibit New Task Creation" setting for the "task scheduler" to organizational standards. CC ID 10080 | System hardening through configuration management | Preventive | |
Configure "Set time limit for disconnected sessions" to organizational standards. CC ID 10081 | System hardening through configuration management | Preventive | |
Configure the "Set time limit for idle sessions" setting to organizational standards. CC ID 10082 | System hardening through configuration management | Preventive | |
Configure the "Enable Keep-Alive Messages" setting to organizational standards. CC ID 10083 | System hardening through configuration management | Preventive | |
Configure the "Automatic Updates detection frequency" setting to organizational standards. CC ID 10084 | System hardening through configuration management | Preventive | |
Configure the "TCPMaxPortsExhausted" setting to organizational standards. CC ID 10085 | System hardening through configuration management | Preventive | |
Configure the "built-in Administrator" account to organizational standards. CC ID 10086 | System hardening through configuration management | Preventive | |
Configure the "Prevent System Maintenance of Computer Account Password" setting to organizational standards. CC ID 10087 | System hardening through configuration management | Preventive | |
Configure the "Digitally Sign Client Communication (When Possible)" setting to organizational standards. CC ID 10088 | System hardening through configuration management | Preventive | |
Configure the "number of SYN-ACK retransmissions sent when attempting to respond to a SYN request" setting to organizational standards. CC ID 10089 | System hardening through configuration management | Preventive | |
Configure the "warning level" setting for the "audit log" to organizational standards. CC ID 10090 | System hardening through configuration management | Preventive | |
Configure the "Change Password" setting for the "Ctrl+Alt+Del dialog" to organizational standards. CC ID 10091 | System hardening through configuration management | Preventive | |
Configure the "account description" setting for the "built-in Administrator" account to organizational standards. CC ID 10092 | System hardening through configuration management | Preventive | |
Configure the "Decoy Admin Account Not Disabled" setting to organizational standards. CC ID 10201 | System hardening through configuration management | Preventive | |
Configure the "when maximum log size is reached" setting for the "Application log" to organizational standards. CC ID 10202 | System hardening through configuration management | Preventive | |
Configure the "password filtering DLL" setting to organizational standards. CC ID 10203 | System hardening through configuration management | Preventive | |
Configure the "Anonymous access to the registry" setting to organizational standards. CC ID 10204 | System hardening through configuration management | Preventive | |
Configure the "Automatic Execution" setting for the "System Debugger" to organizational standards. CC ID 10205 | System hardening through configuration management | Preventive | |
Configure the "CD-ROM Autorun" setting to organizational standards. CC ID 10206 | System hardening through configuration management | Preventive | |
Configure the "ResetBrowser Frames" setting to organizational standards. CC ID 10207 | System hardening through configuration management | Preventive | |
Configure the "Dr. Watson Crash Dumps" setting to organizational standards. CC ID 10208 | System hardening through configuration management | Preventive | |
Configure the "File System Checker and Popups" setting to organizational standards. CC ID 10209 | System hardening through configuration management | Preventive | |
Configure the "System File Checker" setting to organizational standards. CC ID 10210 | System hardening through configuration management | Preventive | |
Configure the "System File Checker Progress Meter" setting to organizational standards. CC ID 10211 | System hardening through configuration management | Preventive | |
Configure the "number of TCP/IP Maximum Half-open Sockets" setting to organizational standards. CC ID 10212 | System hardening through configuration management | Preventive | |
Configure the "number of TCP/IP Maximum Retried Half-open Sockets" setting to organizational standards. CC ID 10213 | System hardening through configuration management | Preventive | |
Configure the "Protect Kernel object attributes" setting to organizational standards. CC ID 10214 | System hardening through configuration management | Preventive | |
Configure the "Unsigned Non-Driver Installation Behavior" setting to organizational standards. CC ID 10215 | System hardening through configuration management | Preventive | |
Configure the "Automatically Log Off Users When Logon Time Expires (local)" setting to organizational standards. CC ID 10216 | System hardening through configuration management | Preventive | |
Configure the "Local volumes" setting to organizational standards. CC ID 10217 | System hardening through configuration management | Preventive | |
Configure the "Unused USB Ports" setting to organizational standards. CC ID 10218 | System hardening through configuration management | Preventive | |
Configure the "Set Safe for Scripting" setting to organizational standards. CC ID 10219 | System hardening through configuration management | Preventive | |
Configure the "Use of the Recycle Bin on file deletion" setting to organizational standards. CC ID 10220 | System hardening through configuration management | Preventive | |
Configure the "Membership in the Power Users group" setting to organizational standards. CC ID 10224 | System hardening through configuration management | Preventive | |
Configure the "AutoBackupLogFiles" setting for the "security log" to organizational standards. CC ID 10225 | System hardening through configuration management | Preventive | |
Configure the "AutoBackupLogFiles" setting for the "application log" to organizational standards. CC ID 10226 | System hardening through configuration management | Preventive | |
Configure the "AutoBackupLogFiles" setting for the "system log" to organizational standards. CC ID 10227 | System hardening through configuration management | Preventive | |
Configure the "Syskey Encryption Key location and password method" setting to organizational standards. CC ID 10228 | System hardening through configuration management | Preventive | |
Configure the "Os2LibPath environmental variable" setting to organizational standards. CC ID 10229 | System hardening through configuration management | Preventive | |
Configure the "path to the Microsoft OS/2 version 1.x library" setting to organizational standards. CC ID 10230 | System hardening through configuration management | Preventive | |
Configure the "location of the OS/2 subsystem" setting to organizational standards. CC ID 10231 | System hardening through configuration management | Preventive | |
Configure the "location of the POSIX subsystem" setting to organizational standards. CC ID 10232 | System hardening through configuration management | Preventive | |
Configure the "path to the debugger used for Just-In-Time debugging" setting to organizational standards. CC ID 10234 | System hardening through configuration management | Preventive | |
Configure the "Distributed Component Object Model (DCOM)" setting to organizational standards. CC ID 10235 | System hardening through configuration management | Preventive | |
Configure the "The "encryption algorithm" setting for "EFS"" setting to organizational standards. CC ID 10236 | System hardening through configuration management | Preventive | |
Configure the "Interix Subsystem Startup service startup type" setting to organizational standards. CC ID 10238 | System hardening through configuration management | Preventive | |
Configure the "Services for Unix Perl Socket service startup type" setting to organizational standards. CC ID 10247 | System hardening through configuration management | Preventive | |
Configure the "Services for Unix Windows Cron service startup type" setting to organizational standards. CC ID 10248 | System hardening through configuration management | Preventive | |
Configure the "fDisableCdm" setting to organizational standards. CC ID 10259 | System hardening through configuration management | Preventive | |
Configure the "fDisableClip" setting to organizational standards. CC ID 10260 | System hardening through configuration management | Preventive | |
Configure the "Inheritance of the shadow setting" setting to organizational standards. CC ID 10261 | System hardening through configuration management | Preventive | |
Configure the "remote control configuration" setting to organizational standards. CC ID 10262 | System hardening through configuration management | Preventive | |
Configure the "fDisableCam" setting to organizational standards. CC ID 10263 | System hardening through configuration management | Preventive | |
Configure the "fDisableCcm" setting to organizational standards. CC ID 10264 | System hardening through configuration management | Preventive | |
Configure the "fDisableLPT" setting to organizational standards. CC ID 10265 | System hardening through configuration management | Preventive | |
Configure the "ActiveX installation policy for sites in Trusted zones" setting to organizational standards. CC ID 10691 | System hardening through configuration management | Preventive | |
Configure the "Add the Administrators security group to roaming user profiles" setting to organizational standards. CC ID 10694 | System hardening through configuration management | Preventive | |
Configure the "Administratively assigned offline files" setting to organizational standards. CC ID 10695 | System hardening through configuration management | Preventive | |
Configure the "Apply policy to removable media" setting to organizational standards. CC ID 10756 | System hardening through configuration management | Preventive | |
Configure the "Baseline file cache maximum size" setting to organizational standards. CC ID 10763 | System hardening through configuration management | Preventive | |
Configure the "Check for New Signatures Before Scheduled Scans" setting to organizational standards. CC ID 10770 | System hardening through configuration management | Preventive | |
Configure the "Check published state" setting to organizational standards. CC ID 10771 | System hardening through configuration management | Preventive | |
Configure the "Communities" setting to organizational standards. CC ID 10772 | System hardening through configuration management | Preventive | |
Configure the "Computer location" setting to organizational standards. CC ID 10773 | System hardening through configuration management | Preventive | |
Configure the "Background Sync" setting to organizational standards. CC ID 10775 | System hardening through configuration management | Preventive | |
Configure the "Corporate Windows Error Reporting" setting to organizational standards. CC ID 10777 | System hardening through configuration management | Preventive | |
Configure the "Corrupted File Recovery Behavior" setting to organizational standards. CC ID 10778 | System hardening through configuration management | Preventive | |
Configure the "Default consent" setting to organizational standards. CC ID 10780 | System hardening through configuration management | Preventive | |
Configure the "list of IEEE 1667 silos usable on your computer" setting to organizational standards. CC ID 10792 | System hardening through configuration management | Preventive | |
Configure the "Microsoft SpyNet Reporting" setting to organizational standards. CC ID 10794 | System hardening through configuration management | Preventive | |
Configure the "MSI Corrupted File Recovery Behavior" setting to organizational standards. CC ID 10795 | System hardening through configuration management | Preventive | |
Configure the "Reliability WMI Providers" setting to organizational standards. CC ID 10804 | System hardening through configuration management | Preventive | |
Configure the "Report Archive" setting to organizational standards. CC ID 10805 | System hardening through configuration management | Preventive | |
Configure the "Report Queue" setting to organizational standards. CC ID 10806 | System hardening through configuration management | Preventive | |
Configure the "root certificate clean up" setting to organizational standards. CC ID 10807 | System hardening through configuration management | Preventive | |
Configure the "Security Policy for Scripted Diagnostics" setting to organizational standards. CC ID 10816 | System hardening through configuration management | Preventive | |
Configure the "list of blocked TPM commands" setting to organizational standards. CC ID 10822 | System hardening through configuration management | Preventive | |
Configure the "refresh interval for Server Manager" setting to organizational standards. CC ID 10823 | System hardening through configuration management | Preventive | |
Configure the "server address, refresh interval, and issuer certificate authority of a target Subscription Manager" setting to organizational standards. CC ID 10824 | System hardening through configuration management | Preventive | |
Configure the "Customize consent settings" setting to organizational standards. CC ID 10837 | System hardening through configuration management | Preventive | |
Configure the "Default behavior for AutoRun" setting to organizational standards. CC ID 10839 | System hardening through configuration management | Preventive | |
Configure the "Define Activation Security Check exemptions" setting to organizational standards. CC ID 10841 | System hardening through configuration management | Preventive | |
Configure the "Define host name-to-Kerberos realm mappings" setting to organizational standards. CC ID 10842 | System hardening through configuration management | Preventive | |
Configure the "Define interoperable Kerberos V5 realm settings" setting to organizational standards. CC ID 10843 | System hardening through configuration management | Preventive | |
Configure the "Delay Restart for scheduled installations" setting to organizational standards. CC ID 10844 | System hardening through configuration management | Preventive | |
Configure the "Delete cached copies of roaming profiles" setting to organizational standards. CC ID 10845 | System hardening through configuration management | Preventive | |
Configure the "Delete user profiles older than a specified number of days on system restart" setting to organizational standards. CC ID 10847 | System hardening through configuration management | Preventive | |
Configure the "Diagnostics: Configure scenario retention" setting to organizational standards. CC ID 10857 | System hardening through configuration management | Preventive | |
Configure the "Directory pruning interval" setting to organizational standards. CC ID 10858 | System hardening through configuration management | Preventive | |
Configure the "Directory pruning priority" setting to organizational standards. CC ID 10859 | System hardening through configuration management | Preventive | |
Configure the "Directory pruning retry" setting to organizational standards. CC ID 10860 | System hardening through configuration management | Preventive | |
Configure the "Disk Diagnostic: Configure custom alert text" setting to organizational standards. CC ID 10882 | System hardening through configuration management | Preventive | |
Configure the "Display Shutdown Event Tracker" setting to organizational standards. CC ID 10888 | System hardening through configuration management | Preventive | |
Configure the "Display string when smart card is blocked" setting to organizational standards. CC ID 10889 | System hardening through configuration management | Preventive | |
Configure the "Do not automatically encrypt files moved to encrypted folders" setting to organizational standards. CC ID 10924 | System hardening through configuration management | Preventive | |
Configure the "Do not check for user ownership of Roaming Profile Folders" setting to organizational standards. CC ID 10925 | System hardening through configuration management | Preventive | |
Configure the "Do not process incoming mailslot messages used for domain controller location based on NetBIOS domain names" setting to organizational standards. CC ID 10932 | System hardening through configuration management | Preventive | |
Configure the "Do not send additional data" machine setting should be configured correctly. to organizational standards. CC ID 10934 | System hardening through configuration management | Preventive | |
Configure the "Domain Controller Address Type Returned" setting to organizational standards. CC ID 10939 | System hardening through configuration management | Preventive | |
Configure the "Domain Location Determination URL" setting to organizational standards. CC ID 10940 | System hardening through configuration management | Preventive | |
Configure the "Don't set the always do this checkbox" setting to organizational standards. CC ID 10941 | System hardening through configuration management | Preventive | |
Configure the "Download missing COM components" setting to organizational standards. CC ID 10942 | System hardening through configuration management | Preventive | |
Configure the "Dynamic Update" setting to organizational standards. CC ID 10944 | System hardening through configuration management | Preventive | |
Configure the "Enable client-side targeting" setting to organizational standards. CC ID 10946 | System hardening through configuration management | Preventive | |
Configure the "Enable NTFS pagefile encryption" setting to organizational standards. CC ID 10948 | System hardening through configuration management | Preventive | |
Configure the "Enable Persistent Time Stamp" setting to organizational standards. CC ID 10949 | System hardening through configuration management | Preventive | |
Configure the "Enable Transparent Caching" setting to organizational standards. CC ID 10950 | System hardening through configuration management | Preventive | |
Configure the "Enable Windows NTP Client" setting to organizational standards. CC ID 10951 | System hardening through configuration management | Preventive | |
Configure the "Enable Windows NTP Server" setting to organizational standards. CC ID 10952 | System hardening through configuration management | Preventive | |
Configure the "Encrypt the Offline Files cache" setting to organizational standards. CC ID 10955 | System hardening through configuration management | Preventive | |
Configure the "Enforce upgrade component rules" setting to organizational standards. CC ID 10958 | System hardening through configuration management | Preventive | |
Configure the "Events.asp program" setting to organizational standards. CC ID 10959 | System hardening through configuration management | Preventive | |
Configure the "Events.asp program command line parameters" setting to organizational standards. CC ID 10960 | System hardening through configuration management | Preventive | |
Configure the "Events.asp URL" setting to organizational standards. CC ID 10961 | System hardening through configuration management | Preventive | |
Configure the "Exclude credential providers" setting to organizational standards. CC ID 10962 | System hardening through configuration management | Preventive | |
Configure the "Exclude files from being cached" setting to organizational standards. CC ID 10963 | System hardening through configuration management | Preventive | |
Configure the "Final DC Discovery Retry Setting for Background Callers" setting to organizational standards. CC ID 10968 | System hardening through configuration management | Preventive | |
Configure the "For tablet pen input, don't show the Input Panel icon" setting to organizational standards. CC ID 10973 | System hardening through configuration management | Preventive | |
Configure the "For touch input, don't show the Input Panel icon" setting to organizational standards. CC ID 10974 | System hardening through configuration management | Preventive | |
Configure the "Force Rediscovery Interval" setting to organizational standards. CC ID 10975 | System hardening through configuration management | Preventive | |
Configure the "Force selected system UI language to overwrite the user UI language" setting to organizational standards. CC ID 10976 | System hardening through configuration management | Preventive | |
Configure the "Force the reading of all certificates from the smart card" setting to organizational standards. CC ID 10977 | System hardening through configuration management | Preventive | |
Configure the "ForwarderResourceUsage" setting to organizational standards. CC ID 10978 | System hardening through configuration management | Preventive | |
Configure the "Global Configuration Settings" setting to organizational standards. CC ID 10979 | System hardening through configuration management | Preventive | |
Configure the "Hash Publication for BranchCache" setting to organizational standards. CC ID 10986 | System hardening through configuration management | Preventive | |
Configure the "Hide entry points for Fast User Switching" setting to organizational standards. CC ID 10987 | System hardening through configuration management | Preventive | |
Configure the "Hide notifications about RD Licensing problems that affect the RD Session Host server" setting to organizational standards. CC ID 10988 | System hardening through configuration management | Preventive | |
Configure the "Hide previous versions list for local files" setting to organizational standards. CC ID 10989 | System hardening through configuration management | Preventive | |
Configure the "Hide previous versions of files on backup location" setting to organizational standards. CC ID 10991 | System hardening through configuration management | Preventive | |
Configure the "Ignore custom consent settings" setting to organizational standards. CC ID 10992 | System hardening through configuration management | Preventive | |
Configure the "Ignore Delegation Failure" setting to organizational standards. CC ID 10993 | System hardening through configuration management | Preventive | |
Configure the "Ignore the default list of blocked TPM commands" setting to organizational standards. CC ID 10994 | System hardening through configuration management | Preventive | |
Configure the "Ignore the local list of blocked TPM commands" setting to organizational standards. CC ID 10995 | System hardening through configuration management | Preventive | |
Configure the "Include rarely used Chinese, Kanji, or Hanja characters" setting to organizational standards. CC ID 10996 | System hardening through configuration management | Preventive | |
Configure the "Initial DC Discovery Retry Setting for Background Callers" setting to organizational standards. CC ID 10997 | System hardening through configuration management | Preventive | |
Configure the "IP-HTTPS State" setting to organizational standards. CC ID 11000 | System hardening through configuration management | Preventive | |
Configure the "ISATAP Router Name" setting to organizational standards. CC ID 11001 | System hardening through configuration management | Preventive | |
Configure the "ISATAP State" setting to organizational standards. CC ID 11002 | System hardening through configuration management | Preventive | |
Configure the "License server security group" setting to organizational standards. CC ID 11005 | System hardening through configuration management | Preventive | |
Configure the "List of applications to be excluded" setting to organizational standards. CC ID 11023 | System hardening through configuration management | Preventive | |
Configure the "Lock Enhanced Storage when the computer is locked" setting to organizational standards. CC ID 11025 | System hardening through configuration management | Preventive | |
Configure the "Make Parental Controls control panel visible on a Domain" setting to organizational standards. CC ID 11039 | System hardening through configuration management | Preventive | |
Configure the "MaxConcurrentUsers" setting to organizational standards. CC ID 11040 | System hardening through configuration management | Preventive | |
Configure the "Maximum DC Discovery Retry Interval Setting for Background Callers" setting to organizational standards. CC ID 11041 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with Support Provider" setting to organizational standards. CC ID 11045 | System hardening through configuration management | Preventive | |
Configure the "Negative DC Discovery Cache Setting" setting to organizational standards. CC ID 11047 | System hardening through configuration management | Preventive | |
Configure the "Non-conforming packets" setting to organizational standards. CC ID 11053 | System hardening through configuration management | Preventive | |
Configure the "Notify blocked drivers" setting to organizational standards. CC ID 11054 | System hardening through configuration management | Preventive | |
Configure the "Notify user of successful smart card driver installation" setting to organizational standards. CC ID 11055 | System hardening through configuration management | Preventive | |
Configure the "Permitted Managers" setting to organizational standards. CC ID 11062 | System hardening through configuration management | Preventive | |
Configure the "Positive Periodic DC Cache Refresh for Background Callers" setting to organizational standards. CC ID 11063 | System hardening through configuration management | Preventive | |
Configure the "Positive Periodic DC Cache Refresh for Non-Background Callers" setting to organizational standards. CC ID 11064 | System hardening through configuration management | Preventive | |
Configure the "Prioritize all digitally signed drivers equally during the driver ranking and selection process" setting to organizational standards. CC ID 11098 | System hardening through configuration management | Preventive | |
Configure the "Prompt for credentials on the client computer" setting to organizational standards. CC ID 11108 | System hardening through configuration management | Preventive | |
Configure the "Propagation of extended error information" setting to organizational standards. CC ID 11110 | System hardening through configuration management | Preventive | |
Configure the "Register PTR Records" setting to organizational standards. CC ID 11121 | System hardening through configuration management | Preventive | |
Configure the "Registration Refresh Interval" setting to organizational standards. CC ID 11122 | System hardening through configuration management | Preventive | |
Configure the "Remove Program Compatibility Property Page" setting to organizational standards. CC ID 11128 | System hardening through configuration management | Preventive | |
Configure the "Remove users ability to invoke machine policy refresh" setting to organizational standards. CC ID 11129 | System hardening through configuration management | Preventive | |
Configure the "Remove Windows Security item from Start menu" setting to organizational standards. CC ID 11130 | System hardening through configuration management | Preventive | |
Configure the "Re-prompt for restart with scheduled installations" setting to organizational standards. CC ID 11131 | System hardening through configuration management | Preventive | |
Configure the "Require secure RPC communication" setting to organizational standards. CC ID 11134 | System hardening through configuration management | Preventive | |
Configure the "Require strict KDC validation" setting to organizational standards. CC ID 11135 | System hardening through configuration management | Preventive | |
Configure the "Reverse the subject name stored in a certificate when displaying" setting to organizational standards. CC ID 11148 | System hardening through configuration management | Preventive | |
Configure the "RPC Troubleshooting State Information" setting to organizational standards. CC ID 11150 | System hardening through configuration management | Preventive | |
Configure the "Run shutdown scripts visible" setting to organizational standards. CC ID 11152 | System hardening through configuration management | Preventive | |
Configure the "Run startup scripts asynchronously" setting to organizational standards. CC ID 11153 | System hardening through configuration management | Preventive | |
Configure the "Run startup scripts visible" setting to organizational standards. CC ID 11154 | System hardening through configuration management | Preventive | |
Configure the "Scavenge Interval" setting to organizational standards. CC ID 11158 | System hardening through configuration management | Preventive | |
Configure the "Server Authentication Certificate Template" setting to organizational standards. CC ID 11170 | System hardening through configuration management | Preventive | |
Configure the "Set BranchCache Distributed Cache mode" setting to organizational standards. CC ID 11172 | System hardening through configuration management | Preventive | |
Configure the "Set BranchCache Hosted Cache mode" setting to organizational standards. CC ID 11173 | System hardening through configuration management | Preventive | |
Configure the "Set compression algorithm for RDP data" setting to organizational standards. CC ID 11174 | System hardening through configuration management | Preventive | |
Configure the "Set percentage of disk space used for client computer cache" setting to organizational standards. CC ID 11177 | System hardening through configuration management | Preventive | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Global" to organizational standards. CC ID 11178 | System hardening through configuration management | Preventive | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Site Local" to organizational standards. CC ID 11180 | System hardening through configuration management | Preventive | |
Configure the "Set the Email IDs to which notifications are to be sent" setting to organizational standards. CC ID 11184 | System hardening through configuration management | Preventive | |
Configure the "Set the map update interval for NIS subordinate servers" setting to organizational standards. CC ID 11186 | System hardening through configuration management | Preventive | |
Configure the "Set the Seed Server" setting for "IPv6 Global" to organizational standards. CC ID 11189 | System hardening through configuration management | Preventive | |
Configure the "Set the Seed Server" setting for "IPv6 Site Local" to organizational standards. CC ID 11191 | System hardening through configuration management | Preventive | |
Configure the "Set the SMTP Server used to send notifications" setting to organizational standards. CC ID 11192 | System hardening through configuration management | Preventive | |
Configure the "Set timer resolution" setting to organizational standards. CC ID 11196 | System hardening through configuration management | Preventive | |
Configure the "Sets how often a DFS Client discovers DC's" setting to organizational standards. CC ID 11199 | System hardening through configuration management | Preventive | |
Configure the "Short name creation options" setting to organizational standards. CC ID 11200 | System hardening through configuration management | Preventive | |
Configure the "Site Name" setting to organizational standards. CC ID 11201 | System hardening through configuration management | Preventive | |
Configure the "Specify a default color" setting to organizational standards. CC ID 11208 | System hardening through configuration management | Preventive | |
Configure the "Specify idle Timeout" setting to organizational standards. CC ID 11210 | System hardening through configuration management | Preventive | |
Configure the "Specify maximum amount of memory in MB per Shell" setting to organizational standards. CC ID 11211 | System hardening through configuration management | Preventive | |
Configure the "Specify maximum number of processes per Shell" setting to organizational standards. CC ID 11212 | System hardening through configuration management | Preventive | |
Configure the "Specify Shell Timeout" setting to organizational standards. CC ID 11216 | System hardening through configuration management | Preventive | |
Configure the "Specify Windows installation file location" setting to organizational standards. CC ID 11225 | System hardening through configuration management | Preventive | |
Configure the "Specify Windows Service Pack installation file location" setting to organizational standards. CC ID 11226 | System hardening through configuration management | Preventive | |
Configure the "SSL Cipher Suite Order" setting to organizational standards. CC ID 11227 | System hardening through configuration management | Preventive | |
Configure the "Switch to the Simplified Chinese (PRC) gestures" setting to organizational standards. CC ID 11230 | System hardening through configuration management | Preventive | |
Configure the "Sysvol share compatibility" setting to organizational standards. CC ID 11231 | System hardening through configuration management | Preventive | |
Configure the "Tag Windows Customer Experience Improvement data with Study Identifier" setting to organizational standards. CC ID 11232 | System hardening through configuration management | Preventive | |
Configure the "Teredo Client Port" setting to organizational standards. CC ID 11236 | System hardening through configuration management | Preventive | |
Configure the "Teredo Default Qualified" setting to organizational standards. CC ID 11237 | System hardening through configuration management | Preventive | |
Configure the "Teredo Refresh Rate" setting to organizational standards. CC ID 11238 | System hardening through configuration management | Preventive | |
Configure the "Teredo Server Name" setting to organizational standards. CC ID 11239 | System hardening through configuration management | Preventive | |
Configure the "Teredo State" setting to organizational standards. CC ID 11240 | System hardening through configuration management | Preventive | |
Configure the "Time (in seconds) to force reboot" setting to organizational standards. CC ID 11242 | System hardening through configuration management | Preventive | |
Configure the "Time (in seconds) to force reboot when required for policy changes to take effect" setting to organizational standards. CC ID 11243 | System hardening through configuration management | Preventive | |
Configure the "Timeout for fast user switching events" setting to organizational standards. CC ID 11244 | System hardening through configuration management | Preventive | |
Configure the "Traps for public community" setting to organizational standards. CC ID 11246 | System hardening through configuration management | Preventive | |
Configure the "Trusted Hosts" setting to organizational standards. CC ID 11249 | System hardening through configuration management | Preventive | |
Configure the "Try Next Closest Site" setting to organizational standards. CC ID 11250 | System hardening through configuration management | Preventive | |
Configure the "TTL Set in the A and PTR records" setting to organizational standards. CC ID 11251 | System hardening through configuration management | Preventive | |
Configure the "Turn on Accounting for WSRM" setting to organizational standards. CC ID 11333 | System hardening through configuration management | Preventive | |
Configure the "Turn on BranchCache" setting to organizational standards. CC ID 11334 | System hardening through configuration management | Preventive | |
Configure the "Turn on certificate propagation from smart card" setting to organizational standards. CC ID 11335 | System hardening through configuration management | Preventive | |
Configure the "Turn On Compatibility HTTP Listener" setting to organizational standards. CC ID 11336 | System hardening through configuration management | Preventive | |
Configure the "Turn On Compatibility HTTPS Listener" setting to organizational standards. CC ID 11337 | System hardening through configuration management | Preventive | |
Configure the "Turn on definition updates through both WSUS and the Microsoft Malware Protection Center" setting to organizational standards. CC ID 11338 | System hardening through configuration management | Preventive | |
Configure the "Turn on definition updates through both WSUS and Windows Update" setting to organizational standards. CC ID 11339 | System hardening through configuration management | Preventive | |
Configure the "Turn on economical application of administratively assigned Offline Files" setting to organizational standards. CC ID 11342 | System hardening through configuration management | Preventive | |
Configure the "Turn on Mapper I/O (LLTDIO) driver" setting to organizational standards. CC ID 11346 | System hardening through configuration management | Preventive | |
Configure the "Turn on recommended updates via Automatic Updates" setting to organizational standards. CC ID 11347 | System hardening through configuration management | Preventive | |
Configure the "Turn on root certificate propagation from smart card" setting to organizational standards. CC ID 11349 | System hardening through configuration management | Preventive | |
Configure the "Turn on Software Notifications" setting to organizational standards. CC ID 11352 | System hardening through configuration management | Preventive | |
Configure the "Turn on TPM backup to Active Directory Domain Services" setting to organizational standards. CC ID 11356 | System hardening through configuration management | Preventive | |
Configure the "Use forest search order" setting for "Key Distribution Center (KDC) searches" to organizational standards. CC ID 11359 | System hardening through configuration management | Preventive | |
Configure the "Use forest search order" setting for "Kerberos client searches" to organizational standards. CC ID 11360 | System hardening through configuration management | Preventive | |
Configure the "Use IP Address Redirection" setting to organizational standards. CC ID 11361 | System hardening through configuration management | Preventive | |
Configure the "Use localized subfolder names when redirecting Start Menu and My Documents" setting to organizational standards. CC ID 11362 | System hardening through configuration management | Preventive | |
Configure the "Use mandatory profiles on the RD Session Host server" setting to organizational standards. CC ID 11363 | System hardening through configuration management | Preventive | |
Configure the "Verbose vs normal status messages" setting to organizational standards. CC ID 11368 | System hardening through configuration management | Preventive | |
Configure the "Verify old and new Folder Redirection targets point to the same share before redirecting" setting to organizational standards. CC ID 11369 | System hardening through configuration management | Preventive | |
Configure the "Windows Scaling Heuristics State" setting to organizational standards. CC ID 11372 | System hardening through configuration management | Preventive | |
Configure the "Obtain Software Package Updates with apt-get" setting to organizational standards. CC ID 11375 | System hardening through configuration management | Preventive | |
Configure the "display a banner before authentication" setting for "LightDM" to organizational standards. CC ID 11385 | System hardening through configuration management | Preventive | |
Configure the "shadow" group to organizational standards. CC ID 11386 | System hardening through configuration management | Preventive | |
Configure the "AppArmor" setting to organizational standards. CC ID 11387 | System hardening through configuration management | Preventive | |
Configure knowledge-based authentication tools in accordance with organizational standards. CC ID 13740 | System hardening through configuration management | Preventive | |
Configure the session timeout for the knowledge-based authentication tool used for the identity proofing process according to organizational standards. CC ID 13754 | System hardening through configuration management | Preventive | |
Configure the knowledge-based authentication tool to restart after a session timeout. CC ID 13753 | System hardening through configuration management | Preventive | |
Configure the number of attempts allowed to complete the knowledge-based authentication in the knowledge-based authentication tool. CC ID 13751 | System hardening through configuration management | Preventive | |
Disable or configure the e-mail server, as necessary. CC ID 06563 | System hardening through configuration management | Preventive | |
Configure e-mail servers to enable receiver-side verification. CC ID 12223 | System hardening through configuration management | Preventive | |
Configure the e-mail server to prevent it from listening to external interfaces. CC ID 01561 | System hardening through configuration management | Preventive | |
Configure the "Local-Only Mode" setting for the "Mail Transfer Agent" to organizational standards. CC ID 09940 | System hardening through configuration management | Preventive | |
Configure the system account settings and the permission settings in accordance with the organizational standards. CC ID 01538 | System hardening through configuration management | Preventive | |
Configure Windows User Account Control in accordance with organizational standards. CC ID 16437 | System hardening through configuration management | Preventive | |
Configure the at.allow file with the users who are permitted to use the at facility, as appropriate. CC ID 06005 | System hardening through configuration management | Preventive | |
Configure the /etc/xinetd.conf file group permissions, as appropriate. CC ID 05994 | System hardening through configuration management | Preventive | |
Create the default adduser.conf file. CC ID 01581 | System hardening through configuration management | Preventive | |
Configure user accounts. CC ID 07036 | System hardening through configuration management | Preventive | |
Configure account expiration parameters on active accounts. CC ID 01580 | System hardening through configuration management | Preventive | |
Change default usernames, as necessary. CC ID 14661 | System hardening through configuration management | Corrective | |
Remove unnecessary default accounts. CC ID 01539 | System hardening through configuration management | Preventive | |
Disable or delete shared User IDs. CC ID 12478 | System hardening through configuration management | Corrective | |
Verify that no UID 0 accounts exist other than root. CC ID 01585 | System hardening through configuration management | Detective | |
Disable or delete generic user IDs. CC ID 12479 | System hardening through configuration management | Corrective | |
Disable all unnecessary user identifiers. CC ID 02185 | System hardening through configuration management | Preventive | |
Remove unnecessary user credentials. CC ID 16409 | System hardening through configuration management | Preventive | |
Remove the root user as appropriate. CC ID 01582 | System hardening through configuration management | Preventive | |
Disable or remove the null account. CC ID 06572 | System hardening through configuration management | Preventive | |
Configure accounts with administrative privilege. CC ID 07033 | System hardening through configuration management | Preventive | |
Disable root logons or limit the logons to the system console. CC ID 01573 | System hardening through configuration management | Preventive | |
Encrypt non-console administrative access. CC ID 00883 | System hardening through configuration management | Preventive | |
Configure the default group for the root user. CC ID 01586 | System hardening through configuration management | Preventive | |
Rename or disable the Administrator Account. CC ID 01721 | System hardening through configuration management | Preventive | |
Create a backup administrator account. CC ID 04497 | System hardening through configuration management | Preventive | |
Configure the general user ID parameters. CC ID 02186 | System hardening through configuration management | Preventive | |
Configure the Master user ID parameters inside the Site Management Complex. CC ID 02187 | System hardening through configuration management | Preventive | |
Configure the subadministrators user ID parameters. CC ID 02188 | System hardening through configuration management | Preventive | |
Configure the user account expiration date. CC ID 07101 | System hardening through configuration management | Preventive | |
Configure User Rights. CC ID 07034 | System hardening through configuration management | Preventive | |
Configure the "Access this computer from the network" User Right. CC ID 01834 | System hardening through configuration management | Preventive | |
Configure the "Act as a part of the operating system" User Right. CC ID 01835 | System hardening through configuration management | Preventive | |
Configure the "Add workstations to domain" User Right setting to organizational standards. CC ID 01836 | System hardening through configuration management | Preventive | |
Configure the "Adjust memory quotas for a process" User Right. CC ID 01837 | System hardening through configuration management | Preventive | |
Configure the "Allow log on through Terminal Services" User Right setting to organizational standards. CC ID 01838 | System hardening through configuration management | Preventive | |
Configure the "Back up files and directories" User Right. CC ID 01839 | System hardening through configuration management | Preventive | |
Configure the "Bypass traverse checking" User Right. CC ID 01840 | System hardening through configuration management | Preventive | |
Configure the "Change the system time" User Right. CC ID 01841 | System hardening through configuration management | Preventive | |
Configure the "Change the time zone" User Right. CC ID 04382 | System hardening through configuration management | Preventive | |
Configure the "Create a pagefile" User Right. CC ID 01842 | System hardening through configuration management | Preventive | |
Configure the "Create a token object" User Right. CC ID 01843 | System hardening through configuration management | Preventive | |
Configure the "Create permanent shared objects" User Right. CC ID 01844 | System hardening through configuration management | Preventive | |
Configure the "Debug programs" User Right. CC ID 01845 | System hardening through configuration management | Preventive | |
Configure the "Deny access to this computer from the network" User Right. CC ID 01846 | System hardening through configuration management | Preventive | |
Configure the "Deny log on as a batch job" User Right setting to organizational standards. CC ID 01847 | System hardening through configuration management | Preventive | |
Configure the "Deny log on as a service" User Right setting to organizational standards. CC ID 01848 | System hardening through configuration management | Preventive | |
Configure the "Deny log on locally" User Right setting to organizational standards. CC ID 01849 | System hardening through configuration management | Preventive | |
Configure the "Deny log on through Terminal Service" User Right setting to organizational standards. CC ID 01850 | System hardening through configuration management | Preventive | |
Configure the "Enable computer and user accounts to be trusted for delegation" User Right. CC ID 01851 | System hardening through configuration management | Preventive | |
Configure the "Force shutdown from a remote system" User Right. CC ID 01852 | System hardening through configuration management | Preventive | |
Configure the "Generate security audits" User Right. CC ID 01853 | System hardening through configuration management | Preventive | |
Configure the "Increase scheduling priority" User Right. CC ID 01854 | System hardening through configuration management | Preventive | |
Configure the "Load and unload device drivers" User Right. CC ID 01855 | System hardening through configuration management | Preventive | |
Configure the "Lock pages in memory" User Right. CC ID 01856 | System hardening through configuration management | Preventive | |
Configure the "Lock Inactive User Accounts" setting to organizational standards. CC ID 09921 | System hardening through configuration management | Preventive | |
Configure the "Log on as a batch job" User Right. CC ID 01857 | System hardening through configuration management | Preventive | |
Configure the "Log on as a service" User Right. CC ID 01858 | System hardening through configuration management | Preventive | |
Configure the "Allow log on locally" User Right setting to organizational standards. CC ID 01859 | System hardening through configuration management | Preventive | |
Configure the "Manage auditing and security log" User Right. CC ID 01860 | System hardening through configuration management | Preventive | |
Configure the "Modify firmware environment values" User Right. CC ID 01861 | System hardening through configuration management | Preventive | |
Configure the "Perform volume maintenance tasks" User Right. CC ID 01862 | System hardening through configuration management | Preventive | |
Configure the "Profile single process" User Right. CC ID 01863 | System hardening through configuration management | Preventive | |
Configure the "Profile system performance" User Right. CC ID 01864 | System hardening through configuration management | Preventive | |
Configure the "Remove computer from docking station" User Right. CC ID 01865 | System hardening through configuration management | Preventive | |
Configure the "Replace a process level token" User Right. CC ID 01866 | System hardening through configuration management | Preventive | |
Configure the "Restore files and directories" User Right. CC ID 01867 | System hardening through configuration management | Preventive | |
Configure the "Shut down the system" User Right. CC ID 01868 | System hardening through configuration management | Preventive | |
Configure the "Synchronize directory service data" User Right setting to organizational standards. CC ID 01869 | System hardening through configuration management | Preventive | |
Configure the "Take ownership of files or other objects" User Right. CC ID 01870 | System hardening through configuration management | Preventive | |
Configure the "Create global objects" User Right. CC ID 04383 | System hardening through configuration management | Preventive | |
Configure the "Create symbolic links" User Right. CC ID 04384 | System hardening through configuration management | Preventive | |
Configure the "Impersonate a client after authentication" User Right. CC ID 04385 | System hardening through configuration management | Preventive | |
Configure the "Increase a process working set" User Right. CC ID 04386 | System hardening through configuration management | Preventive | |
Configure file permissions and directory permissions to organizational standards. CC ID 07035 | System hardening through configuration management | Preventive | |
Configure "SYSVOL" to organizational standards. CC ID 15398 | System hardening through configuration management | Preventive | |
Configure the Cron log file permissions, as appropriate. CC ID 05998 | System hardening through configuration management | Preventive | |
Configure the "docker.service" file ownership to organizational standards. CC ID 14477 | System hardening through configuration management | Preventive | |
Verify uneven file permissions and uneven directory permissions do not occur, except on the WWW directory. CC ID 02159 | System hardening through configuration management | Preventive | |
Configure the "/dev/kmem" file permissions to organizational standards. CC ID 05449 | System hardening through configuration management | Preventive | |
Configure the "/dev/mem" file permissions to organizational standards. CC ID 05450 | System hardening through configuration management | Preventive | |
Configure the "/dev/null" file permissions to organizational standards. CC ID 05451 | System hardening through configuration management | Preventive | |
Configure the "resolv.conf" file permissions to organizational standards. CC ID 05452 | System hardening through configuration management | Preventive | |
Configure the "/etc/named.conf" file permissions to organizational standards. CC ID 05453 | System hardening through configuration management | Preventive | |
Configure the "/etc/group" file permissions to organizational standards. CC ID 05454 | System hardening through configuration management | Preventive | |
Set the /etc/exports file file permissions properly. CC ID 05455 | System hardening through configuration management | Preventive | |
Set the /usr/bin/at file file permissions properly. CC ID 05456 | System hardening through configuration management | Preventive | |
Configure the "/usr/bin/rdist" file permissions to organizational standards. CC ID 05457 | System hardening through configuration management | Preventive | |
Configure the "/usr/sbin/sync" file permissions to organizational standards. CC ID 05458 | System hardening through configuration management | Preventive | |
Configure the "aliases" file permissions to organizational standards. CC ID 05460 | System hardening through configuration management | Preventive | |
Set the file permissions for all files executed through /etc/aliases file entries properly. CC ID 05462 | System hardening through configuration management | Preventive | |
Configure the "/bin/csh" file permissions to organizational standards. CC ID 05463 | System hardening through configuration management | Preventive | |
Configure the "/bin/jsh" file permissions to organizational standards. CC ID 05464 | System hardening through configuration management | Preventive | |
Configure the "/bin/ksh" file permissions to organizational standards. CC ID 05465 | System hardening through configuration management | Preventive | |
Configure the "/bin/sh" file permissions to organizational standards. CC ID 05466 | System hardening through configuration management | Preventive | |
Configure the "/bin/bash" file permissions to organizational standards. CC ID 05467 | System hardening through configuration management | Preventive | |
Configure the "/sbin/csh" file permissions to organizational standards. CC ID 05468 | System hardening through configuration management | Preventive | |
Configure the "/sbin/jsh" file permissions to organizational standards. CC ID 05469 | System hardening through configuration management | Preventive | |
Configure the "/sbin/ksh" file permissions to organizational standards. CC ID 05470 | System hardening through configuration management | Preventive | |
Configure the "/sbin/sh" file permissions to organizational standards. CC ID 05471 | System hardening through configuration management | Preventive | |
Configure the "/sbin/bash" file permissions to organizational standards. CC ID 05472 | System hardening through configuration management | Preventive | |
Configure the "/usr/bin/csh" file permissions to organizational standards. CC ID 05473 | System hardening through configuration management | Preventive | |
Configure the "/usr/bin/jsh" file permissions to organizational standards. CC ID 05474 | System hardening through configuration management | Preventive | |
Configure the "/usr/bin/ksh" file permissions to organizational standards. CC ID 05475 | System hardening through configuration management | Preventive | |
Configure the "/usr/bin/sh" file permissions to organizational standards. CC ID 05476 | System hardening through configuration management | Preventive | |
Configure the "/usr/bin/bash" file permissions to organizational standards. CC ID 05477 | System hardening through configuration management | Preventive | |
Configure the "snmpd.conf" file permissions to organizational standards. CC ID 05478 | System hardening through configuration management | Preventive | |
Configure the "/tmp" file permissions to organizational standards. CC ID 05479 | System hardening through configuration management | Preventive | |
Configure the "/usr/tmp" file permissions to organizational standards. CC ID 05480 | System hardening through configuration management | Preventive | |
Configure the ".Xauthority" file permissions to organizational standards. CC ID 05481 | System hardening through configuration management | Preventive | |
Configure the "/etc/aliases" file permissions to organizational standards. CC ID 05482 | System hardening through configuration management | Preventive | |
Configure the "/etc/csh" file permissions to organizational standards. CC ID 05483 | System hardening through configuration management | Preventive | |
Configure the "/etc/default/docker" file permissions to organizational standards. CC ID 14487 | System hardening through configuration management | Preventive | |
Configure the "/etc/default/docker" file ownership to organizational standards. CC ID 14484 | System hardening through configuration management | Preventive | |
Configure the "/etc/default/*" file permissions to organizational standards. CC ID 05484 | System hardening through configuration management | Preventive | |
Configure the "/etc/docker" directory permissions to organizational standards. CC ID 14470 | System hardening through configuration management | Preventive | |
Configure the "/etc/docker" directory ownership to organizational standards. CC ID 14469 | System hardening through configuration management | Preventive | |
Set the file permissions for /etc/default/login properly. CC ID 05485 | System hardening through configuration management | Preventive | |
Configure the "/etc/gshadow" file permissions to organizational standards. CC ID 05486 | System hardening through configuration management | Preventive | |
Configure the "/etc/host.lpd" file permissions to organizational standards. CC ID 05487 | System hardening through configuration management | Preventive | |
Configure the "/etc/hostname*" file permissions to organizational standards. CC ID 05488 | System hardening through configuration management | Preventive | |
Configure the "/etc/hosts" file permissions to organizational standards. CC ID 05489 | System hardening through configuration management | Preventive | |
Set the /etc/inetd.conf file file permissions properly. CC ID 05490 | System hardening through configuration management | Preventive | |
Configure the "/etc/issue" file permissions to organizational standards. CC ID 05491 | System hardening through configuration management | Preventive | |
Configure the "/etc/jsh" file permissions to organizational standards. CC ID 05492 | System hardening through configuration management | Preventive | |
Configure the "/etc/kubernetes/pki/*.crt" file permissions to organizational standards. CC ID 14562 | System hardening through configuration management | Preventive | |
Configure the "/etc/kubernetes/pki/*.key" file permissions to organizational standards. CC ID 14557 | System hardening through configuration management | Preventive | |
Configure the "/etc/kubernetes/pki" file ownership to organizational standards. CC ID 14555 | System hardening through configuration management | Preventive | |
Configure the "/etc/ksh" file permissions to organizational standards. CC ID 05493 | System hardening through configuration management | Preventive | |
Configure the "/etc/mail/aliases" file permissions to organizational standards. CC ID 05494 | System hardening through configuration management | Preventive | |
Configure the "/etc/motd" file permissions to organizational standards. CC ID 05495 | System hardening through configuration management | Preventive | |
Configure the "/etc/netconfig" file permissions to organizational standards. CC ID 05496 | System hardening through configuration management | Preventive | |
Configure the "/etc/notrouter" file permissions to organizational standards. CC ID 05497 | System hardening through configuration management | Preventive | |
Configure the "/etc/passwd" file permissions to organizational standards. CC ID 05498 | System hardening through configuration management | Preventive | |
Configure the "/etc/security" file permissions to organizational standards. CC ID 05499 | System hardening through configuration management | Preventive | |
Configure the "/etc/services" file permissions to organizational standards. CC ID 05500 | System hardening through configuration management | Preventive | |
Configure the "/etc/sysconfig/docker" file ownership to organizational standards. CC ID 14491 | System hardening through configuration management | Preventive | |
Configure the "/etc/sh" file permissions to organizational standards. CC ID 05501 | System hardening through configuration management | Preventive | |
Configure the "/etc/sysconfig/docker" file permissions to organizational standards. CC ID 14486 | System hardening through configuration management | Preventive | |
Configure the "/etc/shadow" file permissions to organizational standards. CC ID 05502 | System hardening through configuration management | Preventive | |
Configure the "docker.socket" file ownership to organizational standards. CC ID 14472 | System hardening through configuration management | Preventive | |
Configure the "/etc/syslog.conf" file permissions to organizational standards. CC ID 05503 | System hardening through configuration management | Preventive | |
Configure the "/etc/fstab" file permissions to organizational standards. CC ID 05504 | System hardening through configuration management | Preventive | |
Configure the "docker.socket" file permissions to organizational standards. CC ID 14468 | System hardening through configuration management | Preventive | |
Configure the "/var/adm/messages" file permissions to organizational standards. CC ID 05505 | System hardening through configuration management | Preventive | |
Configure the "/var/adm/sulog" file permissions to organizational standards. CC ID 05506 | System hardening through configuration management | Preventive | |
Configure the "/var/adm/utmp" file permissions to organizational standards. CC ID 05507 | System hardening through configuration management | Preventive | |
Configure the "/var/adm/wtmp" file permissions to organizational standards. CC ID 05508 | System hardening through configuration management | Preventive | |
Configure the "/var/adm/authlog" file permissions to organizational standards. CC ID 05509 | System hardening through configuration management | Preventive | |
Configure the "/var/adm/syslog" file permissions to organizational standards. CC ID 05510 | System hardening through configuration management | Preventive | |
Configure the "/var/mail" file permissions to organizational standards. CC ID 05511 | System hardening through configuration management | Preventive | |
Configure the "/var/tmp" file permissions to organizational standards. CC ID 05512 | System hardening through configuration management | Preventive | |
Configure the "/usr/lib/pt_chmod" file permissions to organizational standards. CC ID 05513 | System hardening through configuration management | Preventive | |
Configure the "/usr/lib/embedded_us" file permissions to organizational standards. CC ID 05514 | System hardening through configuration management | Preventive | |
Configure the "/usr/kerberos/bin/rsh" file permissions to organizational standards. CC ID 05515 | System hardening through configuration management | Preventive | |
Configure the "/var/spool/mail" file permissions to organizational standards. CC ID 05516 | System hardening through configuration management | Preventive | |
Configure the "smbpasswd" file permissions to organizational standards. CC ID 05517 | System hardening through configuration management | Preventive | |
Configure the "/usr/lib/sendmail" file permissions to organizational standards. CC ID 05518 | System hardening through configuration management | Preventive | |
Set the /etc/security/audit/config file file permissions properly. CC ID 05519 | System hardening through configuration management | Preventive | |
Set the /etc/security/audit/events file file permissions properly. CC ID 05520 | System hardening through configuration management | Preventive | |
Set the /etc/security/audit/objects file file permissions properly. CC ID 05521 | System hardening through configuration management | Preventive | |
Set the /usr/lib/trcload file file permissions properly. CC ID 05522 | System hardening through configuration management | Preventive | |
Set the /usr/lib/semutil file file permissions properly. CC ID 05523 | System hardening through configuration management | Preventive | |
Set the /etc/rc.config.d/auditing file file permissions properly. CC ID 05524 | System hardening through configuration management | Preventive | |
Configure the "/etc/init.d" file permissions to organizational standards. CC ID 05525 | System hardening through configuration management | Preventive | |
Set the /etc/hosts.lpd file file permissions properly. CC ID 05526 | System hardening through configuration management | Preventive | |
Configure the "/etc/pam.conf" file permissions to organizational standards. CC ID 05527 | System hardening through configuration management | Preventive | |
Configure the "/boot/grub/grub.conf" file permissions to organizational standards. CC ID 05528 | System hardening through configuration management | Preventive | |
Configure the "/etc/grub.conf" file permissions to organizational standards. CC ID 05529 | System hardening through configuration management | Preventive | |
Configure the "/etc/lilo.conf" file permissions to organizational standards. CC ID 05530 | System hardening through configuration management | Preventive | |
Set the file permissions for /etc/login.access properly. CC ID 05531 | System hardening through configuration management | Preventive | |
Configure the "docker.service" file permissions to organizational standards. CC ID 14479 | System hardening through configuration management | Preventive | |
Configure the "/etc/security/access.conf" file permissions to organizational standards. CC ID 05532 | System hardening through configuration management | Preventive | |
Configure the "/etc/sysctl.conf" file permissions to organizational standards. CC ID 05533 | System hardening through configuration management | Preventive | |
Configure the "/etc/securetty" file permissions to organizational standards. CC ID 05534 | System hardening through configuration management | Preventive | |
Configure the "/etc/audit/auditd.conf" file permissions to organizational standards. CC ID 05535 | System hardening through configuration management | Preventive | |
Configure the "audit.rules" file permissions to organizational standards. CC ID 05536 | System hardening through configuration management | Preventive | |
Set the /usr/sbin/userhelper file file permissions properly. CC ID 05537 | System hardening through configuration management | Preventive | |
Set the file permissions for all syslog log files properly. CC ID 05538 | System hardening through configuration management | Preventive | |
Set the /etc/anacrontab file file permissions properly. CC ID 05543 | System hardening through configuration management | Preventive | |
Set the /etc/pki/tls/CA/cacert.pem file file permissions properly. CC ID 05544 | System hardening through configuration management | Preventive | |
Set the /etc/pki/tls/ldap/serverkey.pem file file permissions properly. CC ID 05545 | System hardening through configuration management | Preventive | |
Set the /etc/pki/tls/ldap/servercert.pem file file permissions properly. CC ID 05546 | System hardening through configuration management | Preventive | |
Set the /etc/pki/tls/ldap file file permissions properly. CC ID 05547 | System hardening through configuration management | Preventive | |
Set the /etc/httpd/conf file file permissions properly. CC ID 05548 | System hardening through configuration management | Preventive | |
Set the /etc/httpd/conf/* file file permissions properly. CC ID 05549 | System hardening through configuration management | Preventive | |
Set the /usr/sbin/httpd file file permissions properly. CC ID 05550 | System hardening through configuration management | Preventive | |
Set the /var/log/httpd file file permissions properly. CC ID 05551 | System hardening through configuration management | Preventive | |
Set the daemon debug log file file permissions properly. CC ID 05552 | System hardening through configuration management | Preventive | |
Set the Cron log file file permissions properly. CC ID 05553 | System hardening through configuration management | Preventive | |
Set the file permissions for system accounting properly. CC ID 05554 | System hardening through configuration management | Preventive | |
Set the /etc/dfs file file permissions properly. CC ID 05555 | System hardening through configuration management | Preventive | |
Set the /etc/fs file permissions properly. CC ID 05556 | System hardening through configuration management | Preventive | |
Set the /etc/ufs file file permissions properly. CC ID 05557 | System hardening through configuration management | Preventive | |
Set the /etc/vfstab file file permissions properly. CC ID 05558 | System hardening through configuration management | Preventive | |
Set the vold.conf file permissions properly. CC ID 05559 | System hardening through configuration management | Preventive | |
Configure the "Docker socket" file ownership to organizational standards. CC ID 14493 | System hardening through configuration management | Preventive | |
Configure the "daemon.json" file permissions to organizational standards. CC ID 14492 | System hardening through configuration management | Preventive | |
Set the ASET userlist file permissions properly. CC ID 05560 | System hardening through configuration management | Preventive | |
Set the /etc/rmmount.conf file file permissions properly. CC ID 05561 | System hardening through configuration management | Preventive | |
Configure the "Docker server certificate" file ownership to organizational standards. CC ID 14471 | System hardening through configuration management | Preventive | |
Configure the "Docker server certificate key" file permissions to organizational standards. CC ID 14485 | System hardening through configuration management | Preventive | |
Set the /etc/security/audit_control file file permissions properly. CC ID 05563 | System hardening through configuration management | Preventive | |
Configure the "daemon.json" file ownership to organizational standards. CC ID 14482 | System hardening through configuration management | Preventive | |
Configure the "Docker socket" file permissions to organizational standards. CC ID 14480 | System hardening through configuration management | Preventive | |
Set the /etc/security/audit_class file file permissions properly. CC ID 05564 | System hardening through configuration management | Preventive | |
Configure the "Docker server certificate key" file ownership to organizational standards. CC ID 14478 | System hardening through configuration management | Preventive | |
Configure the "admin.conf" file ownership to organizational standards. CC ID 14556 | System hardening through configuration management | Preventive | |
Set the /etc/security/audit_event file file permissions properly. CC ID 05565 | System hardening through configuration management | Preventive | |
Configure the "admin.conf" file permissions to organizational standards. CC ID 14554 | System hardening through configuration management | Preventive | |
Configure the "Certificate Authority" file ownership to organizational standards. CC ID 14630 | System hardening through configuration management | Preventive | |
Configure the "Docker server certificate" file permissions to organizational standards. CC ID 14476 | System hardening through configuration management | Preventive | |
Configure the "etcd" data directory ownership to organizational standards. CC ID 14620 | System hardening through configuration management | Preventive | |
Configure the "etcd" data directory permissions to organizational standards. CC ID 14618 | System hardening through configuration management | Preventive | |
Configure the "etcd.yaml" file ownership to organizational standards. CC ID 14615 | System hardening through configuration management | Preventive | |
Configure the "etcd.yaml" file permissions to organizational standards. CC ID 14609 | System hardening through configuration management | Preventive | |
Configure the file permissions for at.allow, as appropriate. CC ID 05995 | System hardening through configuration management | Preventive | |
Configure the file permissions for at.deny, as appropriate. CC ID 05996 | System hardening through configuration management | Preventive | |
Configure the file permissions for cron.allow, as appropriate. CC ID 05999 | System hardening through configuration management | Preventive | |
Configure the file permissions for cron.deny, as appropriate. CC ID 06000 | System hardening through configuration management | Preventive | |
Configure the "Certificate Authority" file permissions to organizational standards. CC ID 14623 | System hardening through configuration management | Preventive | |
Configure the file permissions for /usr/bin/at file, as appropriate. CC ID 06001 | System hardening through configuration management | Preventive | |
Configure the "kubelet --config" file ownership to organizational standards. CC ID 14632 | System hardening through configuration management | Preventive | |
Configure the file permissions for the /etc/cron.daily file, as appropriate. CC ID 06008 | System hardening through configuration management | Preventive | |
Configure the "kubelet.conf" file ownership to organizational standards. CC ID 14628 | System hardening through configuration management | Preventive | |
Configure the "kubelet --config" file permissions to organizational standards. CC ID 14625 | System hardening through configuration management | Preventive | |
Configure the file permissions for the /etc/cron.weekly file, as appropriate. CC ID 06009 | System hardening through configuration management | Preventive | |
Configure the file permissions for the /etc/cron.hourly file, as appropriate. CC ID 06010 | System hardening through configuration management | Preventive | |
Configure the "kubelet service" file permissions to organizational standards. CC ID 14660 | System hardening through configuration management | Preventive | |
Configure the "kubelet.conf" file permissions to organizational standards. CC ID 14619 | System hardening through configuration management | Preventive | |
Configure the "controller-manager.conf" file ownership to organizational standards. CC ID 14560 | System hardening through configuration management | Preventive | |
Configure the "kubeconfig" file ownership to organizational standards. CC ID 14617 | System hardening through configuration management | Preventive | |
Configure the "kubeconfig" file permissions to organizational standards. CC ID 14616 | System hardening through configuration management | Preventive | |
Configure the file permissions for the /etc/cron.monthly file, as appropriate. CC ID 06013 | System hardening through configuration management | Preventive | |
Configure the "kubelet service" file ownership to organizational standards. CC ID 14612 | System hardening through configuration management | Preventive | |
Configure the "kube-scheduler.yaml" file ownership to organizational standards. CC ID 14611 | System hardening through configuration management | Preventive | |
Configure the file permissions for all user home directories, as appropriate. CC ID 06019 | System hardening through configuration management | Preventive | |
Configure the "kube-scheduler.yaml" file permissions to organizational standards. CC ID 14603 | System hardening through configuration management | Preventive | |
Configure the "kube-controller-manager.yaml" file ownership to organizational standards. CC ID 14600 | System hardening through configuration management | Preventive | |
Configure the "kube-controller-manager.yaml" file permissions to organizational standards. CC ID 14598 | System hardening through configuration management | Preventive | |
Configure the "kube-apiserver.yaml" file ownership to organizational standards. CC ID 14597 | System hardening through configuration management | Preventive | |
Configure the "scheduler.conf" file ownership to organizational standards. CC ID 14558 | System hardening through configuration management | Preventive | |
Configure the .netrc file permissions, as necessary. CC ID 06022 | System hardening through configuration management | Preventive | |
Configure the "controller-manager.conf" file permissions to organizational standards. CC ID 14553 | System hardening through configuration management | Preventive | |
Configure the "Container Network Interface" file ownership to organizational standards. CC ID 14552 | System hardening through configuration management | Preventive | |
Configure the "Container Network Interface" file permissions to organizational standards. CC ID 14550 | System hardening through configuration management | Preventive | |
Configure the "crontab" directory permissions to organizational standards. CC ID 08967 | System hardening through configuration management | Preventive | |
Configure the "scheduler.conf" file permissions to organizational standards. CC ID 14551 | System hardening through configuration management | Preventive | |
Configure the "crontab" file permissions to organizational standards. CC ID 08968 | System hardening through configuration management | Preventive | |
Configure the "kube-apiserver.yaml" file permissions to organizational standards. CC ID 14549 | System hardening through configuration management | Preventive | |
Configure the "traceroute executable" file permissions to organizational standards. CC ID 08979 | System hardening through configuration management | Preventive | |
Configure the "httpd.conf" file permissions to organizational standards. CC ID 09041 | System hardening through configuration management | Preventive | |
Configure the "/etc/httpd/conf/passwd" file permissions to organizational standards. CC ID 09042 | System hardening through configuration management | Preventive | |
Configure the "/usr/sbin/apachectl" file permissions to organizational standards. CC ID 09043 | System hardening through configuration management | Preventive | |
Configure the "/var/www/html" file permissions to organizational standards. CC ID 09044 | System hardening through configuration management | Preventive | |
Configure the "apache configuration" directory permissions to organizational standards. CC ID 09045 | System hardening through configuration management | Preventive | |
Configure the "htpasswd" file permissions to organizational standards. CC ID 09057 | System hardening through configuration management | Preventive | |
Configure all "files specified by CustomLogs" file permissions to organizational standards. CC ID 09073 | System hardening through configuration management | Preventive | |
Configure the "apache /bin" directory permissions to organizational standards. CC ID 09093 | System hardening through configuration management | Preventive | |
Configure the "apache /logs" directory permissions to organizational standards. CC ID 09096 | System hardening through configuration management | Preventive | |
Configure the "registry certificate" file permissions to organizational standards. CC ID 14483 | System hardening through configuration management | Preventive | |
Configure the "apache /htdocs" directory permissions to organizational standards. CC ID 09099 | System hardening through configuration management | Preventive | |
Configure the "registry certificate" file ownership to organizational standards. CC ID 14481 | System hardening through configuration management | Preventive | |
Configure the "apache /cgi-bin" directory permissions to organizational standards. CC ID 09102 | System hardening through configuration management | Preventive | |
Configure the "cgi-bin" directory permissions to organizational standards. CC ID 09103 | System hardening through configuration management | Preventive | |
Configure the "apache process ID" file permissions to organizational standards. CC ID 09124 | System hardening through configuration management | Preventive | |
Configure the "apache scoreboard" file permissions to organizational standards. CC ID 09127 | System hardening through configuration management | Preventive | |
Configure the "htpasswd.exe" file permissions to organizational standards. CC ID 09143 | System hardening through configuration management | Preventive | |
Configure the "setgid" permissions to organizational standards. CC ID 14513 | System hardening through configuration management | Preventive | |
Configure the "TLS CA certificate" file permissions to organizational standards. CC ID 14475 | System hardening through configuration management | Preventive | |
Configure the "TLS CA certificate" file ownership to organizational standards. CC ID 14473 | System hardening through configuration management | Preventive | |
Configure the "apache /config" directory permissions to organizational standards. CC ID 09144 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32wscript.exe" file permissions to organizational standards. CC ID 09145 | System hardening through configuration management | Preventive | |
Configure the "%SystemRoot%System32cscript.exe" file permissions to organizational standards. CC ID 09146 | System hardening through configuration management | Preventive | |
Configure the "apache's process ID" file permissions to organizational standards. CC ID 09148 | System hardening through configuration management | Preventive | |
Configure the "/etc/httpd/conf.d" file permissions to organizational standards. CC ID 09149 | System hardening through configuration management | Preventive | |
Configure the "setuid" permissions to organizational standards. CC ID 14509 | System hardening through configuration management | Preventive | |
Configure the "Web Root 'Images'" directory permissions to organizational standards. CC ID 09191 | System hardening through configuration management | Preventive | |
Configure the "Web Root 'scripts'" directory permissions to organizational standards. CC ID 09192 | System hardening through configuration management | Preventive | |
Configure the "Web Root 'executables'" directory permissions to organizational standards. CC ID 09193 | System hardening through configuration management | Preventive | |
Configure the "Web Root 'docs'" directory permissions to organizational standards. CC ID 09194 | System hardening through configuration management | Preventive | |
Configure the "Web Root 'home'" directory permissions to organizational standards. CC ID 09195 | System hardening through configuration management | Preventive | |
Configure the "Web Root 'include'" directory permissions to organizational standards. CC ID 09196 | System hardening through configuration management | Preventive | |
Configure the "default Logfiles" directory permissions to organizational standards. CC ID 09197 | System hardening through configuration management | Preventive | |
Configure the "Inetpub" directory permissions to organizational standards. CC ID 09221 | System hardening through configuration management | Preventive | |
Configure the "inetsrv" directory permissions to organizational standards. CC ID 09222 | System hardening through configuration management | Preventive | |
Configure the "inetsrvasp.dll" file permissions to organizational standards. CC ID 09223 | System hardening through configuration management | Preventive | |
Configure the "Web Root" directory permissions . to organizational standards CC ID 09224 | System hardening through configuration management | Preventive | |
Configure the "files located in the folder specified by the Logger component (server.xml)" file permissions to organizational standards. CC ID 09733 | System hardening through configuration management | Preventive | |
Configure the "webapps" directory permissions to organizational standards. CC ID 09734 | System hardening through configuration management | Preventive | |
Configure the "tomcat installation" directory permissions to organizational standards. CC ID 09735 | System hardening through configuration management | Preventive | |
Configure the "tomcat /bin" directory permissions to organizational standards. CC ID 09736 | System hardening through configuration management | Preventive | |
Configure the "tomcat /common" directory permissions to organizational standards. CC ID 09737 | System hardening through configuration management | Preventive | |
Configure the "tomcat /conf" directory permissions to organizational standards. CC ID 09738 | System hardening through configuration management | Preventive | |
Configure the "tomcat /logs" directory permissions to organizational standards. CC ID 09739 | System hardening through configuration management | Preventive | |
Configure the "tomcat /server" directory permissions to organizational standards. CC ID 09740 | System hardening through configuration management | Preventive | |
Configure the "tomcat /shared" directory permissions to organizational standards. CC ID 09741 | System hardening through configuration management | Preventive | |
Configure the "tomcat /webapps" directory permissions to organizational standards. CC ID 09742 | System hardening through configuration management | Preventive | |
Configure the "tomcat /work" directory permissions to organizational standards. CC ID 09743 | System hardening through configuration management | Preventive | |
Configure the "tomcat /temp" directory permissions to organizational standards. CC ID 09744 | System hardening through configuration management | Preventive | |
Configure the "tomcat-users.xml" file permissions to organizational standards. CC ID 09778 | System hardening through configuration management | Preventive | |
Configure the "Tomcat home" directory permissions to organizational standards. CC ID 09799 | System hardening through configuration management | Preventive | |
Configure the "Tomcat home/conf/" directory permissions to organizational standards. CC ID 09802 | System hardening through configuration management | Preventive | |
Configure the "SerializedSystemIni.dat" file permissions to organizational standards. CC ID 09860 | System hardening through configuration management | Preventive | |
Configure the "Keystore" file permissions to organizational standards. CC ID 09900 | System hardening through configuration management | Preventive | |
Configure the "Weblogic Server Product Installation" directory permissions to organizational standards. CC ID 09902 | System hardening through configuration management | Preventive | |
Configure the "Domain Home" directory permissions to organizational standards. CC ID 09903 | System hardening through configuration management | Preventive | |
Configure the "Middleware Home" directory permissions to organizational standards. CC ID 09907 | System hardening through configuration management | Preventive | |
Restrict at/cron to authorized users. CC ID 01572 | System hardening through configuration management | Preventive | |
Configure the system to need authentication for single user mode. CC ID 01577 | System hardening through configuration management | Preventive | |
Configure the system to block certain system accounts. CC ID 01578 | System hardening through configuration management | Preventive | |
Verify that there are no accounts with empty password fields. CC ID 01579 | System hardening through configuration management | Preventive | |
Use standards-based encryption for encryption, hashing, and signing. CC ID 01583 | System hardening through configuration management | Preventive | |
Configure symbolic permissions for the passwd file, shadow file, and group files to organizational standards. CC ID 01584 | System hardening through configuration management | Detective | |
Configure the "dCOM: Machine access restrictions in Security Descriptor Definition Language (sddl)" setting. CC ID 01726 | System hardening through configuration management | Preventive | |
Configure the "dCOM: Machine launch restrictions in Security Descriptor Definition Language (sddl)" setting to organizational standards. CC ID 01727 | System hardening through configuration management | Preventive | |
Configure the root $PATH to not have any "." directories, group directories or world writable directories. CC ID 01587 | System hardening through configuration management | Preventive | |
Configure user home directories to be mode 750 or more restrictive. CC ID 01588 | System hardening through configuration management | Preventive | |
Configure user dot-files to not be group or world-writable. CC ID 01589 | System hardening through configuration management | Preventive | |
Remove .netrc files. CC ID 01590 | System hardening through configuration management | Preventive | |
Configure default UMASK for users. CC ID 01591 | System hardening through configuration management | Preventive | |
Configure the default UMASK for FTP users. CC ID 01592 | System hardening through configuration management | Preventive | |
Configure the "mesg n" as default for all users. CC ID 01593 | System hardening through configuration management | Preventive | |
Configure the system to restrict access to the root user from the su command. CC ID 01595 | System hardening through configuration management | Preventive | |
Configure Restricted groups. CC ID 01928 | System hardening through configuration management | Preventive | |
Configure the run control scripts permissions. CC ID 02160 | System hardening through configuration management | Preventive | |
Configure root to be the Traceroute command owner. CC ID 02165 | System hardening through configuration management | Preventive | |
Coordinate the User ID access restrictions with the site-unique configuration file, the UOSS control file, and the Tape File Configuration Transfer file. CC ID 02192 | System hardening through configuration management | Preventive | |
Refrain from displaying user information when the system is locked. CC ID 04302 | System hardening through configuration management | Preventive | |
Configure systems to prevent dial-up passwords from being saved. CC ID 04303 | System hardening through configuration management | Preventive | |
Configure the "Always prompt client for password upon connection" setting. CC ID 04317 | System hardening through configuration management | Preventive | |
Configure the "Do not allow passwords to be saved" setting. CC ID 04320 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Admin Approval Mode for the Built-in Administrator account" setting. CC ID 04388 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" setting. CC ID 04389 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Behavior of the elevation prompt for standard users" setting. CC ID 04390 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Detect application installations and prompt for elevation" setting. CC ID 04391 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Only elevate executables that are signed and validated" setting. CC ID 04392 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Only elevate UIAccess applications that are installed in secure locations" setting. CC ID 04393 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Run all administrators in Admin Approval Mode" setting. CC ID 04394 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Switch to the secure desktop when prompting for elevation" setting. CC ID 04395 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Virtualize file and registry write failures to per-user locations" setting. CC ID 04396 | System hardening through configuration management | Preventive | |
Configure the "Enumerate administrator accounts on elevation" setting. CC ID 04403 | System hardening through configuration management | Preventive | |
Configure the "Required trusted path for credential entry" setting. CC ID 04404 | System hardening through configuration management | Preventive | |
Require proper authentication prior to accessing NetWare's eGuide. CC ID 04450 | System hardening through configuration management | Preventive | |
Disable the SAdmin account and SDebug account in NetWare. CC ID 04458 | System hardening through configuration management | Preventive | |
Configure the system to prevent helper applications from changing client rights. CC ID 04464 | System hardening through configuration management | Preventive | |
Delete authenticator hint field contents or authenticator hint field files. CC ID 04477 | System hardening through configuration management | Preventive | |
Configure the "Limit number of simultaneous connections" setting to organizational standards. CC ID 04511 | System hardening through configuration management | Preventive | |
Configure the "Do not allow local administrators to customize permissions" setting to organizational standards. CC ID 04512 | System hardening through configuration management | Preventive | |
Configure the default Distributed Component Object Model authorization level to 'connect' or higher. CC ID 04528 | System hardening through configuration management | Preventive | |
Configure the "Network access: Shares that can be accessed anonymously" setting. CC ID 04533 | System hardening through configuration management | Preventive | |
Configure domain-connected workstations to not have any local user accounts. CC ID 04535 | System hardening through configuration management | Preventive | |
Configure printers to only accept print jobs from known print spoolers. CC ID 04812 | System hardening through configuration management | Preventive | |
Configure print spoolers to accept jobs from authorized users only. CC ID 04813 | System hardening through configuration management | Preventive | |
Prevent Multi-Function Devices from connecting to networks routing restricted data, unless authorized. CC ID 04815 | System hardening through configuration management | Preventive | |
Restrict access to remote file shares. CC ID 04817 | System hardening through configuration management | Preventive | |
Configure Multi-Function Devices to prevent non-printer administrators from altering the global configuration file. CC ID 04818 | System hardening through configuration management | Preventive | |
Configure the user's .forward file to mode 600. CC ID 04848 | System hardening through configuration management | Preventive | |
Configure the GID of accounts other than root and locked system accounts properly. CC ID 05448 | System hardening through configuration management | Preventive | |
Set the smbpasswd executable permissions properly. CC ID 05459 | System hardening through configuration management | Preventive | |
Grant or reject sudo privileges to the wheel group, as appropriate. CC ID 05539 | System hardening through configuration management | Preventive | |
Set the /var/log/pamlog log permissions properly. CC ID 05562 | System hardening through configuration management | Preventive | |
Restrict the audit log permissions. CC ID 05566 | System hardening through configuration management | Preventive | |
Use the pkgchk utility to force default settings and to verify the ownership, group ownership, and access permissions for installed packages. CC ID 05567 | System hardening through configuration management | Preventive | |
Configure role-based access control (RBAC) caching elements to organizational standards. CC ID 05568 | System hardening through configuration management | Preventive | |
Configure the read-only option for all NFS exports. CC ID 05572 | System hardening through configuration management | Preventive | |
Configure access controls through /etc/login.access and access.conf for non-superusers. CC ID 05573 | System hardening through configuration management | Preventive | |
Enable or disable root login via Secure Shell, as appropriate. CC ID 05574 | System hardening through configuration management | Preventive | |
Verify the ftpusers file restricts access to certain accounts. CC ID 05575 | System hardening through configuration management | Preventive | |
Enable or disable SSH host-based authentication, as appropriate. CC ID 05576 | System hardening through configuration management | Preventive | |
Configure the environmental variable path properly. CC ID 05577 | System hardening through configuration management | Preventive | |
Configure local initialization files and global initialization files to allow or deny write access to the terminal, as appropriate. CC ID 05578 | System hardening through configuration management | Preventive | |
Verify user .shosts files exist or not, as appropriate. CC ID 05579 | System hardening through configuration management | Preventive | |
Set the default umask for the bash shell properly for all users. CC ID 05580 | System hardening through configuration management | Preventive | |
Set the default umask for the csh shell properly for all users. CC ID 05581 | System hardening through configuration management | Preventive | |
Configure the system umask properly. CC ID 05582 | System hardening through configuration management | Preventive | |
Verify console device ownership is restricted to root-only, as appropriate. CC ID 05583 | System hardening through configuration management | Preventive | |
Configure the "Access credential Manager as a trusted caller" User Right properly. CC ID 05584 | System hardening through configuration management | Preventive | |
Restrict the right of modifying an Object label. CC ID 05585 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Allow UIAccess applications to prompt for elevation" setting. CC ID 05586 | System hardening through configuration management | Preventive | |
Configure the "Do Not Allow New Client Connections" policy for Terminal Services properly. CC ID 05587 | System hardening through configuration management | Preventive | |
Configure the "Remote Control Settings" policy for Terminal Services properly. CC ID 05588 | System hardening through configuration management | Preventive | |
Configure the Cron directory permissions to organizational standards. CC ID 05997 | System hardening through configuration management | Preventive | |
Configure the cron.allow file with the user group permitted to use the cron facility, as appropriate. CC ID 06002 | System hardening through configuration management | Preventive | |
Configure the cron.deny file with the user set permitted to use the cron facility, as appropriate. CC ID 06003 | System hardening through configuration management | Preventive | |
Configure the Cron directories to be owned by an appropriate user and group. CC ID 06004 | System hardening through configuration management | Preventive | |
Configure the at.deny file with the user set permitted to use the at facility, as appropriate. CC ID 06006 | System hardening through configuration management | Preventive | |
Configure the /etc/cron.monthly file to be owned by an appropriate user or group. CC ID 06007 | System hardening through configuration management | Preventive | |
Configure /etc/cron.hourly to be owned by an appropriate user or group. CC ID 06011 | System hardening through configuration management | Preventive | |
Configure /etc/cron.daily to be owned by an appropriate user or group. CC ID 06012 | System hardening through configuration management | Preventive | |
Configure the home directory for the root user, as appropriate. CC ID 06017 | System hardening through configuration management | Preventive | |
Configure the home directory for each user account, as appropriate. CC ID 06018 | System hardening through configuration management | Preventive | |
Configure the home directory permissions for the Superuser account, as appropriate. CC ID 06020 | System hardening through configuration management | Preventive | |
Configure each user home directory to be owned by an appropriate user or group. CC ID 06021 | System hardening through configuration management | Preventive | |
Configure the world-write permissions for all files, as appropriate. CC ID 06026 | System hardening through configuration management | Preventive | |
Configure and assign the correct service permissions for the SNMP Service. CC ID 06041 | System hardening through configuration management | Preventive | |
Configure the service permissions for NetMeeting, as appropriate. CC ID 06045 | System hardening through configuration management | Preventive | |
Configure the "Allow log on through Remote Desktop Services" User Right properly. CC ID 06062 | System hardening through configuration management | Preventive | |
Configure the "Deny log on through Remote Desktop Services" User Right properly. CC ID 06063 | System hardening through configuration management | Preventive | |
Remove all members found in the Windows OS Power Users Group. CC ID 06573 | System hardening through configuration management | Preventive | |
Configure the "sudo" to organizational standards. CC ID 15325 | System hardening through configuration management | Preventive | |
Require users to use the 'sudo' command when accessing the root account. CC ID 06736 | System hardening through configuration management | Preventive | |
Configure the "log all su (switch user) activity" setting to organizational standards. CC ID 08965 | System hardening through configuration management | Preventive | |
Configure the "status" of the "apache" account to organizational standards. CC ID 09018 | System hardening through configuration management | Preventive | |
Configure the "apache" account group membership to organizational standards. CC ID 09033 | System hardening through configuration management | Preventive | |
Configure the "CustomLog" files permissions to organizational standards. CC ID 09051 | System hardening through configuration management | Preventive | |
Configure the "ErrorLog" files permissions to organizational standards. CC ID 09052 | System hardening through configuration management | Preventive | |
Configure the "default webpage" for "all readable apache web document directories" to organizational standards. CC ID 09071 | System hardening through configuration management | Preventive | |
Configure the "ScriptAlias" directories permissions to organizational standards. CC ID 09078 | System hardening through configuration management | Preventive | |
Configure the "ScriptAliasMatch" directories permissions to organizational standards. CC ID 09081 | System hardening through configuration management | Preventive | |
Configure the "DocumentRoot" directories permissions to organizational standards. CC ID 09084 | System hardening through configuration management | Preventive | |
Configure the "Alias" directories permissions to organizational standards. CC ID 09087 | System hardening through configuration management | Preventive | |
Configure the "ServerRoot" directories permissions to organizational standards. CC ID 09090 | System hardening through configuration management | Preventive | |
Configure the "Enable Logging" setting for the "master home directory" to organizational standards. CC ID 09156 | System hardening through configuration management | Preventive | |
Configure the "Read" permission for the "master home directory" to organizational standards. CC ID 09157 | System hardening through configuration management | Preventive | |
Configure the "Write" permission for the "master home directory" to organizational standards. CC ID 09158 | System hardening through configuration management | Preventive | |
Configure the "Script Source Access" permission for the "master home directory" to organizational standards. CC ID 09159 | System hardening through configuration management | Preventive | |
Configure the "Directory Browsing" permission for the "master home directory" to organizational standards. CC ID 09160 | System hardening through configuration management | Preventive | |
Configure the "Log Visits" permission for the "master home directory" to organizational standards. CC ID 09161 | System hardening through configuration management | Preventive | |
Configure the "Index this resource" permission for the "master home directory" to organizational standards. CC ID 09162 | System hardening through configuration management | Preventive | |
Configure the "Execute Permissions" permission for the "master home directory" to organizational standards. CC ID 09163 | System hardening through configuration management | Preventive | |
Configure the "Anonymous Access" permission for the "master home directory" to organizational standards. CC ID 09164 | System hardening through configuration management | Preventive | |
Configure the "Basic Authentication" setting for the "master home directory" to organizational standards. CC ID 09165 | System hardening through configuration management | Preventive | |
Configure the "Integrated Windows Authentication" setting for the "master home directory" to organizational standards. CC ID 09166 | System hardening through configuration management | Preventive | |
Configure the "Read" permission" for the "website home directory" to organizational standards. CC ID 09168 | System hardening through configuration management | Preventive | |
Configure the "Write" privilege for the "website home directory" to organizational standards. CC ID 09169 | System hardening through configuration management | Preventive | |
Configure the "Script Source Access" permission for the "website home directory" to organizational standards. CC ID 09170 | System hardening through configuration management | Preventive | |
Configure the "Directory Browsing" permission for the "website home directory" to organizational standards. CC ID 09171 | System hardening through configuration management | Preventive | |
Configure the "Log Visits" permission for the "website home directory" to organizational standards. CC ID 09172 | System hardening through configuration management | Preventive | |
Configure the "Index this resource" permission for the "website home directory" to organizational standards. CC ID 09173 | System hardening through configuration management | Preventive | |
Configure the "Execute Permissions" permission to organizational standards. CC ID 09174 | System hardening through configuration management | Preventive | |
Configure the "Anonymous Access" permission for the "website home directory" to organizational standards. CC ID 09175 | System hardening through configuration management | Preventive | |
Configure the "file auditing" setting for the "\%SystemRoot%System32Inetsrv" directory to organizational standards. CC ID 09198 | System hardening through configuration management | Preventive | |
Configure the "membership" of the "IUSR" account to organizational standards. CC ID 09213 | System hardening through configuration management | Preventive | |
Configure the "IUSR" account to organizational standards. CC ID 09214 | System hardening through configuration management | Preventive | |
Configure the "file auditing" setting for the "Inetpub" directory to organizational standards. CC ID 09225 | System hardening through configuration management | Preventive | |
Configure the "file auditing" setting for the "Web Root" directory to organizational standards. CC ID 09226 | System hardening through configuration management | Preventive | |
Configure the "file auditing" setting for the "Metaback" directory to organizational standards. CC ID 09227 | System hardening through configuration management | Preventive | |
Configure the "IWAM" account to organizational standards. CC ID 09228 | System hardening through configuration management | Preventive | |
Configure the "Application object owner" accounts to organizational standards. CC ID 09257 | System hardening through configuration management | Preventive | |
Configure the "system tables" permissions to organizational standards. CC ID 09260 | System hardening through configuration management | Preventive | |
Configure the "DDL" permissions to organizational standards. CC ID 09261 | System hardening through configuration management | Preventive | |
Configure the "WITH GRANT OPTION" permissions to organizational standards. CC ID 09262 | System hardening through configuration management | Preventive | |
Configure the "Object" permissions for the "PUBLIC or GUEST" account to organizational standards. CC ID 09263 | System hardening through configuration management | Preventive | |
Configure the "restore database data or other DBMS configurations, features or objects" permissions to organizational standards. CC ID 09267 | System hardening through configuration management | Preventive | |
Configure the "SQL Server Database Service" account to organizational standards. CC ID 09273 | System hardening through configuration management | Preventive | |
Configure the "SQL Server Agent" account to organizational standards. CC ID 09274 | System hardening through configuration management | Preventive | |
Configure the "SQL Server registry keys and sub-keys" permissions to organizational standards. CC ID 09276 | System hardening through configuration management | Preventive | |
Configure the "built-in sa" account to organizational standards. CC ID 09298 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "ErrorDumpDir" directory to organizational standards. CC ID 09299 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "DefaultLog " file to organizational standards. CC ID 09300 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "ErrorLog" File to organizational standards. CC ID 09301 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "SQLPath " directory to organizational standards. CC ID 09302 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the " BackupDirectory " directory to organizational standards. CC ID 09303 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "FullTextDefaultPath " directory to organizational standards. CC ID 09304 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "WorkingDirectory " directory to organizational standards. CC ID 09305 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "SQLBinRoot " directory to organizational standards. CC ID 09306 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "SQLDataRoot " directory to organizational standards. CC ID 09307 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "SQLProgramDir " directory to organizational standards. CC ID 09308 | System hardening through configuration management | Preventive | |
Configure the "audit access" setting for the "DataDir " directory to organizational standards. CC ID 09309 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services" account to organizational standards. CC ID 09318 | System hardening through configuration management | Preventive | |
Configure the "Integration Services" account to organizational standards. CC ID 09319 | System hardening through configuration management | Preventive | |
Configure the "Reporting Services" account to organizational standards. CC ID 09320 | System hardening through configuration management | Preventive | |
Configure the "Notification Services" account to organizational standards. CC ID 09321 | System hardening through configuration management | Preventive | |
Configure the "Full Text Search" account to organizational standards. CC ID 09322 | System hardening through configuration management | Preventive | |
Configure the "SQL Server Browser" account to organizational standards. CC ID 09323 | System hardening through configuration management | Preventive | |
Configure the "SQL Server Active Directory Helper" account to organizational standards. CC ID 09324 | System hardening through configuration management | Preventive | |
Configure the "SQL Writer" account to organizational standards. CC ID 09325 | System hardening through configuration management | Preventive | |
Configure the "SQL Server MSSearch" registry key permissions to organizational standards. CC ID 09327 | System hardening through configuration management | Preventive | |
Configure the "SQL Server Agent" registry key permissions to organizational standards. CC ID 09328 | System hardening through configuration management | Preventive | |
Configure the "SQL Server RS" registry key permissions to organizational standards. CC ID 09330 | System hardening through configuration management | Preventive | |
Configure the "Reporting Services Windows Integrated Security" accounts to organizational standards. CC ID 09347 | System hardening through configuration management | Preventive | |
Configure the "permissions" of the "SQL Server Agent proxy" accounts to organizational standards. CC ID 09352 | System hardening through configuration management | Preventive | |
Configure the "default webpage" for "all readable Tomcat Apache web document" directories to organizational standards. CC ID 09729 | System hardening through configuration management | Preventive | |
Configure the "account" setting for "Tomcat" to organizational standards. CC ID 09792 | System hardening through configuration management | Preventive | |
Configure the "specified codebase" permissions to organizational standards. CC ID 09796 | System hardening through configuration management | Preventive | |
Configure the "property read permission" for the "Tomcat web application JVM" to organizational standards. CC ID 09813 | System hardening through configuration management | Preventive | |
Configure the "property write permission" for the "Tomcat web application JVM" to organizational standards. CC ID 09814 | System hardening through configuration management | Preventive | |
Configure the "status of the "Tomcat" account to organizational standards. CC ID 09815 | System hardening through configuration management | Preventive | |
Configure the "user account" for "Oracle WebLogic Server" to organizational standards. CC ID 09823 | System hardening through configuration management | Preventive | |
Configure the "Keystores" permission in "directories" to organizational standards. CC ID 09901 | System hardening through configuration management | Preventive | |
Implement a reference monitor to implement the Access Control policies. CC ID 10096 | System hardening through configuration management | Preventive | |
Configure the "Add Printer wizard - Network scan page (Managed network)" setting to organizational standards. CC ID 10692 | System hardening through configuration management | Preventive | |
Configure the "Add Printer wizard - Network scan page (Unmanaged network)" setting to organizational standards. CC ID 10693 | System hardening through configuration management | Preventive | |
Configure the "All Removable Storage classes: Deny all access" setting to organizational standards. CC ID 10696 | System hardening through configuration management | Preventive | |
Configure the "All Removable Storage: Allow direct access in remote sessions" setting to organizational standards. CC ID 10697 | System hardening through configuration management | Preventive | |
Configure the "Allowrdp files from unknown publishers" setting to organizational standards. CC ID 10698 | System hardening through configuration management | Preventive | |
Configure the "Allowrdp files from valid publishers and user's defaultrdp settings" setting to organizational standards. CC ID 10699 | System hardening through configuration management | Preventive | |
Configure the "Allow admin to install from Remote Desktop Services session" setting to organizational standards. CC ID 10700 | System hardening through configuration management | Preventive | |
Configure the "Allow administrators to override Device Installation Restriction policies" setting to organizational standards. CC ID 10701 | System hardening through configuration management | Preventive | |
Configure the "Allow Applications to Prevent Automatic Sleep (On Battery)" setting to organizational standards. CC ID 10702 | System hardening through configuration management | Preventive | |
Configure the "Allow asynchronous user Group Policy processing when logging on through Remote Desktop Services" setting to organizational standards. CC ID 10704 | System hardening through configuration management | Preventive | |
Configure the "Allow audio and video playback redirection" setting to organizational standards. CC ID 10705 | System hardening through configuration management | Preventive | |
Configure the "Allow audio recording redirection" setting to organizational standards. CC ID 10706 | System hardening through configuration management | Preventive | |
Configure the "Allow automatic configuration of listeners" setting to organizational standards. CC ID 10707 | System hardening through configuration management | Preventive | |
Configure the "Allow Automatic Sleep with Open Network Files (On Battery)" setting to organizational standards. CC ID 10708 | System hardening through configuration management | Preventive | |
Configure the "Allow Automatic Updates immediate installation" setting to organizational standards. CC ID 10710 | System hardening through configuration management | Preventive | |
Configure the "Allow BITS Peercaching" setting to organizational standards. CC ID 10711 | System hardening through configuration management | Preventive | |
Configure the "Allow certificates with no extended key usage certificate attribute" setting to organizational standards. CC ID 10712 | System hardening through configuration management | Preventive | |
Configure the "Allow Corporate redirection of Customer Experience Improvement uploads" setting to organizational standards. CC ID 10713 | System hardening through configuration management | Preventive | |
Configure the "Allow CredSSP authentication" setting for the "WinRM client" to organizational standards. CC ID 10714 | System hardening through configuration management | Preventive | |
Configure the "Allow Cross-Forest User Policy and Roaming User Profiles" setting to organizational standards. CC ID 10716 | System hardening through configuration management | Preventive | |
Configure the "Allow cryptography algorithms compatible with Windows NT 4.0" setting to organizational standards. CC ID 10717 | System hardening through configuration management | Preventive | |
Configure the "Allow Delegating Default Credentials" setting to organizational standards. CC ID 10718 | System hardening through configuration management | Preventive | |
Configure the "Allow Delegating Default Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10719 | System hardening through configuration management | Preventive | |
Configure the "Allow Delegating Fresh Credentials" setting to organizational standards. CC ID 10720 | System hardening through configuration management | Preventive | |
Configure the "Allow Delegating Fresh Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10721 | System hardening through configuration management | Preventive | |
Configure the "Allow Delegating Saved Credentials" setting to organizational standards. CC ID 10722 | System hardening through configuration management | Preventive | |
Configure the "Allow Delegating Saved Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10723 | System hardening through configuration management | Preventive | |
Configure the "Allow desktop composition for remote desktop sessions" setting to organizational standards. CC ID 10724 | System hardening through configuration management | Preventive | |
Configure the "Allow DNS Suffix Appending to Unqualified Multi-Label Name Queries" setting to organizational standards. CC ID 10725 | System hardening through configuration management | Preventive | |
Configure the "Allow domain users to log on using biometrics" setting to organizational standards. CC ID 10726 | System hardening through configuration management | Preventive | |
Configure the "Allow ECC certificates to be used for logon and authentication" setting to organizational standards. CC ID 10727 | System hardening through configuration management | Preventive | |
Configure the "Allow Enhanced Storage certificate provisioning" setting to organizational standards. CC ID 10728 | System hardening through configuration management | Preventive | |
Configure the "Allow installation of devices that match any of these device IDs" setting to organizational standards. CC ID 10729 | System hardening through configuration management | Preventive | |
Configure the "Allow installation of devices using drivers that match these device setup classes" setting to organizational standards. CC ID 10730 | System hardening through configuration management | Preventive | |
Configure the "Allow Integrated Unblock screen to be displayed at the time of logon" setting to organizational standards. CC ID 10731 | System hardening through configuration management | Preventive | |
Configure the "Allow local activation security check exemptions" setting to organizational standards. CC ID 10732 | System hardening through configuration management | Preventive | |
Configure the "Allow logon scripts when NetBIOS or WINS is disabled" setting to organizational standards. CC ID 10733 | System hardening through configuration management | Preventive | |
Configure the "Allow non-administrators to install drivers for these device setup classes" setting to organizational standards. CC ID 10734 | System hardening through configuration management | Preventive | |
Configure the "Allow non-administrators to receive update notifications" setting to organizational standards. CC ID 10735 | System hardening through configuration management | Preventive | |
Configure the "Allow only system backup" setting to organizational standards. CC ID 10736 | System hardening through configuration management | Preventive | |
Configure the "Allow only USB root hub connected Enhanced Storage devices" setting to organizational standards. CC ID 10737 | System hardening through configuration management | Preventive | |
Configure the "Allow or Disallow use of the Offline Files feature" setting to organizational standards. CC ID 10738 | System hardening through configuration management | Preventive | |
Configure the "Allow Print Spooler to accept client connections" setting to organizational standards. CC ID 10739 | System hardening through configuration management | Preventive | |
Configure the "Allow printers to be published" setting to organizational standards. CC ID 10740 | System hardening through configuration management | Preventive | |
Configure the "Allow pruning of published printers" setting to organizational standards. CC ID 10741 | System hardening through configuration management | Preventive | |
Configure the "Allow remote start of unlisted programs" setting to organizational standards. CC ID 10743 | System hardening through configuration management | Preventive | |
Configure the "Allow restore of system to default state" setting to organizational standards. CC ID 10744 | System hardening through configuration management | Preventive | |
Configure the "Allow signature keys valid for Logon" setting to organizational standards. CC ID 10745 | System hardening through configuration management | Preventive | |
Configure the "Allow signed updates from an intranet Microsoft update service location" setting to organizational standards. CC ID 10746 | System hardening through configuration management | Preventive | |
Configure the "Allow the Network Access Protection client to support the 802.1x Enforcement Client component" setting to organizational standards. CC ID 10747 | System hardening through configuration management | Preventive | |
Configure the "Allow time invalid certificates" setting to organizational standards. CC ID 10748 | System hardening through configuration management | Preventive | |
Configure the "Allow time zone redirection" setting to organizational standards. CC ID 10749 | System hardening through configuration management | Preventive | |
Configure the "Allow user name hint" setting to organizational standards. CC ID 10750 | System hardening through configuration management | Preventive | |
Configure the "Allow users to log on using biometrics" setting to organizational standards. CC ID 10751 | System hardening through configuration management | Preventive | |
Configure the "Always render print jobs on the server" setting to organizational standards. CC ID 10752 | System hardening through configuration management | Preventive | |
Configure the "Always use classic logon" setting to organizational standards. CC ID 10754 | System hardening through configuration management | Preventive | |
Configure the "Always use custom logon background" setting to organizational standards. CC ID 10755 | System hardening through configuration management | Preventive | |
Configure the "Apply the default user logon picture to all users" setting to organizational standards. CC ID 10757 | System hardening through configuration management | Preventive | |
Configure the "Assign a default domain for logon" setting to organizational standards. CC ID 10758 | System hardening through configuration management | Preventive | |
Configure the "CD and DVD: Deny execute access" setting to organizational standards. CC ID 10767 | System hardening through configuration management | Preventive | |
Configure the "CD and DVD: Deny read access" setting to organizational standards. CC ID 10768 | System hardening through configuration management | Preventive | |
Configure the "CD and DVD: Deny write access" setting to organizational standards. CC ID 10769 | System hardening through configuration management | Preventive | |
Configure the "Printers preference logging and tracing" setting to organizational standards. CC ID 10799 | System hardening through configuration management | Preventive | |
Configure the "Contact PDC on logon failure" setting to organizational standards. CC ID 10825 | System hardening through configuration management | Preventive | |
Configure the "Custom Classes: Deny read access" setting to organizational standards. CC ID 10835 | System hardening through configuration management | Preventive | |
Configure the "Custom Classes: Deny write access" setting to organizational standards. CC ID 10836 | System hardening through configuration management | Preventive | |
Configure the "Deny Delegating Default Credentials" setting to organizational standards. CC ID 10848 | System hardening through configuration management | Preventive | |
Configure the "Deny Delegating Fresh Credentials" setting to organizational standards. CC ID 10849 | System hardening through configuration management | Preventive | |
Configure the "Deny Delegating Saved Credentials" setting to organizational standards. CC ID 10850 | System hardening through configuration management | Preventive | |
Configure the "Disallow changing of geographic location" setting to organizational standards. CC ID 10870 | System hardening through configuration management | Preventive | |
Configure the "Disallow Interactive Users from generating Resultant Set of Policy data" setting to organizational standards. CC ID 10871 | System hardening through configuration management | Preventive | |
Configure the "Disallow Kerberos authentication" setting for the "WinRM client" to organizational standards. CC ID 10872 | System hardening through configuration management | Preventive | |
Configure the "Disallow locally attached storage as backup target" setting to organizational standards. CC ID 10874 | System hardening through configuration management | Preventive | |
Configure the "Disallow Negotiate authentication" setting for the "WinRM client" to organizational standards. CC ID 10875 | System hardening through configuration management | Preventive | |
Configure the "Disallow network as backup target" setting to organizational standards. CC ID 10877 | System hardening through configuration management | Preventive | |
Configure the "Disallow optical media as backup target" setting to organizational standards. CC ID 10878 | System hardening through configuration management | Preventive | |
Configure the "Disallow run-once backups" setting to organizational standards. CC ID 10879 | System hardening through configuration management | Preventive | |
Configure the "Disallow selection of Custom Locales" setting to organizational standards. CC ID 10880 | System hardening through configuration management | Preventive | |
Configure the "Disallow user override of locale settings" setting to organizational standards. CC ID 10881 | System hardening through configuration management | Preventive | |
Configure the "Display information about previous logons during user logon" setting to organizational standards. CC ID 10887 | System hardening through configuration management | Preventive | |
Configure the "Do not allow adding new targets via manual configuration" setting to organizational standards. CC ID 10891 | System hardening through configuration management | Preventive | |
Configure the "Do not allow additional session logins" setting to organizational standards. CC ID 10892 | System hardening through configuration management | Preventive | |
Configure the "Do not allow changes to initiator CHAP secret" setting to organizational standards. CC ID 10893 | System hardening through configuration management | Preventive | |
Configure the "Do not allow changes to initiator iqn name" setting to organizational standards. CC ID 10894 | System hardening through configuration management | Preventive | |
Configure the "Do not allow client printer redirection" setting to organizational standards. CC ID 10895 | System hardening through configuration management | Preventive | |
Configure the "Do not allow clipboard redirection" setting to organizational standards. CC ID 10896 | System hardening through configuration management | Preventive | |
Configure the "Do not allow color changes" setting to organizational standards. CC ID 10897 | System hardening through configuration management | Preventive | |
Configure the "Do not allow COM port redirection" setting to organizational standards. CC ID 10898 | System hardening through configuration management | Preventive | |
Configure the "Do not allow compression on all NTFS volumes" setting to organizational standards. CC ID 10899 | System hardening through configuration management | Preventive | |
Configure the "Do not allow connections without IPSec" setting to organizational standards. CC ID 10900 | System hardening through configuration management | Preventive | |
Configure the "Do not allow desktop composition" setting to organizational standards. CC ID 10901 | System hardening through configuration management | Preventive | |
Configure the "Do not allow encryption on all NTFS volumes" setting to organizational standards. CC ID 10902 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Flip3D invocation" setting to organizational standards. CC ID 10903 | System hardening through configuration management | Preventive | |
Configure the "Do not allow font smoothing" setting to organizational standards. CC ID 10904 | System hardening through configuration management | Preventive | |
Configure the "Do not allow LPT port redirection" setting to organizational standards. CC ID 10905 | System hardening through configuration management | Preventive | |
Configure the "Do not allow manual configuration of discovered targets" setting to organizational standards. CC ID 10906 | System hardening through configuration management | Preventive | |
Configure the "Do not allow manual configuration of iSNS servers" setting to organizational standards. CC ID 10907 | System hardening through configuration management | Preventive | |
Configure the "Do not allow manual configuration of target portals" setting to organizational standards. CC ID 10908 | System hardening through configuration management | Preventive | |
Configure the "Do not allow non-Enhanced Storage removable devices" setting to organizational standards. CC ID 10909 | System hardening through configuration management | Preventive | |
Configure the "Do not allow password authentication of Enhanced Storage devices" setting to organizational standards. CC ID 10910 | System hardening through configuration management | Preventive | |
Configure the "Do not allow sessions without mutual CHAP" setting to organizational standards. CC ID 10912 | System hardening through configuration management | Preventive | |
Configure the "Do not allow sessions without one way CHAP" setting to organizational standards. CC ID 10913 | System hardening through configuration management | Preventive | |
Configure the "Do not allow smart card device redirection" setting to organizational standards. CC ID 10914 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Snipping Tool to run" setting to organizational standards. CC ID 10915 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Sound Recorder to run" setting to organizational standards. CC ID 10916 | System hardening through configuration management | Preventive | |
Configure the "Do not allow the BITS client to use Windows Branch Cache" setting to organizational standards. CC ID 10918 | System hardening through configuration management | Preventive | |
Configure the "Do not allow the computer to act as a BITS Peercaching client" setting to organizational standards. CC ID 10919 | System hardening through configuration management | Preventive | |
Configure the "Do not allow the computer to act as a BITS Peercaching server" setting to organizational standards. CC ID 10920 | System hardening through configuration management | Preventive | |
Configure the "Do not allow window animations" setting to organizational standards. CC ID 10921 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Windows Media Center to run" setting to organizational standards. CC ID 10923 | System hardening through configuration management | Preventive | |
Configure the "Do not display Initial Configuration Tasks window automatically at logon" setting to organizational standards. CC ID 10927 | System hardening through configuration management | Preventive | |
Configure the "Do not display Manage Your Server page at logon" setting to organizational standards. CC ID 10928 | System hardening through configuration management | Preventive | |
Configure the "Do not display Server Manager automatically at logon" setting to organizational standards. CC ID 10929 | System hardening through configuration management | Preventive | |
Configure the "Do not set default client printer to be default printer in a session" setting to organizational standards. CC ID 10935 | System hardening through configuration management | Preventive | |
Configure the "Execute print drivers in isolated processes" setting to organizational standards. CC ID 10964 | System hardening through configuration management | Preventive | |
Configure the "Expected dial-up delay on logon" setting to organizational standards. CC ID 10965 | System hardening through configuration management | Preventive | |
Configure the "Extend Point and Print connection to search Windows Update" setting to organizational standards. CC ID 10966 | System hardening through configuration management | Preventive | |
Configure the "Filter duplicate logon certificates" setting to organizational standards. CC ID 10967 | System hardening through configuration management | Preventive | |
Configure the "Floppy Drives: Deny execute access" setting to organizational standards. CC ID 10969 | System hardening through configuration management | Preventive | |
Configure the "Floppy Drives: Deny read access" setting to organizational standards. CC ID 10970 | System hardening through configuration management | Preventive | |
Configure the "Floppy Drives: Deny write access" setting to organizational standards. CC ID 10971 | System hardening through configuration management | Preventive | |
Configure the "Limit the maximum number of files allowed in a BITS job" setting to organizational standards. CC ID 11020 | System hardening through configuration management | Preventive | |
Configure the "Netlogon share compatibility" setting to organizational standards. CC ID 11048 | System hardening through configuration management | Preventive | |
Configure the "Only allow local user profiles" setting to organizational standards. CC ID 11056 | System hardening through configuration management | Preventive | |
Configure the "Only use Package Point and print" setting to organizational standards. CC ID 11057 | System hardening through configuration management | Preventive | |
Configure the "Override print driver execution compatibility setting reported by print driver" setting to organizational standards. CC ID 11059 | System hardening through configuration management | Preventive | |
Configure the "Package Point and print - Approved servers" setting to organizational standards. CC ID 11061 | System hardening through configuration management | Preventive | |
Configure the "Pre-populate printer search location text" setting to organizational standards. CC ID 11065 | System hardening through configuration management | Preventive | |
Configure the "Printer browsing" setting to organizational standards. CC ID 11097 | System hardening through configuration management | Preventive | |
Configure the "Provide information about previous logons to client computers" setting to organizational standards. CC ID 11111 | System hardening through configuration management | Preventive | |
Configure the "Prune printers that are not automatically republished" setting to organizational standards. CC ID 11112 | System hardening through configuration management | Preventive | |
Configure the "Redirect only the default client printer" setting to organizational standards. CC ID 11116 | System hardening through configuration management | Preventive | |
Configure the "Removable Disks: Deny execute access" setting to organizational standards. CC ID 11123 | System hardening through configuration management | Preventive | |
Configure the "Removable Disks: Deny read access" setting to organizational standards. CC ID 11124 | System hardening through configuration management | Preventive | |
Configure the "Removable Disks: Deny write access" setting to organizational standards. CC ID 11125 | System hardening through configuration management | Preventive | |
Configure the "Run logon scripts synchronously" setting to organizational standards. CC ID 11151 | System hardening through configuration management | Preventive | |
Configure the "Run these programs at user logon" setting to organizational standards. CC ID 11155 | System hardening through configuration management | Preventive | |
Configure the "Selectively allow the evaluation of a symbolic link" setting to organizational standards. CC ID 11169 | System hardening through configuration management | Preventive | |
Configure the "Specify SHA1 thumbprints of certificates representing trustedrdp publishers" setting to organizational standards. CC ID 11215 | System hardening through configuration management | Preventive | |
Configure the "Tape Drives: Deny execute access" setting to organizational standards. CC ID 11233 | System hardening through configuration management | Preventive | |
Configure the "Tape Drives: Deny read access" setting to organizational standards. CC ID 11234 | System hardening through configuration management | Preventive | |
Configure the "Tape Drives: Deny write access" setting to organizational standards. CC ID 11235 | System hardening through configuration management | Preventive | |
Configure the "Timeout for hung logon sessions during shutdown" setting to organizational standards. CC ID 11245 | System hardening through configuration management | Preventive | |
Configure the "Troubleshooting: Allow users to access and run Troubleshooting Wizards" setting to organizational standards. CC ID 11247 | System hardening through configuration management | Preventive | |
Configure the "Troubleshooting: Allow users to access online troubleshooting content on Microsoft servers from the Troubleshooting Control Panel (via the Windows Online Troubleshooting Service - WOTS)" setting to organizational standards. CC ID 11248 | System hardening through configuration management | Preventive | |
Configure the "Turn off the "Order Prints" picture task" setting to organizational standards. CC ID 11314 | System hardening through configuration management | Preventive | |
Configure the "Use Remote Desktop Easy Print printer driver first" setting to organizational standards. CC ID 11365 | System hardening through configuration management | Preventive | |
Configure the "Domain controller: Allow server operators to schedule tasks" setting. CC ID 01735 | System hardening through configuration management | Preventive | |
Configure the "domain member: require strong (Windows 2000 or later) session key" setting. CC ID 01738 | System hardening through configuration management | Preventive | |
Configure the "Enforce user logon restrictions" setting. CC ID 04500 | System hardening through configuration management | Preventive | |
Configure the "Maximum lifetime for service ticket" setting. CC ID 04501 | System hardening through configuration management | Preventive | |
Configure the "Maximum lifetime for user ticket" setting. CC ID 04502 | System hardening through configuration management | Preventive | |
Configure the "Maximum lifetime for user ticket renewal" setting. CC ID 04503 | System hardening through configuration management | Preventive | |
Configure the "Maximum tolerance for computer clock synchronization" setting. CC ID 04504 | System hardening through configuration management | Preventive | |
Verify the Trusted Computing Base is installed, as appropriate. CC ID 05589 | System hardening through configuration management | Preventive | |
Configure the "Shutdown: Allow system to be shut down without having to log on" setting. CC ID 01779 | System hardening through configuration management | Preventive | |
Configure the "Shutdown: Clear virtual memory pagefile" setting. CC ID 01780 | System hardening through configuration management | Preventive | |
Configure Multi-Function Devices to clear their hard drives in between jobs. CC ID 04816 | System hardening through configuration management | Preventive | |
Configure shared volumes to use the appropriate file system for the network protocols being operated (NT File System in Windows OS or Netware SS), and configure the security parameters. CC ID 01927 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\at.exe. CC ID 01929 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\attrib.exe. CC ID 01930 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\cacls.exe. CC ID 01931 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\debug.exe. CC ID 01932 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\drwatson.exe. CC ID 01933 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\drwtsn32.exe. CC ID 01934 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\edlin.exe. CC ID 01935 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\eventcreate.exe. CC ID 01936 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\eventtriggers.exe. CC ID 01937 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\ftp.exe. CC ID 01938 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\net.exe. CC ID 01939 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\net1.exe. CC ID 01940 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\netsh.exe. CC ID 01941 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\rcp.exe. CC ID 01942 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\reg.exe. CC ID 01943 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\regedit.exe. CC ID 01944 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\regedt32.exe. CC ID 01945 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\regsvr32.exe. CC ID 01946 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\rexec.exe. CC ID 01947 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\rsh.exe. CC ID 01948 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\runas.exe. CC ID 01949 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\sc.exe. CC ID 01950 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\subst.exe. CC ID 01951 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\telnet.exe. CC ID 01952 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\tftp.exe. CC ID 01953 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\tlntsvr.exe. CC ID 01954 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\. CC ID 01968 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\autoexec.bat. CC ID 01969 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\boot.ini. CC ID 01970 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\config.sys. CC ID 01971 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\io.sys. CC ID 01972 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\msdos.sys. CC ID 01973 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\ntbootdd.sys. CC ID 01974 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\ntdetect.com. CC ID 01975 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\ntldr. CC ID 01976 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings. CC ID 01977 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings\Administrator. CC ID 01978 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users. CC ID 01979 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson. CC ID 01980 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Setting\Default User. CC ID 01981 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\System Volume Information. CC ID 01982 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Temp. CC ID 01983 | System hardening through configuration management | Preventive | |
Configure the file permissions for %ProgramFiles%. CC ID 01984 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Program Files\Resource Kit. CC ID 01985 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%. CC ID 01986 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\$NTServicePackUninstall$. CC ID 01987 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\CSC. CC ID 01988 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Debug. CC ID 01989 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Debug\UserMode. CC ID 01990 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Offline Web Pages. CC ID 01991 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Registration. CC ID 01992 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Repair. CC ID 01993 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\security. CC ID 01994 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32. CC ID 01995 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\Ntbackup.exe. CC ID 01996 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\secedit.exe. CC ID 01997 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\appmgmt. CC ID 01998 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\config. CC ID 01999 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\dllcache. CC ID 02000 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\DTCLog. CC ID 02001 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\GroupPolicy. CC ID 02002 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\ias. CC ID 02003 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\NTMSData. CC ID 02004 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\reinstallbackups. CC ID 02005 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\Setup. CC ID 02006 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\spool\printers. CC ID 02007 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Tasks. CC ID 02008 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Temp. CC ID 02009 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Program Files\Resource Pro Kit. CC ID 04301 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\arp.exe. CC ID 04304 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\nbstat.exe. CC ID 04305 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\netstat.exe. CC ID 04306 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\nslookup.exe. CC ID 04307 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\regini.exe. CC ID 04308 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\route.exe. CC ID 04310 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\systeminfo.exe. CC ID 04311 | System hardening through configuration management | Preventive | |
Disable DOSFAT.NSS. CC ID 04462 | System hardening through configuration management | Preventive | |
Enable user directory data encryption. CC ID 04467 | System hardening through configuration management | Preventive | |
Remove the SYS:Mail directory. CC ID 04470 | System hardening through configuration management | Preventive | |
Configure the largest folder size (storage capacity) restrictions for user directories. CC ID 04471 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config\AppEvent.evt. CC ID 04506 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config\SecEvent.evt. CC ID 04507 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config\SysEvent.evt. CC ID 04508 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDirectory%. CC ID 04532 | System hardening through configuration management | Preventive | |
Configure the file permissions appropriately for all shell executables. CC ID 05619 | System hardening through configuration management | Preventive | |
Configure the file permissions for the remote copy (rcp) binary properly. CC ID 05620 | System hardening through configuration management | Preventive | |
Configure the file permissions for the remote login (rlogin) binary properly. CC ID 05621 | System hardening through configuration management | Preventive | |
Configure the file permissions for the rlogind binary properly. CC ID 05622 | System hardening through configuration management | Preventive | |
Configure the file permissions for the remote shell (rsh) binary properly. CC ID 05623 | System hardening through configuration management | Preventive | |
Configure the file permissions for the rshd binary properly. CC ID 05624 | System hardening through configuration management | Preventive | |
Configure the file permissions for the tftp binary properly. CC ID 05625 | System hardening through configuration management | Preventive | |
Configure the file permissions for the tftpd binary properly. CC ID 05626 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwts32.log properly. CC ID 05627 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemDrive%\My Download Files properly. CC ID 05628 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\Driver Cache\I386\Driver.cab properly. CC ID 05629 | System hardening through configuration management | Preventive | |
Configure the permissions for the %SystemRoot%\$NtUninstall* directories properly. CC ID 05630 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemDrive%\NTDS properly. CC ID 05631 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\SYSVOL properly. CC ID 05632 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\SYSVOL\domain\Policies properly. CC ID 05633 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\repl properly. CC ID 05634 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\repl\export properly. CC ID 05635 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\repl\import properly. CC ID 05636 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %ALL% properly. CC ID 05637 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %ALL%\Program Files\MQSeries properly. CC ID 05638 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %ALL%\Program Files\MQSeries\qmggr properly. CC ID 05639 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemDrive%\Documents and Settings\All Users\Application Data\Microsoft\HTML Help ACL properly. CC ID 05640 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemDrive%\WINNT\SECURITY\Database\SECEDIT.SDB ACL properly. CC ID 05641 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemDrive%\perflogs properly. CC ID 05642 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemDrive%\i386 properly. CC ID 05643 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %ProgramFiles%\Common Files\SpeechEngines\TTS properly. CC ID 05644 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\_default.plf properly. CC ID 05645 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\addins properly. CC ID 05646 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\appPatch properly. CC ID 05647 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\clock.avi properly. CC ID 05648 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\Connection Wizard properly. CC ID 05649 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Driver Cache properly. CC ID 05650 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\explorer.scf properly. CC ID 05651 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\explorer.exe properly. CC ID 05652 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\Help properly. CC ID 05653 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\inf\unregmp2.exe properly. CC ID 05654 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\Java properly. CC ID 05655 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\mib.bin properly. CC ID 05656 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\msagent properly. CC ID 05657 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\msdfmap.ini properly. CC ID 05658 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\mui properly. CC ID 05659 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\security\templates properly. CC ID 05660 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\speech properly. CC ID 05661 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system.ini properly. CC ID 05662 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system\setup.inf properly. CC ID 05663 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system\stdole.tlb properly. CC ID 05664 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\twain_32 properly. CC ID 05665 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\CatRoot properly. CC ID 05666 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\configf\systemprofile properly. CC ID 05667 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\dhcp properly. CC ID 05668 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\drivers properly. CC ID 05669 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\Export properly. CC ID 05670 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\ipconfig.exe properly. CC ID 05671 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\LogFiles properly. CC ID 05672 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\mshta.exe properly. CC ID 05673 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\mui properly. CC ID 05674 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\ShellExt properly. CC ID 05675 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\wbem properly. CC ID 05676 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\wbem\mof properly. CC ID 05677 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\wbem\repository properly. CC ID 05678 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\wbem\logs properly. CC ID 05679 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile% properly. CC ID 05680 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data properly. CC ID 05681 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft properly. CC ID 05682 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Crypto\DSSHKLMKeys properly. CC ID 05683 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Crypto\RSAHKLMKeys properly. CC ID 05684 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Dr Watson properly. CC ID 05685 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Dr Watson\drwtsn32.log properly. CC ID 05686 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\HTML Help properly. CC ID 05687 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\MediaIndex properly. CC ID 05688 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\Documents\desktop.ini properly. CC ID 05689 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %AllUsersProfile%\DRM properly. CC ID 05690 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\Debug\UserMode\userenv.log properly. CC ID 05691 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Installer properly. CC ID 05692 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\Prefetch properly. CC ID 05693 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\Registration\CRMLog properly. CC ID 05694 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\ciadv.msc properly. CC ID 05695 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Com\comexp.msc properly. CC ID 05696 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\compmgmt.msc properly. CC ID 05697 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config properly. CC ID 05698 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\Config\*.evt properly. CC ID 05699 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\devmgmt.msc properly. CC ID 05700 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\dfrg.msc properly. CC ID 05701 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\diskmgmt.msc properly. CC ID 05702 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\system32\eventvwr.msc properly. CC ID 05703 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\fsmgmt.msc properly. CC ID 05704 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\gpedit.msc properly. CC ID 05705 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\lusrmgr.msg properly. CC ID 05706 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\System32\MSDTC properly. CC ID 05707 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\ntmsoprq.msc properly. CC ID 05708 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\ntmsmgr.msc properly. CC ID 05709 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\perfmon.msc properly. CC ID 05710 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\RSoP.msc properly. CC ID 05711 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\secpol.msc properly. CC ID 05712 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\services.msc properly. CC ID 05713 | System hardening through configuration management | Preventive | |
Configure the file permissions for %SystemRoot%\System32\wmimgmt.msc properly. CC ID 05714 | System hardening through configuration management | Preventive | |
Configure the directory permissions for %SystemRoot%\Web properly. CC ID 05715 | System hardening through configuration management | Preventive | |
Configure the BitLocker setting appropriately for fixed disk drives and removable disk drives. CC ID 06064 | System hardening through configuration management | Preventive | |
Configure the settings for fixed disk drives, removable disk drives, and operating system disk drives. CC ID 06065 | System hardening through configuration management | Preventive | |
Configure the BitLocker identifiers. CC ID 06066 | System hardening through configuration management | Preventive | |
Configure utility and device driver software in accordance with organizational standards. CC ID 12340 | System hardening through configuration management | Preventive | |
Restrict utility programs from interfering with Information Technology operations. CC ID 13087 | System hardening through configuration management | Preventive | |
Configure appropriate Partitioning schemes. CC ID 02162 | System hardening through configuration management | Preventive | |
Verify the /home file system, /export/home file system, and /var file system each has its own partition. CC ID 02163 | System hardening through configuration management | Preventive | |
Verify the root shell environment is located outside the /usr directory in a partitioned environment. CC ID 02158 | System hardening through configuration management | Preventive | |
Verify the primary filesystem partition uses an appropriate filesystem. CC ID 05716 | System hardening through configuration management | Preventive | |
Enable the OS/2 subsystem, as appropriate. CC ID 05717 | System hardening through configuration management | Preventive | |
Configure the "nodev" option for "/run/shm" to organizational standards. CC ID 11376 | System hardening through configuration management | Preventive | |
Configure the "nosuid" option for "/run/shm" to organizational standards. CC ID 11377 | System hardening through configuration management | Preventive | |
Configure the "noexec" option for "/run/shm" to organizational standards. CC ID 11378 | System hardening through configuration management | Preventive | |
Configure attached printers and shared printers. CC ID 04499 | System hardening through configuration management | Preventive | |
Configure the IPsec security association lifetime to organizational standards. CC ID 16508 | System hardening through configuration management | Preventive | |
Configure route filtering to organizational standards. CC ID 16359 | System hardening through configuration management | Preventive | |
Configure security gateways to organizational standards. CC ID 16352 | System hardening through configuration management | Preventive | |
Configure network elements to organizational standards. CC ID 16361 | System hardening through configuration management | Preventive | |
Configure devices having access to network elements to organizational standards. CC ID 16408 | System hardening through configuration management | Preventive | |
Configure routing tables to organizational standards. CC ID 15438 | System hardening through configuration management | Preventive | |
Configure "NetBT NodeType configuration" to organizational standards. CC ID 15383 | System hardening through configuration management | Preventive | |
Configure "Allow remote server management through WinRM" to organizational standards. CC ID 15364 | System hardening through configuration management | Preventive | |
Configure "Allow network connectivity during connected-standby (on battery)" to organizational standards. CC ID 15342 | System hardening through configuration management | Preventive | |
Configure BOOTP queries to be accepted or denied by the DHCP Server, as appropriate. CC ID 06040 | System hardening through configuration management | Preventive | |
Enable TCP wrappers. CC ID 01567 | System hardening through configuration management | Preventive | |
Configure TCP wrappers. CC ID 01566 | System hardening through configuration management | Preventive | |
Configure devices to block or avoid outbound connections. CC ID 04807 | System hardening through configuration management | Preventive | |
Configure devices to deny inbound connections. CC ID 04805 | System hardening through configuration management | Preventive | |
Review and restrict network addresses and network protocols. CC ID 01518 | System hardening through configuration management | Preventive | |
Disable wireless access if it is not necessary. CC ID 12100 | System hardening through configuration management | Preventive | |
Configure Network Address Translation to organizational standards. CC ID 16395 | System hardening through configuration management | Preventive | |
Enable Network Address Translation or Port Address Translation for internal networks on all network access and control points. CC ID 00545 | System hardening through configuration management | Preventive | |
Disable NIS Server Daemons unless NIS Server Daemons are absolutely necessary. CC ID 01457 | System hardening through configuration management | Preventive | |
Disable NIS Client Daemons unless NIS Client Daemons are absolutely necessary. CC ID 01458 | System hardening through configuration management | Preventive | |
Disable NIS+ daemons unless NIS+ daemons are absolutely necessary. CC ID 01459 | System hardening through configuration management | Preventive | |
Disable Kerberos server daemons unless Kerberos server daemons are absolutely necessary. CC ID 01461 | System hardening through configuration management | Preventive | |
Disable Kerberos client daemons unless Kerberos client daemons are absolutely necessary. CC ID 01462 | System hardening through configuration management | Preventive | |
Disable Kerberos-related daemons unless Kerberos-related daemons are absolutely necessary. CC ID 01463 | System hardening through configuration management | Preventive | |
Disable DHCP Server unless DHCP Server is absolutely necessary. CC ID 01482 | System hardening through configuration management | Preventive | |
Disable Domain Name Server unless Domain Name Server is absolutely necessary. CC ID 01483 | System hardening through configuration management | Preventive | |
Disable Simple Network Management Protocol unless it is absolutely necessary. CC ID 01491 | System hardening through configuration management | Preventive | |
Enable or disable tunneling, as necessary. CC ID 15235 | System hardening through configuration management | Preventive | |
Disable Internet Protocol version 6 unless it is absolutely necessary. CC ID 01493 | System hardening through configuration management | Preventive | |
Disable Simple Mail Transport Protocol unless it is absolutely necessary. CC ID 01825 | System hardening through configuration management | Preventive | |
Disable SNMP trap unless SNMP trap is absolutely necessary. CC ID 01828 | System hardening through configuration management | Preventive | |
Disable UNIX-to-UNIX Copy Program unless it is absolutely necessary. CC ID 02169 | System hardening through configuration management | Preventive | |
Disable the ugidd daemon unless the ugidd daemon is absolutely necessary. CC ID 02181 | System hardening through configuration management | Preventive | |
Disable IP Routing unless it is absolutely necessary. CC ID 02170 | System hardening through configuration management | Preventive | |
Disable Client Service for NetWare unless it is absolutely necessary. CC ID 04277 | System hardening through configuration management | Preventive | |
Disable HyperText Transfer Protocol Secure Socket Layer unless it is absolutely necessary. CC ID 04281 | System hardening through configuration management | Preventive | |
Disable network connections unless network connections are absolutely necessary. CC ID 04283 | System hardening through configuration management | Preventive | |
Disable Boot Protocol unless it is absolutely necessary. CC ID 04809 | System hardening through configuration management | Preventive | |
Disable Pre-boot eXecution Environment unless it is absolutely necessary. CC ID 04819 | System hardening through configuration management | Preventive | |
Disable Bluetooth unless Bluetooth is absolutely necessary. CC ID 04476 | System hardening through configuration management | Preventive | |
Disable Internetwork Packet Exchange/Sequenced Packet Exchange. CC ID 04800 | System hardening through configuration management | Preventive | |
Disable AppleTalk. CC ID 04799 | System hardening through configuration management | Preventive | |
Disable Network Basic Input/Output System. CC ID 01925 | System hardening through configuration management | Preventive | |
Assign or reserve static IP addresses in Dynamic Host Configuration Protocol. CC ID 04801 | System hardening through configuration management | Preventive | |
Disable wireless networking on Multi-Function Devices, unless absolutely necessary. CC ID 04821 | System hardening through configuration management | Preventive | |
Configure mountd to use a static port or a dynamic portmapper port, as appropriate. CC ID 06023 | System hardening through configuration management | Preventive | |
Configure the Avahi daemon to serve via Internet Protocol version 4, Internet Protocol version 6, as appropriate. CC ID 06024 | System hardening through configuration management | Preventive | |
Validate and check Simple Network Management Protocol using snmpwalk. CC ID 06941 | System hardening through configuration management | Preventive | |
Disable the XDMCP port. CC ID 01563 | System hardening through configuration management | Preventive | |
Prevent syslog from accepting messages from the network. CC ID 01562 | System hardening through configuration management | Preventive | |
Prevent X server from listening on port 6000/tcp. CC ID 01565 | System hardening through configuration management | Preventive | |
Configure the Intrusion Detection System and the Intrusion Prevention System to accept the organizational vulnerability scanning host or vendor's originating IP address. CC ID 01645 | System hardening through configuration management | Preventive | |
Configure the "Network access: Allow anonymous SID/Name translation" setting to organizational standards. CC ID 01717 | System hardening through configuration management | Preventive | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts" setting. CC ID 01718 | System hardening through configuration management | Preventive | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts and shares" setting. CC ID 01719 | System hardening through configuration management | Preventive | |
Enable Data Execution Protection for all applications. CC ID 01720 | System hardening through configuration management | Preventive | |
Enable digital encryption or digital signatures of secure channel data. CC ID 01736 | System hardening through configuration management | Preventive | |
Enable digital signatures of communications using the Server Message Block protocol. CC ID 01762 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network client: Send unencrypted password to connect to third-party SMB servers" setting. CC ID 01764 | System hardening through configuration management | Preventive | |
Configure the amount of idle time required before disconnecting an idle session. CC ID 01763 | System hardening through configuration management | Preventive | |
Configure the "Allow reconnection from original client only" setting to organizational standards. CC ID 04515 | System hardening through configuration management | Preventive | |
Enable the disconnect clients setting (server) or force logoff setting (client) if the account's allotted logon period expire. CC ID 01765 [{time of day access} Review whether management does the following: Sets time-of-day or terminal limitations for some applications or for more sensitive functions within an application. App A Objective 6.22.e] | System hardening through configuration management | Preventive | |
Configure the "Network access: Do not allow storage of credentials or .NET Passports for network authentication" setting. CC ID 01766 | System hardening through configuration management | Preventive | |
Configure the "Network access: Let Everyone permissions apply to anonymous users" setting. CC ID 01767 | System hardening through configuration management | Preventive | |
Configure the "Network access: Named pipes that can be accessed anonymously" setting. CC ID 01768 | System hardening through configuration management | Preventive | |
Configure the "Network access: Remotely accessible registry paths" setting. CC ID 01769 | System hardening through configuration management | Preventive | |
Configure the "Network access: Sharing and security model for local accounts" setting. CC ID 01771 | System hardening through configuration management | Preventive | |
Configure the "Network security: Do not store LAN Manager hash value on next password change" setting. CC ID 01772 | System hardening through configuration management | Preventive | |
Configure the "Network security: LAN Manager authentication level" setting. CC ID 01773 | System hardening through configuration management | Preventive | |
Configure the "Network security: LDAP client signing requirements" setting. CC ID 01774 | System hardening through configuration management | Preventive | |
Configure Lightweight Directory Access Protocol connections for security. CC ID 04451 | System hardening through configuration management | Preventive | |
Configure the least session security for NT LM Security Support Provider based clients (including secure RPC) and servers settings. CC ID 01775 | System hardening through configuration management | Preventive | |
Enable the LDAP cache manager as necessary. CC ID 01460 | System hardening through configuration management | Preventive | |
Configure firewalls in accordance with organizational standards. CC ID 01926 | System hardening through configuration management | Preventive | |
Control inbound connections to the firewall. CC ID 04397 | System hardening through configuration management | Preventive | |
Control outbound connections to the firewall. CC ID 04398 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Do not allow exceptions" setting. CC ID 04318 | System hardening through configuration management | Preventive | |
Configure the firewall to define program exceptions as necessary. CC ID 04319 | System hardening through configuration management | Preventive | |
Configure the firewall to display notifications. CC ID 04399 | System hardening through configuration management | Preventive | |
Configure the firewall to allow Unicast responses. CC ID 04400 | System hardening through configuration management | Preventive | |
Configure the firewall to apply local connection security rules. CC ID 04402 | System hardening through configuration management | Preventive | |
Review and approve the firewall rules, as necessary. CC ID 06745 | System hardening through configuration management | Preventive | |
Disable Internet Connection Sharing. CC ID 02035 | System hardening through configuration management | Preventive | |
Disable anonymous DDP. CC ID 02193 | System hardening through configuration management | Preventive | |
Configure the "Set client connection encryption level" setting. CC ID 04321 | System hardening through configuration management | Preventive | |
Configure the "Network access: Restrict anonymous access to named pipes and shares" setting to organizational standards. CC ID 04381 | System hardening through configuration management | Preventive | |
Configure the "Intranet Sites: Include all network paths (UNCs)" setting. CC ID 04414 | System hardening through configuration management | Preventive | |
Configure RConsoleJ in NetWare. CC ID 04460 | System hardening through configuration management | Preventive | |
Configure Secure Console in NetWare. CC ID 04461 | System hardening through configuration management | Preventive | |
Disable Universal Description, Discovery, and Integration. CC ID 04466 | System hardening through configuration management | Preventive | |
Enable encryption for connections that transfer restricted data over HyperText Transfer Protocol. CC ID 04473 | System hardening through configuration management | Preventive | |
Use HyperText Transfer Protocol Secure to protect authenticators or other restricted data or restricted information. CC ID 04474 | System hardening through configuration management | Preventive | |
Configure Windows Messenger to prevent access to the internet. CC ID 04518 | System hardening through configuration management | Preventive | |
Configure the "Always wait for the network at computer startup and logon" setting to organizational standards. CC ID 04519 | System hardening through configuration management | Preventive | |
Do not Configure anonymous File Transfer Protocol on computers located inside a defined security perimeter. CC ID 04527 | System hardening through configuration management | Preventive | |
Create an access control list on Network Access and Control Points to restrict access. CC ID 04810 | System hardening through configuration management | Preventive | |
Configure the Access Control List to restrict connections between untrusted networks and any system that holds restricted data or restricted information. CC ID 06077 | System hardening through configuration management | Preventive | |
Configure the Access Control List (ACL) so that internal network addresses cannot pass from the Internet into the Demilitarized Zone (DMZ). CC ID 06421 | System hardening through configuration management | Preventive | |
Configure the Access Control List so that outbound network traffic from protected subnets can only access IP Addresses inside the Demilitarized Zone. CC ID 06422 | System hardening through configuration management | Preventive | |
Configure Print Services to use port 9100 and/or port 515. CC ID 04811 | System hardening through configuration management | Preventive | |
Configure the SSH server in accordance with organizational standards. CC ID 04843 | System hardening through configuration management | Preventive | |
Configure permissions for SSH private host key files to organizational standards. CC ID 15331 | System hardening through configuration management | Preventive | |
Configure permissions for SSH public host key files to organizational standards. CC ID 15333 | System hardening through configuration management | Preventive | |
Disable Secure Shell version 1 and use Secure Shell version 2. CC ID 04465 | System hardening through configuration management | Preventive | |
Allow or deny inbound connections to the secure shell port, as appropriate. CC ID 05746 | System hardening through configuration management | Preventive | |
Enable or disable the emulation of the rsh command through the SSH server, as appropriate. CC ID 05747 | System hardening through configuration management | Preventive | |
Configure SSH X11 forwarding to organizational standards. CC ID 05748 | System hardening through configuration management | Preventive | |
Set the SSH authentication log retry limit. CC ID 05750 | System hardening through configuration management | Preventive | |
Configure SSH integration with .rhosts to organizational standards. CC ID 05751 | System hardening through configuration management | Preventive | |
Configure SSH integration with hosts.equiv to organizational standards. CC ID 05752 | System hardening through configuration management | Preventive | |
Enable or disable SSH Rhosts RSA Authentication, as appropriate. CC ID 05753 | System hardening through configuration management | Preventive | |
Use Secure Shell for remote logins and file transfers. CC ID 06562 | System hardening through configuration management | Preventive | |
Configure the "/etc/hosts.deny" file: Content to organizational standards. CC ID 09924 | System hardening through configuration management | Preventive | |
Configure the "hosts.deny" file permissions to organizational standards. CC ID 09925 | System hardening through configuration management | Preventive | |
Configure the "PermitEmptyPasswords" setting to organizational standards. CC ID 09926 | System hardening through configuration management | Preventive | |
Configure the "SSH IgnoreRhosts" setting to organizational standards. CC ID 09951 | System hardening through configuration management | Preventive | |
Configure the "allowed users and groups" setting for "SSH" to organizational standards. CC ID 09952 | System hardening through configuration management | Preventive | |
Configure Network Time Protocol. CC ID 04844 | System hardening through configuration management | Preventive | |
Configure multicasting. CC ID 04845 | System hardening through configuration management | Preventive | |
Set the apache2 server's ServerTokens value properly. CC ID 05720 | System hardening through configuration management | Preventive | |
Set the apache2 server's ServerSignature value properly. CC ID 05721 | System hardening through configuration management | Preventive | |
Configure "Configuration of wireless settings using Windows Connect Now" to organizational standards. CC ID 05722 | System hardening through configuration management | Preventive | |
Configure X11 forwarding via Secure Shell, as appropriate. CC ID 05723 | System hardening through configuration management | Preventive | |
Enable the NIS passwd daemon as necessary. CC ID 05725 | System hardening through configuration management | Preventive | |
Enable the NIS update daemon as necessary. CC ID 05726 | System hardening through configuration management | Preventive | |
Enable the NIS xfr daemon as necessary. CC ID 05727 | System hardening through configuration management | Preventive | |
Enable or disable strict destination multihoming, as appropriate. CC ID 05728 | System hardening through configuration management | Preventive | |
Enable or disable IPv4 strict multihoming, as appropriate. CC ID 05729 | System hardening through configuration management | Preventive | |
Enable the appropriate tunneling protocol for Internet Protocol version 6. CC ID 05730 | System hardening through configuration management | Preventive | |
Enable or disable the automatic loading of the IPv6 kernel module, as appropriate. CC ID 05731 | System hardening through configuration management | Preventive | |
Configure the router advertisements settings to organizational standards. CC ID 05732 | System hardening through configuration management | Preventive | |
Configure IPv6 privacy extensions properly. CC ID 05733 | System hardening through configuration management | Preventive | |
Set the default number of global unicast IPv6 addresses allowed per network interface properly. CC ID 05734 | System hardening through configuration management | Preventive | |
Set the default number of IPv6 router solicitations for network interfaces to send properly. CC ID 05735 | System hardening through configuration management | Preventive | |
Set the default number of IPv6 duplicate address detection solicitations for network interfaces to send per configured network address properly. CC ID 05736 | System hardening through configuration management | Preventive | |
Enable or disable IPv6 strict multihoming, as appropriate. CC ID 05737 | System hardening through configuration management | Preventive | |
Enable or disable IP routing, as appropriate. CC ID 05738 | System hardening through configuration management | Preventive | |
Enable or disable reverse source routed packets, as appropriate. CC ID 05739 | System hardening through configuration management | Preventive | |
Restrict packet forwarding, as appropriate. CC ID 05740 | System hardening through configuration management | Preventive | |
Set unestablished TCP connection queues and established TCP connection queues properly. CC ID 05741 | System hardening through configuration management | Preventive | |
Enable or disable the LDAP dynamic updates feature, as appropriate. CC ID 05742 | System hardening through configuration management | Preventive | |
Configure the "Prohibit use of Internet Connection Firewall on your DNS domain network" setting properly. CC ID 05743 | System hardening through configuration management | Preventive | |
Enable or disable printing services through inetd, as appropriate. CC ID 05744 | System hardening through configuration management | Preventive | |
Enable or disable firewall access to printing services, as appropriate. CC ID 05745 | System hardening through configuration management | Preventive | |
Set the Secure Shell largest number for authentication retries. CC ID 05749 | System hardening through configuration management | Preventive | |
Configure the "Server SPN target name validation level" properly. CC ID 06067 | System hardening through configuration management | Preventive | |
Configure the "Allow Local System NULL session fallback" setting properly. CC ID 06068 | System hardening through configuration management | Preventive | |
Configure the "Restrict NTLM" settings properly. CC ID 06069 | System hardening through configuration management | Preventive | |
Configure the "Allow Local System to use computer identity for NTLM" setting properly. CC ID 06070 | System hardening through configuration management | Preventive | |
Configure the "Configure encryption types allowed for Kerberos" setting properly. CC ID 06071 | System hardening through configuration management | Preventive | |
Configure the "Allow PKU2U authentication requests to this computer to use online identities" setting properly. CC ID 06072 | System hardening through configuration management | Preventive | |
Configure wireless communication to be encrypted using strong cryptography. CC ID 06078 | System hardening through configuration management | Preventive | |
Reserve the use of VLAN1 to in-band management. CC ID 06413 | System hardening through configuration management | Preventive | |
Disallow Internet Protocol (IP) directed broadcasts. CC ID 06571 | System hardening through configuration management | Preventive | |
Configure the "source-routed packets" setting to organizational standards. CC ID 08977 | System hardening through configuration management | Preventive | |
Disable feedback on protocol format validation errors. CC ID 10646 | System hardening through configuration management | Preventive | |
Configure the "6to4 Relay Name" setting to organizational standards. CC ID 10688 | System hardening through configuration management | Preventive | |
Configure the "6to4 Relay Name Resolution Interval" setting to organizational standards. CC ID 10689 | System hardening through configuration management | Preventive | |
Configure the "6to4 State" setting to organizational standards. CC ID 10690 | System hardening through configuration management | Preventive | |
Configure the "Automated Site Coverage by the DC Locator DNS SRV Records" setting to organizational standards. CC ID 10759 | System hardening through configuration management | Preventive | |
Configure the "Best effort service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10764 | System hardening through configuration management | Preventive | |
Configure the "Best effort service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10765 | System hardening through configuration management | Preventive | |
Configure the "Best effort service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10766 | System hardening through configuration management | Preventive | |
Configure the "BranchCache for network files" setting to organizational standards. CC ID 10776 | System hardening through configuration management | Preventive | |
Configure the "Network Options preference logging and tracing" setting to organizational standards. CC ID 10796 | System hardening through configuration management | Preventive | |
Configure the "Network Shares preference logging and tracing" setting to organizational standards. CC ID 10797 | System hardening through configuration management | Preventive | |
Configure the "slow-link mode" setting to organizational standards. CC ID 10820 | System hardening through configuration management | Preventive | |
Configure the "Controlled load service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10826 | System hardening through configuration management | Preventive | |
Configure the "Controlled load service type Layer-3 Differentiated Services Code Point (DSCP) for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10827 | System hardening through configuration management | Preventive | |
Configure the "Controlled load service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10828 | System hardening through configuration management | Preventive | |
Configure the "Corporate DNS Probe Host Address" setting to organizational standards. CC ID 10829 | System hardening through configuration management | Preventive | |
Configure the "Corporate DNS Probe Host Name" setting to organizational standards. CC ID 10830 | System hardening through configuration management | Preventive | |
Configure the "Corporate Site Prefix List" setting to organizational standards. CC ID 10831 | System hardening through configuration management | Preventive | |
Configure the "Corporate Website Probe URL" setting to organizational standards. CC ID 10832 | System hardening through configuration management | Preventive | |
Configure the "DC Locator DNS records not registered by the DCs" setting to organizational standards. CC ID 10838 | System hardening through configuration management | Preventive | |
Configure the "DNS Suffix Search List" setting to organizational standards. CC ID 10890 | System hardening through configuration management | Preventive | |
Configure the "Do not detect slow network connections" setting to organizational standards. CC ID 10926 | System hardening through configuration management | Preventive | |
Configure the "Do not show the "local access only" network icon" setting to organizational standards. CC ID 10936 | System hardening through configuration management | Preventive | |
Configure the "Dynamic Registration of the DC Locator DNS Records" setting to organizational standards. CC ID 10943 | System hardening through configuration management | Preventive | |
Configure the "Group Policy slow link detection" setting to organizational standards. CC ID 10982 | System hardening through configuration management | Preventive | |
Configure the "Guaranteed service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10983 | System hardening through configuration management | Preventive | |
Configure the "Guaranteed service type Layer-3 Differentiated Services Code Point for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10984 | System hardening through configuration management | Preventive | |
Configure the "Guaranteed service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10985 | System hardening through configuration management | Preventive | |
Configure the "Limit the maximum network bandwidth used for Peercaching" setting to organizational standards. CC ID 11017 | System hardening through configuration management | Preventive | |
Configure the "Location of the DCs hosting a domain with single label DNS name" setting to organizational standards. CC ID 11024 | System hardening through configuration management | Preventive | |
Configure the "Minimum Idle Connection Timeout for RPC/HTTP connections" setting to organizational standards. CC ID 11046 | System hardening through configuration management | Preventive | |
Configure the "Network control service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 11049 | System hardening through configuration management | Preventive | |
Configure the "Network control service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 11050 | System hardening through configuration management | Preventive | |
Configure the "Network control service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 11051 | System hardening through configuration management | Preventive | |
Configure the "Network Projector Port Setting" setting to organizational standards. CC ID 11052 | System hardening through configuration management | Preventive | |
Configure the "Override the More Gadgets link" setting to organizational standards. CC ID 11060 | System hardening through configuration management | Preventive | |
Configure the "Prevent backing up to network location" setting to organizational standards. CC ID 11070 | System hardening through configuration management | Preventive | |
Configure the "Primary DNS Suffix" setting to organizational standards. CC ID 11094 | System hardening through configuration management | Preventive | |
Configure the "Primary DNS Suffix Devolution" setting to organizational standards. CC ID 11095 | System hardening through configuration management | Preventive | |
Configure the "Priority Set in the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11099 | System hardening through configuration management | Preventive | |
Configure the "Prohibit installation and configuration of Network Bridge on your DNS domain network" setting to organizational standards. CC ID 11102 | System hardening through configuration management | Preventive | |
Configure the "Prompt user when a slow network connection is detected" setting to organizational standards. CC ID 11109 | System hardening through configuration management | Preventive | |
Configure the "Qualitative service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 11113 | System hardening through configuration management | Preventive | |
Configure the "Qualitative service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 11114 | System hardening through configuration management | Preventive | |
Configure the "Qualitative service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 11115 | System hardening through configuration management | Preventive | |
Configure the "Refresh Interval of the DC Locator DNS Records" setting to organizational standards. CC ID 11119 | System hardening through configuration management | Preventive | |
Configure the "Register DNS records with connection-specific DNS suffix" setting to organizational standards. CC ID 11120 | System hardening through configuration management | Preventive | |
Configure the "Require domain users to elevate when setting a network's location" setting to organizational standards. CC ID 11133 | System hardening through configuration management | Preventive | |
Configure the "Route all traffic through the internal network" setting to organizational standards. CC ID 11149 | System hardening through configuration management | Preventive | |
Configure the "Set a support web page link" setting to organizational standards. CC ID 11171 | System hardening through configuration management | Preventive | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Link Local" to organizational standards. CC ID 11179 | System hardening through configuration management | Preventive | |
Configure the "Set the Seed Server" setting for "IPv6 Link Local" to organizational standards. CC ID 11190 | System hardening through configuration management | Preventive | |
Configure the "Set up a maintenance schedule to limit the maximum network bandwidth used for BITS background transfers" setting to organizational standards. CC ID 11197 | System hardening through configuration management | Preventive | |
Configure the "Set up a work schedule to limit the maximum network bandwidth used for BITS background transfers" setting to organizational standards. CC ID 11198 | System hardening through configuration management | Preventive | |
Configure the "Sites Covered by the Application Directory Partition Locator DNS SRV Records" setting to organizational standards. CC ID 11202 | System hardening through configuration management | Preventive | |
Configure the "Sites Covered by the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11203 | System hardening through configuration management | Preventive | |
Configure the "Sites Covered by the GC Locator DNS SRV Records" setting to organizational standards. CC ID 11204 | System hardening through configuration management | Preventive | |
Configure the "Slow network connection timeout for user profiles" setting to organizational standards. CC ID 11205 | System hardening through configuration management | Preventive | |
Configure the "TTL Set in the DC Locator DNS Records" setting to organizational standards. CC ID 11252 | System hardening through configuration management | Preventive | |
Configure the "Turn off Connect to a Network Projector" setting to organizational standards. CC ID 11272 | System hardening through configuration management | Preventive | |
Configure the "Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com" setting to organizational standards. CC ID 11283 | System hardening through configuration management | Preventive | |
Configure the "Turn off Microsoft Peer-to-Peer Networking Services" setting to organizational standards. CC ID 11289 | System hardening through configuration management | Preventive | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Link Local" to organizational standards. CC ID 11291 | System hardening through configuration management | Preventive | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Link Local" to organizational standards. CC ID 11299 | System hardening through configuration management | Preventive | |
Configure the "Turn off Registration if URL connection is referring to Microsoft.com" setting to organizational standards. CC ID 11305 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Network Connectivity Status Indicator active tests" setting to organizational standards. CC ID 11328 | System hardening through configuration management | Preventive | |
Configure the "Weight Set in the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11371 | System hardening through configuration management | Preventive | |
Configure Automated Teller Machines in accordance with organizational standards. CC ID 12542 | System hardening through configuration management | Preventive | |
Enable or disable remote print browsing, as appropriate. CC ID 05718 | System hardening through configuration management | Preventive | |
Allow or deny remote print browsing Common Unix Printing System the ability to listen for incoming printer information, as appropriate. CC ID 05719 | System hardening through configuration management | Preventive | |
Configure the time server in accordance with organizational standards. CC ID 06426 | System hardening through configuration management | Preventive | |
Configure the time server to synchronize with specifically designated hosts. CC ID 06427 | System hardening through configuration management | Preventive | |
Restrict access to time server configuration to personnel with a business need. CC ID 06858 | System hardening through configuration management | Preventive | |
Enable or disable the Uninterruptible Power Supply service, as appropriate. CC ID 06037 | System hardening through configuration management | Preventive | |
Configure Private Branch Exchanges in accordance with organizational standards. CC ID 02219 | System hardening through configuration management | Preventive | |
Enable Direct Inward System Access, only when necessary. CC ID 02220 | System hardening through configuration management | Preventive | |
Configure voicemail security inside each Private Branch Exchange. CC ID 02221 | System hardening through configuration management | Preventive | |
Configure Wireless Access Points in accordance with organizational standards. CC ID 12477 | System hardening through configuration management | Preventive | |
Enable MAC address filtering for Wireless Access Points. CC ID 04592 | System hardening through configuration management | Preventive | |
Disable Service Set Identifier broadcast. CC ID 04590 | System hardening through configuration management | Preventive | |
Configure Service Set Identifiers in accordance with organizational standards. CC ID 16447 | System hardening through configuration management | Preventive | |
Configure the Wireless Access Point transmit power setting to the lowest level possible. CC ID 04593 | System hardening through configuration management | Preventive | |
Enable two-factor authentication for identifying and authenticating Wireless Local Area Network users. CC ID 04595 | System hardening through configuration management | Preventive | |
Enable an authorized version of Wi-Fi Protected Access. CC ID 04832 | System hardening through configuration management | Preventive | |
Synchronize the Wireless Access Points' clocks. CC ID 04834 | System hardening through configuration management | Preventive | |
Disable unnecessary applications, ports, and protocols on Wireless Access Points. CC ID 04835 | System hardening through configuration management | Preventive | |
Enable or disable all BIOS wireless devices, as appropriate. CC ID 05754 | System hardening through configuration management | Preventive | |
Enable or disable all wireless interfaces, as necessary. CC ID 05755 | System hardening through configuration management | Preventive | |
Include or exclude device drivers for wireless devices from the kernel, as appropriate. CC ID 05756 | System hardening through configuration management | Preventive | |
Configure mobile device settings in accordance with organizational standards. CC ID 04600 | System hardening through configuration management | Preventive | |
Configure mobile devices to enable remote wipe. CC ID 12212 | System hardening through configuration management | Preventive | |
Configure prohibiting the circumvention of security controls on mobile devices. CC ID 12335 | System hardening through configuration management | Preventive | |
Configure the "VPN" setting to organizational standards. CC ID 09987 | System hardening through configuration management | Preventive | |
Configure the "Fraudulent Website Warning" setting to organizational standards. CC ID 09988 | System hardening through configuration management | Preventive | |
Configure the "With Authentication" setting to organizational standards. CC ID 09989 | System hardening through configuration management | Preventive | |
Configure the "Auto-Join" setting to organizational standards. CC ID 09990 | System hardening through configuration management | Preventive | |
Configure the "AirDrop Discoverability" setting to organizational standards. CC ID 09991 | System hardening through configuration management | Preventive | |
Configure the "Wi-Fi" setting to organizational standards. CC ID 09992 | System hardening through configuration management | Preventive | |
Configure the "Personal Hotspot" setting to organizational standards. CC ID 09994 | System hardening through configuration management | Preventive | |
Configure the "Notifications View" setting for "Access on Lock Screen" to organizational standards. CC ID 09995 | System hardening through configuration management | Preventive | |
Configure the "Find My iPhone" setting to organizational standards. CC ID 09996 | System hardening through configuration management | Preventive | |
Configure the "iPhone Unlock" setting to organizational standards. CC ID 09997 | System hardening through configuration management | Preventive | |
Configure the "Access on Lock Screen" setting to organizational standards. CC ID 09998 | System hardening through configuration management | Preventive | |
Configure the "Forget this Network" setting to organizational standards. CC ID 09999 | System hardening through configuration management | Preventive | |
Configure the "Ask to Join Networks" setting to organizational standards. CC ID 10000 | System hardening through configuration management | Preventive | |
Configure the "Fraudulent Website Warning" setting to organizational standards. CC ID 10001 | System hardening through configuration management | Preventive | |
Configure the "Credit Cards" setting to organizational standards. CC ID 10002 | System hardening through configuration management | Preventive | |
Configure the "Saved Credit Card Information" setting to organizational standards. CC ID 10003 | System hardening through configuration management | Preventive | |
Configure the "Do Not Track" setting to organizational standards. CC ID 10004 | System hardening through configuration management | Preventive | |
Configure the "With Authentication" setting to organizational standards. CC ID 10005 | System hardening through configuration management | Preventive | |
Configure the "Allow Move" setting to organizational standards. CC ID 10006 | System hardening through configuration management | Preventive | |
Configure the "Use Only in Mail" setting to organizational standards. CC ID 10007 | System hardening through configuration management | Preventive | |
Configure mobile devices to organizational standards. CC ID 04639 | System hardening through configuration management | Preventive | |
Configure mobile devices to separate organizational data from personal data. CC ID 16463 | System hardening through configuration management | Preventive | |
Configure the mobile device properties to organizational standards. CC ID 04640 | System hardening through configuration management | Preventive | |
Configure the mobile device menu items to organizational standards. CC ID 04641 | System hardening through configuration management | Preventive | |
Configure the BlackBerry handheld device driver settings. CC ID 04642 | System hardening through configuration management | Preventive | |
Configure the BlackBerry Enterprise Server with either BlackBerry DMZ Solution or the BlackBerry firewall solution. CC ID 04602 | System hardening through configuration management | Preventive | |
Configure automatic master key generation on the BlackBerry Enterprise Server. CC ID 04608 | System hardening through configuration management | Preventive | |
Configure e-mail messages to not display a signature line stating the message was sent from a Portable Electronic Device. CC ID 04605 | System hardening through configuration management | Preventive | |
Verify only the specific mobile device web browser software is installed. CC ID 04606 | System hardening through configuration management | Preventive | |
Update the software and master keys for mobile Personal Electronic Devices every 30 days. CC ID 04607 | System hardening through configuration management | Preventive | |
Enable content protection on mobile devices. CC ID 04609 | System hardening through configuration management | Preventive | |
Configure the application policy groups for each mobile Personal Electronic Device. CC ID 04610 | System hardening through configuration management | Preventive | |
Configure the BlackBerry Messenger policy group settings. CC ID 04611 | System hardening through configuration management | Preventive | |
Configure the Camera policy group settings. CC ID 04614 | System hardening through configuration management | Preventive | |
Configure the Bluetooth policy group settings. CC ID 04612 | System hardening through configuration management | Preventive | |
Configure the Bluetooth Smart Card Reader policy group settings. CC ID 04613 | System hardening through configuration management | Preventive | |
Configure the Browser policy group settings. CC ID 04615 | System hardening through configuration management | Preventive | |
Configure the Certificate Sync policy group settings. CC ID 04616 | System hardening through configuration management | Preventive | |
Configure the CMIME policy group settings. CC ID 04617 | System hardening through configuration management | Preventive | |
Configure the Common policy group settings. CC ID 04618 | System hardening through configuration management | Preventive | |
Configure the Desktop-only policy group settings. CC ID 04619 | System hardening through configuration management | Preventive | |
Configure the IOT Application policy group settings. CC ID 04620 | System hardening through configuration management | Preventive | |
Configure the Device-only policy group settings. CC ID 04621 | System hardening through configuration management | Preventive | |
Configure the Desktop policy group settings. CC ID 04622 | System hardening through configuration management | Preventive | |
Configure the Global items policy group settings. CC ID 04623 | System hardening through configuration management | Preventive | |
Configure the Location Based Services policy group settings. CC ID 04624 | System hardening through configuration management | Preventive | |
Configure the MDS policy group settings. CC ID 04625 | System hardening through configuration management | Preventive | |
Configure the On-Device Help policy group settings. CC ID 04626 | System hardening through configuration management | Preventive | |
Configure the Password policy group settings. CC ID 04627 | System hardening through configuration management | Preventive | |
Configure the PIM Sync policy group settings. CC ID 04628 | System hardening through configuration management | Preventive | |
Configure the Secure E-mail policy group settings. CC ID 04629 | System hardening through configuration management | Preventive | |
Configure the Memory Cleaner policy group settings. CC ID 04630 | System hardening through configuration management | Preventive | |
Configure the Security policy group settings. CC ID 04631 | System hardening through configuration management | Preventive | |
Configure the Service Exclusivity policy group settings. CC ID 04632 | System hardening through configuration management | Preventive | |
Configure the SIM Application Toolkit policy group settings. CC ID 04633 | System hardening through configuration management | Preventive | |
Configure the Smart Dialing policy group settings. CC ID 04634 | System hardening through configuration management | Preventive | |
Configure the S/MIME policy group settings. CC ID 04635 | System hardening through configuration management | Preventive | |
Configure the TCP policy group settings. CC ID 04636 | System hardening through configuration management | Preventive | |
Configure the WTLS (Application) policy group settings. CC ID 04638 | System hardening through configuration management | Preventive | |
Configure emergency and critical e-mail notifications so that they are digitally signed. CC ID 04841 | System hardening through configuration management | Preventive | |
Enable data-at-rest encryption on mobile devices. CC ID 04842 | System hardening through configuration management | Preventive | |
Disable the capability to automatically execute code on mobile devices absent user direction. CC ID 08705 | System hardening through configuration management | Preventive | |
Configure environmental sensors on mobile devices. CC ID 10667 | System hardening through configuration management | Preventive | |
Prohibit the remote activation of environmental sensors on mobile devices. CC ID 10666 | System hardening through configuration management | Preventive | |
Configure the mobile device to explicitly show when an environmental sensor is in use. CC ID 10668 | System hardening through configuration management | Preventive | |
Configure the environmental sensor to report collected data to designated personnel only. CC ID 10669 | System hardening through configuration management | Preventive | |
Configure Cisco-specific applications and service in accordance with organizational standards. CC ID 06557 | System hardening through configuration management | Preventive | |
Disable Cisco Discovery Protocol service unless the Cisco Discovery Protocol service is absolutely necessary. CC ID 06556 | System hardening through configuration management | Preventive | |
Disable configuration autoloading unless configuration autoloading is absolutely necessary. CC ID 06558 | System hardening through configuration management | Preventive | |
Disable exec on aux unless exec on aux is absolutely necessary. CC ID 06559 | System hardening through configuration management | Preventive | |
Define and configure the Cisco loopback interface. CC ID 06560 | System hardening through configuration management | Preventive | |
Configure custom Oracle-specific applications and services in accordance with organizational standards. CC ID 06565 | System hardening through configuration management | Preventive | |
Set the Oracle Listener password. CC ID 06566 | System hardening through configuration management | Preventive | |
Configure Oracle batch processes to not use passwords in parameters or variables. CC ID 06567 | System hardening through configuration management | Preventive | |
Configure the Global Positioning System settings as appropriate. CC ID 06888 | System hardening through configuration management | Preventive | |
Configure the Global Positioning System monitor carrier-to-noise density ratio to the range of 48-50 bbhrtz. CC ID 06889 | System hardening through configuration management | Preventive | |
Configure endpoint security tools in accordance with organizational standards. CC ID 07049 | System hardening through configuration management | Preventive | |
Secure endpoint security tool configuration settings from unauthorized change. CC ID 07050 | System hardening through configuration management | Preventive | |
Configure e-mail security settings in accordance with organizational standards. CC ID 07055 | System hardening through configuration management | Preventive | |
Configure e-mail to limit the number of recipients per message. CC ID 07056 | System hardening through configuration management | Preventive | |
Configure web server security settings in accordance with organizational standards. CC ID 07059 | System hardening through configuration management | Preventive | |
Configure the web server to hide the directory of files in a folder. CC ID 07060 | System hardening through configuration management | Preventive | |
Certify the system before releasing it into a production environment. CC ID 06419 | System hardening through configuration management | Preventive | |
Document the system's accreditation and residual risks. CC ID 06728 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain virtualization configuration settings. CC ID 07110 | System hardening through configuration management | Preventive | |
Implement the security features of hypervisor to protect virtual machines. CC ID 12176 | System hardening through configuration management | Preventive | |
Execute code in confined virtual machine environments. CC ID 10648 | System hardening through configuration management | Preventive | |
Configure Microsoft Office to Organizational Standards. CC ID 07147 | System hardening through configuration management | Preventive | |
Set custom Microsoft Office security options in accordance with organizational standards. CC ID 05757 | System hardening through configuration management | Preventive | |
Configure the "Disable VBA for Office applications" setting properly. CC ID 05758 | System hardening through configuration management | Preventive | |
Configure the "ActiveX Control Initialization" setting to organizational standards. CC ID 05759 | System hardening through configuration management | Preventive | |
Configure the "Online content options" setting properly. CC ID 05760 | System hardening through configuration management | Preventive | |
Configure the "VBA Macro Warning Settings" setting properly. CC ID 05761 | System hardening through configuration management | Preventive | |
Configure the "Trust access to Visual Basic Project" setting properly. CC ID 05762 | System hardening through configuration management | Preventive | |
Configure the "Configure Add-In Trust Level" setting properly. CC ID 05763 | System hardening through configuration management | Preventive | |
Configure the "Minimum encryption settings" setting properly. CC ID 05764 | System hardening through configuration management | Preventive | |
Configure the "Do not check e-mail address against address of certificates being used" setting to organizational standards. CC ID 05765 | System hardening through configuration management | Preventive | |
Configure the "Send all signed messages as clear signed messages" setting properly. CC ID 05766 | System hardening through configuration management | Preventive | |
Configure the "Request an S/MIME receipt for all S/MIME signed messages" setting properly. CC ID 05767 | System hardening through configuration management | Preventive | |
Configure the "Do not display 'Publish to GAL' button" setting properly. CC ID 05768 | System hardening through configuration management | Preventive | |
Configure the "Signature Warning" setting properly. CC ID 05769 | System hardening through configuration management | Preventive | |
Configure the "Enable Cryptography Icons" setting properly. CC ID 05770 | System hardening through configuration management | Preventive | |
Configure the "Retrieving CRLs (Certificate Revocation Lists)" setting properly. CC ID 05771 | System hardening through configuration management | Preventive | |
Configure the "Warn before printing, saving, or sending a file that contains tracked changes or comments" setting properly. CC ID 05772 | System hardening through configuration management | Preventive | |
Configure the "Underline hyperlinks" setting properly. CC ID 05773 | System hardening through configuration management | Preventive | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins" setting properly. CC ID 05774 | System hardening through configuration management | Preventive | |
Configure the "Disable all application add-ins" setting properly. CC ID 05775 | System hardening through configuration management | Preventive | |
Configure the "Required that application add-ins are signed by Trusted Publisher" setting properly. CC ID 05776 | System hardening through configuration management | Preventive | |
Configure the "Disable all trusted locations" setting properly. CC ID 05777 | System hardening through configuration management | Preventive | |
Configure the "Allow Trusted Locations not on the computer" setting properly. CC ID 05778 | System hardening through configuration management | Preventive | |
Configure the "Modal Trust Decision Only" setting properly. CC ID 05779 | System hardening through configuration management | Preventive | |
Configure the "Disable commands" setting properly. CC ID 05780 | System hardening through configuration management | Preventive | |
Configure the "Database Tools | Macro | Convert Macros to Visual Basic" setting to organizational standards. CC ID 05781 | System hardening through configuration management | Preventive | |
Configure the "Database Tools | Macro | Create Shortcut Menu from Macro" setting to organizational standards. CC ID 05782 | System hardening through configuration management | Preventive | |
Configure the "Disable shortcut keys" setting properly. CC ID 05783 | System hardening through configuration management | Preventive | |
Configure the "Default file format" setting properly. CC ID 05784 | System hardening through configuration management | Preventive | |
Configure the "Do not prompt to convert older databases" setting properly. CC ID 05785 | System hardening through configuration management | Preventive | |
Configure the "Internet and network paths as hyperlinks" setting properly. CC ID 05786 | System hardening through configuration management | Preventive | |
Configure the "Save files" setting properly. CC ID 05787 | System hardening through configuration management | Preventive | |
Configure the "Disable AutoRepublish" setting properly. CC ID 05788 | System hardening through configuration management | Preventive | |
Configure the "Autorepublish warning alert" setting properly. CC ID 05789 | System hardening through configuration management | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Excel Open XML workbooks" setting properly. CC ID 05790 | System hardening through configuration management | Preventive | |
Configure the "Force file extension to match file type" setting properly. CC ID 05791 | System hardening through configuration management | Preventive | |
Configure the "Store macro in Personal Macro Workbook by default" setting properly. CC ID 05792 | System hardening through configuration management | Preventive | |
Configure the "Ignore other applications" setting properly. CC ID 05793 | System hardening through configuration management | Preventive | |
Configure the "Ask to update automatic links" setting properly. CC ID 05794 | System hardening through configuration management | Preventive | |
Configure the "Save any additional data necessary to maintain formulas" setting properly. CC ID 05795 | System hardening through configuration management | Preventive | |
Configure the "Load pictures from Web pages not created in Excel" setting properly. CC ID 05796 | System hardening through configuration management | Preventive | |
Configure the "Do not show data extraction options when opening corrupt workbooks" setting properly. CC ID 05797 | System hardening through configuration management | Preventive | |
Configure the "Assume structured storage format of workbook is intact when recovering data" setting to organizational standards. CC ID 05798 | System hardening through configuration management | Preventive | |
Configure the "Corrupt formula conversion (Convert unrecoverable references to: values | #REF or #NAME)" setting to organizational standards. CC ID 05799 | System hardening through configuration management | Preventive | |
Configure the "Connection File Locations" setting to organizational standards. CC ID 05800 | System hardening through configuration management | Preventive | |
Configure the "Automatic Query Refresh (Prompt for all workbooks | Do not prompt; do not allow auto refresh | Do not prompt; allow auto refresh)" setting to organizational standards. CC ID 05801 | System hardening through configuration management | Preventive | |
Configure the "Block opening of" setting properly. CC ID 05802 | System hardening through configuration management | Preventive | |
Configure the "Block saving of" setting properly. CC ID 05803 | System hardening through configuration management | Preventive | |
Configure the "Locally cache network file storages" setting to organizational standards. CC ID 05804 | System hardening through configuration management | Preventive | |
Configure the "Locally cache PivotTable reports" setting to organizational standards. CC ID 05805 | System hardening through configuration management | Preventive | |
Configure the "OLAP PivotTable User Defined Function (UDF) security setting" setting properly. CC ID 05806 | System hardening through configuration management | Preventive | |
Configure the "Recognize SmartTags" setting to organizational standards. CC ID 05807 | System hardening through configuration management | Preventive | |
Configure the "Offline Mode Status" setting properly. CC ID 05808 | System hardening through configuration management | Preventive | |
Configure the "Control behavior for Windows SharePoint Services gradual upgrade" setting properly. CC ID 05809 | System hardening through configuration management | Preventive | |
Configure the "Disable opening of solutions from the Internet security zone" setting properly. CC ID 05810 | System hardening through configuration management | Preventive | |
Configure the "Allow the use of ActiveX Custom Controls in InfoPath forms" setting properly. CC ID 05811 | System hardening through configuration management | Preventive | |
Configure the "Run forms in restricted mode if they do not specify a publish location and use only features introduced before InfoPath 2003 SP1" setting to organizational standards. CC ID 05812 | System hardening through configuration management | Preventive | |
Configure the "Allow file types as attachments to forms" setting properly. CC ID 05813 | System hardening through configuration management | Preventive | |
Configure the "Block specific file types as attachments to forms" setting properly. CC ID 05814 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from allowing unsafe file types to be attached to forms" setting properly. CC ID 05815 | System hardening through configuration management | Preventive | |
Configure the "Display a warning that a form is digitally signed" setting properly. CC ID 05816 | System hardening through configuration management | Preventive | |
Configure the "Control behavior when opening forms" setting properly. CC ID 05817 | System hardening through configuration management | Preventive | |
Configure the "Beaconing UI for forms" setting properly. CC ID 05818 | System hardening through configuration management | Preventive | |
Configure the "Disable sending form template with e-mail forms" setting properly. CC ID 05819 | System hardening through configuration management | Preventive | |
Configure the "Disable dynamic caching of the form template in InfoPath e-mail forms" setting properly. CC ID 05820 | System hardening through configuration management | Preventive | |
Configure the "Disable sending InfoPath 2003 Forms as e-mail forms" setting properly. CC ID 05821 | System hardening through configuration management | Preventive | |
Configure the "Disable e-mail forms" setting properly. CC ID 05822 | System hardening through configuration management | Preventive | |
Configure the "Disable InfoPath e-mail forms in Outlook" setting properly. CC ID 05823 | System hardening through configuration management | Preventive | |
Configure the "Information Rights Management" setting to organizational standards. CC ID 05824 | System hardening through configuration management | Preventive | |
Configure the "Custom code" setting properly. CC ID 05825 | System hardening through configuration management | Preventive | |
Configure the "E-mail forms beaconing UI" setting properly. CC ID 05826 | System hardening through configuration management | Preventive | |
Configure the "Disable user customization of Quick Access Toolbar via UI" setting properly. CC ID 05827 | System hardening through configuration management | Preventive | |
Configure the "Disable all user customization of Quick Access Toolar" setting properly. CC ID 05828 | System hardening through configuration management | Preventive | |
Configure the "Disable UI extending from documents and templates" setting properly. CC ID 05829 | System hardening through configuration management | Preventive | |
Configure the "Recognize smart tags in Excel" setting properly. CC ID 05830 | System hardening through configuration management | Preventive | |
Configure the "Disable Clip Art and Media downloads from the client and from Office Online website" setting properly. CC ID 05831 | System hardening through configuration management | Preventive | |
Configure the "Disable template downloads from the client and from Office Online website" setting properly. CC ID 05832 | System hardening through configuration management | Preventive | |
Configure the "Disable access to updates, add-ins, and patches on the Office Online website" setting properly. CC ID 05833 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from uploading document templates to the Office Online community" setting to organizational standards. CC ID 05834 | System hardening through configuration management | Preventive | |
Configure the "Disable training practice downloads from the Office Online website" setting properly. CC ID 05835 | System hardening through configuration management | Preventive | |
Configure the "Disable customer-submitted templates downloads from Office Online" setting properly. CC ID 05836 | System hardening through configuration management | Preventive | |
Configure the "Open Office documents as read/write while browsing" setting properly. CC ID 05837 | System hardening through configuration management | Preventive | |
Configure the "Rely on VML for displaying graphics in browsers" setting properly. CC ID 05838 | System hardening through configuration management | Preventive | |
Configure the "Allow PNG as an output format" setting properly. CC ID 05839 | System hardening through configuration management | Preventive | |
Configure the "Improve Proofing Tools" setting properly. CC ID 05840 | System hardening through configuration management | Preventive | |
Configure the "Disable Opt-in Wizard on first run" setting properly. CC ID 05841 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Office Online" setting to organizational standards. CC ID 05842 | System hardening through configuration management | Preventive | |
Configure the "Disable Password Caching" setting properly. CC ID 05843 | System hardening through configuration management | Preventive | |
Configure the "Disable all Trust Bar notifications for security issues" setting properly. CC ID 05844 | System hardening through configuration management | Preventive | |
Configure the "Protect document metadata" setting properly. CC ID 05845 | System hardening through configuration management | Preventive | |
Configure the "Encryption type for password protected" setting properly. CC ID 05846 | System hardening through configuration management | Preventive | |
Configure the "Load controls in Forms3" setting properly. CC ID 05847 | System hardening through configuration management | Preventive | |
Configure the "Automation Security" setting properly. CC ID 05848 | System hardening through configuration management | Preventive | |
Configure the "Prevent Word and Excel from loading managed code extensions" setting properly. CC ID 05849 | System hardening through configuration management | Preventive | |
Configure the "Disable hyperlink warnings" setting properly. CC ID 05850 | System hardening through configuration management | Preventive | |
Configure the "Disable password to open UI" setting properly. CC ID 05851 | System hardening through configuration management | Preventive | |
Configure the "Download Office Controls" setting to organizational standards. CC ID 05852 | System hardening through configuration management | Preventive | |
Configure the "Disable All ActiveX" setting properly. CC ID 05853 | System hardening through configuration management | Preventive | |
Configure the "Allow mix of policy and user locations" setting properly. CC ID 05854 | System hardening through configuration management | Preventive | |
Configure the "Disable Smart Document's use of manifests" setting properly. CC ID 05855 | System hardening through configuration management | Preventive | |
Configure the "Completely disable the Smart Documents feature in Word and Excel" setting to organizational standards. CC ID 05856 | System hardening through configuration management | Preventive | |
Configure the "Disable Internet Fax feature" setting properly. CC ID 05857 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from changing permissions on rights managed content" setting properly. CC ID 05858 | System hardening through configuration management | Preventive | |
Configure the "Allow users with earlier versions of Office to read with browsers." setting properly. CC ID 05859 | System hardening through configuration management | Preventive | |
Configure the "Always require users to connect to verify permission" setting properly. CC ID 05860 | System hardening through configuration management | Preventive | |
Configure the "Always expand groups in Office when restricting permission for documents" setting properly. CC ID 05861 | System hardening through configuration management | Preventive | |
Configure the "Never allow users to specify groups when restricting permission for documents" setting properly. CC ID 05862 | System hardening through configuration management | Preventive | |
Configure the "Disable Microsoft Passport service for content with restricted permission" setting properly. CC ID 05863 | System hardening through configuration management | Preventive | |
Configure the "Do not allow users to upgrade Information Rights Management configuration" setting to organizational standards. CC ID 05864 | System hardening through configuration management | Preventive | |
Configure the "Key Usage Filtering" setting properly. CC ID 05865 | System hardening through configuration management | Preventive | |
Configure the "EKU filtering" setting properly. CC ID 05866 | System hardening through configuration management | Preventive | |
Configure the "Legacy format signatures" setting properly. CC ID 05867 | System hardening through configuration management | Preventive | |
Configure the "Suppress Office Signing Providers" setting properly. CC ID 05868 | System hardening through configuration management | Preventive | |
Configure the "Suppress external signature services menu item" setting properly. CC ID 05869 | System hardening through configuration management | Preventive | |
Configure the "Disable Check For Solutions" setting properly. CC ID 05870 | System hardening through configuration management | Preventive | |
Configure the "Disable inclusion of document properties in PDF and XPS output" setting properly. CC ID 05871 | System hardening through configuration management | Preventive | |
Configure the "Disable Document Information Panel" setting properly. CC ID 05872 | System hardening through configuration management | Preventive | |
Configure the "Document information panel beaconing UI" setting properly. CC ID 05873 | System hardening through configuration management | Preventive | |
Configure the "Disable the Office client from polling the Office server for published links" setting properly. CC ID 05874 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats" setting properly. CC ID 05875 | System hardening through configuration management | Preventive | |
Configure the "Control Blogging" setting properly. CC ID 05876 | System hardening through configuration management | Preventive | |
Configure the "Enable Smart Resume" setting to organizational standards. CC ID 05877 | System hardening through configuration management | Preventive | |
Configure the "Do not upload media files" setting to organizational standards. CC ID 05878 | System hardening through configuration management | Preventive | |
Configure the "Disable hyperlinks to web templates in File | New and task panes" setting properly. CC ID 05879 | System hardening through configuration management | Preventive | |
Configure the "Prevent access to Web-based file storage" setting to organizational standards. CC ID 05880 | System hardening through configuration management | Preventive | |
Configure the "Do not allow attachment previewing in Outlook" setting properly. CC ID 05881 | System hardening through configuration management | Preventive | |
Configure the "Read e-mail as plain text" setting properly. CC ID 05882 | System hardening through configuration management | Preventive | |
Configure the "Read signed e-mail as plain text" setting properly. CC ID 05883 | System hardening through configuration management | Preventive | |
Configure the "Prevent publishing to Office Online" setting properly. CC ID 05884 | System hardening through configuration management | Preventive | |
Configure the "Prevent publishing to a DAV server" setting properly. CC ID 05885 | System hardening through configuration management | Preventive | |
Configure the "Restrict level of calendar details users can publish" setting properly. CC ID 05886 | System hardening through configuration management | Preventive | |
Configure the "Access to published calendars" setting properly. CC ID 05887 | System hardening through configuration management | Preventive | |
Configure the "Restrict upload method" setting properly. CC ID 05888 | System hardening through configuration management | Preventive | |
Configure the "Hide Junk Mail UI" setting properly. CC ID 05889 | System hardening through configuration management | Preventive | |
Configure the "Junk E-mail Protection Level" setting properly. CC ID 05890 | System hardening through configuration management | Preventive | |
Configure the "Trust E-mail from Contacts" setting properly. CC ID 05891 | System hardening through configuration management | Preventive | |
Configure the "Add e-mail recipients to users' Safe Senders Lists" setting properly. CC ID 05892 | System hardening through configuration management | Preventive | |
Configure the "Dial-up options" setting properly. CC ID 05893 | System hardening through configuration management | Preventive | |
Configure the "Do not allow creating, replying, or forwarding signatures for e-mail messages" setting properly. CC ID 05894 | System hardening through configuration management | Preventive | |
Configure the "Send copy of pictures with HTML messages instead of reference to Internet location" setting to organizational standards. CC ID 05895 | System hardening through configuration management | Preventive | |
Configure the "Outlook rich text options" setting properly. CC ID 05896 | System hardening through configuration management | Preventive | |
Configure the "Plain text options" setting properly. CC ID 05897 | System hardening through configuration management | Preventive | |
Configure the "Set message format" setting properly. CC ID 05898 | System hardening through configuration management | Preventive | |
Configure the "Make Outlook the default program for E-mail, Contacts, and Calendar" setting properly. CC ID 05899 | System hardening through configuration management | Preventive | |
Configure the "Do not allow folders in non-default stores to be set as folder home pages" setting properly. CC ID 05900 | System hardening through configuration management | Preventive | |
Configure the "Use Unicode format when dragging e-mail message to file system" setting properly. CC ID 05901 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Outlook object model scripts to run" setting properly. CC ID 05902 | System hardening through configuration management | Preventive | |
Configure the "set maximum level of online status on a person name (do not allow | allow everywhere except to and cc field | allow everywhere)" setting properly. CC ID 05903 | System hardening through configuration management | Preventive | |
Configure the "Display online status on a person name" setting properly. CC ID 05904 | System hardening through configuration management | Preventive | |
Configure the "Turn off Enable the Person Names Smart Tag option" setting properly. CC ID 05905 | System hardening through configuration management | Preventive | |
Configure the "Outlook security mode" setting properly. CC ID 05906 | System hardening through configuration management | Preventive | |
Configure the "Display Level 1 attachments" setting properly. CC ID 05907 | System hardening through configuration management | Preventive | |
Configure the "Allow users to demote attachments to Level 2" setting properly. CC ID 05908 | System hardening through configuration management | Preventive | |
Configure the "Do not prompt about Level 1 attachments" setting properly. CC ID 05909 | System hardening through configuration management | Preventive | |
Configure the "Allow in-place activation of embedded OLE objects" setting to organizational standards. CC ID 05910 | System hardening through configuration management | Preventive | |
Configure the "Display OLE package objects" setting properly. CC ID 05911 | System hardening through configuration management | Preventive | |
Configure the "Add file extensions to block" setting properly. CC ID 05912 | System hardening through configuration management | Preventive | |
Configure the "Remove file extensions blocked" setting properly. CC ID 05913 | System hardening through configuration management | Preventive | |
Configure the "Allow scripts in one-off Outlook forms" setting properly. CC ID 05914 | System hardening through configuration management | Preventive | |
Configure the "Set Outlook object model custom actions execution prompt" setting properly. CC ID 05915 | System hardening through configuration management | Preventive | |
Configure the "Set control itemproperty pompt" setting properly. CC ID 05916 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook object model prompt" setting properly. CC ID 05917 | System hardening through configuration management | Preventive | |
Configure the "Required Certificate Authority" setting properly. CC ID 05918 | System hardening through configuration management | Preventive | |
Configure the "S/MIME interoperability with external clients:" setting properly. CC ID 05919 | System hardening through configuration management | Preventive | |
Configure the "Always use Rich Text formatting in S/MIME messages" setting to organizational standards. CC ID 05920 | System hardening through configuration management | Preventive | |
Configure the "S/MIME password settings" setting properly. CC ID 05921 | System hardening through configuration management | Preventive | |
Configure the "Message Formats" setting properly. CC ID 05922 | System hardening through configuration management | Preventive | |
Configure the "Do not provide Continue option on Encryption warning dialog boxes" setting properly for Microsoft Office 2007. CC ID 05923 | System hardening through configuration management | Preventive | |
Configure the "Run in FIPS compliant mode" setting properly. CC ID 05925 | System hardening through configuration management | Preventive | |
Configure the "URL for S/MIME certificates" setting properly. CC ID 05926 | System hardening through configuration management | Preventive | |
Configure the "Ensure all S/MIME signed messages have a label" setting properly. CC ID 05927 | System hardening through configuration management | Preventive | |
Configure the "S/MIME receipt requests" setting properly. CC ID 05954 | System hardening through configuration management | Preventive | |
Configure the "Fortezza certificate policies" setting properly. CC ID 05928 | System hardening through configuration management | Preventive | |
Configure the "Require SuiteB algorithms for S/MIME operations" setting properly. CC ID 05929 | System hardening through configuration management | Preventive | |
Configure the "Missing CRLs" setting properly. CC ID 05930 | System hardening through configuration management | Preventive | |
Configure the "Missing root certificates" setting properly. CC ID 05931 | System hardening through configuration management | Preventive | |
Configure the "Promote Level 2 errors as errors, not warnings" setting properly. CC ID 05932 | System hardening through configuration management | Preventive | |
Configure the "Attachment Secure Temporary Folder" setting properly. CC ID 05933 | System hardening through configuration management | Preventive | |
Configure the "Display pictures and external content in HTML e-mail" setting properly. CC ID 05934 | System hardening through configuration management | Preventive | |
Configure the "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" setting properly. CC ID 05935 | System hardening through configuration management | Preventive | |
Configure the "Do not permit download of content from safe zones" setting properly. CC ID 05936 | System hardening through configuration management | Preventive | |
Configure the "Block Trusted Zones" setting properly. CC ID 05937 | System hardening through configuration management | Preventive | |
Configure the "Include Internet in Safe Zones for Automatic Picture Download" setting properly. CC ID 05938 | System hardening through configuration management | Preventive | |
Configure the "Include Intranet in Safe Zones for Automatic Picture Download" setting properly. CC ID 05939 | System hardening through configuration management | Preventive | |
Configure the "security setting for macros (always warn | never warn, disable all | warn for signed, disable unsigned | no security check)" setting properly. CC ID 05940 | System hardening through configuration management | Preventive | |
Configure the "Enable links in e-mail messages" setting properly. CC ID 05941 | System hardening through configuration management | Preventive | |
Configure the "Apply macro security settings to macros, add-ins, and SmartTags" setting properly. CC ID 05942 | System hardening through configuration management | Preventive | |
Configure the "Automatically configure profile based on Active Directory Primary SMTP address" setting properly. CC ID 05943 | System hardening through configuration management | Preventive | |
Configure the "Do not allow users to change permissions on folders" setting properly. CC ID 05944 | System hardening through configuration management | Preventive | |
Configure the "Enable RPC encryption" setting properly. CC ID 05945 | System hardening through configuration management | Preventive | |
Configure the "Authentication with Exchange server" setting properly. CC ID 05946 | System hardening through configuration management | Preventive | |
Configure the "Synchronize Outlook RSS Feeds with Common Feed List" setting properly. CC ID 05947 | System hardening through configuration management | Preventive | |
Configure the "Turn off RSS feature" setting properly. CC ID 05948 | System hardening through configuration management | Preventive | |
Configure the "Automatically download enclosures" setting to organizational standards. CC ID 05949 | System hardening through configuration management | Preventive | |
Configure the "Download full text of articles as HTML attachments" setting properly. CC ID 05950 | System hardening through configuration management | Preventive | |
Configure the "Automatically download attachments" setting properly. CC ID 05951 | System hardening through configuration management | Preventive | |
Configure the "Do not include Internet Calendar integration in Outlook" setting properly. CC ID 05952 | System hardening through configuration management | Preventive | |
Configure the "Disable user entries to server list" setting properly. CC ID 05953 | System hardening through configuration management | Preventive | |
Configure the "Do not expand distribution lists" setting properly. CC ID 05955 | System hardening through configuration management | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft PowerPoint Open XML presentations" setting properly. CC ID 05956 | System hardening through configuration management | Preventive | |
Configure the "Run programs" setting properly. CC ID 05957 | System hardening through configuration management | Preventive | |
Configure the "Make hidden markup visible" setting properly. CC ID 05958 | System hardening through configuration management | Preventive | |
Configure the "Unblock automatic download of linked images" setting properly. CC ID 05959 | System hardening through configuration management | Preventive | |
Configure the "Disable Slide Update" setting to organizational standards. CC ID 05960 | System hardening through configuration management | Preventive | |
Configure the "Hidden text" setting properly. CC ID 05961 | System hardening through configuration management | Preventive | |
Configure the "Update automatic links at Open" setting properly. CC ID 05962 | System hardening through configuration management | Preventive | |
Configure the "Save smart tags in e-mail" setting to organizational standards. CC ID 05963 | System hardening through configuration management | Preventive | |
Configure the "Determine where to force encrypted macros to be scanned in Microsoft Word Open XML documents" setting properly. CC ID 05964 | System hardening through configuration management | Preventive | |
Configure the "InfoPath APTCA Assembly Whitelist" setting properly. CC ID 05965 | System hardening through configuration management | Preventive | |
Configure the "Windows Internet Explorer Feature Control Opt-In" setting properly. CC ID 05966 | System hardening through configuration management | Preventive | |
Configure the "Disable Package Repair" setting to organizational standards. CC ID 05967 | System hardening through configuration management | Preventive | |
Configure the "Disable user name and password" setting properly. CC ID 05968 | System hardening through configuration management | Preventive | |
Configure the "Bind to object" setting properly. CC ID 05969 | System hardening through configuration management | Preventive | |
Configure the "Saved from URL" setting properly. CC ID 05970 | System hardening through configuration management | Preventive | |
Configure the "Navigate URL" setting properly. CC ID 05971 | System hardening through configuration management | Preventive | |
Configure the "Block popups" setting properly. CC ID 05972 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from customizing attachment security settings" setting properly. CC ID 05973 | System hardening through configuration management | Preventive | |
Configure the "Macro Security Level" setting properly. CC ID 05974 | System hardening through configuration management | Preventive | |
Configure the "Trust all installed add-ins and templates" setting properly. CC ID 05975 | System hardening through configuration management | Preventive | |
Configure the "Store random number to improve merge accuracy" setting properly. CC ID 05976 | System hardening through configuration management | Preventive | |
Configure the "Prevent Users from Changing Office Encryption Settings" setting properly. CC ID 05977 | System hardening through configuration management | Preventive | |
Configure Universal settings for Microsoft Office in accordance with organizational standards. CC ID 07211 | System hardening through configuration management | Preventive | |
Configure the "Disable VBA for Office applications" to organizational standards. CC ID 07212 | System hardening through configuration management | Preventive | |
Configure the "Navigate URL" to organizational standards. CC ID 07213 | System hardening through configuration management | Preventive | |
Configure the "Block popups" to organizational standards. CC ID 07214 | System hardening through configuration management | Preventive | |
Configure the "Bind to object" to organizational standards. CC ID 07215 | System hardening through configuration management | Preventive | |
Configure the "Disable Package Repair" to organizational standards. CC ID 07216 | System hardening through configuration management | Preventive | |
Configure the "Disable user name and password" to organizational standards. CC ID 07217 | System hardening through configuration management | Preventive | |
Configure the "Saved from URL" to organizational standards. CC ID 07218 | System hardening through configuration management | Preventive | |
Configure the "Allow mix of policy and user locations" to organizational standards. CC ID 07284 | System hardening through configuration management | Preventive | |
Configure the "ActiveX Control Initialization" to organizational standards. CC ID 07285 | System hardening through configuration management | Preventive | |
Configure the "Allow users with earlier versions of Office to read with browsers." to organizational standards CC ID 07287 | System hardening through configuration management | Preventive | |
Configure the "Always expand groups in Office when restricting permission for documents" to organizational standards. CC ID 07288 | System hardening through configuration management | Preventive | |
Configure the "Allow PNG as an output format" to organizational standards. CC ID 07289 | System hardening through configuration management | Preventive | |
Configure the "Automatically receive small updates to improve reliability" to organizational standards. CC ID 07290 | System hardening through configuration management | Preventive | |
Configure the "Always require users to connect to verify permission" to organizational standards. CC ID 07291 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2007 through the Compatibility Pack for the 2007 Office system and PowerPoint 2007 Converter" to organizational standards. CC ID 07292 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Word 2007 through the Compatibility Pack for the 2007 Office system and Word 2007 Open XML/Word 97-2003 Format Converter" to organizational standards. CC ID 07294 | System hardening through configuration management | Preventive | |
Configure the "Block updates from the Office Update Site from applying" to organizational standards. CC ID 07295 | System hardening through configuration management | Preventive | |
Configure the "Control Blogging" to organizational standards. CC ID 07296 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Excel 2007 through the Compatibility Pack for the 2007 Office system and Excel 2007 Converter" to organizational standards. CC ID 07297 | System hardening through configuration management | Preventive | |
Configure the "Disable All ActiveX" to organizational standards. CC ID 07298 | System hardening through configuration management | Preventive | |
Configure the "Disable all Trust Bar notifications for security issues" to organizational standards. CC ID 07299 | System hardening through configuration management | Preventive | |
Configure the "Disable access to updates, add-ins, and patches on the Office Online website" to organizational standards. CC ID 07300 | System hardening through configuration management | Preventive | |
Configure the "Disable Check For Solutions" to organizational standards. CC ID 07301 | System hardening through configuration management | Preventive | |
Configure the "Disable Clip Art and Media downloads from the client and from Office Online website" to organizational standards. CC ID 07302 | System hardening through configuration management | Preventive | |
Configure the "Disable all user customization of Quick Access Toolbar" to organizational standards. CC ID 07303 | System hardening through configuration management | Preventive | |
Configure the "Disable Document Information Panel" to organizational standards. CC ID 07304 | System hardening through configuration management | Preventive | |
Configure the "Disable hyperlink warnings" to organizational standards. CC ID 07305 | System hardening through configuration management | Preventive | |
Configure the "Disable customer-submitted templates downloads from Office Online" to organizational standards. CC ID 07306 | System hardening through configuration management | Preventive | |
Configure the "Disable inclusion of document properties in PDF and XPS output" to organizational standards. CC ID 07307 | System hardening through configuration management | Preventive | |
Configure the "Disable Internet Fax feature" to organizational standards. CC ID 07308 | System hardening through configuration management | Preventive | |
Configure the "Disable hyperlinks to web templates in File | New and task panes" to organizational standards. CC ID 07309 | System hardening through configuration management | Preventive | |
Configure the "Disable password to open UI" to organizational standards. CC ID 07311 | System hardening through configuration management | Preventive | |
Configure the "Disable Microsoft Passport service for content with restricted permission" to organizational standards. CC ID 07312 | System hardening through configuration management | Preventive | |
Configure the "Disable Smart Document's use of manifests" to organizational standards. CC ID 07313 | System hardening through configuration management | Preventive | |
Configure the "Disable template downloads from the client and from Office Online website" to organizational standards. CC ID 07314 | System hardening through configuration management | Preventive | |
Configure the "Automation Security" to organizational standards. CC ID 07315 | System hardening through configuration management | Preventive | |
Configure the "Disable training practice downloads from the Office Online website" to organizational standards. CC ID 07316 | System hardening through configuration management | Preventive | |
Configure the "Disable Update Diagnostic" to organizational standards. CC ID 07317 | System hardening through configuration management | Preventive | |
Configure the "Disable UI extending from documents and templates" to organizational standards. CC ID 07318 | System hardening through configuration management | Preventive | |
Configure the "Disable Opt-in Wizard on first run" to organizational standards. CC ID 07319 | System hardening through configuration management | Preventive | |
Configure the "Document Information Panel Beaconing UI" to organizational standards. CC ID 07320 | System hardening through configuration management | Preventive | |
Configure the "EKU filtering" to organizational standards. CC ID 07321 | System hardening through configuration management | Preventive | |
Configure the "Encryption type for password protected Office 97-2003 files" to organizational standards. CC ID 07323 | System hardening through configuration management | Preventive | |
Configure the "Enable Customer Experience Improvement Program" to organizational standards. CC ID 07324 | System hardening through configuration management | Preventive | |
Configure the "Encryption type for password protected Office Open XML files" to organizational standards. CC ID 07325 | System hardening through configuration management | Preventive | |
Configure the "Key Usage Filtering" to organizational standards. CC ID 07326 | System hardening through configuration management | Preventive | |
Configure the "Improve Proofing Tools" to organizational standards. CC ID 07327 | System hardening through configuration management | Preventive | |
Configure the "Never allow users to specify groups when restricting permission for documents" to organizational standards. CC ID 07328 | System hardening through configuration management | Preventive | |
Configure the "Legacy format signatures" to organizational standards. CC ID 07329 | System hardening through configuration management | Preventive | |
Configure the "Load Controls in Forms3" to organizational standards. CC ID 07330 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from changing permissions on rights managed content" to organizational standards. CC ID 07331 | System hardening through configuration management | Preventive | |
Configure the "Online content options" to organizational standards. CC ID 07332 | System hardening through configuration management | Preventive | |
Configure the "Disable user customization of Quick Access Toolbar via UI" to organizational standards. CC ID 07333 | System hardening through configuration management | Preventive | |
Configure the "Protect document metadata for password protected files" to organizational standards. CC ID 07334 | System hardening through configuration management | Preventive | |
Configure the "Prevents users from uploading document templates to the Office Online community." to organizational standards CC ID 07335 | System hardening through configuration management | Preventive | |
Configure the "Recognize smart tags in Excel" to organizational standards. CC ID 07336 | System hardening through configuration management | Preventive | |
Configure the "Rely on VML for displaying graphics in browsers" to organizational standards. CC ID 07337 | System hardening through configuration management | Preventive | |
Configure the "Protect document metadata for rights managed Office Open XML Files" to organizational standards. CC ID 07338 | System hardening through configuration management | Preventive | |
Configure the "Suppress Office Signing Providers" to organizational standards. CC ID 07339 | System hardening through configuration management | Preventive | |
Configure the "Suppress external signature services menu item" to organizational standards. CC ID 07340 | System hardening through configuration management | Preventive | |
Configure the "Disable the Office client from polling the Office server for published links" to organizational standards. CC ID 07361 | System hardening through configuration management | Preventive | |
Configure the "Open Office documents as read/write while browsing" to organizational standards. CC ID 07380 | System hardening through configuration management | Preventive | |
Configure the "Specify CNG salt length" to organizational standards. CC ID 07905 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #6" to organizational standards. CC ID 07919 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #9" to organizational standards. CC ID 07920 | System hardening through configuration management | Preventive | |
Configure the "Disable template downloads from the client and from Office.com" to organizational standards. CC ID 07942 | System hardening through configuration management | Preventive | |
Configure the "Disable customer-submitted templates downloads from Office.com" to organizational standards. CC ID 07949 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #15" to organizational standards. CC ID 07953 | System hardening through configuration management | Preventive | |
Configure the "Prevents users from uploading document templates to the Office.com Community." to organizational standards CC ID 08017 | System hardening through configuration management | Preventive | |
Configure the "Disable training practice downloads from Office.com" to organizational standards. CC ID 08027 | System hardening through configuration management | Preventive | |
Configure the "Disable Clip Art and Media downloads from the client and from Office.com" to organizational standards. CC ID 08049 | System hardening through configuration management | Preventive | |
Configure the "Allow Trusted Locations on the network" to organizational standards. CC ID 08053 | System hardening through configuration management | Preventive | |
Configure the "Turn off all user customizations" to organizational standards. CC ID 08084 | System hardening through configuration management | Preventive | |
Configure the "Disable access to updates, add-ins, and patches on Office.com" to organizational standards. CC ID 08137 | System hardening through configuration management | Preventive | |
Configure Microsoft InfoPath settings for Microsoft Office in accordance with organizational standards. CC ID 07219 | System hardening through configuration management | Preventive | |
Configure the "InfoPath APTCA Assembly allowable list" to organizational standards. CC ID 07220 | System hardening through configuration management | Preventive | |
Configure the "InfoPath APTCA Assembly Allowable List Enforcement" to organizational standards. CC ID 07221 | System hardening through configuration management | Preventive | |
Configure the "Allow file types as attachments to forms" to organizational standards. CC ID 07260 | System hardening through configuration management | Preventive | |
Configure the "Beaconing UI for forms opened in InfoPath" to organizational standards. CC ID 07262 | System hardening through configuration management | Preventive | |
Configure the "Control behavior for Windows SharePoint Services gradual upgrade" to organizational standards. CC ID 07264 | System hardening through configuration management | Preventive | |
Configure the "Control behavior when opening forms in the Intranet security zone" to organizational standards. CC ID 07266 | System hardening through configuration management | Preventive | |
Configure the "Custom code" to organizational standards. CC ID 07267 | System hardening through configuration management | Preventive | |
Configure the "Beaconing UI for forms opened in InfoPath Editor ActiveX" to organizational standards. CC ID 07268 | System hardening through configuration management | Preventive | |
Configure the "Control behavior when opening InfoPath e-mail forms containing code or script" to organizational standards. CC ID 07269 | System hardening through configuration management | Preventive | |
Configure the "Disable dynamic caching of the form template in InfoPath e-mail forms" to organizational standards. CC ID 07270 | System hardening through configuration management | Preventive | |
Configure the "Disable e-mail forms from the Full Trust security zone" to organizational standards. CC ID 07271 | System hardening through configuration management | Preventive | |
Configure the "Control behavior when opening forms in the Trusted Site security zone" to organizational standards. CC ID 07272 | System hardening through configuration management | Preventive | |
Configure the "Control behavior when opening forms in the Internet security zone" to organizational standards. CC ID 07273 | System hardening through configuration management | Preventive | |
Configure the "Disable e-mail forms from the Intranet security zone" to organizational standards. CC ID 07274 | System hardening through configuration management | Preventive | |
Configure the "Block specific file types as attachments to forms" to organizational standards. CC ID 07276 | System hardening through configuration management | Preventive | |
Configure the "Disable e-mail forms from the Internet security zone" to organizational standards. CC ID 07277 | System hardening through configuration management | Preventive | |
Configure the "Disable fully trusted solutions full access to computer" to organizational standards. CC ID 07278 | System hardening through configuration management | Preventive | |
Configure the "Disable sending form template with e-mail forms" to organizational standards. CC ID 07279 | System hardening through configuration management | Preventive | |
Configure the "Disable InfoPath e-mail forms in Outlook" to organizational standards. CC ID 07280 | System hardening through configuration management | Preventive | |
Configure the "Email Forms Beaconing UI" to organizational standards. CC ID 07281 | System hardening through configuration management | Preventive | |
Configure the "Disable e-mail forms running in restricted security level" to organizational standards. CC ID 07282 | System hardening through configuration management | Preventive | |
Configure the "Disable sending InfoPath 2003 Forms as e-mail forms" to organizational standards. CC ID 07283 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from allowing unsafe file types to be attached to forms" to organizational standards. CC ID 07286 | System hardening through configuration management | Preventive | |
Configure the "Information Rights Management" to organizational standards. CC ID 07293 | System hardening through configuration management | Preventive | |
Configure the "Disable opening of solutions from the Internet security zone" to organizational standards. CC ID 07310 | System hardening through configuration management | Preventive | |
Configure the "Offline Mode status" to organizational standards. CC ID 07322 | System hardening through configuration management | Preventive | |
Configure Microsoft Access settings for Microsoft Office in accordance with organizational standards. CC ID 07222 | System hardening through configuration management | Preventive | |
Configure the "Disable all application add-ins" to organizational standards. CC ID 07223 | System hardening through configuration management | Preventive | |
Configure the "Allow Trusted Locations not on the computer" to organizational standards. CC ID 07224 | System hardening through configuration management | Preventive | |
Configure the "Disable commands" to organizational standards. CC ID 07225 | System hardening through configuration management | Preventive | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins" to organizational standards. CC ID 07226 | System hardening through configuration management | Preventive | |
Configure the "Disable all trusted locations" to organizational standards. CC ID 07227 | System hardening through configuration management | Preventive | |
Configure the "Disable shortcut keys" to organizational standards. CC ID 07228 | System hardening through configuration management | Preventive | |
Configure the "Do not prompt to convert older databases" to organizational standards. CC ID 07229 | System hardening through configuration management | Preventive | |
Configure the "Modal Trust Decision Only" to organizational standards. CC ID 07230 | System hardening through configuration management | Preventive | |
Configure the "Default file format" to organizational standards. CC ID 07231 | System hardening through configuration management | Preventive | |
Configure the "Require that application add-ins are signed by Trusted Publisher" to organizational standards. CC ID 07233 | System hardening through configuration management | Preventive | |
Configure the "VBA Macro Warning Settings" to organizational standards. CC ID 07234 | System hardening through configuration management | Preventive | |
Configure the "Underline hyperlinks" to organizational standards. CC ID 07235 | System hardening through configuration management | Preventive | |
Configure Microsoft Excel settings for Microsoft Office in accordance with organizational standards. CC ID 07232 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Binary file types" to organizational standards. CC ID 07236 | System hardening through configuration management | Preventive | |
Configure the "AutoRepublish Warning Alert" to organizational standards. CC ID 07237 | System hardening through configuration management | Preventive | |
Configure the "Block opening of DIF and SYLK file types" to organizational standards. CC ID 07238 | System hardening through configuration management | Preventive | |
Configure the "Ask to update automatic links" to organizational standards. CC ID 07239 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Open XML file types" to organizational standards. CC ID 07240 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Xll file type" to organizational standards. CC ID 07241 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Xml file types" to organizational standards. CC ID 07242 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Text file types" to organizational standards. CC ID 07243 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Binary file types" to organizational standards. CC ID 07244 | System hardening through configuration management | Preventive | |
Configure the "Block saving DIF and SYLK file types" to organizational standards. CC ID 07245 | System hardening through configuration management | Preventive | |
Configure the "Block opening of files created by pre-release versions of Excel 2007" to organizational standards. CC ID 07246 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Text file types" to organizational standards. CC ID 07247 | System hardening through configuration management | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Excel Open XML workbooks" to organizational standards. CC ID 07248 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Html and Xmlss file types" to organizational standards. CC ID 07249 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Binary 12 file types" to organizational standards. CC ID 07250 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Open XML file types" to organizational standards. CC ID 07251 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Binary12 file types" to organizational standards. CC ID 07252 | System hardening through configuration management | Preventive | |
Configure the "Disable AutoRepublish" to organizational standards. CC ID 07253 | System hardening through configuration management | Preventive | |
Configure the "Do not show data extraction options when opening corrupt workbooks" to organizational standards. CC ID 07254 | System hardening through configuration management | Preventive | |
Configure the "Internet and network paths as hyperlinks" to organizational standards. CC ID 07255 | System hardening through configuration management | Preventive | |
Configure the "Load pictures from Web pages not created in Excel" to organizational standards. CC ID 07256 | System hardening through configuration management | Preventive | |
Configure the "Save any additional data necessary to maintain formulas" to organizational standards. CC ID 07257 | System hardening through configuration management | Preventive | |
Configure the "Store macro in Personal Macro Workbook by default" to organizational standards. CC ID 07258 | System hardening through configuration management | Preventive | |
Configure the "Save Excel files as" to organizational standards. CC ID 07259 | System hardening through configuration management | Preventive | |
Configure the "Trust access to Visual Basic Project" to organizational standards. CC ID 07261 | System hardening through configuration management | Preventive | |
Configure the "Force file extension to match file type" to organizational standards. CC ID 07263 | System hardening through configuration management | Preventive | |
Configure the "Ignore other applications" to organizational standards. CC ID 07265 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Html and Xmlss file types" to organizational standards. CC ID 07275 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #10" to organizational standards. CC ID 07927 | System hardening through configuration management | Preventive | |
Configure the "Configure CNG cipher chaining mode" to organizational standards. CC ID 07934 | System hardening through configuration management | Preventive | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins and block them" to organizational standards. CC ID 07938 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #20" to organizational standards. CC ID 07947 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #18" to organizational standards. CC ID 07961 | System hardening through configuration management | Preventive | |
Configure the "Do not show AutoRepublish warning alert" to organizational standards. CC ID 07970 | System hardening through configuration management | Preventive | |
Configure the "Turn off Protected View for attachments opened from Outlook" to organizational standards. CC ID 07973 | System hardening through configuration management | Preventive | |
Configure the "Turn off Trusted Documents on the network" to organizational standards. CC ID 07980 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #11" to organizational standards. CC ID 08006 | System hardening through configuration management | Preventive | |
Configure the "Perform file validation on pivot caches" to organizational standards. CC ID 08022 | System hardening through configuration management | Preventive | |
Configure the "Scan encrypted macros in Excel Open XML workbooks" to organizational standards. CC ID 08102 | System hardening through configuration management | Preventive | |
Configure the "Open files on local Intranet UNC in Protected View" to organizational standards. CC ID 08110 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Office query files" to organizational standards. CC ID 08205 | System hardening through configuration management | Preventive | |
Configure the "Excel 97-2003 workbooks and templates" to organizational standards. CC ID 08236 | System hardening through configuration management | Preventive | |
Configure the "Excel 95-97 workbooks and templates" to organizational standards. CC ID 08255 | System hardening through configuration management | Preventive | |
Configure the "XML files" to organizational standards. CC ID 08262 | System hardening through configuration management | Preventive | |
Configure the "Excel 3 worksheets" to organizational standards. CC ID 08270 | System hardening through configuration management | Preventive | |
Configure the "Dif and Sylk files" to organizational standards. CC ID 08284 | System hardening through configuration management | Preventive | |
Configure the "dBase III / IV files" to organizational standards. CC ID 08300 | System hardening through configuration management | Preventive | |
Configure the "Excel 2 macrosheets and add-in files" to organizational standards. CC ID 08303 | System hardening through configuration management | Preventive | |
Configure the "Excel 2007 and later binary workbooks" to organizational standards. CC ID 08305 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Office Open XML converters for Excel" to organizational standards. CC ID 08308 | System hardening through configuration management | Preventive | |
Configure the "Web pages and Excel 2003 XML spreadsheets" to organizational standards. CC ID 08314 | System hardening through configuration management | Preventive | |
Configure the "Excel 4 workbooks" to organizational standards. CC ID 08315 | System hardening through configuration management | Preventive | |
Configure the "Excel 2007 and later workbooks and templates" to organizational standards. CC ID 08317 | System hardening through configuration management | Preventive | |
Configure the "Excel 95 workbooks" to organizational standards. CC ID 08319 | System hardening through configuration management | Preventive | |
Configure the "Other data source files" to organizational standards. CC ID 08321 | System hardening through configuration management | Preventive | |
Configure the "Excel 2007 and later macro-enabled workbooks and templates" to organizational standards. CC ID 08323 | System hardening through configuration management | Preventive | |
Configure the "Legacy converters for Excel" to organizational standards. CC ID 08325 | System hardening through configuration management | Preventive | |
Configure the "Excel 2 worksheets" to organizational standards. CC ID 08326 | System hardening through configuration management | Preventive | |
Configure the "Offline cube files" to organizational standards. CC ID 08327 | System hardening through configuration management | Preventive | |
Configure the "Excel 4 macrosheets and add-in files" to organizational standards. CC ID 08329 | System hardening through configuration management | Preventive | |
Configure the "Excel 2007 and later add-in files" to organizational standards. CC ID 08330 | System hardening through configuration management | Preventive | |
Configure the "Excel 3 macrosheets and add-in files" to organizational standards. CC ID 08332 | System hardening through configuration management | Preventive | |
Configure the "OpenDocument Spreadsheet files" to organizational standards. CC ID 08335 | System hardening through configuration management | Preventive | |
Configure the "Excel add-in files" to organizational standards. CC ID 08337 | System hardening through configuration management | Preventive | |
Configure the "Text files" to organizational standards. CC ID 08339 | System hardening through configuration management | Preventive | |
Configure the "Excel 97-2003 add-in files" to organizational standards. CC ID 08344 | System hardening through configuration management | Preventive | |
Configure the "Excel 4 worksheets" to organizational standards. CC ID 08345 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Office data connection files" to organizational standards. CC ID 08346 | System hardening through configuration management | Preventive | |
Configure Microsoft Outlook settings for Microsoft Office in accordance with organizational standards. CC ID 07341 | System hardening through configuration management | Preventive | |
Configure the "Add file extensions to block as Level 1" to organizational standards. CC ID 07342 | System hardening through configuration management | Preventive | |
Configure the "Access to published calendars" to organizational standards. CC ID 07343 | System hardening through configuration management | Preventive | |
Configure the "Add e-mail recipients to users' Safe Senders Lists" to organizational standards. CC ID 07344 | System hardening through configuration management | Preventive | |
Configure the "Allow access to e-mail attachments" to organizational standards. CC ID 07345 | System hardening through configuration management | Preventive | |
Configure the "Allow Active X One Off Forms" to organizational standards. CC ID 07346 | System hardening through configuration management | Preventive | |
Configure the "Add file extensions to block as Level 2" to organizational standards. CC ID 07347 | System hardening through configuration management | Preventive | |
Configure the "Allow users to demote attachments to Level 2" to organizational standards. CC ID 07348 | System hardening through configuration management | Preventive | |
Configure the "Apply macro security settings to macros, add-ins, and SmartTags" to organizational standards. CC ID 07349 | System hardening through configuration management | Preventive | |
Configure the "Allow scripts in one-off Outlook forms" to organizational standards. CC ID 07350 | System hardening through configuration management | Preventive | |
Configure the "Authentication with Exchange Server" to organizational standards. CC ID 07351 | System hardening through configuration management | Preventive | |
Configure the "Attachment Secure Temporary Folder" to organizational standards. CC ID 07352 | System hardening through configuration management | Preventive | |
Configure the "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" to organizational standards. CC ID 07353 | System hardening through configuration management | Preventive | |
Configure the "Automatically configure profile based on Active Directory Primary SMTP address" to organizational standards. CC ID 07354 | System hardening through configuration management | Preventive | |
Configure the "Block Trusted Zones" to organizational standards. CC ID 07355 | System hardening through configuration management | Preventive | |
Configure the "Configure Add-In Trust Level" to organizational standards. CC ID 07356 | System hardening through configuration management | Preventive | |
Configure the "Automatically download attachments" to organizational standards. CC ID 07357 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" to organizational standards. CC ID 07358 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook object model prompt when accessing address information via UserProperties.Find" to organizational standards. CC ID 07359 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook object model prompt when executing Save As" to organizational standards. CC ID 07360 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook object model prompt when responding to meeting and task requests" to organizational standards. CC ID 07362 | System hardening through configuration management | Preventive | |
Configure the "Dial-up options" to organizational standards. CC ID 07363 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook object model prompt when sending mail" to organizational standards. CC ID 07364 | System hardening through configuration management | Preventive | |
Configure the "Configure trusted add-ins" to organizational standards. CC ID 07365 | System hardening through configuration management | Preventive | |
Configure the "Disable user entries to server list" to organizational standards. CC ID 07366 | System hardening through configuration management | Preventive | |
Configure the "Disable Remember Password" to organizational standards. CC ID 07367 | System hardening through configuration management | Preventive | |
Configure the "Display Level 1 attachments" to organizational standards. CC ID 07368 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook object model prompt when reading address information" to organizational standards. CC ID 07369 | System hardening through configuration management | Preventive | |
Configure the "Do not allow attachment previewing in Outlook" to organizational standards. CC ID 07370 | System hardening through configuration management | Preventive | |
Configure the "Do not allow creating, replying, or forwarding signatures for e-mail messages" to organizational standards. CC ID 07371 | System hardening through configuration management | Preventive | |
Configure the "Configure Outlook object model prompt when accessing an address book" to organizational standards. CC ID 07372 | System hardening through configuration management | Preventive | |
Configure the "Do not allow folders in non-default stores to be set as folder home pages" to organizational standards. CC ID 07373 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Outlook object model scripts to run for public folders" to organizational standards. CC ID 07374 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Outlook object model scripts to run for shared folders" to organizational standards. CC ID 07375 | System hardening through configuration management | Preventive | |
Configure the "Do not automatically sign replies" to organizational standards. CC ID 07376 | System hardening through configuration management | Preventive | |
Configure the "Do not check e-mail address against address of certificates being used" to organizational standards. CC ID 07377 | System hardening through configuration management | Preventive | |
Configure the "Do not allow users to change permissions on folders" to organizational standards. CC ID 07378 | System hardening through configuration management | Preventive | |
Configure the "Do not expand distribution lists" to organizational standards. CC ID 07379 | System hardening through configuration management | Preventive | |
Configure the "Do not display 'Publish to GAL' button" to organizational standards. CC ID 07381 | System hardening through configuration management | Preventive | |
Configure the "Do not prompt about Level 1 attachments when closing an item" to organizational standards. CC ID 07382 | System hardening through configuration management | Preventive | |
Configure the "Do not permit download of content from safe zones" to organizational standards. CC ID 07383 | System hardening through configuration management | Preventive | |
Configure the "Download full text of articles as HTML attachments" to organizational standards. CC ID 07384 | System hardening through configuration management | Preventive | |
Configure the "Do not prompt about Level 1 attachments when sending an item" to organizational standards. CC ID 07385 | System hardening through configuration management | Preventive | |
Configure the "Do not provide Continue option on Encryption warning dialog boxes" to organizational standards. CC ID 07386 | System hardening through configuration management | Preventive | |
Configure the "Enable RPC encryption" to organizational standards. CC ID 07387 | System hardening through configuration management | Preventive | |
Configure the "Encrypt all e-mail messages" to organizational standards. CC ID 07388 | System hardening through configuration management | Preventive | |
Configure the "Enable links in e-mail messages" to organizational standards. CC ID 07389 | System hardening through configuration management | Preventive | |
Configure the "Display pictures and external content in HTML e-mail" to organizational standards. CC ID 07390 | System hardening through configuration management | Preventive | |
Configure the "Hide Junk Mail UI" to organizational standards. CC ID 07391 | System hardening through configuration management | Preventive | |
Configure the "Ensure all S/MIME signed messages have a label" to organizational standards. CC ID 07392 | System hardening through configuration management | Preventive | |
Configure the "Include Intranet in Safe Zones for Automatic Picture Download" to organizational standards. CC ID 07393 | System hardening through configuration management | Preventive | |
Configure the "Include Internet in Safe Zones for Automatic Picture Download" to organizational standards. CC ID 07394 | System hardening through configuration management | Preventive | |
Configure the "Message Formats" to organizational standards. CC ID 07395 | System hardening through configuration management | Preventive | |
Configure the "Junk E-mail protection level" to organizational standards. CC ID 07396 | System hardening through configuration management | Preventive | |
Configure the "Make Outlook the default program for E-mail, Contacts, and Calendar" to organizational standards. CC ID 07397 | System hardening through configuration management | Preventive | |
Configure the "Do not include Internet Calendar integration in Outlook" to organizational standards. CC ID 07398 | System hardening through configuration management | Preventive | |
Configure the "Missing CRLs" to organizational standards. CC ID 07399 | System hardening through configuration management | Preventive | |
Configure the "Display online status on a person name" to organizational standards. CC ID 07400 | System hardening through configuration management | Preventive | |
Configure the "Outlook Rich Text options" to organizational standards. CC ID 07401 | System hardening through configuration management | Preventive | |
Configure the "Outlook Security Mode" to organizational standards. CC ID 07402 | System hardening through configuration management | Preventive | |
Configure the "Plain text options" to organizational standards. CC ID 07403 | System hardening through configuration management | Preventive | |
Configure the "Prevent publishing to a DAV server" to organizational standards. CC ID 07404 | System hardening through configuration management | Preventive | |
Configure the "Prevent publishing to Office Online" to organizational standards. CC ID 07405 | System hardening through configuration management | Preventive | |
Configure the "Promote Level 2 errors as errors, not warnings" to organizational standards. CC ID 07406 | System hardening through configuration management | Preventive | |
Configure the "Prevent users from customizing attachment security settings" to organizational standards. CC ID 07407 | System hardening through configuration management | Preventive | |
Configure the "Prompt user to choose security settings if default settings fail" to organizational standards. CC ID 07408 | System hardening through configuration management | Preventive | |
Configure the "Remove file extensions blocked as Level 1" to organizational standards. CC ID 07409 | System hardening through configuration management | Preventive | |
Configure the "Remove file extensions blocked as Level 2" to organizational standards. CC ID 07410 | System hardening through configuration management | Preventive | |
Configure the "Read e-mail as plain text" to organizational standards. CC ID 07411 | System hardening through configuration management | Preventive | |
Configure the "Read signed e-mail as plain text" to organizational standards. CC ID 07412 | System hardening through configuration management | Preventive | |
Configure the "Request an S/MIME receipt for all S/MIME signed messages" to organizational standards. CC ID 07413 | System hardening through configuration management | Preventive | |
Configure the "Restrict level of calendar details users can publish" to organizational standards. CC ID 07414 | System hardening through configuration management | Preventive | |
Configure the "Require SuiteB algorithms for S/MIME operations" to organizational standards. CC ID 07415 | System hardening through configuration management | Preventive | |
Configure the "Minimum encryption settings" to organizational standards. CC ID 07416 | System hardening through configuration management | Preventive | |
Configure the "Retrieving CRLs (Certificate Revocation Lists)" to organizational standards. CC ID 07417 | System hardening through configuration management | Preventive | |
Configure the "Run in FIPS compliant mode" to organizational standards. CC ID 07418 | System hardening through configuration management | Preventive | |
Configure the "Missing root certificates" to organizational standards. CC ID 07419 | System hardening through configuration management | Preventive | |
Configure the "S/MIME password settings" to organizational standards. CC ID 07420 | System hardening through configuration management | Preventive | |
Configure the "S/MIME receipt requests" to organizational standards. CC ID 07421 | System hardening through configuration management | Preventive | |
Configure the "S/MIME interoperability with external clients:" to organizational standards. CC ID 07422 | System hardening through configuration management | Preventive | |
Configure the "Send all signed messages as clear signed messages" to organizational standards. CC ID 07423 | System hardening through configuration management | Preventive | |
Configure the "Security setting for macros" to organizational standards. CC ID 07424 | System hardening through configuration management | Preventive | |
Configure the "Set control ItemProperty prompt" to organizational standards. CC ID 07425 | System hardening through configuration management | Preventive | |
Configure the "Set maximum level of online status on a person name" to organizational standards. CC ID 07426 | System hardening through configuration management | Preventive | |
Configure the "Set message format" to organizational standards. CC ID 07427 | System hardening through configuration management | Preventive | |
Configure the "Sign all e-mail messages" to organizational standards. CC ID 07428 | System hardening through configuration management | Preventive | |
Configure the "Fortezza certificate policies" to organizational standards. CC ID 07429 | System hardening through configuration management | Preventive | |
Configure the "Synchronize Outlook RSS Feeds with Common Feed List" to organizational standards. CC ID 07430 | System hardening through configuration management | Preventive | |
Configure the "Trust E-mail from Contacts" to organizational standards. CC ID 07431 | System hardening through configuration management | Preventive | |
Configure the "Signature Warning" to organizational standards. CC ID 07432 | System hardening through configuration management | Preventive | |
Configure the "Turn off RSS feature" to organizational standards. CC ID 07466 | System hardening through configuration management | Preventive | |
Configure the "Restrict upload method" to organizational standards. CC ID 07473 | System hardening through configuration management | Preventive | |
Configure the "Required Certificate Authority" to organizational standards. CC ID 07493 | System hardening through configuration management | Preventive | |
Configure the "Turn off Enable the Person Names Smart Tag option" to organizational standards. CC ID 07499 | System hardening through configuration management | Preventive | |
Configure the "Use Unicode format when dragging e-mail message to file system" to organizational standards. CC ID 07506 | System hardening through configuration management | Preventive | |
Configure the "URL for S/MIME certificates" to organizational standards. CC ID 07520 | System hardening through configuration management | Preventive | |
Configure the "Set Outlook object model Custom Actions execution prompt" to organizational standards. CC ID 07539 | System hardening through configuration management | Preventive | |
Configure the "Prevent publishing to Office.com" to organizational standards. CC ID 08243 | System hardening through configuration management | Preventive | |
Configure the "Do not allow signatures for e-mail messages" to organizational standards. CC ID 08318 | System hardening through configuration management | Preventive | |
Configure Microsoft PowerPoint settings for Microsoft Office in accordance with organizational standards. CC ID 07433 | System hardening through configuration management | Preventive | |
Configure the "Block saving of GraphicFilters" to organizational standards. CC ID 07456 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Converters" to organizational standards. CC ID 07458 | System hardening through configuration management | Preventive | |
Configure the "Save files in this format" to organizational standards. CC ID 07461 | System hardening through configuration management | Preventive | |
Configure the "Disable Slide Update" to organizational standards. CC ID 07464 | System hardening through configuration management | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft PowerPoint Open XML presentations" to organizational standards. CC ID 07467 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Html file types" to organizational standards. CC ID 07474 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Outlines" to organizational standards. CC ID 07485 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Outlines" to organizational standards. CC ID 07490 | System hardening through configuration management | Preventive | |
Configure the "Make hidden markup visible" to organizational standards. CC ID 07511 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2007" to organizational standards. CC ID 07516 | System hardening through configuration management | Preventive | |
Configure the "Run Programs" to organizational standards. CC ID 07518 | System hardening through configuration management | Preventive | |
Configure the "Unblock automatic download of linked images" to organizational standards. CC ID 07519 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Open Xml files types" to organizational standards. CC ID 07531 | System hardening through configuration management | Preventive | |
Configure the "Web Pages" to organizational standards. CC ID 07914 | System hardening through configuration management | Preventive | |
Configure the "Turn off trusted documents" to organizational standards. CC ID 07925 | System hardening through configuration management | Preventive | |
Configure the "Set CNG password spin count" to organizational standards. CC ID 07946 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #16" to organizational standards. CC ID 07956 | System hardening through configuration management | Preventive | |
Configure the "Outline files" to organizational standards. CC ID 07958 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #3" to organizational standards. CC ID 07966 | System hardening through configuration management | Preventive | |
Configure the "Scan encrypted macros in PowerPoint Open XML presentations" to organizational standards. CC ID 07967 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #4" to organizational standards. CC ID 07978 | System hardening through configuration management | Preventive | |
Configure the "Set maximum number of trusted documents" to organizational standards. CC ID 08005 | System hardening through configuration management | Preventive | |
Configure the "Legacy converters for PowerPoint" to organizational standards. CC ID 08009 | System hardening through configuration management | Preventive | |
Configure the "Set document behavior if file validation fails" to organizational standards. CC ID 08025 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Office Open XML converters for PowerPoint" to organizational standards. CC ID 08030 | System hardening through configuration management | Preventive | |
Configure the "PowerPoint beta converters" to organizational standards. CC ID 08047 | System hardening through configuration management | Preventive | |
Configure the "OpenDocument Presentation files" to organizational standards. CC ID 08051 | System hardening through configuration management | Preventive | |
Configure the "Use new key on password change" to organizational standards. CC ID 08052 | System hardening through configuration management | Preventive | |
Configure the "Graphic Filters" to organizational standards. CC ID 08060 | System hardening through configuration management | Preventive | |
Configure the "PowerPoint 2007 and later presentations, shows, templates, themes and add-in files" to organizational standards. CC ID 08099 | System hardening through configuration management | Preventive | |
Configure the "PowerPoint 97-2003 presentations, shows, templates and add-in files" to organizational standards. CC ID 08106 | System hardening through configuration management | Preventive | |
Configure the "PowerPoint beta files" to organizational standards. CC ID 08121 | System hardening through configuration management | Preventive | |
Configure the "Set default file block behavior" to organizational standards. CC ID 08142 | System hardening through configuration management | Preventive | |
Configure Microsoft Word settings for Microsoft Office in accordance with organizational standards. CC ID 07438 | System hardening through configuration management | Preventive | |
Configure the "Block opening of files before version" to organizational standards. CC ID 07462 | System hardening through configuration management | Preventive | |
Configure the "Block open Converters" to organizational standards. CC ID 07468 | System hardening through configuration management | Preventive | |
Configure the "Update automatic links at Open" to organizational standards. CC ID 07483 | System hardening through configuration management | Preventive | |
Configure the "Warn before printing, saving or sending a file that contains tracked changes or comments" to organizational standards. CC ID 07494 | System hardening through configuration management | Preventive | |
Configure the "Block saving of RTF file types" to organizational standards. CC ID 07501 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Converters" to organizational standards. CC ID 07504 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Word 2003 XML file types" to organizational standards. CC ID 07507 | System hardening through configuration management | Preventive | |
Configure the "Block opening of RTF file types" to organizational standards. CC ID 07510 | System hardening through configuration management | Preventive | |
Configure the "Block opening of HTML file types" to organizational standards. CC ID 07512 | System hardening through configuration management | Preventive | |
Configure the "Hidden text" to organizational standards. CC ID 07513 | System hardening through configuration management | Preventive | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Word Open XML documents" to organizational standards. CC ID 07533 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Word 2007" to organizational standards. CC ID 07541 | System hardening through configuration management | Preventive | |
Configure the "Block opening of Internal file types" to organizational standards. CC ID 07552 | System hardening through configuration management | Preventive | |
Configure the "Block saving of Word 2003 XML file types" to organizational standards. CC ID 07567 | System hardening through configuration management | Preventive | |
Configure the "RTF files" to organizational standards. CC ID 07911 | System hardening through configuration management | Preventive | |
Configure the "Set maximum number of trust records to preserve" to organizational standards. CC ID 07912 | System hardening through configuration management | Preventive | |
Configure the "Specify CNG hash algorithm" to organizational standards. CC ID 07913 | System hardening through configuration management | Preventive | |
Configure the "VBA Macro Notification Settings" to organizational standards. CC ID 07926 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #2" to organizational standards. CC ID 07933 | System hardening through configuration management | Preventive | |
Configure the "Do not open files in unsafe locations in Protected View" to organizational standards. CC ID 07939 | System hardening through configuration management | Preventive | |
Configure the "Set parameters for CNG context" to organizational standards. CC ID 07948 | System hardening through configuration management | Preventive | |
Configure the "Store random number to improve merge accuracy" to organizational standards. CC ID 07972 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #19" to organizational standards. CC ID 07975 | System hardening through configuration management | Preventive | |
Configure the "Legacy converters for Word" to organizational standards. CC ID 07985 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #5" to organizational standards. CC ID 07987 | System hardening through configuration management | Preventive | |
Configure the "Word 6.0 binary documents and templates" to organizational standards. CC ID 07995 | System hardening through configuration management | Preventive | |
Configure the "Word 2000 binary documents and templates" to organizational standards. CC ID 08012 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #13" to organizational standards. CC ID 08013 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #17" to organizational standards. CC ID 08015 | System hardening through configuration management | Preventive | |
Configure the "Word 97 binary documents and templates" to organizational standards. CC ID 08024 | System hardening through configuration management | Preventive | |
Configure the "Do not open files from the Internet zone in Protected View" to organizational standards. CC ID 08029 | System hardening through configuration management | Preventive | |
Configure the "Turn off file validation" to organizational standards. CC ID 08048 | System hardening through configuration management | Preventive | |
Configure the "Office Open XML converters for Word" to organizational standards. CC ID 08055 | System hardening through configuration management | Preventive | |
Configure the "Word 95 binary documents and templates" to organizational standards. CC ID 08065 | System hardening through configuration management | Preventive | |
Configure the "Word beta converters" to organizational standards. CC ID 08080 | System hardening through configuration management | Preventive | |
Configure the "Word 2007 and later binary documents and templates" to organizational standards. CC ID 08082 | System hardening through configuration management | Preventive | |
Configure the "Word beta files" to organizational standards. CC ID 08092 | System hardening through configuration management | Preventive | |
Configure the "Word 2003 binary documents and templates" to organizational standards. CC ID 08093 | System hardening through configuration management | Preventive | |
Configure the "Word XP binary documents and templates" to organizational standards. CC ID 08095 | System hardening through configuration management | Preventive | |
Configure the "Word 2007 and later documents and templates" to organizational standards. CC ID 08097 | System hardening through configuration management | Preventive | |
Configure the "Word 2 and earlier binary documents and templates" to organizational standards. CC ID 08112 | System hardening through configuration management | Preventive | |
Configure the "Plain text files" to organizational standards. CC ID 08125 | System hardening through configuration management | Preventive | |
Configure the "Word 2003 and plain XML documents" to organizational standards. CC ID 08134 | System hardening through configuration management | Preventive | |
Configure the "OpenDocument Text files" to organizational standards. CC ID 08141 | System hardening through configuration management | Preventive | |
Configure the "Scan encrypted macros in Word Open XML documents" to organizational standards. CC ID 08147 | System hardening through configuration management | Preventive | |
Configure Microsoft OneNote settings for Microsoft Office in accordance with organizational standards. CC ID 07908 | System hardening through configuration management | Preventive | |
Configure the "Specify encryption compatibility" to organizational standards. CC ID 07909 | System hardening through configuration management | Preventive | |
Configure the "Specify CNG random number generator algorithm" to organizational standards. CC ID 07916 | System hardening through configuration management | Preventive | |
Configure the "Set CNG cipher algorithm" to organizational standards. CC ID 07944 | System hardening through configuration management | Preventive | |
Configure the "Set CNG cipher key length" to organizational standards. CC ID 07974 | System hardening through configuration management | Preventive | |
Configure User Interface settings for Microsoft Office in accordance with organizational standards. CC ID 07923 | System hardening through configuration management | Preventive | |
Configure Signing settings for Microsoft Office in accordance with organizational standards. CC ID 07929 | System hardening through configuration management | Preventive | |
Configure Email Form settings for Microsoft Office in accordance with organizational standards. CC ID 07930 | System hardening through configuration management | Preventive | |
Configure Security settings for Microsoft Office in accordance with organizational standards. CC ID 07932 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #8" to organizational standards. CC ID 07935 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #12" to organizational standards. CC ID 07940 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #20" to organizational standards. CC ID 07943 | System hardening through configuration management | Preventive | |
Configure the "Check the XAdES portions of a digital signature" to organizational standards. CC ID 07955 | System hardening through configuration management | Preventive | |
Configure the "Check OLE objects" to organizational standards. CC ID 07957 | System hardening through configuration management | Preventive | |
Configure the "Consistent Mime Handling" to organizational standards. CC ID 07959 | System hardening through configuration management | Preventive | |
Configure the "Protection From Zone Elevation" to organizational standards. CC ID 07964 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #14" to organizational standards. CC ID 07965 | System hardening through configuration management | Preventive | |
Configure the "Turn off Data Execution Prevention" to organizational standards. CC ID 07968 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #12" to organizational standards. CC ID 07976 | System hardening through configuration management | Preventive | |
Configure the "Set password hash format as ISO-compliant" to organizational standards. CC ID 07977 | System hardening through configuration management | Preventive | |
Configure the "Prompt to allow fatally corrupt files to open instead of blocking them" to organizational standards. CC ID 07982 | System hardening through configuration management | Preventive | |
Configure the "Encrypt document properties" to organizational standards. CC ID 07991 | System hardening through configuration management | Preventive | |
Configure the "Prevent Word and Excel from loading managed code extensions" to organizational standards. CC ID 07999 | System hardening through configuration management | Preventive | |
Configure the "Apply macro security settings to macros, add-ins and additional actions" to organizational standards. CC ID 08002 | System hardening through configuration management | Preventive | |
Configure the "Add-on Management" to organizational standards. CC ID 08007 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #7" to organizational standards. CC ID 08008 | System hardening through configuration management | Preventive | |
Configure the "Trusted Location #1" to organizational standards. CC ID 08016 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #13" to organizational standards. CC ID 08023 | System hardening through configuration management | Preventive | |
Configure the "S/MIME receipt requests behavior" to organizational standards. CC ID 08026 | System hardening through configuration management | Preventive | |
Configure the "Do not include XAdES reference object in the manifest" to organizational standards. CC ID 08031 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #11" to organizational standards. CC ID 08032 | System hardening through configuration management | Preventive | |
Configure the "Windows Internet Explorer Feature Control Opt-In" to organizational standards. CC ID 08033 | System hardening through configuration management | Preventive | |
Configure the "Allow hyperlinks in suspected phishing e-mail messages" to organizational standards. CC ID 08034 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #5" to organizational standards. CC ID 08038 | System hardening through configuration management | Preventive | |
Configure the "Specify minimum XAdES level for digital signature generation" to organizational standards. CC ID 08040 | System hardening through configuration management | Preventive | |
Configure the "Check OWC data source providers" to organizational standards. CC ID 08041 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #10" to organizational standards. CC ID 08044 | System hardening through configuration management | Preventive | |
Configure the "Set password rules domain timeout" to organizational standards. CC ID 08045 | System hardening through configuration management | Preventive | |
Configure the "Object Caching Protection" to organizational standards. CC ID 08046 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #18" to organizational standards. CC ID 08056 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #8" to organizational standards. CC ID 08057 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #3" to organizational standards. CC ID 08059 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #6" to organizational standards. CC ID 08063 | System hardening through configuration management | Preventive | |
Configure the "Replies or forwards to signed/encrypted messages are signed/encrypted" to organizational standards. CC ID 08064 | System hardening through configuration management | Preventive | |
Configure the "Set timestamp server timeout" to organizational standards. CC ID 08068 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #16" to organizational standards. CC ID 08071 | System hardening through configuration management | Preventive | |
Configure the "Previous-version file formats" to organizational standards. CC ID 08072 | System hardening through configuration management | Preventive | |
Configure the "Turn off PDF encryption setting UI" to organizational standards. CC ID 08074 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #2" to organizational standards. CC ID 08075 | System hardening through configuration management | Preventive | |
Configure the "Restrict File Download" to organizational standards. CC ID 08076 | System hardening through configuration management | Preventive | |
Configure the "Require OCSP at signature generation time" to organizational standards. CC ID 08077 | System hardening through configuration management | Preventive | |
Configure the "Disable Password Caching" to organizational standards. CC ID 08079 | System hardening through configuration management | Preventive | |
Configure the "Message when Outlook cannot find the digital ID to decode a message" to organizational standards. CC ID 08083 | System hardening through configuration management | Preventive | |
Configure the "Enable Cryptography Icons" to organizational standards. CC ID 08086 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #14" to organizational standards. CC ID 08091 | System hardening through configuration management | Preventive | |
Configure the "Disable 'Remember password' for Internet e-mail accounts" to organizational standards. CC ID 08096 | System hardening through configuration management | Preventive | |
Configure the "Suppress hyperlink warnings" to organizational standards. CC ID 08100 | System hardening through configuration management | Preventive | |
Configure the "Use Protected View for attachments received from internal senders" to organizational standards. CC ID 08104 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #9" to organizational standards. CC ID 08108 | System hardening through configuration management | Preventive | |
Configure the "Display OLE package objects" to organizational standards. CC ID 08109 | System hardening through configuration management | Preventive | |
Configure the "Configure time stamping hashing algorithm" to organizational standards. CC ID 08111 | System hardening through configuration management | Preventive | |
Configure the "Scripted Window Security Restrictions" to organizational standards. CC ID 08113 | System hardening through configuration management | Preventive | |
Configure the "Set password rules level" to organizational standards. CC ID 08117 | System hardening through configuration management | Preventive | |
Configure the "Information Bar" to organizational standards. CC ID 08118 | System hardening through configuration management | Preventive | |
Configure the "Mime Sniffing Safety Feature" to organizational standards. CC ID 08119 | System hardening through configuration management | Preventive | |
Configure the "Publisher Automation Security Level" to organizational standards. CC ID 08123 | System hardening through configuration management | Preventive | |
Configure the "Check Excel RTD servers" to organizational standards. CC ID 08127 | System hardening through configuration management | Preventive | |
Configure the "Path to shared Workgroup information file for secured MDB files" to organizational standards. CC ID 08128 | System hardening through configuration management | Preventive | |
Configure the "Check ActiveX objects" to organizational standards. CC ID 08131 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #15" to organizational standards. CC ID 08132 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #19" to organizational standards. CC ID 08135 | System hardening through configuration management | Preventive | |
Configure the "Always use TNEF formatting in S/MIME messages" to organizational standards. CC ID 08136 | System hardening through configuration management | Preventive | |
Configure the "Restrict ActiveX Install" to organizational standards. CC ID 08138 | System hardening through configuration management | Preventive | |
Configure the "Set signature verification level" to organizational standards. CC ID 08140 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #17" to organizational standards. CC ID 08143 | System hardening through configuration management | Preventive | |
Configure the "Do not allow expired certificates when validating signatures" to organizational standards. CC ID 08144 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #4" to organizational standards. CC ID 08145 | System hardening through configuration management | Preventive | |
Configure the "Requested XAdES level for signature generation" to organizational standards. CC ID 08146 | System hardening through configuration management | Preventive | |
Configure the "Specify timestamp server name" to organizational standards. CC ID 08148 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #7" to organizational standards. CC ID 08149 | System hardening through configuration management | Preventive | |
Configure the "Select digital signature hashing algorithm" to organizational standards. CC ID 08150 | System hardening through configuration management | Preventive | |
Configure the "Local Machine Zone Lockdown Security" to organizational standards. CC ID 08151 | System hardening through configuration management | Preventive | |
Configure the "Graphics filter import" to organizational standards. CC ID 08152 | System hardening through configuration management | Preventive | |
Configure the "Unsafe Location #1" to organizational standards. CC ID 08153 | System hardening through configuration management | Preventive | |
Configure the "Security Level" to organizational standards. CC ID 08157 | System hardening through configuration management | Preventive | |
Configure the "Turn off error reporting for files that fail file validation" to organizational standards. CC ID 08159 | System hardening through configuration management | Preventive | |
Configure the "Block application add-ins loading" to organizational standards. CC ID 08160 | System hardening through configuration management | Preventive | |
Configure the "Allow the use of ActiveX Custom Controls in InfoPath forms" to organizational standards. CC ID 08171 | System hardening through configuration management | Preventive | |
Configure the "Control behavior for Microsoft SharePoint Foundation gradual upgrade" to organizational standards. CC ID 08181 | System hardening through configuration management | Preventive | |
Configure the "Block cross-domain data form retrieval" to organizational standards. CC ID 08238 | System hardening through configuration management | Preventive | |
Configure the "Display a warning that a form is digitally signed" to organizational standards. CC ID 08307 | System hardening through configuration management | Preventive | |
Configure the "Beaconing UI for forms opened in InfoPath Filler ActiveX" to organizational standards. CC ID 08333 | System hardening through configuration management | Preventive | |
Configure the "Disable opening forms with managed code from the Internet security zone" to organizational standards. CC ID 08340 | System hardening through configuration management | Preventive | |
Configure Restricted Permissions settings for Microsoft Office in accordance with organizational standards. CC ID 07937 | System hardening through configuration management | Preventive | |
Configure Account settings for Microsoft Office in accordance with organizational standards. CC ID 07951 | System hardening through configuration management | Preventive | |
Configure Add-In settings for Microsoft Office in accordance with organizational standards. CC ID 07962 | System hardening through configuration management | Preventive | |
Configure the "Do not allow on-demand activity synchronization" to organizational standards. CC ID 07963 | System hardening through configuration management | Preventive | |
Configure the "Do not show social network info-bars" to organizational standards. CC ID 07988 | System hardening through configuration management | Preventive | |
Configure the "Turn off Outlook Social Connector" to organizational standards. CC ID 07989 | System hardening through configuration management | Preventive | |
Configure the "Set GAL contact synchronization interval" to organizational standards. CC ID 08039 | System hardening through configuration management | Preventive | |
Configure the "Do not download photos from Active Directory" to organizational standards. CC ID 08043 | System hardening through configuration management | Preventive | |
Configure the "Specify activity feed synchronization interval" to organizational standards. CC ID 08058 | System hardening through configuration management | Preventive | |
Configure the "Block social network contact synchronization" to organizational standards. CC ID 08062 | System hardening through configuration management | Preventive | |
Configure the "Block network activity synchronization" to organizational standards. CC ID 08103 | System hardening through configuration management | Preventive | |
Configure the "Block specific social network providers" to organizational standards. CC ID 08114 | System hardening through configuration management | Preventive | |
Configure the "Specify list of social network providers to load" to organizational standards. CC ID 08122 | System hardening through configuration management | Preventive | |
Configure the "Block Global Address List synchronization" to organizational standards. CC ID 08139 | System hardening through configuration management | Preventive | |
Configure the "Prevent social network connectivity" to organizational standards. CC ID 08156 | System hardening through configuration management | Preventive | |
Configure File Format Converter settings for Microsoft Office in accordance with organizational standards. CC ID 07983 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Excel 2010 through the Compatibility Pack for Office 2010 and Excel 2010 Converter" to organizational standards. CC ID 07984 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to Word 2010 through the Compatibility Pack for Office 2010 and Word 2010 Open XML/Word 97-2003 Format Converter" to organizational standards. CC ID 08004 | System hardening through configuration management | Preventive | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2010 through the Compatibility Pack for Office 2010 and PowerPoint 2010 Converter" to organizational standards. CC ID 08124 | System hardening through configuration management | Preventive | |
Configure Microsoft Project settings for Microsoft Office in accordance with organizational standards. CC ID 08036 | System hardening through configuration management | Preventive | |
Configure the "Enable untrusted intranet zone access to Project server" to organizational standards. CC ID 08037 | System hardening through configuration management | Preventive | |
Configure Meeting Workspace settings for Microsoft Office in accordance with organizational standards. CC ID 08050 | System hardening through configuration management | Preventive | |
Configure Miscellaneous settings for Microsoft Office in accordance with organizational standards. CC ID 08054 | System hardening through configuration management | Preventive | |
Configure the "OLAP PivotTable User Defined Function (UDF) security setting" to organizational standards. CC ID 08133 | System hardening through configuration management | Preventive | |
Configure the "Do not expand Contact Groups" to organizational standards. CC ID 08343 | System hardening through configuration management | Preventive | |
Configure Data Backup and Recovery settings for Microsoft Office in accordance with organizational standards. CC ID 08098 | System hardening through configuration management | Preventive | |
Configure Privacy settings for Microsoft Office in accordance with organizational standards. CC ID 08101 | System hardening through configuration management | Preventive | |
Configure Server Settings settings for Microsoft Office in accordance with organizational standards. CC ID 08154 | System hardening through configuration management | Preventive | |
Configure the "Disable the Office client from polling the SharePoint Server for published links" to organizational standards. CC ID 08155 | System hardening through configuration management | Preventive | |
Configure Smart Documents settings for Microsoft Office in accordance with organizational standards. CC ID 08158 | System hardening through configuration management | Preventive | |
Configure Fax settings for Microsoft Office in accordance with organizational standards. CC ID 08310 | System hardening through configuration management | Preventive | |
Configure the "Date Format" setting to organizational standards. CC ID 09400 | System hardening through configuration management | Preventive | |
Configure the "Do not allow printing to Journal Note Writer" setting to organizational standards. CC ID 10911 | System hardening through configuration management | Preventive | |
Configure the "Do not allow Windows Journal to be run" setting to organizational standards. CC ID 10922 | System hardening through configuration management | Preventive | |
Configure Services settings to organizational standards. CC ID 07434 | System hardening through configuration management | Preventive | |
Configure Active Directory in accordance with organizational standards. CC ID 16434 | System hardening through configuration management | Preventive | |
Configure SID filtering in accordance with organizational standards. CC ID 16435 | System hardening through configuration management | Preventive | |
Configure AWS Config to organizational standards. CC ID 15440 | System hardening through configuration management | Preventive | |
Configure "Configure Authenticated Proxy usage for the Connected User Experience and Telemetry service" to organizational standards. CC ID 15343 | System hardening through configuration management | Preventive | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_X64" to organizational standards CC ID 07435 | System hardening through configuration management | Preventive | |
Configure the "namespace" to organizational standards. CC ID 14654 | System hardening through configuration management | Preventive | |
Configure the "Smart Card" to organizational standards. CC ID 07436 | System hardening through configuration management | Preventive | |
Configure the "File Server Storage Reports Manager" to organizational standards. CC ID 07437 | System hardening through configuration management | Preventive | |
Configure the "IP Helper" to organizational standards. CC ID 07439 | System hardening through configuration management | Preventive | |
Configure the "ipc" argument to organizational standards. CC ID 14524 | System hardening through configuration management | Preventive | |
Configure the "AD RMS Logging Service" to organizational standards. CC ID 07440 | System hardening through configuration management | Preventive | |
Configure the "Windows Time" to organizational standards. CC ID 07441 | System hardening through configuration management | Preventive | |
Configure the "Protected Storage" to organizational standards. CC ID 07442 | System hardening through configuration management | Preventive | |
Configure the "Windows License Monitoring Service" to organizational standards. CC ID 07443 | System hardening through configuration management | Preventive | |
Configure the "Portable Device Enumerator Service" to organizational standards. CC ID 07444 | System hardening through configuration management | Preventive | |
Configure the "Software Licensing" to organizational standards. CC ID 07445 | System hardening through configuration management | Preventive | |
Configure the "Offline Files" to organizational standards. CC ID 07446 | System hardening through configuration management | Preventive | |
Configure the "Peer Networking Identity Manager" to organizational standards. CC ID 07447 | System hardening through configuration management | Preventive | |
Configure the "Human Interface Device Access" to organizational standards. CC ID 07448 | System hardening through configuration management | Preventive | |
Configure the "Link-Layer Topology Discovery Mapper" to organizational standards. CC ID 07449 | System hardening through configuration management | Preventive | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_I64" to organizational standards CC ID 07450 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall" to organizational standards. CC ID 07451 | System hardening through configuration management | Preventive | |
Configure the "networkpolicy" to organizational standards. CC ID 14655 | System hardening through configuration management | Preventive | |
Configure the "Net.Tcp Port Sharing Service" to organizational standards. CC ID 07452 | System hardening through configuration management | Preventive | |
Configure the "pid" argument to organizational standards. CC ID 14532 | System hardening through configuration management | Preventive | |
Configure the "Secondary Logon" to organizational standards. CC ID 07453 | System hardening through configuration management | Preventive | |
Configure the "Remote Access Connection Manager" to organizational standards. CC ID 07454 | System hardening through configuration management | Preventive | |
Configure the "Function Discovery Provider Host" to organizational standards. CC ID 07455 | System hardening through configuration management | Preventive | |
Configure the "Windows Process Activation Service" to organizational standards. CC ID 07457 | System hardening through configuration management | Preventive | |
Configure the "Task Scheduler" to organizational standards. CC ID 07459 | System hardening through configuration management | Preventive | |
Configure the "Intersite Messaging" to organizational standards. CC ID 07460 | System hardening through configuration management | Preventive | |
Configure the "Special Administration Console Helper" to organizational standards. CC ID 07463 | System hardening through configuration management | Preventive | |
Configure the "Security Accounts Manager" to organizational standards. CC ID 07465 | System hardening through configuration management | Preventive | |
Configure the "Kerberos Key Distribution Center" to organizational standards. CC ID 07469 | System hardening through configuration management | Preventive | |
Configure the "COM+ System Application" to organizational standards. CC ID 07470 | System hardening through configuration management | Preventive | |
Configure the "RPC Endpoint Mapper" to organizational standards. CC ID 07471 | System hardening through configuration management | Preventive | |
Configure the "UPnP Device Host" to organizational standards. CC ID 07472 | System hardening through configuration management | Preventive | |
Configure the "DHCP Client" to organizational standards. CC ID 07475 | System hardening through configuration management | Preventive | |
Configure the "Extensible Authentication Protocol" to organizational standards. CC ID 07476 | System hardening through configuration management | Preventive | |
Configure the "SNMP Service" to organizational standards. CC ID 07477 | System hardening through configuration management | Preventive | |
Configure the "Message Queuing Down Level Clients" to organizational standards. CC ID 07478 | System hardening through configuration management | Preventive | |
Configure the "TPM Base Services" to organizational standards. CC ID 07479 | System hardening through configuration management | Preventive | |
Configure the "Windows Deployment Services server" to organizational standards. CC ID 07480 | System hardening through configuration management | Preventive | |
Configure the "Microsoft iSNS Server" to organizational standards. CC ID 07481 | System hardening through configuration management | Preventive | |
Configure the "Multimedia Class Scheduler" to organizational standards. CC ID 07482 | System hardening through configuration management | Preventive | |
Configure the "uts" argument to organizational standards. CC ID 14526 | System hardening through configuration management | Preventive | |
Configure the "Performance Counter DLL Host" to organizational standards. CC ID 07484 | System hardening through configuration management | Preventive | |
Configure the "pids-limit" argument to organizational standards. CC ID 14537 | System hardening through configuration management | Preventive | |
Configure the "Windows Search" to organizational standards. CC ID 07486 | System hardening through configuration management | Preventive | |
Configure the "DFS Replication" to organizational standards. CC ID 07487 | System hardening through configuration management | Preventive | |
Configure the "Superfetch" to organizational standards. CC ID 07488 | System hardening through configuration management | Preventive | |
Configure the "Power" to organizational standards. CC ID 07489 | System hardening through configuration management | Preventive | |
Configure the "Remote Access Quarantine Agent" to organizational standards. CC ID 07491 | System hardening through configuration management | Preventive | |
Configure the "Windows Audio" to organizational standards. CC ID 07492 | System hardening through configuration management | Preventive | |
Configure the "Windows Event Log" to organizational standards. CC ID 07495 | System hardening through configuration management | Preventive | |
Configure the "Performance Logs & Alerts" to organizational standards. CC ID 07496 | System hardening through configuration management | Preventive | |
Configure the "File Replication" to organizational standards. CC ID 07497 | System hardening through configuration management | Preventive | |
Configure the "Encrypting File System (EFS)" to organizational standards. CC ID 07498 | System hardening through configuration management | Preventive | |
Configure the "userns" argument to organizational standards. CC ID 14530 | System hardening through configuration management | Preventive | |
Configure the "Quality Windows Audio Video Experience" to organizational standards. CC ID 07500 | System hardening through configuration management | Preventive | |
Configure the "TCP/IP NetBIOS Helper" to organizational standards. CC ID 07502 | System hardening through configuration management | Preventive | |
Configure the "Windows System Resource Manager" to organizational standards. CC ID 07503 | System hardening through configuration management | Preventive | |
Configure the "Interactive Services Detection" to organizational standards. CC ID 07505 | System hardening through configuration management | Preventive | |
Configure the "Software Protection" to organizational standards. CC ID 07508 | System hardening through configuration management | Preventive | |
Configure the "ASP .NET State Service" to organizational standards CC ID 07509 | System hardening through configuration management | Preventive | |
Configure the "Distributed Transaction Coordinator" to organizational standards. CC ID 07514 | System hardening through configuration management | Preventive | |
Configure the "Telnet" to organizational standards. CC ID 07515 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Image Management Service" to organizational standards. CC ID 07517 | System hardening through configuration management | Preventive | |
Configure the "Server" to organizational standards. CC ID 07521 | System hardening through configuration management | Preventive | |
Configure the "Group Policy Client" to organizational standards. CC ID 07522 | System hardening through configuration management | Preventive | |
Configure the "Desktop Window Manager Session Manager" to organizational standards. CC ID 07523 | System hardening through configuration management | Preventive | |
Configure the "Windows Management Instrumentation" to organizational standards. CC ID 07524 | System hardening through configuration management | Preventive | |
Configure the "World Wide Web Publishing Service" to organizational standards. CC ID 07525 | System hardening through configuration management | Preventive | |
Configure the "Function Discovery Resource Publication" to organizational standards. CC ID 07526 | System hardening through configuration management | Preventive | |
Configure the "Simple Mail Transport Protocol (SMTP)" to organizational standards. CC ID 07527 | System hardening through configuration management | Preventive | |
Configure the "Resultant Set of Policy Provider" to organizational standards. CC ID 07528 | System hardening through configuration management | Preventive | |
Configure the "WMI Performance Adapter" to organizational standards. CC ID 07529 | System hardening through configuration management | Preventive | |
Configure the "Disk Defragmenter" to organizational standards. CC ID 07530 | System hardening through configuration management | Preventive | |
Configure the "IIS Admin Service" to organizational standards. CC ID 07532 | System hardening through configuration management | Preventive | |
Configure the "Volume Shadow Copy" to organizational standards. CC ID 07534 | System hardening through configuration management | Preventive | |
Configure the "Network Location Awareness" to organizational standards. CC ID 07535 | System hardening through configuration management | Preventive | |
Configure the "Windows Presentation Foundation Font Cache 3.0.0.0" to organizational standards. CC ID 07536 | System hardening through configuration management | Preventive | |
Configure the "WinHTTP Web Proxy Auto-Discovery Service" to organizational standards. CC ID 07537 | System hardening through configuration management | Preventive | |
Configure the "Network List Service" to organizational standards. CC ID 07538 | System hardening through configuration management | Preventive | |
Configure the "Application Experience" to organizational standards. CC ID 07540 | System hardening through configuration management | Preventive | |
Configure the "Active Directory Web Services" to organizational standards. CC ID 07542 | System hardening through configuration management | Preventive | |
Configure the "SSDP Discovery" to organizational standards. CC ID 07543 | System hardening through configuration management | Preventive | |
Configure the "TCP/IP Print Server" to organizational standards. CC ID 07544 | System hardening through configuration management | Preventive | |
Configure "Netlogon" to organizational standards. CC ID 07545 | System hardening through configuration management | Preventive | |
Configure the "Windows Error Reporting Service" to organizational standards. CC ID 07546 | System hardening through configuration management | Preventive | |
Configure the "IKE and AuthIP IPsec Keying Modules" to organizational standards. CC ID 07547 | System hardening through configuration management | Preventive | |
Configure the "DFS Namespace" to organizational standards. CC ID 07548 | System hardening through configuration management | Preventive | |
Configure the "SQL Server VSS Writer" to organizational standards. CC ID 07549 | System hardening through configuration management | Preventive | |
Configure the "Network Policy Server" to organizational standards. CC ID 07550 | System hardening through configuration management | Preventive | |
Configure the "Windows Driver Foundation - User-mode Driver Framework" to organizational standards. CC ID 07551 | System hardening through configuration management | Preventive | |
Configure the "Server For NIS" to organizational standards. CC ID 07553 | System hardening through configuration management | Preventive | |
Configure the "User Profile Service" to organizational standards. CC ID 07554 [Review whether applications in use provide the following capabilities: Have user and group profiles to manage user access for applications if they are not part of a centralized identity access management system. App A Objective 6.27.b] | System hardening through configuration management | Preventive | |
Configure the "SNMP Trap" to organizational standards. CC ID 07555 | System hardening through configuration management | Preventive | |
Configure the "Net.Tcp Listener Adapter" to organizational standards. CC ID 07556 | System hardening through configuration management | Preventive | |
Configure the "Network Access Protection Agent" to organizational standards. CC ID 07557 | System hardening through configuration management | Preventive | |
Configure the "Remote Access Auto Connection Manager" to organizational standards. CC ID 07558 | System hardening through configuration management | Preventive | |
Configure the "Server for NFS" to organizational standards. CC ID 07559 | System hardening through configuration management | Preventive | |
Configure the "Credential Manager" to organizational standards. CC ID 07560 | System hardening through configuration management | Preventive | |
Configure the "Workstation" to organizational standards. CC ID 07561 | System hardening through configuration management | Preventive | |
Configure the "PNRP Machine Name Publication Service" to organizational standards. CC ID 07562 | System hardening through configuration management | Preventive | |
Configure the "Print Spooler" to organizational standards. CC ID 07563 | System hardening through configuration management | Preventive | |
Configure the "Windows Internet Name Service (WINS)" to organizational standards. CC ID 07564 | System hardening through configuration management | Preventive | |
Configure the "Net.Msmq Listener Adapter" to organizational standards. CC ID 07565 | System hardening through configuration management | Preventive | |
Configure the "COM+ Event System" to organizational standards. CC ID 07566 | System hardening through configuration management | Preventive | |
Configure the "Windows Update" to organizational standards. CC ID 07568 | System hardening through configuration management | Preventive | |
Configure the "Windows Installer" to organizational standards. CC ID 07569 | System hardening through configuration management | Preventive | |
Configure the "Windows Color System" to organizational standards. CC ID 07570 | System hardening through configuration management | Preventive | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_X86" to organizational standards CC ID 07571 | System hardening through configuration management | Preventive | |
Configure the "Block Level Backup Engine Service" to organizational standards. CC ID 07572 | System hardening through configuration management | Preventive | |
Configure the "Windows CardSpace" to organizational standards. CC ID 07573 | System hardening through configuration management | Preventive | |
Configure the "webclient" to organizational standards. CC ID 07574 | System hardening through configuration management | Preventive | |
Configure the "Diagnostic Service Host" to organizational standards. CC ID 07575 | System hardening through configuration management | Preventive | |
Configure the "Active Directory Certificate Services" to organizational standards. CC ID 07576 | System hardening through configuration management | Preventive | |
Configure the "File Server Resource Manager" to organizational standards. CC ID 07577 | System hardening through configuration management | Preventive | |
Configure the "Secure Socket Tunneling Protocol Service" to organizational standards. CC ID 07578 | System hardening through configuration management | Preventive | |
Configure the "Cluster Service" to organizational standards. CC ID 07579 | System hardening through configuration management | Preventive | |
Configure the "Application Management" to organizational standards. CC ID 07580 | System hardening through configuration management | Preventive | |
Configure the "Remote Procedure Call (RPC) Locator" to organizational standards. CC ID 07581 | System hardening through configuration management | Preventive | |
Configure the "Thread Ordering Server" to organizational standards. CC ID 07582 | System hardening through configuration management | Preventive | |
Configure the "FTP Publishing Service" to organizational standards. CC ID 07583 | System hardening through configuration management | Preventive | |
Configure the "System Event Notification Service" to organizational standards. CC ID 07584 | System hardening through configuration management | Preventive | |
Configure the "Remote Procedure Call (RPC)" to organizational standards. CC ID 07585 | System hardening through configuration management | Preventive | |
Configure the "Net.Pipe Listener Adapter" to organizational standards. CC ID 07586 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Licensing" to organizational standards. CC ID 07587 | System hardening through configuration management | Preventive | |
Configure the "Message Queuing Triggers" to organizational standards. CC ID 07588 | System hardening through configuration management | Preventive | |
Configure the "Windows Modules Installer" to organizational standards. CC ID 07589 | System hardening through configuration management | Preventive | |
Configure the "Application Layer Gateway Service" to organizational standards. CC ID 07590 | System hardening through configuration management | Preventive | |
Configure the "DNS Server" to organizational standards. CC ID 07591 | System hardening through configuration management | Preventive | |
Configure the "Web Management Service" to organizational standards. CC ID 07592 | System hardening through configuration management | Preventive | |
Configure the "Windows Remote Management (WS-Management)" to organizational standards. CC ID 07593 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Gateway" to organizational standards. CC ID 07594 | System hardening through configuration management | Preventive | |
Configure the "Network Connections" to organizational standards. CC ID 07595 | System hardening through configuration management | Preventive | |
Configure the "Background Intelligent Transfer Service" to organizational standards. CC ID 07596 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Session Broker" to organizational standards. CC ID 07597 | System hardening through configuration management | Preventive | |
Configure the "Removable Storage" to organizational standards. CC ID 07598 | System hardening through configuration management | Preventive | |
Configure the "KtmRm for Distributed Transaction Coordinator" to organizational standards. CC ID 07614 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Software Shadow Copy Provider" to organizational standards. CC ID 07615 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Services" to organizational standards. CC ID 07616 | System hardening through configuration management | Preventive | |
Configure the "Peer Name Resolution Protocol" to organizational standards. CC ID 07617 | System hardening through configuration management | Preventive | |
Configure the "Online Responder Service" to organizational standards. CC ID 07618 | System hardening through configuration management | Preventive | |
Configure the "Message Queuing" to organizational standards. CC ID 07619 | System hardening through configuration management | Preventive | |
Configure the "Telephony" to organizational standards. CC ID 07620 | System hardening through configuration management | Preventive | |
Configure the "Plug and Play" to organizational standards. CC ID 07624 | System hardening through configuration management | Preventive | |
Configure the "DHCP Server" to organizational standards. CC ID 07627 | System hardening through configuration management | Preventive | |
Configure the "Remote Registry" to organizational standards. CC ID 07628 | System hardening through configuration management | Preventive | |
Configure the "Cryptographic Services" to organizational standards. CC ID 07630 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Configuration" to organizational standards. CC ID 07631 | System hardening through configuration management | Preventive | |
Configure the "CNG Key Isolation" to organizational standards. CC ID 07634 | System hardening through configuration management | Preventive | |
Configure the "Active Directory Domain Services" to organizational standards. CC ID 07636 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Networking Management Service" to organizational standards. CC ID 07637 | System hardening through configuration management | Preventive | |
Configure the "Problem Reports and Solutions Control Panel Support" to organizational standards. CC ID 07640 | System hardening through configuration management | Preventive | |
Configure the "Certificate Propagation" to organizational standards. CC ID 07641 | System hardening through configuration management | Preventive | |
Configure the "Health Key and Certificate Management" to organizational standards. CC ID 07644 | System hardening through configuration management | Preventive | |
Configure the "DNS Client" to organizational standards. CC ID 07645 | System hardening through configuration management | Preventive | |
Configure the "Shell Hardware Detection" to organizational standards. CC ID 07647 | System hardening through configuration management | Preventive | |
Configure the "DCOM Server Process Launcher" to organizational standards. CC ID 07649 | System hardening through configuration management | Preventive | |
Configure the "Distributed Link Tracking Client" to organizational standards. CC ID 07651 | System hardening through configuration management | Preventive | |
Configure the "IPsec Policy Agent" to organizational standards. CC ID 07654 | System hardening through configuration management | Preventive | |
Configure the "Application Information" to organizational standards. CC ID 07656 | System hardening through configuration management | Preventive | |
Configure the "Windows Audio Endpoint Builder" to organizational standards. CC ID 07661 | System hardening through configuration management | Preventive | |
Configure the "SL UI Notification Service" to organizational standards. CC ID 07665 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Virtual Machine Management Service" to organizational standards. CC ID 07668 | System hardening through configuration management | Preventive | |
Configure the "Windows Internal Database (MICROSOFT**SSEE)" to organizational standards. CC ID 07670 | System hardening through configuration management | Preventive | |
Configure the "Themes" to organizational standards. CC ID 07672 | System hardening through configuration management | Preventive | |
Configure the "Base Filtering Engine" to organizational standards. CC ID 07673 | System hardening through configuration management | Preventive | |
Configure the "Simple TCP/IP Services" to organizational standards. CC ID 07674 | System hardening through configuration management | Preventive | |
Configure Transmission Control Protocol/Internet Protocol (TCP/IP) to organizational standards. CC ID 16358 | System hardening through configuration management | Preventive | |
Configure the "Fax" to organizational standards. CC ID 07675 | System hardening through configuration management | Preventive | |
Configure the "Diagnostic System Host" to organizational standards. CC ID 07686 | System hardening through configuration management | Preventive | |
Configure the "Routing and Remote Access" to organizational standards. CC ID 07692 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Fibre Channel Platform Registration Service" to organizational standards. CC ID 07696 | System hardening through configuration management | Preventive | |
Configure the "Windows Event Collector" to organizational standards. CC ID 07700 | System hardening through configuration management | Preventive | |
Configure the "Internet Connection Sharing (ICS)" to organizational standards. CC ID 07702 | System hardening through configuration management | Preventive | |
Configure the "IAS Jet Database Access" to organizational standards. CC ID 07709 | System hardening through configuration management | Preventive | |
Configure the "Wired AutoConfig" to organizational standards. CC ID 07725 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop UserMode Port Redirector" to organizational standards. CC ID 07727 | System hardening through configuration management | Preventive | |
Configure the "Application Identity" to organizational standards. CC ID 07731 | System hardening through configuration management | Preventive | |
Configure the "Network Store Interface Service" to organizational standards. CC ID 07740 | System hardening through configuration management | Preventive | |
Configure the "PnP-X IP Bus Enumerator" to organizational standards. CC ID 07761 | System hardening through configuration management | Preventive | |
Configure the "Diagnostic Policy Service" to organizational standards. CC ID 07766 | System hardening through configuration management | Preventive | |
Configure the "Virtual Disk" to organizational standards. CC ID 07767 | System hardening through configuration management | Preventive | |
Configure the "AD FS Web Agent Authentication Service" to organizational standards. CC ID 07768 | System hardening through configuration management | Preventive | |
Configure the "Microsoft iSCSI Initiator Service" to organizational standards. CC ID 07780 | System hardening through configuration management | Preventive | |
Configure the "Computer Browser" to organizational standards. CC ID 07794 | System hardening through configuration management | Preventive | |
Configure the "Smart Card Removal Policy" to organizational standards. CC ID 07795 | System hardening through configuration management | Preventive | |
Configure the "Windows Font Cache Service" to organizational standards. CC ID 07797 | System hardening through configuration management | Preventive | |
Configure the "Application Host Helper Service" to organizational standards. CC ID 07855 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Help Session Manager" to organizational standards. CC ID 08163 | System hardening through configuration management | Preventive | |
Configure the "Network DDE" to organizational standards. CC ID 08164 | System hardening through configuration management | Preventive | |
Configure the "Upload Manager" to organizational standards. CC ID 08165 | System hardening through configuration management | Preventive | |
Configure the "Event Log" to organizational standards. CC ID 08166 | System hardening through configuration management | Preventive | |
Configure the "Client for NFS" to organizational standards. CC ID 08168 | System hardening through configuration management | Preventive | |
Configure the "Fax Service" to organizational standards. CC ID 08172 | System hardening through configuration management | Preventive | |
Configure the "Virtual Disk Service" to organizational standards. CC ID 08174 | System hardening through configuration management | Preventive | |
Configure the "Uninterruptable Power Supply" to organizational standards. CC ID 08175 | System hardening through configuration management | Preventive | |
Configure the "Network DDE DSDM" to organizational standards. CC ID 08176 | System hardening through configuration management | Preventive | |
Configure the "Portable Media Serial Number Service" to organizational standards. CC ID 08177 | System hardening through configuration management | Preventive | |
Configure the "Windows Management Instrumentation Driver Extensions" to organizational standards. CC ID 08179 | System hardening through configuration management | Preventive | |
Configure the "License Logging" to organizational standards. CC ID 08180 | System hardening through configuration management | Preventive | |
Configure the "Windows Image Acquisition (WIA)" to organizational standards. CC ID 08183 | System hardening through configuration management | Preventive | |
Configure the "Terminal Server Licensing" to organizational standards. CC ID 08185 | System hardening through configuration management | Preventive | |
Configure the "Virtual Machine Additions Shared Folder Service" to organizational standards. CC ID 08189 | System hardening through configuration management | Preventive | |
Configure the "Net Logon" to organizational standards. CC ID 08191 | System hardening through configuration management | Preventive | |
Configure the "HTTP SSL" to organizational standards. CC ID 08194 | System hardening through configuration management | Preventive | |
Configure the "Alerter" to organizational standards. CC ID 08196 | System hardening through configuration management | Preventive | |
Configure the "User Name Mapping" to organizational standards. CC ID 08203 | System hardening through configuration management | Preventive | |
Configure the "Error Reporting Service" to organizational standards. CC ID 08206 | System hardening through configuration management | Preventive | |
Configure the "Windows User Mode Driver Framework" to organizational standards. CC ID 08207 | System hardening through configuration management | Preventive | |
Configure the "NetMeeting Remote Desktop Sharing" to organizational standards. CC ID 08209 | System hardening through configuration management | Preventive | |
Configure the "Terminal Services UserMode Port Redirector" to organizational standards. CC ID 08212 | System hardening through configuration management | Preventive | |
Configure the "File Replication Service" to organizational standards. CC ID 08213 | System hardening through configuration management | Preventive | |
Configure the "NT LM Security Support Provider" to organizational standards. CC ID 08223 | System hardening through configuration management | Preventive | |
Configure the "Messenger" to organizational standards. CC ID 08227 | System hardening through configuration management | Preventive | |
Configure the "Logical Disk Manager" to organizational standards. CC ID 08230 | System hardening through configuration management | Preventive | |
Configure the "Network Location Awareness (NLA)" to organizational standards. CC ID 08231 | System hardening through configuration management | Preventive | |
Configure the "Certificate Services" to organizational standards. CC ID 08232 | System hardening through configuration management | Preventive | |
Configure the "IPSEC Services" to organizational standards. CC ID 08233 | System hardening through configuration management | Preventive | |
Configure the "Terminal Services Gateway" to organizational standards. CC ID 08235 | System hardening through configuration management | Preventive | |
Configure the "Clipbook" to organizational standards. CC ID 08237 | System hardening through configuration management | Preventive | |
Configure the "Indexing Service" to organizational standards. CC ID 08239 | System hardening through configuration management | Preventive | |
Configure the "File Server for Macintosh" to organizational standards. CC ID 08242 | System hardening through configuration management | Preventive | |
Configure the "Virtual Machine Additions Service Application" to organizational standards. CC ID 08245 | System hardening through configuration management | Preventive | |
Configure the "Network Provisioning Service" to organizational standards. CC ID 08250 | System hardening through configuration management | Preventive | |
Configure the "Terminal Services" to organizational standards. CC ID 08252 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall/Internet Connection Sharing (ICS)" to organizational standards. CC ID 08254 | System hardening through configuration management | Preventive | |
Configure the ".NET Runtime Optimization Service v2.0.50727_x86" to organizational standards CC ID 08256 | System hardening through configuration management | Preventive | |
Configure the "Terminal Services Session Directory" to organizational standards. CC ID 08261 | System hardening through configuration management | Preventive | |
Configure the "Application Experience Lookup Service" to organizational standards. CC ID 08267 | System hardening through configuration management | Preventive | |
Configure the "Distributed File System" to organizational standards. CC ID 08268 | System hardening through configuration management | Preventive | |
Configure the "Help and Support" to organizational standards. CC ID 08271 | System hardening through configuration management | Preventive | |
Configure the "Automatic Updates" to organizational standards. CC ID 08273 | System hardening through configuration management | Preventive | |
Configure the "Distributed Link Tracking Server" to organizational standards. CC ID 08276 | System hardening through configuration management | Preventive | |
Configure the "IMAPI CD-Burning Service" to organizational standards. CC ID 08277 | System hardening through configuration management | Preventive | |
Configure the "Terminal Services Configuration" to organizational standards. CC ID 08287 | System hardening through configuration management | Preventive | |
Configure the "Logical Disk Manager Administrative Service" to organizational standards. CC ID 08290 | System hardening through configuration management | Preventive | |
Configure the "Wireless Configuration" to organizational standards. CC ID 08292 | System hardening through configuration management | Preventive | |
Configure the "System Event Notification" to organizational standards. CC ID 08306 | System hardening through configuration management | Preventive | |
Configure the "Internet Authentication Service" to organizational standards. CC ID 08313 | System hardening through configuration management | Preventive | |
Configure the "Terminal Services Licensing" to organizational standards. CC ID 08320 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange ADAM" to organizational standards. CC ID 08349 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Server Extension for Windows Server Backup" to organizational standards. CC ID 08351 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Search Indexer" to organizational standards. CC ID 08355 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Connection Broker" to organizational standards. CC ID 08356 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Service Host" to organizational standards. CC ID 08358 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Transport" to organizational standards. CC ID 08359 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Transport Log Search" to organizational standards. CC ID 08364 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Time Synchronization Service" to organizational standards. CC ID 08365 | System hardening through configuration management | Preventive | |
Configure the "DS Role Server" to organizational standards. CC ID 08366 | System hardening through configuration management | Preventive | |
Configure the "RemoteApp and Desktop Connection Management" to organizational standards. CC ID 08367 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Guest Shutdown Service" to organizational standards. CC ID 08368 | System hardening through configuration management | Preventive | |
Configure the "Optimize drives" to organizational standards. CC ID 08369 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Management" to organizational standards. CC ID 08371 | System hardening through configuration management | Preventive | |
Configure the "Background Tasks Infrastructure Service" to organizational standards. CC ID 08373 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Forms-Based Authentication service" to organizational standards. CC ID 08375 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange POP3" to organizational standards. CC ID 08376 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Information Store" to organizational standards. CC ID 08377 | System hardening through configuration management | Preventive | |
Configure the "LPD Service" to organizational standards. CC ID 08378 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Mailbox Assistants" to organizational standards. CC ID 08379 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Monitoring" to organizational standards. CC ID 08380 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Unified Messaging" to organizational standards. CC ID 08381 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Search (Exchange)" to organizational standards. CC ID 08384 | System hardening through configuration management | Preventive | |
Configure the "Windows All-User Install Agent" to organizational standards. CC ID 08386 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange EdgeSync Service" to organizational standards. CC ID 08388 | System hardening through configuration management | Preventive | |
Configure the "Microsoft FTP Service" to organizational standards. CC ID 08389 | System hardening through configuration management | Preventive | |
Configure the "Device Install Service" to organizational standards. CC ID 08390 | System hardening through configuration management | Preventive | |
Configure the "Device Association Service" to organizational standards. CC ID 08393 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Heartbeat Service" to organizational standards. CC ID 08400 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Speech Engine Service" to organizational standards. CC ID 08402 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Data Exchange Service" to organizational standards. CC ID 08403 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Mail Submission Service" to organizational standards. CC ID 08408 | System hardening through configuration management | Preventive | |
Configure the "Windows Presentation Foundation Font Cache 4.0.0.0" to organizational standards. CC ID 08409 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Replication Service" to organizational standards. CC ID 08414 | System hardening through configuration management | Preventive | |
Configure the "Windows Internal Database" to organizational standards. CC ID 08416 | System hardening through configuration management | Preventive | |
Configure the "Device Setup Manager" to organizational standards. CC ID 08417 | System hardening through configuration management | Preventive | |
Configure the "User Access Logging Service" to organizational standards. CC ID 08418 | System hardening through configuration management | Preventive | |
Configure the "Windows Internal Database VSS Writer" to organizational standards. CC ID 08423 | System hardening through configuration management | Preventive | |
Configure the "Remote Desktop Services UserMode Port Redirector" to organizational standards. CC ID 08424 | System hardening through configuration management | Preventive | |
Configure the "Remote Access Management service" to organizational standards. CC ID 08425 | System hardening through configuration management | Preventive | |
Configure the "Data Deduplication Volume Shadow Copy Service" to organizational standards. CC ID 08428 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Remote Desktop Virtualization Service" to organizational standards. CC ID 08440 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Anti-spam Update" to organizational standards. CC ID 08442 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange System Attendant" to organizational standards. CC ID 08448 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange File Distribution" to organizational standards. CC ID 08449 | System hardening through configuration management | Preventive | |
Configure the "Printer Extensions and Notifications" to organizational standards. CC ID 08451 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Key Distribution Service" to organizational standards. CC ID 08452 | System hardening through configuration management | Preventive | |
Configure the "Microsoft File Server Shadow Copy Agent Service" to organizational standards. CC ID 08455 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Address Book" to organizational standards. CC ID 08458 | System hardening through configuration management | Preventive | |
Configure the "Data Deduplication Service" to organizational standards. CC ID 08459 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Active Directory Topology" to organizational standards. CC ID 08465 | System hardening through configuration management | Preventive | |
Configure the "Windows Store Service (WSService)" to organizational standards. CC ID 08467 | System hardening through configuration management | Preventive | |
Configure the "Local Session Manager" to organizational standards. CC ID 08468 | System hardening through configuration management | Preventive | |
Configure the "Microsoft iSCSI Software Target" to organizational standards. CC ID 08470 | System hardening through configuration management | Preventive | |
Configure the "Network Connectivity Assistant" to organizational standards. CC ID 08474 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange IMAP4" to organizational standards. CC ID 08479 | System hardening through configuration management | Preventive | |
Configure the "Distributed Scan Server service" to organizational standards. CC ID 08482 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Protected Service Host" to organizational standards. CC ID 08488 | System hardening through configuration management | Preventive | |
Configure the "KDC Proxy Server service (KPS)" to organizational standards. CC ID 08497 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange RPC Client Access" to organizational standards. CC ID 08500 | System hardening through configuration management | Preventive | |
Configure the "Hyper-V Volume Shadow Copy Requestor" to organizational standards. CC ID 08512 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Credential Service (Exchange 2010)" to organizational standards. CC ID 08514 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Throttling" to organizational standards. CC ID 08525 | System hardening through configuration management | Preventive | |
Configure the "Spot Verifier" to organizational standards. CC ID 08538 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Mailbox Replication" to organizational standards. CC ID 08539 | System hardening through configuration management | Preventive | |
Configure the "Terminal Services Session Broker" to organizational standards. CC ID 08586 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange Credential Service (Exchange 2007)" to organizational standards. CC ID 08590 | System hardening through configuration management | Preventive | |
Configure the "Network News Transport Protocol (NNTP) service" setting to organizational standards. CC ID 10221 | System hardening through configuration management | Preventive | |
Configure the "Telephony service" setting to organizational standards. CC ID 10223 | System hardening through configuration management | Preventive | |
Configure the "ATI hotkey poller service" setting to organizational standards. CC ID 10237 | System hardening through configuration management | Preventive | |
Configure the "IP Version 6 Helper service" setting to organizational standards. CC ID 10239 | System hardening through configuration management | Preventive | |
Configure the "Client Service for Netware service" setting to organizational standards. CC ID 10240 | System hardening through configuration management | Preventive | |
Configure the "Utility Manager service" setting to organizational standards. CC ID 10241 | System hardening through configuration management | Preventive | |
Configure the "Remote Administration Service service" setting to organizational standards. CC ID 10242 | System hardening through configuration management | Preventive | |
Configure the "Microsoft POP3 Service service" setting to organizational standards. CC ID 10243 | System hardening through configuration management | Preventive | |
Configure the "Windows System Resource Manager (WSRM) service" setting to organizational standards. CC ID 10244 | System hardening through configuration management | Preventive | |
Configure the "Services for Unix Trivial FTP Daemon (TFTP) service" setting to organizational standards. CC ID 10245 | System hardening through configuration management | Preventive | |
Configure the "Services for Unix Server for PCNFS service" setting to organizational standards. CC ID 10246 | System hardening through configuration management | Preventive | |
Configure the "Print Server for Macintosh service" setting to organizational standards. CC ID 10249 | System hardening through configuration management | Preventive | |
Configure the "Remote Installation Services service" setting to organizational standards. CC ID 10250 | System hardening through configuration management | Preventive | |
Configure the "Remote Server Manager service" setting to organizational standards. CC ID 10251 | System hardening through configuration management | Preventive | |
Configure the "Remote Server Monitor service" setting to organizational standards. CC ID 10252 | System hardening through configuration management | Preventive | |
Configure the "Remote Storage Notification service" setting to organizational standards. CC ID 10253 | System hardening through configuration management | Preventive | |
Configure the "Remote Storage Server service" setting to organizational standards. CC ID 10254 | System hardening through configuration management | Preventive | |
Configure the "Windows Media Services service" setting to organizational standards. CC ID 10255 | System hardening through configuration management | Preventive | |
Configure the "Web Element Manager service" setting to organizational standards. CC ID 10256 | System hardening through configuration management | Preventive | |
Configure the "Infrared Monitor service service" setting to organizational standards. CC ID 10257 | System hardening through configuration management | Preventive | |
Configure the "QoS Admission Control (RSVP) service" setting to organizational standards. CC ID 10258 | System hardening through configuration management | Preventive | |
Configure the "Allow CredSSP authentication" setting for the "WinRM service" to organizational standards. CC ID 10715 | System hardening through configuration management | Preventive | |
Configure the "Disallow Kerberos authentication" setting for the "WinRM service" to organizational standards. CC ID 10873 | System hardening through configuration management | Preventive | |
Configure the "Disallow Negotiate authentication" setting for the "WinRM service" to organizational standards. CC ID 10876 | System hardening through configuration management | Preventive | |
Configure the "Turn off Federation Service" setting to organizational standards. CC ID 11278 | System hardening through configuration management | Preventive | |
Configure the "Turn off Internet File Association service" setting to organizational standards. CC ID 11284 | System hardening through configuration management | Preventive | |
Configure the "Turn on Smart Card Plug and Play service" setting to organizational standards. CC ID 11351 | System hardening through configuration management | Preventive | |
Configure the "rsyncd service" setting to organizational standards. CC ID 11382 | System hardening through configuration management | Preventive | |
Configure network protection settings to organizational standards. CC ID 07601 | System hardening through configuration management | Preventive | |
Configure the "CNI" plugin to organizational standards. CC ID 14659 | System hardening through configuration management | Preventive | |
Configure the "data-path-addr" argument to organizational standards. CC ID 14546 | System hardening through configuration management | Preventive | |
Configure the "advertise-addr" argument to organizational standards. CC ID 14544 | System hardening through configuration management | Preventive | |
Configure the "nftables" to organizational standards. CC ID 15320 | System hardening through configuration management | Preventive | |
Configure the "iptables" to organizational standards. CC ID 14463 | System hardening through configuration management | Preventive | |
Configure the "ip6tables" settings to organizational standards. CC ID 15322 | System hardening through configuration management | Preventive | |
Configure the "insecure registries" to organizational standards. CC ID 14455 | System hardening through configuration management | Preventive | |
Configure the "MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to organizational standards. CC ID 07602 | System hardening through configuration management | Preventive | |
Configure the "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to organizational standards. CC ID 07648 | System hardening through configuration management | Preventive | |
Configure the "net-host" argument to organizational standards. CC ID 14529 | System hardening through configuration management | Preventive | |
Configure the "firewalld" to organizational standards. CC ID 15321 | System hardening through configuration management | Preventive | |
Configure the "network bridge" to organizational standards. CC ID 14501 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Firewall state" to organizational standards. CC ID 07667 | System hardening through configuration management | Preventive | |
Configure the "MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments)" to organizational standards. CC ID 07680 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Outbound connections" to organizational standards. CC ID 07695 | System hardening through configuration management | Preventive | |
Configure the "MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic." to organizational standards CC ID 07703 | System hardening through configuration management | Preventive | |
Configure the "MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS)" to organizational standards. CC ID 07733 | System hardening through configuration management | Preventive | |
Configure the "publish" argument to organizational standards. CC ID 14500 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Inbound connections" to organizational standards. CC ID 07747 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Apply local firewall rules" to organizational standards. CC ID 07777 | System hardening through configuration management | Preventive | |
Configure the "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to organizational standards. CC ID 07801 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Firewall state" to organizational standards. CC ID 07803 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Apply local connection security rules" to organizational standards. CC ID 07805 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Apply local firewall rules" to organizational standards. CC ID 07833 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Display a notification" to organizational standards. CC ID 07836 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Outbound connections" to organizational standards. CC ID 07839 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Apply local firewall rules" to organizational standards. CC ID 07850 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Inbound connections" to organizational standards. CC ID 07851 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Outbound connections" to organizational standards. CC ID 07858 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Firewall state" to organizational standards. CC ID 07861 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Display a notification" to organizational standards. CC ID 07868 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Inbound connections" to organizational standards. CC ID 07872 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Allow unicast response" to organizational standards. CC ID 07873 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Allow unicast response" to organizational standards. CC ID 07885 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Apply local connection security rules" to organizational standards. CC ID 07890 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Allow unicast response" to organizational standards. CC ID 07893 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Apply local connection security rules" to organizational standards. CC ID 07896 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Display a notification" to organizational standards. CC ID 07902 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Protect all network connections" to organizational standards. CC ID 08161 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Allow inbound UPnP framework exceptions" to organizational standards. CC ID 08170 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Allow local program exceptions" to organizational standards. CC ID 08173 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Do not allow exceptions" to organizational standards. CC ID 08184 | System hardening through configuration management | Preventive | |
Configure the "MSS: (DisableSavePassword) Prevent the dial-up password from being saved (recommended)" to organizational standards. CC ID 08208 | System hardening through configuration management | Preventive | |
Configure the "MSS: (EnableDeadGWDetect) Allow automatic detection of dead network gateways (could lead to DoS)" to organizational standards. CC ID 08210 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Allow local port exceptions" to organizational standards. CC ID 08214 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Define inbound port exceptions" to organizational standards. CC ID 08215 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Prohibit unicast response to multicast or broadcast requests" to organizational standards. CC ID 08217 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Prohibit notifications" to organizational standards. CC ID 08249 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Allow inbound file and printer sharing exception" to organizational standards. CC ID 08275 | System hardening through configuration management | Preventive | |
Configure the "MSS: (TcpMaxConnectResponseRetransmissions) SYN-ACK retransmissions when a connection request is not acknowledged" to organizational standards. CC ID 08279 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Define inbound program exceptions" to organizational standards. CC ID 08282 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Allow ICMP exceptions" to organizational standards. CC ID 08289 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Allow inbound Remote Desktop exceptions" to organizational standards. CC ID 08295 | System hardening through configuration management | Preventive | |
Configure the "Allow unencrypted traffic" to organizational standards. CC ID 08383 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Logging: Log successful connections" to organizational standards. CC ID 08466 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Logging: Size limit (KB)" to organizational standards. CC ID 08494 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Logging: Log successful connections" to organizational standards. CC ID 08544 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Logging: Name" to organizational standards. CC ID 08595 | System hardening through configuration management | Preventive | |
Configure Account settings in accordance with organizational standards. CC ID 07603 | System hardening through configuration management | Preventive | |
Configure the "Account lockout threshold" to organizational standards. CC ID 07604 | System hardening through configuration management | Preventive | |
Configure the "Account lockout duration" to organizational standards. CC ID 07771 | System hardening through configuration management | Preventive | |
Configure the "Reset account lockout counter after" to organizational standards. CC ID 07853 | System hardening through configuration management | Preventive | |
Configure system integrity settings to organizational standards. CC ID 07605 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Switch to the secure desktop when prompting for elevation" to organizational standards. CC ID 07606 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to organizational standards. CC ID 07642 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to organizational standards. CC ID 07681 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to organizational standards. CC ID 07690 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Only elevate executables that are signed and validated" to organizational standards. CC ID 07723 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Run all administrators in Admin Approval Mode" to organizational standards. CC ID 07726 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Do not require CTRL+ALT+DEL" to organizational standards. CC ID 07775 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Admin Approval Mode for the Built-in Administrator account" to organizational standards. CC ID 07800 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Detect application installations and prompt for elevation" to organizational standards. CC ID 07815 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Virtualize file and registry write failures to per-user locations" to organizational standards. CC ID 07834 | System hardening through configuration management | Preventive | |
Configure the "User Account Control: Behavior of the elevation prompt for standard users" to organizational standards. CC ID 07874 | System hardening through configuration management | Preventive | |
Configure the "Do not process the legacy run list" to organizational standards. CC ID 08167 | System hardening through configuration management | Preventive | |
Configure the "Configure Automatic Updates" to organizational standards. CC ID 08192 | System hardening through configuration management | Preventive | |
Configure the "Reschedule Automatic Updates scheduled installations" to organizational standards. CC ID 08195 | System hardening through configuration management | Preventive | |
Configure the "No auto-restart with logged on users for scheduled automatic updates installations" to organizational standards. CC ID 08216 | System hardening through configuration management | Preventive | |
Configure the "Specify intranet Microsoft update service location" to organizational standards. CC ID 08224 | System hardening through configuration management | Preventive | |
Configure the "Devices: Unsigned driver installation behavior" to organizational standards. CC ID 08225 | System hardening through configuration management | Preventive | |
Configure the "Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box" to organizational standards. CC ID 08281 | System hardening through configuration management | Preventive | |
Configure the "Allow unmanaged devices" to organizational standards. CC ID 08391 | System hardening through configuration management | Preventive | |
Configure the "Allow all trusted apps to install" to organizational standards. CC ID 08392 | System hardening through configuration management | Preventive | |
Configure the "Turn on script execution" to organizational standards. CC ID 08411 | System hardening through configuration management | Preventive | |
Configure the "Configure registry policy processing" to organizational standards. CC ID 08426 | System hardening through configuration management | Preventive | |
Configure the "Specify the search server for device driver updates" to organizational standards. CC ID 08481 | System hardening through configuration management | Preventive | |
Configure the "Configure Windows SmartScreen" to organizational standards. CC ID 08485 | System hardening through configuration management | Preventive | |
Configure the "Detect compatibility issues for applications and drivers" to organizational standards. CC ID 08489 | System hardening through configuration management | Preventive | |
Configure the "Turn off Automatic Download of updates" to organizational standards. CC ID 08498 | System hardening through configuration management | Preventive | |
Configure the "Allow deployment operations in special profiles" to organizational standards. CC ID 08529 | System hardening through configuration management | Preventive | |
Configure the "Turn off Data Execution Prevention for Explorer" to organizational standards. CC ID 08531 | System hardening through configuration management | Preventive | |
Configure the "Specify settings for optional component installation and component repair" to organizational standards. CC ID 08550 | System hardening through configuration management | Preventive | |
Configure the "Refresh interval" to organizational standards. CC ID 08559 | System hardening through configuration management | Preventive | |
Configure the "Boot-Start Driver Initialization Policy" to organizational standards. CC ID 08571 | System hardening through configuration management | Preventive | |
Configure the "Turn off the Store application" to organizational standards. CC ID 08596 | System hardening through configuration management | Preventive | |
Configure the "Periodic Execution of File Integrity" setting to organizational standards. CC ID 09935 | System hardening through configuration management | Preventive | |
Prohibit the use of binary code or machine code from sources with limited or no warranty absent the source code. CC ID 10681 | System hardening through configuration management | Preventive | |
Do not allow processes to execute absent supervision. CC ID 10683 | System hardening through configuration management | Preventive | |
Configure the "Disk Quota policy processing" setting to organizational standards. CC ID 10884 | System hardening through configuration management | Preventive | |
Configure the "EFS recovery policy processing" setting to organizational standards. CC ID 10945 | System hardening through configuration management | Preventive | |
Configure the "Enable disk quotas" setting to organizational standards. CC ID 10947 | System hardening through configuration management | Preventive | |
Configure the "Folder Redirection policy processing" setting to organizational standards. CC ID 10972 | System hardening through configuration management | Preventive | |
Configure the "Group Policy refresh interval for computers" setting to organizational standards. CC ID 10980 | System hardening through configuration management | Preventive | |
Configure the "Group Policy refresh interval for domain controllers" setting to organizational standards. CC ID 10981 | System hardening through configuration management | Preventive | |
Configure the "Internet Explorer Maintenance policy processing" setting to organizational standards. CC ID 10998 | System hardening through configuration management | Preventive | |
Configure the "IP Security policy processing" setting to organizational standards. CC ID 10999 | System hardening through configuration management | Preventive | |
Configure the "Leave Windows Installer and Group Policy Software Installation Data" setting to organizational standards. CC ID 11004 | System hardening through configuration management | Preventive | |
Configure the "Maximum wait time for Group Policy scripts" setting to organizational standards. CC ID 11042 | System hardening through configuration management | Preventive | |
Configure the "Scripts policy processing" setting to organizational standards. CC ID 11159 | System hardening through configuration management | Preventive | |
Configure the "Security policy processing" setting to organizational standards. CC ID 11160 | System hardening through configuration management | Preventive | |
Configure the "Software Installation policy processing" setting to organizational standards. CC ID 11206 | System hardening through configuration management | Preventive | |
Configure the "Startup policy processing wait time" setting to organizational standards. CC ID 11229 | System hardening through configuration management | Preventive | |
Configure the "Turn off Local Group Policy objects processing" setting to organizational standards. CC ID 11286 | System hardening through configuration management | Preventive | |
Configure the "User Group Policy loopback processing mode" setting to organizational standards. CC ID 11367 | System hardening through configuration management | Preventive | |
Configure the "Wired policy processing" setting to organizational standards. CC ID 11373 | System hardening through configuration management | Preventive | |
Configure the "Wireless policy processing" setting to organizational standards. CC ID 11374 | System hardening through configuration management | Preventive | |
Configure Protocol Configuration settings to organizational standards. CC ID 07607 | System hardening through configuration management | Preventive | |
Configure the "MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds" to organizational standards. CC ID 07608 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network client: Send unencrypted password to third-party SMB servers" to organizational standards. CC ID 07623 | System hardening through configuration management | Preventive | |
Configure the "Network access: Remotely accessible registry paths and sub-paths" to organizational standards. CC ID 07632 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network server: Digitally sign communications (if client agrees)" to organizational standards. CC ID 07643 | System hardening through configuration management | Preventive | |
Configure the "Network access: Let Everyone permissions apply to anonymous users" to organizational standards. CC ID 07646 | System hardening through configuration management | Preventive | |
Configure the "Network security: Allow LocalSystem NULL session fallback" to organizational standards. CC ID 07650 | System hardening through configuration management | Preventive | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to organizational standards. CC ID 07682 | System hardening through configuration management | Preventive | |
Configure the "Network access: Do not allow storage of passwords and credentials for network authentication" to organizational standards. CC ID 07694 | System hardening through configuration management | Preventive | |
Configure the "Network security: LAN Manager authentication level" to organizational standards. CC ID 07704 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Number of previous logons to cache (in case domain controller is not available)" to organizational standards. CC ID 07705 | System hardening through configuration management | Preventive | |
Configure the "Network access: Sharing and security model for local accounts" to organizational standards. CC ID 07712 | System hardening through configuration management | Preventive | |
Configure the "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to organizational standards. CC ID 07719 | System hardening through configuration management | Preventive | |
Configure the "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to organizational standards. CC ID 07721 | System hardening through configuration management | Preventive | |
Configure the "Domain member: Digitally encrypt secure channel data (when possible)" to organizational standards. CC ID 07728 | System hardening through configuration management | Preventive | |
Configure the "Network security: Do not store LAN Manager hash value on next password change" to organizational standards. CC ID 07732 | System hardening through configuration management | Preventive | |
Configure the "Domain member: Require strong (Windows 2000 or later) session key" to organizational standards. CC ID 07741 | System hardening through configuration management | Preventive | |
Configure the "Network access: Shares that can be accessed anonymously" to organizational standards. CC ID 07748 | System hardening through configuration management | Preventive | |
Configure the "Network access: Allow anonymous SID/Name translation" to organizational standards. CC ID 07749 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network client: Digitally sign communications (if server agrees)" to organizational standards. CC ID 07750 | System hardening through configuration management | Preventive | |
Configure the "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to organizational standards. CC ID 07754 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network client: Digitally sign communications (always)" to organizational standards. CC ID 07759 | System hardening through configuration management | Preventive | |
Configure the "Network security: LDAP client signing requirements" to organizational standards. CC ID 07760 | System hardening through configuration management | Preventive | |
Configure the "MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to organizational standards. CC ID 07772 | System hardening through configuration management | Preventive | |
Configure the "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to organizational standards. CC ID 07773 | System hardening through configuration management | Preventive | |
Configure the "Network access: Restrict anonymous access to Named Pipes and Shares" to organizational standards. CC ID 07798 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Restrict NTLM: Add remote server exceptions for NTLM authentication" to organizational standards. CC ID 07837 | System hardening through configuration management | Preventive | |
Configure the "Domain controller: LDAP server signing requirements" to organizational standards. CC ID 07857 | System hardening through configuration management | Preventive | |
Configure the "Network access: Remotely accessible registry paths" to organizational standards. CC ID 07863 | System hardening through configuration management | Preventive | |
Configure the "Set client connection encryption level" to organizational standards. CC ID 07881 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Allow inbound remote administration exception" to organizational standards. CC ID 08182 | System hardening through configuration management | Preventive | |
Configure the "MSS: (SynAttackProtect) Syn attack protection level (protects against DoS)" to organizational standards. CC ID 08198 | System hardening through configuration management | Preventive | |
Configure the "Network access: Do not allow storage of credentials or .NET Passports for network authentication" to organizational standards CC ID 08200 | System hardening through configuration management | Preventive | |
Configure the "Turn off Internet download for Web publishing and online ordering wizards" to organizational standards. CC ID 08259 | System hardening through configuration management | Preventive | |
Configure the "Maximum tolerance for computer clock synchronization" to organizational standards. CC ID 08260 | System hardening through configuration management | Preventive | |
Configure the "Maximum lifetime for user ticket" to organizational standards. CC ID 08299 | System hardening through configuration management | Preventive | |
Configure the "Maximum lifetime for service ticket" to organizational standards. CC ID 08301 | System hardening through configuration management | Preventive | |
Configure the "Set IP Stateless Autoconfiguration Limits State" to organizational standards. CC ID 08348 | System hardening through configuration management | Preventive | |
Configure the "Prohibit connection to non-domain networks when connected to domain authenticated network" to organizational standards. CC ID 08420 | System hardening through configuration management | Preventive | |
Configure the "Restrict Unauthenticated RPC clients" to organizational standards. CC ID 08437 | System hardening through configuration management | Preventive | |
Configure the "Enable RPC Endpoint Mapper Client Authentication" to organizational standards. CC ID 08526 | System hardening through configuration management | Preventive | |
Configure the "Minimize the number of simultaneous connections to the Internet or a Windows Domain" to organizational standards. CC ID 08603 | System hardening through configuration management | Preventive | |
Configure Logging settings in accordance with organizational standards. CC ID 07611 | System hardening through configuration management | Preventive | |
Configure "CloudTrail" to organizational standards. CC ID 15443 | System hardening through configuration management | Preventive | |
Configure "CloudTrail log file validation" to organizational standards. CC ID 15437 | System hardening through configuration management | Preventive | |
Configure "VPC flow logging" to organizational standards. CC ID 15436 | System hardening through configuration management | Preventive | |
Configure "object-level logging" to organizational standards. CC ID 15433 | System hardening through configuration management | Preventive | |
Configure "Turn on PowerShell Transcription" to organizational standards. CC ID 15415 | System hardening through configuration management | Preventive | |
Configure "Turn on PowerShell Script Block Logging" to organizational standards. CC ID 15413 | System hardening through configuration management | Preventive | |
Configure "Audit PNP Activity" to organizational standards. CC ID 15393 | System hardening through configuration management | Preventive | |
Configure "Include command line in process creation events" to organizational standards. CC ID 15358 | System hardening through configuration management | Preventive | |
Configure "Audit Group Membership" to organizational standards. CC ID 15341 | System hardening through configuration management | Preventive | |
Configure the "audit_backlog_limit" setting to organizational standards. CC ID 15324 | System hardening through configuration management | Preventive | |
Configure the "/etc/docker/daemon.json" files and directories auditing to organizational standards. CC ID 14467 | System hardening through configuration management | Detective | |
Configure the "systemd-journald" to organizational standards. CC ID 15326 | System hardening through configuration management | Preventive | |
Configure the "/etc/docker" files and directories auditing to organizational standards. CC ID 14459 | System hardening through configuration management | Detective | |
Configure the "docker.socket" files and directories auditing to organizational standards. CC ID 14458 | System hardening through configuration management | Detective | |
Configure the "docker.service" files and directories auditing to organizational standards. CC ID 14454 | System hardening through configuration management | Detective | |
Configure the "/var/lib/docker" files and directories auditing to organizational standards. CC ID 14453 | System hardening through configuration management | Detective | |
Configure the "/usr/sbin/runc" files and directories auditing to organizational standards. CC ID 14452 | System hardening through configuration management | Detective | |
Configure the "/usr/bin/containerd" files and directories auditing to organizational standards. CC ID 14451 | System hardening through configuration management | Detective | |
Configure the "/etc/default/docker" files and directories auditing to organizational standards. CC ID 14450 | System hardening through configuration management | Detective | |
Configure the "/etc/sysconfig/docker" files and directories auditing to organizational standards. CC ID 14449 | System hardening through configuration management | Detective | |
Configure the "Audit Policy: Object Access: SAM" to organizational standards. CC ID 07612 | System hardening through configuration management | Preventive | |
Configure the storage parameters for all logs. CC ID 06330 | System hardening through configuration management | Preventive | |
Configure sufficient log storage capacity and prevent the capacity from being exceeded. CC ID 01425 | System hardening through configuration management | Preventive | |
Configure the log retention method. CC ID 01715 | System hardening through configuration management | Preventive | |
Configure the log retention size. CC ID 01716 | System hardening through configuration management | Preventive | |
Configure syslogd to send logs to a Remote LogHost. CC ID 01526 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Management: User Account Management" to organizational standards. CC ID 07613 | System hardening through configuration management | Preventive | |
Configure the security parameters for all logs. CC ID 01712 [Review whether management has the following: Processes for the security and integrity of log files (e.g., encryption of log files, adequate storage capacity, secure backup and disposal of logs, logging to a separate computer, use of read-only media, controlled log parameters, and restricted access to log files). App A Objective 6.35.b Review whether management has the following: Processes for the security and integrity of log files (e.g., encryption of log files, adequate storage capacity, secure backup and disposal of logs, logging to a separate computer, use of read-only media, controlled log parameters, and restricted access to log files). App A Objective 6.35.b] | System hardening through configuration management | Preventive | |
Configure the log so that it cannot be disabled. CC ID 00595 | System hardening through configuration management | Preventive | |
Configure the event log size capacity limits for the application log, the security log, and the system log. CC ID 01713 | System hardening through configuration management | Preventive | |
Configure the application log, the security log, and the system log to restrict guest access. CC ID 01714 | System hardening through configuration management | Preventive | |
Configure the "mss: (warninglevel) percentage threshold for the security event log at which the system will generate a warning" setting. CC ID 04275 | System hardening through configuration management | Preventive | |
Configure the detailed data elements to be captured for all logs so that events are identified by type, location, subject, user, what data was accessed, etc. CC ID 06331 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: System: System Integrity" to organizational standards. CC ID 07652 | System hardening through configuration management | Preventive | |
Configure the log to capture the user's identification. CC ID 01334 | System hardening through configuration management | Preventive | |
Configure the log to capture a date and time stamp. CC ID 01336 | System hardening through configuration management | Preventive | |
Configure the log to uniquely identify each asset. CC ID 01339 | System hardening through configuration management | Preventive | |
Configure the log to capture remote access information. CC ID 05596 | System hardening through configuration management | Detective | |
Configure the log to capture the type of each event. CC ID 06423 | System hardening through configuration management | Preventive | |
Configure the log to capture each event's success or failure indication. CC ID 06424 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: File Share" to organizational standards. CC ID 07655 | System hardening through configuration management | Preventive | |
Configure all logs to capture auditable events or actionable events. CC ID 06332 | System hardening through configuration management | Preventive | |
Configure the log to capture account lockouts. CC ID 16470 | System hardening through configuration management | Preventive | |
Configure the log to capture execution events. CC ID 16469 | System hardening through configuration management | Preventive | |
Configure the log to capture AWS Organizations changes. CC ID 15445 | System hardening through configuration management | Preventive | |
Configure the log to capture Identity and Access Management policy changes. CC ID 15442 | System hardening through configuration management | Preventive | |
Configure the log to capture management console sign-in without multi-factor authentication. CC ID 15441 | System hardening through configuration management | Preventive | |
Configure the log to capture route table changes. CC ID 15439 | System hardening through configuration management | Preventive | |
Configure the log to capture virtual private cloud changes. CC ID 15435 | System hardening through configuration management | Preventive | |
Configure the log to capture changes to encryption keys. CC ID 15432 | System hardening through configuration management | Preventive | |
Configure the log to capture unauthorized API calls. CC ID 15429 | System hardening through configuration management | Preventive | |
Configure the log to capture changes to network gateways. CC ID 15421 | System hardening through configuration management | Preventive | |
Configure the log to capture all spoofed addresses. CC ID 01313 | System hardening through configuration management | Preventive | |
Configure the "logging level" to organizational standards. CC ID 14456 | System hardening through configuration management | Detective | |
Configure inetd tracing. CC ID 01523 | System hardening through configuration management | Preventive | |
Configure the system to capture messages sent to the syslog AUTH facility. CC ID 01525 | System hardening through configuration management | Preventive | |
Configure Cron logging. CC ID 01528 | System hardening through configuration management | Preventive | |
Configure the kernel level auditing setting. CC ID 01530 | System hardening through configuration management | Preventive | |
Configure the "audit successful file system mounts" setting to organizational standards. CC ID 09923 | System hardening through configuration management | Preventive | |
Configure system accounting/system events. CC ID 01529 | System hardening through configuration management | Preventive | |
Configure the privilege use auditing setting. CC ID 01699 | System hardening through configuration management | Preventive | |
Configure the log to record the Denial of Access that results from an excessive number of unsuccessful logon attempts. CC ID 01919 | System hardening through configuration management | Preventive | |
Configure the Audit Process Tracking setting. CC ID 01700 | System hardening through configuration management | Preventive | |
Configure the EEPROM security-mode accesses and EEPROM log-failed accesses. CC ID 01575 | System hardening through configuration management | Preventive | |
Configure the log to capture user identifier, address, port blocking or blacklisting. CC ID 01918 | System hardening through configuration management | Preventive | |
Enable directory service access events, as appropriate. CC ID 05616 | System hardening through configuration management | Preventive | |
Configure the log to capture failed transactions. CC ID 06334 | System hardening through configuration management | Preventive | |
Configure the log to capture successful transactions. CC ID 06335 | System hardening through configuration management | Preventive | |
Audit non attributable events (na class). CC ID 05604 | System hardening through configuration management | Preventive | |
Configure the log to capture configuration changes. CC ID 06881 | System hardening through configuration management | Preventive | |
Log, monitor, and review all changes to time settings on critical systems. CC ID 11608 | System hardening through configuration management | Preventive | |
Configure the log to capture all changes to certificates. CC ID 05595 | System hardening through configuration management | Preventive | |
Configure the "inetd logging" setting to organizational standards. CC ID 08970 | System hardening through configuration management | Preventive | |
Configure the "audit sudoers" setting to organizational standards. CC ID 09950 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Registry" to organizational standards. CC ID 07658 | System hardening through configuration management | Preventive | |
Configure the event log settings for specific Operating System functions. CC ID 06337 | System hardening through configuration management | Preventive | |
Configure the "Audit: Audit the use of Backup and Restore privilege" setting. CC ID 01724 | System hardening through configuration management | Preventive | |
Configure the "Audit: Shut down the system immediately if unable to log security audits" setting. CC ID 01725 | System hardening through configuration management | Preventive | |
Configure "Audit account management" to organizational standards. CC ID 02039 | System hardening through configuration management | Preventive | |
Configure the "Audit: Force audit policy subcategory settings (Windows Vista or later)" setting. CC ID 04387 | System hardening through configuration management | Preventive | |
Configure console logging. CC ID 04454 | System hardening through configuration management | Preventive | |
Configure boot error logging. CC ID 04455 | System hardening through configuration management | Preventive | |
Disable the "Audit password" setting in NetWare. CC ID 04456 | System hardening through configuration management | Preventive | |
Configure the "Disable Logging" setting. CC ID 05590 | System hardening through configuration management | Preventive | |
Enable BIN mode auditing. CC ID 05591 | System hardening through configuration management | Preventive | |
Enable or disable the BSM auditing setting, as appropriate. CC ID 05592 | System hardening through configuration management | Preventive | |
Set the X server audit level appropriately. CC ID 05600 | System hardening through configuration management | Preventive | |
Configure the "Turn on session logging" properly. CC ID 05618 | System hardening through configuration management | Preventive | |
Configure Sendmail with the appropriate logging levels. CC ID 06028 | System hardening through configuration management | Preventive | |
Enable or disable auditing in the runcontrol scripts, as appropriate. CC ID 06029 | System hardening through configuration management | Preventive | |
Enable or disable auditing for user accounts, as appropriate. CC ID 06030 | System hardening through configuration management | Preventive | |
Enable or disable auditing at boot time, as appropriate. CC ID 06031 | System hardening through configuration management | Preventive | |
Enable or disable the auditing of chgrp usage, as appropriate. CC ID 06033 | System hardening through configuration management | Preventive | |
Enable or disable the auditing of mkgroup usage, as appropriate. CC ID 06034 | System hardening through configuration management | Preventive | |
Enable or disable the auditing of rmgroup usage, as appropriate. CC ID 06035 | System hardening through configuration management | Preventive | |
Enable or disable the auditing of the exit function, as appropriate. CC ID 06036 | System hardening through configuration management | Preventive | |
Generate an alert when an audit log failure occurs. CC ID 06737 | System hardening through configuration management | Preventive | |
Configure additional log settings. CC ID 06333 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Logoff" to organizational standards. CC ID 07662 | System hardening through configuration management | Preventive | |
Configure additional logging for the FTP daemon. CC ID 01524 | System hardening through configuration management | Preventive | |
Configure the "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to organizational standards. CC ID 07664 | System hardening through configuration management | Preventive | |
Configure additional log file parameters appropriately. CC ID 06338 | System hardening through configuration management | Preventive | |
Create the /var/adm/loginlog file. CC ID 01527 | System hardening through configuration management | Preventive | |
Verify the audit config file contains only accounts that should be present. CC ID 05594 | System hardening through configuration management | Preventive | |
Specify the PRI audit file properly. CC ID 05597 | System hardening through configuration management | Preventive | |
Specify the SEC audit file properly. CC ID 05598 | System hardening through configuration management | Preventive | |
Verify the user audit file contains the appropriate never-audit flags. CC ID 05605 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: File System" to organizational standards. CC ID 07666 | System hardening through configuration management | Preventive | |
Configure the "Background upload of a roaming user profile's registry file while user is logged on" setting to organizational standards. CC ID 10761 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Logon" to organizational standards. CC ID 07669 | System hardening through configuration management | Preventive | |
Configure the "Backup log automatically when full" setting for the "setup log" to organizational standards. CC ID 10762 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Logon: Kerberos Authentication Service" to organizational standards. CC ID 07679 | System hardening through configuration management | Preventive | |
Configure the "Applications preference logging and tracing" setting to organizational standards. CC ID 10774 | System hardening through configuration management | Preventive | |
Configure the "Data Sources preference logging and tracing" setting to organizational standards. CC ID 10779 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: IPsec Extended Mode" to organizational standards. CC ID 07683 | System hardening through configuration management | Preventive | |
Configure the "Devices preference logging and tracing" setting to organizational standards. CC ID 10782 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Handle Manipulation" to organizational standards. CC ID 07684 | System hardening through configuration management | Preventive | |
Configure the "Drive Maps preference logging and tracing" setting to organizational standards. CC ID 10783 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Detailed File Share" to organizational standards. CC ID 07687 | System hardening through configuration management | Preventive | |
Configure the "Environment preference logging and tracing" setting to organizational standards. CC ID 10784 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Network Policy Server" to organizational standards. CC ID 07701 | System hardening through configuration management | Preventive | |
Configure the "Files preference logging and tracing" setting to organizational standards. CC ID 10785 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Detailed Tracking: Process Creation" to organizational standards. CC ID 07707 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: System: IPsec Driver" to organizational standards. CC ID 07708 | System hardening through configuration management | Preventive | |
Configure the "Folder Options preference logging and tracing" setting to organizational standards. CC ID 10786 | System hardening through configuration management | Preventive | |
Configure the "Folders preference logging and tracing" setting to organizational standards. CC ID 10787 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Account Lockout" to organizational standards. CC ID 07713 | System hardening through configuration management | Preventive | |
Configure the "Ini Files preference logging and tracing" setting to organizational standards. CC ID 10788 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Kernel Object" to organizational standards. CC ID 07720 | System hardening through configuration management | Preventive | |
Configure the "Internet Settings preference logging and tracing" setting to organizational standards. CC ID 10789 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Other Object Access Events" to organizational standards. CC ID 07724 | System hardening through configuration management | Preventive | |
Configure the "Local Users and Groups preference logging and tracing" setting to organizational standards. CC ID 10793 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: DS Access: Directory Service Replication" to organizational standards. CC ID 07734 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Policy Change: Audit Policy Change" to organizational standards. CC ID 07735 | System hardening through configuration management | Preventive | |
Configure the "Regional Options preference logging and tracing" setting to organizational standards. CC ID 10802 | System hardening through configuration management | Preventive | |
Configure the "Registry preference logging and tracing" setting to organizational standards. CC ID 10803 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: DS Access: Directory Service Changes" to organizational standards. CC ID 07736 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Certification Services" to organizational standards. CC ID 07742 | System hardening through configuration management | Preventive | |
Configure the "Scheduled Tasks preference logging and tracing" setting to organizational standards. CC ID 10815 | System hardening through configuration management | Preventive | |
Configure the "Services preference logging and tracing" setting to organizational standards. CC ID 10818 | System hardening through configuration management | Preventive | |
Configure the "Maximum Log Size (KB)" to organizational standards. CC ID 07744 | System hardening through configuration management | Preventive | |
Configure the "Shortcuts preference logging and tracing" setting to organizational standards. CC ID 10819 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Detailed Tracking: DPAPI Activity" to organizational standards. CC ID 07746 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Management: Other Account Management Events" to organizational standards. CC ID 07751 | System hardening through configuration management | Preventive | |
Configure the "Start Menu preference logging and tracing" setting to organizational standards. CC ID 10821 | System hardening through configuration management | Preventive | |
Configure the "Delete data from devices running Microsoft firmware when a user logs off from the computer." setting to organizational standards. CC ID 10846 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Management: Computer Account Management" to organizational standards. CC ID 07752 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Privilege Use: Non Sensitive Privilege Use" to organizational standards. CC ID 07756 | System hardening through configuration management | Preventive | |
Configure the "Disable logging via package settings" setting to organizational standards. CC ID 10864 | System hardening through configuration management | Preventive | |
Configure the "Do not forcefully unload the users registry at user logoff" setting to organizational standards. CC ID 10930 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Application Generated" to organizational standards. CC ID 07757 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: DS Access: Detailed Directory Service Replication" to organizational standards. CC ID 07764 | System hardening through configuration management | Preventive | |
Configure the "Do not log users on with temporary profiles" setting to organizational standards. CC ID 10931 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Privilege Use: Other Privilege Use Events" to organizational standards. CC ID 07776 | System hardening through configuration management | Preventive | |
Configure the "Log Access" setting for the "application log" to organizational standards. CC ID 11026 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Logon: Kerberos Service Ticket Operations" to organizational standards. CC ID 07786 | System hardening through configuration management | Preventive | |
Configure the "Log Access" setting for the "setup log" to organizational standards. CC ID 11027 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: DS Access: Directory Service Access" to organizational standards. CC ID 07790 | System hardening through configuration management | Preventive | |
Configure the "Log Access" setting for the "system log" to organizational standards. CC ID 11028 | System hardening through configuration management | Preventive | |
Configure the "Retain old events" to organizational standards. CC ID 07791 | System hardening through configuration management | Preventive | |
Configure the "Log directory pruning retry events" setting to organizational standards. CC ID 11029 | System hardening through configuration management | Preventive | |
Configure the "Audit: Audit the use of Backup and Restore privilege" to organizational standards. CC ID 07792 | System hardening through configuration management | Preventive | |
Configure the "Log event when quota limit exceeded" setting to organizational standards. CC ID 11030 | System hardening through configuration management | Preventive | |
Configure the "Log File Path" setting for the "application log" to organizational standards. CC ID 11033 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Policy Change: MPSSVC Rule-Level Policy Change" to organizational standards. CC ID 07793 | System hardening through configuration management | Preventive | |
Configure the "Log File Path" setting for the "setup log" to organizational standards. CC ID 11034 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Policy Change: Other Policy Change Events" to organizational standards. CC ID 07810 | System hardening through configuration management | Preventive | |
Configure the "Log File Path" setting for the "system log" to organizational standards. CC ID 11035 | System hardening through configuration management | Preventive | |
Configure the "Audit: Shut down system immediately if unable to log security audits" to organizational standards. CC ID 07812 | System hardening through configuration management | Preventive | |
Configure the "Logging" setting to organizational standards. CC ID 11036 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: System: Other System Events" to organizational standards. CC ID 07817 | System hardening through configuration management | Preventive | |
Configure the "Remove "Disconnect" option from Shut Down dialog" setting to organizational standards. CC ID 11126 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Management: Application Group Management" to organizational standards. CC ID 07819 | System hardening through configuration management | Preventive | |
Configure the "MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning" to organizational standards. CC ID 07820 | System hardening through configuration management | Preventive | |
Configure the "Remove browse dialog box for new source" setting to organizational standards. CC ID 11127 | System hardening through configuration management | Preventive | |
Configure the "Restricts the UI language Windows uses for all logged users" setting to organizational standards. CC ID 11147 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Logon: Other Account Logon Events" to organizational standards. CC ID 07825 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Management: Distribution Group Management" to organizational standards. CC ID 07828 | System hardening through configuration management | Preventive | |
Configure the "Set roaming profile path for all users logging onto this computer" setting to organizational standards. CC ID 11182 | System hardening through configuration management | Preventive | |
Configure the "Audit: Audit the access of global system objects" to organizational standards. CC ID 07831 | System hardening through configuration management | Preventive | |
Configure the "Set the Time interval in minutes for logging accounting data" setting to organizational standards. CC ID 11193 | System hardening through configuration management | Preventive | |
Configure the "Turn off Resultant Set of Policy logging" setting to organizational standards. CC ID 11307 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Special Logon" to organizational standards. CC ID 07835 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Detailed Tracking: RPC Events" to organizational standards. CC ID 07840 | System hardening through configuration management | Preventive | |
Configure the "Turn on extensive logging for Active Directory Domain Services domain controllers that are running Server for NIS" setting to organizational standards. CC ID 11343 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Policy Change: Authentication Policy Change" to organizational standards. CC ID 07846 | System hardening through configuration management | Preventive | |
Configure the "Turn on extensive logging for Password Synchronization" setting to organizational standards. CC ID 11344 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Detailed Tracking: Process Termination" to organizational standards. CC ID 07849 | System hardening through configuration management | Preventive | |
Configure the "Turn on logging" setting to organizational standards. CC ID 11345 | System hardening through configuration management | Preventive | |
Configure the "Turn on session logging" setting to organizational standards. CC ID 11350 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: IPsec Quick Mode" to organizational standards. CC ID 07852 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Filtering Platform Packet Drop" to organizational standards. CC ID 07856 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Filtering Platform Connection" to organizational standards. CC ID 07864 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Policy Change: Authorization Policy Change" to organizational standards. CC ID 07875 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Management: Security Group Management" to organizational standards. CC ID 07880 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Privilege Use: Sensitive Privilege Use" to organizational standards. CC ID 07887 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: IPsec Main Mode" to organizational standards. CC ID 07888 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Account Logon: Credential Validation" to organizational standards. CC ID 07892 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Policy Change: Filtering Platform Policy Change" to organizational standards. CC ID 07895 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Logon-Logoff: Other Logon/Logoff Events" to organizational standards. CC ID 07899 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: System: Security State Change" to organizational standards. CC ID 07903 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: System: Security System Extension" to organizational standards. CC ID 07904 | System hardening through configuration management | Preventive | |
Configure the "Audit account logon events" to organizational standards. CC ID 08188 | System hardening through configuration management | Preventive | |
Configure the "Retention method for security log" to organizational standards. CC ID 08197 | System hardening through configuration management | Preventive | |
Configure the "Retention method for system log" to organizational standards. CC ID 08211 | System hardening through configuration management | Preventive | |
Configure the "Audit logon events" to organizational standards. CC ID 08221 | System hardening through configuration management | Preventive | |
Configure the "Retention method for application log" to organizational standards. CC ID 08226 | System hardening through configuration management | Preventive | |
Configure the "Retain security log" to organizational standards. CC ID 08241 | System hardening through configuration management | Preventive | |
Configure the "Audit system events" to organizational standards. CC ID 08244 | System hardening through configuration management | Preventive | |
Configure the "Retain application log" to organizational standards. CC ID 08246 | System hardening through configuration management | Preventive | |
Configure the "Prevent local guests group from accessing application log" to organizational standards. CC ID 08248 | System hardening through configuration management | Preventive | |
Configure the "Maximum security log size" to organizational standards. CC ID 08251 | System hardening through configuration management | Preventive | |
Configure the "Retain system log" to organizational standards. CC ID 08258 | System hardening through configuration management | Preventive | |
Configure the "Audit privilege use" to organizational standards. CC ID 08266 | System hardening through configuration management | Preventive | |
Configure the "Audit policy change" to organizational standards. CC ID 08272 | System hardening through configuration management | Preventive | |
Configure the "Audit object access" to organizational standards. CC ID 08278 | System hardening through configuration management | Preventive | |
Configure the "Audit process tracking" to organizational standards. CC ID 08283 | System hardening through configuration management | Preventive | |
Configure the "Maximum system log size" to organizational standards. CC ID 08286 | System hardening through configuration management | Preventive | |
Configure the "Maximum application log size" to organizational standards. CC ID 08296 | System hardening through configuration management | Preventive | |
Configure the "Prevent local guests group from accessing security log" to organizational standards. CC ID 08297 | System hardening through configuration management | Preventive | |
Configure the "Audit directory service access" to organizational standards. CC ID 08304 | System hardening through configuration management | Preventive | |
Configure the "Audit account management" to organizational standards. CC ID 08316 | System hardening through configuration management | Preventive | |
Configure the "Prevent local guests group from accessing system log" to organizational standards. CC ID 08336 | System hardening through configuration management | Preventive | |
Configure the "Specify the maximum log file size (KB)" to organizational standards. CC ID 08352 | System hardening through configuration management | Preventive | |
Configure the "Message tracking logging - Mailbox" to organizational standards. CC ID 08360 | System hardening through configuration management | Preventive | |
Configure the "Turn on Connectivity logging" to organizational standards. CC ID 08398 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Logging: Size limit (KB)" to organizational standards. CC ID 08405 | System hardening through configuration management | Preventive | |
Configure the "Control Event Log behavior when the log file reaches its maximum size" to organizational standards. CC ID 08444 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Logging: Log dropped packets" to organizational standards. CC ID 08445 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Logging: Log dropped packets" to organizational standards. CC ID 08454 | System hardening through configuration management | Preventive | |
Configure the "Configure Protocol logging" to organizational standards. CC ID 08463 | System hardening through configuration management | Preventive | |
Configure the "Message tracking logging - Transport" to organizational standards. CC ID 08477 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Logging: Log dropped packets" to organizational standards. CC ID 08501 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Removable Storage" to organizational standards. CC ID 08504 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Domain: Logging: Name" to organizational standards. CC ID 08543 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Logging: Log successful connections" to organizational standards. CC ID 08545 | System hardening through configuration management | Preventive | |
Configure the "Audit Policy: Object Access: Central Access Policy Staging" to organizational standards. CC ID 08558 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Public: Logging: Name" to organizational standards. CC ID 08565 | System hardening through configuration management | Preventive | |
Configure the "Windows Firewall: Private: Logging: Size limit (KB)" to organizational standards. CC ID 08606 | System hardening through configuration management | Preventive | |
Configure the "audit change user functions" setting to organizational standards. CC ID 08982 | System hardening through configuration management | Preventive | |
Configure the "audit the use of chmod command" setting to organizational standards. CC ID 08983 | System hardening through configuration management | Preventive | |
Configure the "audit the chown command" setting to organizational standards. CC ID 08984 | System hardening through configuration management | Preventive | |
Configure the "Collect Session Initiation Information" setting to organizational standards. CC ID 09948 | System hardening through configuration management | Preventive | |
Configure the "Collect Discretionary Access Control Permission Modification Events" setting to organizational standards. CC ID 09949 | System hardening through configuration management | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Fault Tolerant Heap" to organizational standards. CC ID 10808 | System hardening through configuration management | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Boot Performance Diagnostics" to organizational standards. CC ID 10809 | System hardening through configuration management | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Memory Leak Diagnosis" to organizational standards. CC ID 10810 | System hardening through configuration management | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Resource Exhaustion Detection and Resolution" to organizational standards. CC ID 10811 | System hardening through configuration management | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Shutdown Performance Diagnostics" to organizational standards. CC ID 10812 | System hardening through configuration management | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Standby/Resume Performance Diagnostics" to organizational standards. CC ID 10813 | System hardening through configuration management | Preventive | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows System Responsiveness Diagnostics" to organizational standards. CC ID 10814 | System hardening through configuration management | Preventive | |
Configure the "Default quota limit and warning level" setting to organizational standards. CC ID 10840 | System hardening through configuration management | Preventive | |
Configure the "Detect application failures caused by deprecated COM objects" setting to organizational standards. CC ID 10851 | System hardening through configuration management | Preventive | |
Configure the "Detect application failures caused by deprecated Windows DLLs" setting to organizational standards. CC ID 10852 | System hardening through configuration management | Preventive | |
Configure the "Detect application install failures" setting to organizational standards. CC ID 10853 | System hardening through configuration management | Preventive | |
Configure the "Detect application installers that need to be run as administrator" setting to organizational standards. CC ID 10854 | System hardening through configuration management | Preventive | |
Configure the "Detect applications unable to launch installers under UAC" setting to organizational standards. CC ID 10855 | System hardening through configuration management | Preventive | |
Configure the "Diagnostics: Configure scenario execution level" setting to organizational standards. CC ID 10856 | System hardening through configuration management | Preventive | |
Configure the "Disk Diagnostic: Configure execution level" setting to organizational standards. CC ID 10883 | System hardening through configuration management | Preventive | |
Configure the "Log event when quota warning level exceeded" setting to organizational standards. CC ID 11031 | System hardening through configuration management | Preventive | |
Configure the "Log File Debug Output Level" setting to organizational standards. CC ID 11032 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Support Diagnostic Tool: Configure execution level" setting to organizational standards. CC ID 11043 | System hardening through configuration management | Preventive | |
Configure the "Primary DNS Suffix Devolution Level" setting to organizational standards. CC ID 11096 | System hardening through configuration management | Preventive | |
Configure the "Require user authentication for remote connections by using Network Level Authentication" setting to organizational standards. CC ID 11138 | System hardening through configuration management | Preventive | |
Configure the "Specify channel binding token hardening level" setting to organizational standards. CC ID 11209 | System hardening through configuration management | Preventive | |
Configure the "Update Security Level" setting to organizational standards. CC ID 11357 | System hardening through configuration management | Preventive | |
Configure the "Update Top Level Domain Zones" setting to organizational standards. CC ID 11358 | System hardening through configuration management | Preventive | |
Configure Key, Certificate, Password, Authentication and Identity Management settings in accordance with organizational standards. CC ID 07621 | System hardening through configuration management | Preventive | |
Configure Kerberos pre-authentication to organizational standards. CC ID 16480 | System hardening through configuration management | Preventive | |
Configure time-based user access restrictions in accordance with organizational standards. CC ID 16436 | System hardening through configuration management | Preventive | |
Configure "MFA Delete" to organizational standards. CC ID 15430 | System hardening through configuration management | Preventive | |
Configure Identity and Access Management policies to organizational standards. CC ID 15422 | System hardening through configuration management | Preventive | |
Configure the Identity and Access Management Access analyzer to organizational standards. CC ID 15420 | System hardening through configuration management | Preventive | |
Configure "Support device authentication using certificate" to organizational standards. CC ID 15410 | System hardening through configuration management | Preventive | |
Install LAPS AdmPwd GPO Extension, as necessary. CC ID 15409 | System hardening through configuration management | Preventive | |
Configure "Require pin for pairing" to organizational standards. CC ID 15395 | System hardening through configuration management | Preventive | |
Configure "Do not allow password expiration time longer than required by policy" to organizational standards. CC ID 15390 | System hardening through configuration management | Preventive | |
Configure "Enable Local Admin Password Management" to organizational standards. CC ID 15387 | System hardening through configuration management | Preventive | |
Configure "Allow Microsoft accounts to be optional" to organizational standards. CC ID 15368 | System hardening through configuration management | Preventive | |
Configure "Turn off picture password sign-in" to organizational standards. CC ID 15347 | System hardening through configuration management | Preventive | |
Configure "Enable insecure guest logons" to organizational standards. CC ID 15344 | System hardening through configuration management | Preventive | |
Configure the "cert-expiry" argument to organizational standards. CC ID 14541 | System hardening through configuration management | Preventive | |
Configure "client certificate authentication" to organizational standards. CC ID 14608 | System hardening through configuration management | Preventive | |
Configure the "client certificate bundles" to organizational standards. CC ID 14518 | System hardening through configuration management | Preventive | |
Configure the "external-server-cert" argument to organizational standards. CC ID 14522 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Restrict NTLM: Incoming NTLM traffic" to organizational standards. CC ID 07622 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Allow PKU2U authentication requests to this computer to use online identities" to organizational standards. CC ID 07638 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Require Domain Controller authentication to unlock workstation" to organizational standards. CC ID 07639 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers" to organizational standards. CC ID 07663 | System hardening through configuration management | Preventive | |
Configure the "Maximum password age" to organizational standards. CC ID 07688 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Restrict NTLM: Add server exceptions in this domain" to organizational standards. CC ID 07693 | System hardening through configuration management | Preventive | |
Configure "Accounts: Limit local account use of blank passwords to console logon only" to organizational standards. CC ID 07697 | System hardening through configuration management | Preventive | |
Configure the "Minimum password length" to organizational standards. CC ID 07711 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network server: Server SPN target name validation level" to organizational standards. CC ID 07714 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Restrict NTLM: Audit Incoming NTLM Traffic" to organizational standards. CC ID 07730 | System hardening through configuration management | Preventive | |
Configure the "Domain member: Maximum machine account password age" to organizational standards. CC ID 07737 | System hardening through configuration management | Preventive | |
Configure the "Password must meet complexity requirements" to organizational standards. CC ID 07743 | System hardening through configuration management | Preventive | |
Configure the "Service Account Tokens" to organizational standards. CC ID 14646 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Require smart card" to organizational standards. CC ID 07753 | System hardening through configuration management | Preventive | |
Configure the "System cryptography: Force strong key protection for user keys stored on the computer" to organizational standards. CC ID 07763 | System hardening through configuration management | Preventive | |
Configure the "rotate" argument to organizational standards. CC ID 14548 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Restrict NTLM: Audit NTLM authentication in this domain" to organizational standards. CC ID 07769 | System hardening through configuration management | Preventive | |
Configure the "Domain controller: Refuse machine account password changes" to organizational standards. CC ID 07827 | System hardening through configuration management | Preventive | |
Configure the "Store passwords using reversible encryption" to organizational standards. CC ID 07829 | System hardening through configuration management | Preventive | |
Configure the "Network security: Allow Local System to use computer identity for NTLM" to organizational standards. CC ID 07830 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Prompt user to change password before expiration" to organizational standards. CC ID 07844 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Restrict NTLM: NTLM authentication in this domain" to organizational standards. CC ID 07859 | System hardening through configuration management | Preventive | |
Configure the "Enforce password history" to organizational standards. CC ID 07877 | System hardening through configuration management | Preventive | |
Configure the "Domain member: Disable machine account password changes" to organizational standards. CC ID 07883 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Smart card removal behavior" to organizational standards. CC ID 07884 | System hardening through configuration management | Preventive | |
Configure the "Logon options" to organizational standards. CC ID 07917 | System hardening through configuration management | Preventive | |
Configure the "Prevent ignoring certificate errors" to organizational standards. CC ID 07924 | System hardening through configuration management | Preventive | |
Configure the "Turn off Encryption Support" to organizational standards. CC ID 08028 | System hardening through configuration management | Preventive | |
Configure the "Disable changing certificate settings" to organizational standards. CC ID 08042 | System hardening through configuration management | Preventive | |
Configure the "Check for server certificate revocation" to organizational standards. CC ID 08120 | System hardening through configuration management | Preventive | |
Configure the "Do not allow passwords to be saved" to organizational standards. CC ID 08178 | System hardening through configuration management | Preventive | |
Configure the "RPC Endpoint Mapper Client Authentication" to organizational standards. CC ID 08202 | System hardening through configuration management | Preventive | |
Configure the "Restrictions for Unauthenticated RPC clients" to organizational standards. CC ID 08240 | System hardening through configuration management | Preventive | |
Configure the "Maximum lifetime for user ticket renewal" to organizational standards. CC ID 08257 | System hardening through configuration management | Preventive | |
Configure the "System objects: Default owner for objects created by members of the Administrators group" to organizational standards. CC ID 08269 | System hardening through configuration management | Preventive | |
Configure the "Enforce user logon restrictions" to organizational standards. CC ID 08274 | System hardening through configuration management | Preventive | |
Configure the "Require a Password When a Computer Wakes (Plugged In)" to organizational standards. CC ID 08404 | System hardening through configuration management | Preventive | |
Configure the "Configure login authentication for POP3" to organizational standards. CC ID 08413 | System hardening through configuration management | Preventive | |
Configure the "Turn on PIN sign-in" to organizational standards. CC ID 08415 | System hardening through configuration management | Preventive | |
Configure the "Interactive logon: Machine account lockout threshold" to organizational standards. CC ID 08419 | System hardening through configuration management | Preventive | |
Configure the "Allow the use of biometrics" to organizational standards. CC ID 08435 | System hardening through configuration management | Preventive | |
Configure the "Configure login authentication for IMAP4" to organizational standards. CC ID 08443 | System hardening through configuration management | Preventive | |
Configure the "Allow simple passwords" to organizational standards. CC ID 08476 | System hardening through configuration management | Preventive | |
Configure the "Require a Password When a Computer Wakes (On Battery)" to organizational standards. CC ID 08487 | System hardening through configuration management | Preventive | |
Configure the "Require password" to organizational standards. CC ID 08511 | System hardening through configuration management | Preventive | |
Configure the "Time without user input before password must be re-entered" to organizational standards. CC ID 08518 | System hardening through configuration management | Preventive | |
Configure the "Allow basic authentication" to organizational standards. CC ID 08522 | System hardening through configuration management | Preventive | |
Configure the "External send connector authentication: Domain Security" to organizational standards. CC ID 08527 | System hardening through configuration management | Preventive | |
Configure the "External send connector authentication: Ignore Start TLS" to organizational standards. CC ID 08530 | System hardening through configuration management | Preventive | |
Configure the "Turn on Basic feed authentication over HTTP" to organizational standards. CC ID 08548 | System hardening through configuration management | Preventive | |
Configure the "Number of attempts allowed" to organizational standards. CC ID 08569 | System hardening through configuration management | Preventive | |
Configure the "Password Expiration" to organizational standards. CC ID 08576 | System hardening through configuration management | Preventive | |
Configure the "External send connector authentication: DNS Routing" to organizational standards. CC ID 08579 | System hardening through configuration management | Preventive | |
Configure the "Require alphanumeric password" to organizational standards. CC ID 08582 | System hardening through configuration management | Preventive | |
Configure the "Allow access to voicemail without requiring a PIN" to organizational standards. CC ID 08585 | System hardening through configuration management | Preventive | |
Configure the "Require Client Certificates" to organizational standards. CC ID 08597 | System hardening through configuration management | Preventive | |
Configure the "Disallow Digest authentication" to organizational standards. CC ID 08602 | System hardening through configuration management | Preventive | |
Configure the "Accounts: Block Microsoft accounts" to organizational standards. CC ID 08613 | System hardening through configuration management | Preventive | |
Configure Encryption settings in accordance with organizational standards. CC ID 07625 | System hardening through configuration management | Preventive | |
Configure "Elastic Block Store volume encryption" to organizational standards. CC ID 15434 | System hardening through configuration management | Preventive | |
Configure "Encryption Oracle Remediation" to organizational standards. CC ID 15366 | System hardening through configuration management | Preventive | |
Configure the "encryption provider" to organizational standards. CC ID 14591 | System hardening through configuration management | Preventive | |
Configure the "Microsoft network server: Digitally sign communications (always)" to organizational standards. CC ID 07626 | System hardening through configuration management | Preventive | |
Configure the "Domain member: Digitally encrypt or sign secure channel data (always)" to organizational standards. CC ID 07657 | System hardening through configuration management | Preventive | |
Configure the "Domain member: Digitally sign secure channel data (when possible)" to organizational standards. CC ID 07678 | System hardening through configuration management | Preventive | |
Configure the "Network Security: Configure encryption types allowed for Kerberos" to organizational standards. CC ID 07799 | System hardening through configuration management | Preventive | |
Configure the "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to organizational standards. CC ID 07822 | System hardening through configuration management | Preventive | |
Configure the "Configure use of smart cards on fixed data drives" to organizational standards. CC ID 08361 | System hardening through configuration management | Preventive | |
Configure the "Enforce drive encryption type on removable data drives" to organizational standards. CC ID 08363 | System hardening through configuration management | Preventive | |
Configure the "Configure TPM platform validation profile for BIOS-based firmware configurations" to organizational standards. CC ID 08370 | System hardening through configuration management | Preventive | |
Configure the "Configure use of passwords for removable data drives" to organizational standards. CC ID 08394 | System hardening through configuration management | Preventive | |
Configure the "Configure use of hardware-based encryption for removable data drives" to organizational standards. CC ID 08401 | System hardening through configuration management | Preventive | |
Configure the "Require additional authentication at startup" to organizational standards. CC ID 08422 | System hardening through configuration management | Preventive | |
Configure the "Deny write access to fixed drives not protected by BitLocker" to organizational standards. CC ID 08429 | System hardening through configuration management | Preventive | |
Configure the "Configure startup mode" to organizational standards. CC ID 08430 | System hardening through configuration management | Preventive | |
Configure the "Require client MAPI encryption" to organizational standards. CC ID 08446 | System hardening through configuration management | Preventive | |
Configure the "Configure dial plan security" to organizational standards. CC ID 08453 | System hardening through configuration management | Preventive | |
Configure the "Allow access to BitLocker-protected removable data drives from earlier versions of Windows" to organizational standards. CC ID 08457 | System hardening through configuration management | Preventive | |
Configure the "Enforce drive encryption type on fixed data drives" to organizational standards. CC ID 08460 | System hardening through configuration management | Preventive | |
Configure the "Allow Secure Boot for integrity validation" to organizational standards. CC ID 08461 | System hardening through configuration management | Preventive | |
Configure the "Configure use of passwords for operating system drives" to organizational standards. CC ID 08478 | System hardening through configuration management | Preventive | |
Configure the "Choose how BitLocker-protected removable drives can be recovered" to organizational standards. CC ID 08484 | System hardening through configuration management | Preventive | |
Configure the "Validate smart card certificate usage rule compliance" to organizational standards. CC ID 08492 | System hardening through configuration management | Preventive | |
Configure the "Allow enhanced PINs for startup" to organizational standards. CC ID 08495 | System hardening through configuration management | Preventive | |
Configure the "Choose how BitLocker-protected operating system drives can be recovered" to organizational standards. CC ID 08499 | System hardening through configuration management | Preventive | |
Configure the "Allow access to BitLocker-protected fixed data drives from earlier versions of Windows" to organizational standards. CC ID 08505 | System hardening through configuration management | Preventive | |
Configure the "Choose how BitLocker-protected fixed drives can be recovered" to organizational standards. CC ID 08509 | System hardening through configuration management | Preventive | |
Configure the "Configure use of passwords for fixed data drives" to organizational standards. CC ID 08513 | System hardening through configuration management | Preventive | |
Configure the "Choose drive encryption method and cipher strength" to organizational standards. CC ID 08537 | System hardening through configuration management | Preventive | |
Configure the "Choose default folder for recovery password" to organizational standards. CC ID 08541 | System hardening through configuration management | Preventive | |
Configure the "Prevent memory overwrite on restart" to organizational standards. CC ID 08542 | System hardening through configuration management | Preventive | |
Configure the "Deny write access to removable drives not protected by BitLocker" to organizational standards. CC ID 08549 | System hardening through configuration management | Preventive | |
Configure the "opt encrypted" flag to organizational standards. CC ID 14534 | System hardening through configuration management | Preventive | |
Configure the "Provide the unique identifiers for your organization" to organizational standards. CC ID 08552 | System hardening through configuration management | Preventive | |
Configure the "Enable use of BitLocker authentication requiring preboot keyboard input on slates" to organizational standards. CC ID 08556 | System hardening through configuration management | Preventive | |
Configure the "Require encryption on device" to organizational standards. CC ID 08563 | System hardening through configuration management | Preventive | |
Configure the "Enable S/MIME for OWA 2007" to organizational standards. CC ID 08564 | System hardening through configuration management | Preventive | |
Configure the "Control use of BitLocker on removable drives" to organizational standards. CC ID 08566 | System hardening through configuration management | Preventive | |
Configure the "Configure use of hardware-based encryption for fixed data drives" to organizational standards. CC ID 08568 | System hardening through configuration management | Preventive | |
Configure the "Configure use of smart cards on removable data drives" to organizational standards. CC ID 08570 | System hardening through configuration management | Preventive | |
Configure the "Enforce drive encryption type on operating system drives" to organizational standards. CC ID 08573 | System hardening through configuration management | Preventive | |
Configure the "Disallow standard users from changing the PIN or password" to organizational standards. CC ID 08574 | System hardening through configuration management | Preventive | |
Configure the "Use enhanced Boot Configuration Data validation profile" to organizational standards. CC ID 08578 | System hardening through configuration management | Preventive | |
Configure the "Allow network unlock at startup" to organizational standards. CC ID 08588 | System hardening through configuration management | Preventive | |
Configure the "Enable S/MIME for OWA 2010" to organizational standards. CC ID 08592 | System hardening through configuration management | Preventive | |
Configure the "Configure minimum PIN length for startup" to organizational standards. CC ID 08594 | System hardening through configuration management | Preventive | |
Configure the "Configure TPM platform validation profile" to organizational standards. CC ID 08598 | System hardening through configuration management | Preventive | |
Configure the "Configure use of hardware-based encryption for operating system drives" to organizational standards. CC ID 08601 | System hardening through configuration management | Preventive | |
Configure the "Reset platform validation data after BitLocker recovery" to organizational standards. CC ID 08607 | System hardening through configuration management | Preventive | |
Configure the "Configure TPM platform validation profile for native UEFI firmware configurations" to organizational standards. CC ID 08614 | System hardening through configuration management | Preventive | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives" setting to organizational standards. CC ID 10039 | System hardening through configuration management | Preventive | |
Configure the "Save BitLocker recovery information to AD DS for fixed data drives" setting to organizational standards. CC ID 10040 | System hardening through configuration management | Preventive | |
Configure the "Omit recovery options from the BitLocker setup wizard" setting to organizational standards. CC ID 10041 | System hardening through configuration management | Preventive | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for operating system drives" setting to organizational standards. CC ID 10042 | System hardening through configuration management | Preventive | |
Configure the "Save BitLocker recovery information to AD DS for operating system drives" setting to organizational standards. CC ID 10043 | System hardening through configuration management | Preventive | |
Configure the "Allow BitLocker without a compatible TPM" setting to organizational standards. CC ID 10044 | System hardening through configuration management | Preventive | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for removable data drives" setting to organizational standards. CC ID 10045 | System hardening through configuration management | Preventive | |
Configure the "Save BitLocker recovery information to AD DS for removable data drives" setting to organizational standards. CC ID 10046 | System hardening through configuration management | Preventive | |
Configure File Retention, Impact Level, and Classification Settings settings in accordance with organizational standards. CC ID 07715 | System hardening through configuration management | Preventive | |
Configure the "Classification of files based on Discoverability" to organizational standards. CC ID 07716 | System hardening through configuration management | Preventive | |
Configure the "Classification of files based on Intellectual Property" to organizational standards. CC ID 07765 | System hardening through configuration management | Preventive | |
Configure the "Classification of files based on Confidentiality" to organizational standards. CC ID 07782 | System hardening through configuration management | Preventive | |
Configure the "Classification of files based on PHI" to organizational standards. CC ID 07785 | System hardening through configuration management | Preventive | |
Configure the "Classification of files based on Impact Level" to organizational standards. CC ID 07789 | System hardening through configuration management | Preventive | |
Configure the "Classification of files based on Retention" to organizational standards. CC ID 07860 | System hardening through configuration management | Preventive | |
Configure the "Classification of files based on PII" to organizational standards. CC ID 07865 | System hardening through configuration management | Preventive | |
Configure System settings in accordance with organizational standards. CC ID 07806 | System hardening through configuration management | Preventive | |
Configure the "System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)" to organizational standards CC ID 07807 | System hardening through configuration management | Preventive | |
Configure the "Accounts: Rename guest account" to organizational standards. CC ID 07816 | System hardening through configuration management | Preventive | |
Configure the "Accounts: Rename administrator account" to organizational standards. CC ID 07843 | System hardening through configuration management | Preventive | |
Configure the "Accounts: Guest account status" to organizational standards. CC ID 07971 | System hardening through configuration management | Preventive | |
Configure the "Accounts: Administrator account status" to organizational standards. CC ID 07996 | System hardening through configuration management | Preventive | |
Configure the "Prompt for password on resume from hibernate / suspend" to organizational standards. CC ID 08342 | System hardening through configuration management | Preventive | |
Configure Virus and Malware Protection settings in accordance with organizational standards. CC ID 07906 | System hardening through configuration management | Preventive | |
Configure "Turn on behavior monitoring" to organizational standards. CC ID 15407 | System hardening through configuration management | Preventive | |
Configure "Turn off real-time protection" to organizational standards. CC ID 15406 | System hardening through configuration management | Preventive | |
Configure "Scan all downloaded files and attachments" to organizational standards. CC ID 15404 | System hardening through configuration management | Preventive | |
Configure "Scan removable drives" to organizational standards. CC ID 15401 | System hardening through configuration management | Preventive | |
Configure "Configure Attack Surface Reduction rules: Set the state for each ASR rule" to organizational standards. CC ID 15392 | System hardening through configuration management | Preventive | |
Configure "Join Microsoft MAPS" to organizational standards. CC ID 15384 | System hardening through configuration management | Preventive | |
Configure "Configure detection for potentially unwanted applications" to organizational standards. CC ID 15375 | System hardening through configuration management | Preventive | |
Configure "Turn off Microsoft Defender AntiVirus" to organizational standards. CC ID 15371 | System hardening through configuration management | Preventive | |
Configure "Enable file hash computation feature" to organizational standards. CC ID 15340 | System hardening through configuration management | Preventive | |
Configure the "Internet Explorer Processes" to organizational standards. CC ID 07907 | System hardening through configuration management | Preventive | |
Configure the "Turn on the auto-complete feature for user names and passwords on forms" to organizational standards. CC ID 07941 | System hardening through configuration management | Preventive | |
Configure the "Automatic prompting for file downloads" to organizational standards. CC ID 07950 | System hardening through configuration management | Preventive | |
Configure the "Use SmartScreen Filter" to organizational standards. CC ID 07952 | System hardening through configuration management | Preventive | |
Configure the "Run ActiveX controls and plugins" to organizational standards. CC ID 07954 | System hardening through configuration management | Preventive | |
Configure the "Java permissions" to organizational standards. CC ID 07969 | System hardening through configuration management | Preventive | |
Configure the "Use Pop-up Blocker" to organizational standards. CC ID 07990 | System hardening through configuration management | Preventive | |
Configure the "Prevent Bypassing SmartScreen Filter Warnings" to organizational standards. CC ID 07994 | System hardening through configuration management | Preventive | |
Configure the "Allow cut, copy or paste operations from the clipboard via script" to organizational standards. CC ID 07997 | System hardening through configuration management | Preventive | |
Configure the "Allow software to run or install even if the signature is invalid" to organizational standards. CC ID 08019 | System hardening through configuration management | Preventive | |
Configure the "Do not allow users to enable or disable add-ons" to organizational standards. CC ID 08035 | System hardening through configuration management | Preventive | |
Configure the "Disable AutoComplete for forms" to organizational standards. CC ID 08066 | System hardening through configuration management | Preventive | |
Configure the "Download unsigned ActiveX controls" to organizational standards. CC ID 08073 | System hardening through configuration management | Preventive | |
Configure the "Scripting of Java applets" to organizational standards. CC ID 08105 | System hardening through configuration management | Preventive | |
Configure the "Allow only approved domains to use ActiveX controls without prompt" to organizational standards. CC ID 08374 | System hardening through configuration management | Preventive | |
Configure the "Prevent per-user installation of ActiveX controls" to organizational standards. CC ID 08382 | System hardening through configuration management | Preventive | |
Configure the "Turn on Cross-Site Scripting Filter" to organizational standards. CC ID 08395 | System hardening through configuration management | Preventive | |
Configure the "Turn on certificate address mismatch warning" to organizational standards. CC ID 08410 | System hardening through configuration management | Preventive | |
Configure the "Show security warning for potentially unsafe files" to organizational standards. CC ID 08412 | System hardening through configuration management | Preventive | |
Configure the "Turn on Protected Mode" to organizational standards. CC ID 08471 | System hardening through configuration management | Preventive | |
Configure the "Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled" to organizational standards. CC ID 08510 | System hardening through configuration management | Preventive | |
Configure the "Check for signatures on downloaded programs" to organizational standards. CC ID 08584 | System hardening through configuration management | Preventive | |
Configure the "Specify use of ActiveX Installer Service for installation of ActiveX controls" to organizational standards. CC ID 08587 | System hardening through configuration management | Preventive | |
Configure the "Prevent changing the URL for checking updates to Internet Explorer and Internet Tools" to organizational standards. CC ID 08589 | System hardening through configuration management | Preventive | |
Configure the "Enable MIME Sniffing" to organizational standards. CC ID 08591 | System hardening through configuration management | Preventive | |
Configure "Prevent downloading of enclosures" to organizational standards. CC ID 08612 | System hardening through configuration management | Preventive | |
Configure User Notification settings in accordance with organizational standards. CC ID 08201 | System hardening through configuration management | Preventive | |
Configure the "Display Error Notification" to organizational standards. CC ID 08280 | System hardening through configuration management | Preventive | |
Configure the "Customize Warning Messages" to organizational standards. CC ID 08599 | System hardening through configuration management | Preventive | |
Configure Windows Components settings in accordance with organizational standards. CC ID 08263 | System hardening through configuration management | Preventive | |
Configure the "Notify antivirus programs when opening attachments" to organizational standards. CC ID 08264 | System hardening through configuration management | Preventive | |
Configure the "Do not preserve zone information in file attachments" to organizational standards. CC ID 08309 | System hardening through configuration management | Preventive | |
Configure the "Remove CD Burning features" to organizational standards. CC ID 08324 | System hardening through configuration management | Preventive | |
Configure the "Remove Security tab" to organizational standards. CC ID 08328 | System hardening through configuration management | Preventive | |
Configure the "Hide mechanisms to remove zone information" to organizational standards. CC ID 08338 | System hardening through configuration management | Preventive | |
Configure the "Prevent Codec Download" to organizational standards. CC ID 08554 | System hardening through configuration management | Preventive | |
Configure File System settings in accordance with organizational standards. CC ID 08294 | System hardening through configuration management | Preventive | |
Configure Control Panel settings in accordance with organizational standards. CC ID 08311 | System hardening through configuration management | Preventive | |
Configure the "Screen saver timeout" to organizational standards. CC ID 08312 | System hardening through configuration management | Preventive | |
Configure the "Enable screen saver" to organizational standards. CC ID 08322 | System hardening through configuration management | Preventive | |
Configure the "Force specific screen saver" to organizational standards. CC ID 08334 | System hardening through configuration management | Preventive | |
Configure the "Password protect the screen saver" to organizational standards. CC ID 08341 | System hardening through configuration management | Preventive | |
Configure the "Prevent changing screen saver" to organizational standards. CC ID 08560 | System hardening through configuration management | Preventive | |
Configure Capacity and Performance Management settings in accordance with organizational standards. CC ID 08353 | System hardening through configuration management | Preventive | |
Configure the "Maximum receive size - organization level" to organizational standards. CC ID 08354 | System hardening through configuration management | Preventive | |
Configure the "Maximum send size - connector level" to organizational standards. CC ID 08399 | System hardening through configuration management | Preventive | |
Configure the "Maximum number of recipients - organization level" to organizational standards. CC ID 08431 | System hardening through configuration management | Preventive | |
Configure the "Enable Sender ID agent" to organizational standards. CC ID 08450 | System hardening through configuration management | Preventive | |
Configure the "Maximum receive size - connector level" to organizational standards. CC ID 08480 | System hardening through configuration management | Preventive | |
Configure the "Maximum send size - organization level" to organizational standards. CC ID 08483 | System hardening through configuration management | Preventive | |
Configure the "Mount database at startup" to organizational standards. CC ID 08493 | System hardening through configuration management | Preventive | |
Configure the "Enable Sender reputation" to organizational standards. CC ID 08503 | System hardening through configuration management | Preventive | |
Configure the "Mailbox quotas: Issue warning at" to organizational standards. CC ID 08508 | System hardening through configuration management | Preventive | |
Configure the "Mailbox quotas: Prohibit send and receive at" to organizational standards. CC ID 08532 | System hardening through configuration management | Preventive | |
Configure the "Mailbox quotas: Prohibit send at" to organizational standards. CC ID 08610 | System hardening through configuration management | Preventive | |
Configure Personal Information Handling settings in accordance with organizational standards. CC ID 08396 | System hardening through configuration management | Preventive | |
Configure the "Enable OOF messages to remote domains" to organizational standards. CC ID 08397 | System hardening through configuration management | Preventive | |
Configure the "Enable automatic forwards to remote domains" to organizational standards. CC ID 08462 | System hardening through configuration management | Preventive | |
Configure the "Enable non-delivery reports to remote domains" to organizational standards. CC ID 08506 | System hardening through configuration management | Preventive | |
Configure Data Backup and Recovery settings in accordance with organizational standards. CC ID 08406 | System hardening through configuration management | Preventive | |
Configure the "Retain deleted items for the specified number of days" to organizational standards. CC ID 08407 | System hardening through configuration management | Preventive | |
Configure the "Do not permanently delete items until the database has been backed up" to organizational standards. CC ID 08490 | System hardening through configuration management | Preventive | |
Configure the "Keep deleted mailboxes for the specified number of days" to organizational standards. CC ID 08600 | System hardening through configuration management | Preventive | |
Configure Nonrepudiation Configuration settings in accordance with organizational standards. CC ID 08432 | System hardening through configuration management | Preventive | |
Configure the "Configure Sender Filtering" to organizational standards. CC ID 08433 | System hardening through configuration management | Preventive | |
Configure the "Turn on Administrator Audit Logging" to organizational standards. CC ID 08528 | System hardening through configuration management | Preventive | |
Configure Device Installation settings in accordance with organizational standards. CC ID 08438 | System hardening through configuration management | Preventive | |
Configure the "Prevent installation of devices using drivers that match these device setup classes" to organizational standards. CC ID 08439 | System hardening through configuration management | Preventive | |
Configure the "device installation time-out" setting to organizational standards. CC ID 10781 | System hardening through configuration management | Preventive | |
Configure the "list of Enhanced Storage devices usable on your computer" setting to organizational standards. CC ID 10791 | System hardening through configuration management | Preventive | |
Configure the "Display a custom message title when device installation is prevented by a policy setting" setting to organizational standards. CC ID 10885 | System hardening through configuration management | Preventive | |
Configure the "Do not send a Windows error report when a generic driver is installed on a device" setting to organizational standards. CC ID 10933 | System hardening through configuration management | Preventive | |
Configure the "Prevent creation of a system restore point during device activity that would normally prompt creation of a restore point" setting to organizational standards. CC ID 11072 | System hardening through configuration management | Preventive | |
Configure the "Prevent device metadata retrieval from the Internet" setting to organizational standards. CC ID 11073 | System hardening through configuration management | Preventive | |
Configure the "Prevent installation of devices not described by other policy settings" setting to organizational standards. CC ID 11078 | System hardening through configuration management | Preventive | |
Configure the "Prevent installation of devices that match any of these device IDs" setting to organizational standards. CC ID 11079 | System hardening through configuration management | Preventive | |
Configure the "Prevent installation of removable devices" setting to organizational standards. CC ID 11080 | System hardening through configuration management | Preventive | |
Configure the "Prevent Windows from sending an error report when a device driver requests additional software during installation" setting to organizational standards. CC ID 11093 | System hardening through configuration management | Preventive | |
Configure the "Require a PIN to access data on devices running Microsoft firmware" setting to organizational standards. CC ID 11132 | System hardening through configuration management | Preventive | |
Configure the "Specify search order for device driver source locations" setting to organizational standards. CC ID 11214 | System hardening through configuration management | Preventive | |
Configure the "Turn off "Found New Hardware" balloons during device installation" setting to organizational standards. CC ID 11253 | System hardening through configuration management | Preventive | |
Configure the "Turn off Autoplay for non-volume devices" setting to organizational standards. CC ID 11268 | System hardening through configuration management | Preventive | |
Configure the "Turn off Windows Update device driver search prompt" setting to organizational standards. CC ID 11332 | System hardening through configuration management | Preventive | |
Configure Security settings in accordance with organizational standards. CC ID 08469 | System hardening through configuration management | Preventive | |
Configure the "Enable automatic replies to remote domains" to organizational standards. CC ID 08534 | System hardening through configuration management | Preventive | |
Configure Power Management settings in accordance with organizational standards. CC ID 08515 | System hardening through configuration management | Preventive | |
Configure the "Allow Standby States (S1-S3) When Sleeping (Plugged In)" to organizational standards. CC ID 08516 | System hardening through configuration management | Preventive | |
Configure the "Allow Standby States (S1-S3) When Sleeping (On Battery)" to organizational standards. CC ID 08581 | System hardening through configuration management | Preventive | |
Configure the "Allow Applications to Prevent Automatic Sleep (Plugged In)" setting to organizational standards. CC ID 10703 | System hardening through configuration management | Preventive | |
Configure the "Allow Automatic Sleep with Open Network Files (Plugged In)" setting to organizational standards. CC ID 10709 | System hardening through configuration management | Preventive | |
Configure the "Allow remote access to the Plug and Play interface" setting to organizational standards. CC ID 10742 | System hardening through configuration management | Preventive | |
Configure the "Power Options preference logging and tracing" setting to organizational standards. CC ID 10798 | System hardening through configuration management | Preventive | |
Configure the "Critical Battery Notification Action" setting to organizational standards. CC ID 10833 | System hardening through configuration management | Preventive | |
Configure the "Critical Battery Notification Level" setting to organizational standards. CC ID 10834 | System hardening through configuration management | Preventive | |
Configure the "Do not allow supported Plug and Play device redirection" setting to organizational standards. CC ID 10917 | System hardening through configuration management | Preventive | |
Configure the "Do not turn off system power after a Windows system shutdown has occurred." setting to organizational standards. CC ID 10937 | System hardening through configuration management | Preventive | |
Configure the "Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates" setting to organizational standards. CC ID 10954 | System hardening through configuration management | Preventive | |
Configure the "Low Battery Notification Action" setting to organizational standards. CC ID 11037 | System hardening through configuration management | Preventive | |
Configure the "Low Battery Notification Level" setting to organizational standards. CC ID 11038 | System hardening through configuration management | Preventive | |
Configure the "Reduce Display Brightness (On Battery)" setting to organizational standards. CC ID 11117 | System hardening through configuration management | Preventive | |
Configure the "Reduce Display Brightness (Plugged In)" setting to organizational standards. CC ID 11118 | System hardening through configuration management | Preventive | |
Configure the "Reserve Battery Notification Level" setting to organizational standards. CC ID 11139 | System hardening through configuration management | Preventive | |
Configure Powershell to organizational standards. CC ID 15233 | System hardening through configuration management | Preventive | |
Configure the "Run Windows PowerShell scripts first at computer startup, shutdown" setting to organizational standards. CC ID 11156 | System hardening through configuration management | Preventive | |
Configure the "Run Windows PowerShell scripts first at user logon, logoff" setting to organizational standards. CC ID 11157 | System hardening through configuration management | Preventive | |
Configure the "Select an Active Power Plan" setting to organizational standards. CC ID 11161 | System hardening through configuration management | Preventive | |
Configure the "Select the Lid Switch Action (On Battery)" setting to organizational standards. CC ID 11162 | System hardening through configuration management | Preventive | |
Configure the "Select the Lid Switch Action (Plugged In)" setting to organizational standards. CC ID 11163 | System hardening through configuration management | Preventive | |
Configure the "Select the Power Button Action (On Battery)" setting to organizational standards. CC ID 11165 | System hardening through configuration management | Preventive | |
Configure the "Select the Power Button Action (Plugged In)" setting to organizational standards. CC ID 11166 | System hardening through configuration management | Preventive | |
Configure the "Select the Sleep Button Action (On Battery)" setting to organizational standards. CC ID 11167 | System hardening through configuration management | Preventive | |
Configure the "Select the Sleep Button Action (Plugged In)" setting to organizational standards. CC ID 11168 | System hardening through configuration management | Preventive | |
Configure the "Specify a Custom Active Power Plan" setting to organizational standards. CC ID 11207 | System hardening through configuration management | Preventive | |
Configure the "Specify the Display Dim Brightness (On Battery)" setting to organizational standards. CC ID 11217 | System hardening through configuration management | Preventive | |
Configure the "Specify the Display Dim Brightness (Plugged In)" setting to organizational standards. CC ID 11218 | System hardening through configuration management | Preventive | |
Configure the "Specify the System Hibernate Timeout (On Battery)" setting to organizational standards. CC ID 11219 | System hardening through configuration management | Preventive | |
Configure the "Specify the System Hibernate Timeout (Plugged In)" setting to organizational standards. CC ID 11220 | System hardening through configuration management | Preventive | |
Configure the "Specify the System Sleep Timeout (On Battery)" setting to organizational standards. CC ID 11221 | System hardening through configuration management | Preventive | |
Configure the "Specify the System Sleep Timeout (Plugged In)" setting to organizational standards. CC ID 11222 | System hardening through configuration management | Preventive | |
Configure the "Specify the Unattended Sleep Timeout (On Battery)" setting to organizational standards. CC ID 11223 | System hardening through configuration management | Preventive | |
Configure the "Specify the Unattended Sleep Timeout (Plugged In)" setting to organizational standards. CC ID 11224 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Adaptive Display Timeout (On Battery)" setting to organizational standards. CC ID 11259 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Adaptive Display Timeout (Plugged In)" setting to organizational standards. CC ID 11260 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Cache Power Mode" setting to organizational standards. CC ID 11270 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Hybrid Sleep (On Battery)" setting to organizational standards. CC ID 11281 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Hybrid Sleep (Plugged In)" setting to organizational standards. CC ID 11282 | System hardening through configuration management | Preventive | |
Configure the "Turn Off Low Battery User Notification" setting to organizational standards. CC ID 11288 | System hardening through configuration management | Preventive | |
Configure the "Turn Off the Hard Disk (On Battery)" setting to organizational standards. CC ID 11318 | System hardening through configuration management | Preventive | |
Configure the "Turn Off the Hard Disk (Plugged In)" setting to organizational standards. CC ID 11319 | System hardening through configuration management | Preventive | |
Configure the "Turn On Desktop Background Slideshow (On Battery)" setting to organizational standards. CC ID 11340 | System hardening through configuration management | Preventive | |
Configure the "Turn On Desktop Background Slideshow (Plugged In)" setting to organizational standards. CC ID 11341 | System hardening through configuration management | Preventive | |
Configure the "Turn on the Ability for Applications to Prevent Sleep Transitions (On Battery)" setting to organizational standards. CC ID 11353 | System hardening through configuration management | Preventive | |
Configure the "Turn on the Ability for Applications to Prevent Sleep Transitions (Plugged In)" setting to organizational standards. CC ID 11354 | System hardening through configuration management | Preventive | |
Configure Patch Management settings in accordance with organizational standards. CC ID 08519 | System hardening through configuration management | Preventive | |
Configure "Select when Preview Builds and Feature Updates are received" to organizational standards. CC ID 15399 | System hardening through configuration management | Preventive | |
Configure "Select when Quality Updates are received" to organizational standards. CC ID 15355 | System hardening through configuration management | Preventive | |
Configure the "Check for missing Windows Updates" to organizational standards. CC ID 08520 | System hardening through configuration management | Preventive | |
Configure Start Menu and Task Bar settings in accordance with organizational standards. CC ID 08615 | System hardening through configuration management | Preventive | |
Configure the "Turn off toast notifications on the lock screen" to organizational standards. CC ID 08616 | System hardening through configuration management | Preventive | |
Configure "Turn off notifications network usage" to organizational standards. CC ID 15337 | System hardening through configuration management | Preventive | |
Configure the proxy server to organizational standards. CC ID 12115 | System hardening through configuration management | Preventive | |
Configure the proxy server to log Transmission Control Protocol sessions. CC ID 12123 | System hardening through configuration management | Preventive | |
Configure the "duplicate UIDs" setting to organizational standards. CC ID 09930 | System hardening through configuration management | Preventive | |
Configure the "duplicate GIDs" setting to organizational standards. CC ID 09931 | System hardening through configuration management | Preventive | |
Configure the "duplicate group names" setting to organizational standards. CC ID 09932 | System hardening through configuration management | Preventive | |
Configure the "Connection to the Red Hat Network RPM Repositories" setting to organizational standards. CC ID 09933 | System hardening through configuration management | Preventive | |
Configure the "Obtain Software Package Updates with yum" setting to organizational standards. CC ID 09934 | System hardening through configuration management | Preventive | |
Configure the "Check for Unconfined Daemons" setting to organizational standards. CC ID 09936 | System hardening through configuration management | Preventive | |
Configure the "/etc/hosts.allow" file to organizational standards. CC ID 09944 | System hardening through configuration management | Preventive | |
Configure the "disable system when on audit log is full" setting to organizational standards. CC ID 09945 | System hardening through configuration management | Preventive | |
Configure the "max_log_file" setting to organizational standards. CC ID 15323 | System hardening through configuration management | Preventive | |
Configure the "max_log_file_action" setting to organizational standards. CC ID 09946 | System hardening through configuration management | Preventive | |
Configure the "audit processes that start prior to auditd" setting to organizational standards. CC ID 09947 | System hardening through configuration management | Preventive | |
Configure the "Password Creation Requirement" settings for "pam_cracklib" to organizational standards. CC ID 09953 | System hardening through configuration management | Preventive | |
Configure the "System Accounts" setting to organizational standards. CC ID 09954 | System hardening through configuration management | Preventive | |
Configure the "Verify That Reserved UIDs Are Assigned to System Accounts" setting to organizational standards. CC ID 09955 | System hardening through configuration management | Preventive | |
Configure the "Check for Duplicate User Names" setting to organizational standards. CC ID 09956 | System hardening through configuration management | Preventive | |
Configure the "User .forward" files to organizational standards. CC ID 09957 | System hardening through configuration management | Preventive | |
Configure Polycom HDX to Organizational Standards. CC ID 08986 | System hardening through configuration management | Preventive | |
Configure the "echo cancellation" setting to organizational standards. CC ID 09359 | System hardening through configuration management | Preventive | |
Configure the "keyboard noise reduction" setting to organizational standards. CC ID 09360 | System hardening through configuration management | Preventive | |
Configure the "live music mode" setting to organizational standards. CC ID 09361 | System hardening through configuration management | Preventive | |
Configure the "VCR audio out always on" setting to organizational standards. CC ID 09362 | System hardening through configuration management | Preventive | |
Configure the "user alert tone" setting to organizational standards. CC ID 09363 | System hardening through configuration management | Preventive | |
Configure the "incoming call ring tone" setting to organizational standards. CC ID 09364 | System hardening through configuration management | Preventive | |
Configure the "keypad audio confirmation" setting to organizational standards. CC ID 09365 | System hardening through configuration management | Preventive | |
Configure the "allow Microsoft Exchange calendar integration" setting to organizational standards. CC ID 09366 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange calendar domain" setting to organizational standards. CC ID 09367 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange calendar password" setting to organizational standards. CC ID 09368 | System hardening through configuration management | Preventive | |
Configure the "mailbox to be monitored by Microsoft Exchange calendar service" setting to organizational standards. CC ID 09369 | System hardening through configuration management | Preventive | |
Configure the "Microsoft Exchange calendar server address" setting to organizational standards. CC ID 09370 | System hardening through configuration management | Preventive | |
Configure the "allow Microsoft Exchange calendar service to display private meetings" setting to organizational standards. CC ID 09371 | System hardening through configuration management | Preventive | |
Configure the "number of minutes before the meeting to display a reminder" setting to organizational standards. CC ID 09372 | System hardening through configuration management | Preventive | |
Configure the "play a sound along with the text reminder when the system is not in a call" setting to organizational standards. CC ID 09373 | System hardening through configuration management | Preventive | |
Configure the "backlight compensation" setting to organizational standards. CC ID 09374 | System hardening through configuration management | Preventive | |
Configure the "camera pan direction" setting to organizational standards. CC ID 09375 | System hardening through configuration management | Preventive | |
Configure the "camera presets" setting to organizational standards. CC ID 09376 | System hardening through configuration management | Preventive | |
Configure the "camera video input type" setting to organizational standards. CC ID 09377 | System hardening through configuration management | Preventive | |
Configure the "camera input aspect ratio" setting to organizational standards. CC ID 09378 | System hardening through configuration management | Preventive | |
Configure the "camera input name" setting to organizational standards. CC ID 09379 | System hardening through configuration management | Preventive | |
Configure the "camera input video quality type" setting to organizational standards. CC ID 09380 | System hardening through configuration management | Preventive | |
Configure the "primary camera" setting to organizational standards. CC ID 09381 | System hardening through configuration management | Preventive | |
Configure the "camera quality preference" setting to organizational standards. CC ID 09382 | System hardening through configuration management | Preventive | |
Configure the "camera power frequency" setting to organizational standards. CC ID 09383 | System hardening through configuration management | Preventive | |
Configure the "allow camera tracking" setting to organizational standards. CC ID 09384 | System hardening through configuration management | Preventive | |
Configure the "foreground source for Polycom people on content" setting to organizational standards. CC ID 09385 | System hardening through configuration management | Preventive | |
Configure the "background source for Polycom people on content" setting to organizational standards. CC ID 09386 | System hardening through configuration management | Preventive | |
Configure the "country name for the system" setting to organizational standards. CC ID 09387 | System hardening through configuration management | Preventive | |
Configure the "language for the system local GUI" setting to organizational standards. CC ID 09388 | System hardening through configuration management | Preventive | |
Configure the "NTP" setting to organizational standards. CC ID 09389 | System hardening through configuration management | Preventive | |
Configure the "primary NTP server" setting to organizational standards. CC ID 09390 | System hardening through configuration management | Preventive | |
Configure the "secondary NTP server" setting to organizational standards. CC ID 09391 | System hardening through configuration management | Preventive | |
Configure the "system day" setting to organizational standards. CC ID 09392 | System hardening through configuration management | Preventive | |
Configure the "system month" setting to organizational standards. CC ID 09393 | System hardening through configuration management | Preventive | |
Configure the "system year" setting to organizational standards. CC ID 09394 | System hardening through configuration management | Preventive | |
Configure the "system hour" setting to organizational standards. CC ID 09395 | System hardening through configuration management | Preventive | |
Configure the "system minutes" setting to organizational standards. CC ID 09396 | System hardening through configuration management | Preventive | |
Configure the "system AM or PM" setting to organizational standards. CC ID 09397 | System hardening through configuration management | Preventive | |
Configure the "system time zone" setting to organizational standards. CC ID 09398 | System hardening through configuration management | Preventive | |
Configure the "automatically adjust for daylight savings time" setting to organizational standards. CC ID 09399 | System hardening through configuration management | Preventive | |
Configure the "time format" setting to organizational standards. CC ID 09401 | System hardening through configuration management | Preventive | |
Configure the "LDAP authentication type" setting to organizational standards. CC ID 09402 | System hardening through configuration management | Preventive | |
Configure the "LDAP SSL encryption state" setting to organizational standards. CC ID 09403 | System hardening through configuration management | Preventive | |
Configure the "LDAP base DN" setting to organizational standards. CC ID 09404 | System hardening through configuration management | Preventive | |
Configure the "LDAP NTLM domain" setting to organizational standards. CC ID 09405 | System hardening through configuration management | Preventive | |
Configure the "LDAP bind DN" setting to organizational standards. CC ID 09406 | System hardening through configuration management | Preventive | |
Configure the "LDAP password" setting to organizational standards. CC ID 09407 | System hardening through configuration management | Preventive | |
Configure the "LDAP server address" setting to organizational standards. CC ID 09408 | System hardening through configuration management | Preventive | |
Configure the "LDAP server port" setting to organizational standards. CC ID 09409 | System hardening through configuration management | Preventive | |
Configure the "LDAP user name" setting to organizational standards. CC ID 09410 | System hardening through configuration management | Preventive | |
Configure the "allow access to a Polycom Global Directory Server" setting to organizational standards. CC ID 09411 | System hardening through configuration management | Preventive | |
Configure the "server address of a Polycom Global Directory Server" setting to organizational standards. CC ID 09412 | System hardening through configuration management | Preventive | |
Configure the "maximum international call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09413 | System hardening through configuration management | Preventive | |
Configure the "maximum internet call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09414 | System hardening through configuration management | Preventive | |
Configure the "maximum ISDN transmit call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09415 | System hardening through configuration management | Preventive | |
Configure the "display the system address in a Polycom Global Directory Server" setting to organizational standards. CC ID 09416 | System hardening through configuration management | Preventive | |
Configure the "retrieval and display of contacts from a Microsoft Lync (Office Communications/OCS) Server" setting to organizational standards. CC ID 09417 | System hardening through configuration management | Preventive | |
Configure the "prompt the user to add a local address book entry for a far site upon call disconnection" setting to organizational standards. CC ID 09418 | System hardening through configuration management | Preventive | |
Configure the "prompt the user before allowing a local address book entry to be deleted" setting to organizational standards. CC ID 09419 | System hardening through configuration management | Preventive | |
Configure the "preview of local address book entries" setting to organizational standards. CC ID 09420 | System hardening through configuration management | Preventive | |
Configure the "content video adjustment" setting to organizational standards. CC ID 09421 | System hardening through configuration management | Preventive | |
Configure the "people video adjustment" setting to organizational standards. CC ID 09422 | System hardening through configuration management | Preventive | |
Configure the "display type" setting to organizational standards. CC ID 09423 | System hardening through configuration management | Preventive | |
Configure the "display aspect ratio" setting to organizational standards. CC ID 09424 | System hardening through configuration management | Preventive | |
Configure the "display resolution" setting to organizational standards. CC ID 09425 | System hardening through configuration management | Preventive | |
Configure the "splash screen on the content monitor" setting to organizational standards. CC ID 09426 | System hardening through configuration management | Preventive | |
Configure the "VCR/DVD record source" setting to organizational standards. CC ID 09427 | System hardening through configuration management | Preventive | |
Configure the "screen saver text" setting to organizational standards. CC ID 09428 | System hardening through configuration management | Preventive | |
Configure the "picture in picture (PIP) placement" setting to organizational standards. CC ID 09429 | System hardening through configuration management | Preventive | |
Configure the "how to display the time in a call" setting to organizational standards. CC ID 09430 | System hardening through configuration management | Preventive | |
Configure the "far site name display time in a call" setting to organizational standards. CC ID 09431 | System hardening through configuration management | Preventive | |
Configure the "allow display of the system name on the home screen" setting to organizational standards. CC ID 09432 | System hardening through configuration management | Preventive | |
Configure the "allow display of the system date time on the home screen" setting to organizational standards. CC ID 09433 | System hardening through configuration management | Preventive | |
Configure the "allow display of the system IPv4 address on the home screen" setting to organizational standards. CC ID 09434 | System hardening through configuration management | Preventive | |
Configure the "allow display of the system H.323 extension (E.164) on the home screen" setting to organizational standards CC ID 09435 | System hardening through configuration management | Preventive | |
Configure the "allow display of the system do not disturb control on the home screen" setting to organizational standards. CC ID 09436 | System hardening through configuration management | Preventive | |
Configure the "allow display of the system SIP address on the home screen" setting to organizational standards. CC ID 09437 | System hardening through configuration management | Preventive | |
Configure the "allow display of the system call quality menu on the home screen" setting to organizational standards. CC ID 09438 | System hardening through configuration management | Preventive | |
Configure the "output upon screen saver activation for monitor 1" setting to organizational standards. CC ID 09439 | System hardening through configuration management | Preventive | |
Configure the "output upon screen saver activation for monitor 2" setting to organizational standards. CC ID 09440 | System hardening through configuration management | Preventive | |
Configure the "QoS type" setting to organizational standards. CC ID 09441 | System hardening through configuration management | Preventive | |
Configure the "value for DiffServ for video" setting to organizational standards. CC ID 09442 | System hardening through configuration management | Preventive | |
Configure the "value for DiffServ for audio" setting to organizational standards. CC ID 09443 | System hardening through configuration management | Preventive | |
Configure the "value for DiffServ for fecc" setting to organizational standards. CC ID 09444 | System hardening through configuration management | Preventive | |
Configure the "value for IP Precedence for video" setting to organizational standards. CC ID 09445 | System hardening through configuration management | Preventive | |
Configure the "value for IP Precedence for audio" setting to organizational standards. CC ID 09446 | System hardening through configuration management | Preventive | |
Configure the "value for IP Precedence for fecc" setting to organizational standards. CC ID 09447 | System hardening through configuration management | Preventive | |
Configure the "SIP transport protocol" setting to organizational standards. CC ID 09448 | System hardening through configuration management | Preventive | |
Configure the "SIP registrar server" setting to organizational standards. CC ID 09449 | System hardening through configuration management | Preventive | |
Configure the "SIP proxy server" setting to organizational standards. CC ID 09450 | System hardening through configuration management | Preventive | |
Configure the "SIP password" setting to organizational standards. CC ID 09451 | System hardening through configuration management | Preventive | |
Configure the "allow EAP/802.1X" setting to organizational standards. CC ID 09452 | System hardening through configuration management | Preventive | |
Configure the "allow 802.1p/Q" setting to organizational standards. CC ID 09453 | System hardening through configuration management | Preventive | |
Configure the "fixed ports" setting to organizational standards. CC ID 09454 | System hardening through configuration management | Preventive | |
Configure the "Transmission Control Protocol ports" setting to organizational standards. CC ID 09455 | System hardening through configuration management | Preventive | |
Configure the "UDP ports" setting to organizational standards. CC ID 09456 | System hardening through configuration management | Preventive | |
Configure the "system hostname" setting to organizational standards. CC ID 09457 | System hardening through configuration management | Preventive | |
Configure the "H.323" setting to organizational standards CC ID 09458 | System hardening through configuration management | Preventive | |
Configure the "allow display of the H.323 extension (E.164) on the local GUI" setting to organizational standards CC ID 09459 | System hardening through configuration management | Preventive | |
Configure the "H.323 extension (E.164)" setting to organizational standards CC ID 09460 | System hardening through configuration management | Preventive | |
Configure the "maximum IP call speed to place calls" setting to organizational standards. CC ID 09461 | System hardening through configuration management | Preventive | |
Configure the "maximum IP call speed to receive calls" setting to organizational standards. CC ID 09462 | System hardening through configuration management | Preventive | |
Configure the "use Polycom PathNavigator" setting to organizational standards. CC ID 09463 | System hardening through configuration management | Preventive | |
Configure the "gatekeeper" setting to organizational standards. CC ID 09464 | System hardening through configuration management | Preventive | |
Configure the "gatekeeper authentication" setting to organizational standards. CC ID 09465 | System hardening through configuration management | Preventive | |
Configure the "gatekeeper authentication user name" setting to organizational standards. CC ID 09466 | System hardening through configuration management | Preventive | |
Configure the "gatekeeper authentication password" setting to organizational standards. CC ID 09467 | System hardening through configuration management | Preventive | |
Configure the "primary gatekeeper address" setting to organizational standards. CC ID 09468 | System hardening through configuration management | Preventive | |
Configure the "IP gateway" setting to organizational standards. CC ID 09469 | System hardening through configuration management | Preventive | |
Configure the "ISDN gateway" setting to organizational standards. CC ID 09470 | System hardening through configuration management | Preventive | |
Configure the "gateway country code" setting to organizational standards. CC ID 09471 | System hardening through configuration management | Preventive | |
Configure the "gateway area code" setting to organizational standards. CC ID 09472 | System hardening through configuration management | Preventive | |
Configure the "gateway number" setting to organizational standards. CC ID 09473 | System hardening through configuration management | Preventive | |
Configure the "gateway extension number" setting to organizational standards. CC ID 09474 | System hardening through configuration management | Preventive | |
Configure the "gateway dial prefix" setting to organizational standards. CC ID 09475 | System hardening through configuration management | Preventive | |
Configure the "gateway dial suffix" setting to organizational standards. CC ID 09476 | System hardening through configuration management | Preventive | |
Configure the "gateway number type" setting to organizational standards. CC ID 09477 | System hardening through configuration management | Preventive | |
Configure the "number of digits in the DID gateway number (if set to number+extension)" setting to organizational standards. CC ID 09478 | System hardening through configuration management | Preventive | |
Configure the "gateway dial speed" setting to organizational standards. CC ID 09479 | System hardening through configuration management | Preventive | |
Configure the "MTU mode assignment type" setting to organizational standards. CC ID 09480 | System hardening through configuration management | Preventive | |
Configure the "MTU size manually" setting to organizational standards. CC ID 09481 | System hardening through configuration management | Preventive | |
Configure the "Polycom Video Error Concealment (PVEC)" setting to organizational standards. CC ID 09482 | System hardening through configuration management | Preventive | |
Configure the "RSVP" setting to organizational standards. CC ID 09483 | System hardening through configuration management | Preventive | |
Configure the "dynamic bandwidth" setting to organizational standards. CC ID 09484 | System hardening through configuration management | Preventive | |
Configure the "maximum transmit bandwidth" setting to organizational standards. CC ID 09485 | System hardening through configuration management | Preventive | |
Configure the "maximum receive bandwidth" setting to organizational standards. CC ID 09486 | System hardening through configuration management | Preventive | |
Configure the "NAT configuration type" setting to organizational standards. CC ID 09487 | System hardening through configuration management | Preventive | |
Configure the "NAT public WAN address" setting to organizational standards. CC ID 09488 | System hardening through configuration management | Preventive | |
Configure the "NAT to be H.323 compatible" setting to organizational standards CC ID 09489 | System hardening through configuration management | Preventive | |
Configure the "which NAT address to be displayed in the Polycom Global Directory Server" setting to organizational standards. CC ID 09490 | System hardening through configuration management | Preventive | |
Configure the "ISDN interface" setting to organizational standards. CC ID 09491 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI switch type" setting to organizational standards. CC ID 09492 | System hardening through configuration management | Preventive | |
Configure the "all ISDN BRI lines" setting to organizational standards. CC ID 09493 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI line 1" setting to organizational standards. CC ID 09494 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI line 2" setting to organizational standards. CC ID 09495 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI line 3" setting to organizational standards. CC ID 09496 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI line 4" setting to organizational standards. CC ID 09497 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI country code" setting to organizational standards. CC ID 09498 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI area code" setting to organizational standards. CC ID 09499 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI number 1a" setting to organizational standards. CC ID 09500 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI number 1b" setting to organizational standards. CC ID 09501 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI number 2a" setting to organizational standards. CC ID 09502 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI number 2b" setting to organizational standards. CC ID 09503 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI number 3a" setting to organizational standards. CC ID 09504 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI number 3b" setting to organizational standards. CC ID 09505 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI number 4a" setting to organizational standards. CC ID 09506 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI number 4b" setting to organizational standards. CC ID 09507 | System hardening through configuration management | Preventive | |
Configure the "auto BRI setting that allows SPID numbers to be assigned in NI1 or NI2" setting to organizational standards. CC ID 09508 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI SPID number 1a" setting to organizational standards. CC ID 09509 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI SPID number 1b" setting to organizational standards. CC ID 09510 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI SPID number 2a" setting to organizational standards. CC ID 09511 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI SPID number 2b" setting to organizational standards. CC ID 09512 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI SPID number 3a" setting to organizational standards. CC ID 09513 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI SPID number 3b" setting to organizational standards. CC ID 09514 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI SPID number 4a" setting to organizational standards. CC ID 09515 | System hardening through configuration management | Preventive | |
Configure the "ISDN BRI SPID number 4b" setting to organizational standards. CC ID 09516 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI switch type" setting to organizational standards. CC ID 09517 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI call by call value" setting to organizational standards. CC ID 09518 | System hardening through configuration management | Preventive | |
Configure the "each ISDN PRI channels" setting to organizational standards. CC ID 09519 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI T1 CSU mode type" setting to organizational standards. CC ID 09520 | System hardening through configuration management | Preventive | |
Configure the "number of ISDN PRI channels allowed to be dialed in parallel" setting to organizational standards. CC ID 09521 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI international prefix" setting to organizational standards. CC ID 09522 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI T1 line buildout for internal CSUs" setting to organizational standards. CC ID 09523 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI T1 line buildout for external CSUs" setting to organizational standards. CC ID 09524 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI line signal" setting to organizational standards. CC ID 09525 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI numbering plan" setting to organizational standards. CC ID 09526 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI outside line number" setting to organizational standards. CC ID 09527 | System hardening through configuration management | Preventive | |
Configure the "ISDN PRI number" setting to organizational standards. CC ID 09528 | System hardening through configuration management | Preventive | |
Configure the "V.35" setting to organizational standards CC ID 09529 | System hardening through configuration management | Preventive | |
Configure the "V.35 number for port 1" setting to organizational standards CC ID 09530 | System hardening through configuration management | Preventive | |
Configure the "V.35 number for port 2" setting to organizational standards CC ID 09531 | System hardening through configuration management | Preventive | |
Configure the "V.35 prefix" setting to organizational standards CC ID 09532 | System hardening through configuration management | Preventive | |
Configure the "V.35 suffix" setting to organizational standards CC ID 09533 | System hardening through configuration management | Preventive | |
Configure the "V.35 CTS" setting to organizational standards CC ID 09534 | System hardening through configuration management | Preventive | |
Configure the "V.35 DCD filter" setting to organizational standards CC ID 09535 | System hardening through configuration management | Preventive | |
Configure the "V.35 DCD" setting to organizational standards CC ID 09536 | System hardening through configuration management | Preventive | |
Configure the "V.35 DSR answer" setting to organizational standards CC ID 09537 | System hardening through configuration management | Preventive | |
Configure the "V.35 DSR" setting to organizational standards CC ID 09538 | System hardening through configuration management | Preventive | |
Configure the "V.35 DTR" setting to organizational standards CC ID 09539 | System hardening through configuration management | Preventive | |
Configure the "V.35 RT" setting to organizational standards CC ID 09540 | System hardening through configuration management | Preventive | |
Configure the "V.35 RTS" setting to organizational standards CC ID 09541 | System hardening through configuration management | Preventive | |
Configure the "V.35 ST" setting to organizational standards CC ID 09542 | System hardening through configuration management | Preventive | |
Configure the "V.35 broadcast mode" setting to organizational standards CC ID 09543 | System hardening through configuration management | Preventive | |
Configure the "RS-366 dialing" setting to organizational standards. CC ID 09544 | System hardening through configuration management | Preventive | |
Configure the "V.35 protocol used " setting to organizational standards CC ID 09545 | System hardening through configuration management | Preventive | |
Configure the "V.35 profile used " setting to organizational standards CC ID 09546 | System hardening through configuration management | Preventive | |
Configure the "V.35 H.331 audio mode" setting to organizational standards CC ID 09547 | System hardening through configuration management | Preventive | |
Configure the "V.35 H.331 dual stream" setting to organizational standards CC ID 09548 | System hardening through configuration management | Preventive | |
Configure the "V.35 H.331 frame rate" setting to organizational standards CC ID 09549 | System hardening through configuration management | Preventive | |
Configure the "V.35 H.331 video format" setting to organizational standards CC ID 09550 | System hardening through configuration management | Preventive | |
Configure the "V.35 H.331 video protocol" setting to organizational standards CC ID 09551 | System hardening through configuration management | Preventive | |
Configure the "IPv4 address assignment method" setting to organizational standards. CC ID 09552 | System hardening through configuration management | Preventive | |
Configure the "IPv4 address" setting to organizational standards. CC ID 09553 | System hardening through configuration management | Preventive | |
Configure the "default gateway" setting to organizational standards. CC ID 09554 | System hardening through configuration management | Preventive | |
Configure the "IPv4 subnet mask" setting to organizational standards. CC ID 09555 | System hardening through configuration management | Preventive | |
Configure IPv6 extension headers to organizational standards. CC ID 16398 | System hardening through configuration management | Preventive | |
Configure the "IPv6 address assignment method" setting to organizational standards. CC ID 09556 | System hardening through configuration management | Preventive | |
Configure the "IPv6 link-local address" setting to organizational standards. CC ID 09557 | System hardening through configuration management | Preventive | |
Configure the "IPv6 site-local address" setting to organizational standards. CC ID 09558 | System hardening through configuration management | Preventive | |
Configure the "IPv6 global address" setting to organizational standards. CC ID 09559 | System hardening through configuration management | Preventive | |
Configure the "default gateway" setting for "IPv6" to organizational standards. CC ID 09560 | System hardening through configuration management | Preventive | |
Configure the "system domain name" setting to organizational standards. CC ID 09561 | System hardening through configuration management | Preventive | |
Configure the "primary DNS server address" setting to organizational standards. CC ID 09562 | System hardening through configuration management | Preventive | |
Configure the "secondary DNS server address" setting to organizational standards. CC ID 09563 | System hardening through configuration management | Preventive | |
Configure the "third DNS server address" setting to organizational standards. CC ID 09564 | System hardening through configuration management | Preventive | |
Configure the "fourth DNS server address" setting to organizational standards. CC ID 09565 | System hardening through configuration management | Preventive | |
Configure the "system LAN speed" setting to organizational standards. CC ID 09566 | System hardening through configuration management | Preventive | |
Configure the "system duplex mode" setting to organizational standards. CC ID 09567 | System hardening through configuration management | Preventive | |
Configure the "system to ignore redirect messages" setting to organizational standards. CC ID 09568 | System hardening through configuration management | Preventive | |
Configure the "system ICMP transmission rate limit (in milliseconds)" setting to organizational standards. CC ID 09569 | System hardening through configuration management | Preventive | |
Configure the "generate destination unreachable messages" setting to organizational standards. CC ID 09570 | System hardening through configuration management | Preventive | |
Configure the "respond to broadcast and multicast echo requests" setting to organizational standards. CC ID 09571 | System hardening through configuration management | Preventive | |
Configure the "IPv6 DAD transmit count" setting to organizational standards. CC ID 09572 | System hardening through configuration management | Preventive | |
Configure the "phone number of the room where the system is located" setting to organizational standards. CC ID 09573 | System hardening through configuration management | Preventive | |
Configure the "GMS tech support contact name" setting to organizational standards. CC ID 09574 | System hardening through configuration management | Preventive | |
Configure the "GMS tech support contact email" setting to organizational standards. CC ID 09575 | System hardening through configuration management | Preventive | |
Configure the "GMS tech support contact phone number" setting to organizational standards. CC ID 09576 | System hardening through configuration management | Preventive | |
Configure the "GMS tech support contact fax number" setting to organizational standards. CC ID 09577 | System hardening through configuration management | Preventive | |
Configure the "GMS tech support contact city" setting to organizational standards. CC ID 09578 | System hardening through configuration management | Preventive | |
Configure the "GMS tech support contact state" setting to organizational standards. CC ID 09579 | System hardening through configuration management | Preventive | |
Configure the "GMS tech support contact country" setting to organizational standards. CC ID 09580 | System hardening through configuration management | Preventive | |
Configure the "security profile" setting to organizational standards. CC ID 09581 | System hardening through configuration management | Preventive | |
Configure the "allow PC LAN port access" setting to organizational standards. CC ID 09582 | System hardening through configuration management | Preventive | |
Configure the "require certificate validation for web server" setting to organizational standards. CC ID 09583 | System hardening through configuration management | Preventive | |
Configure the "require certificate validation for peer client applications" setting to organizational standards. CC ID 09584 | System hardening through configuration management | Preventive | |
Configure the "maximum peer certificate chain depth" setting to organizational standards. CC ID 09585 | System hardening through configuration management | Preventive | |
Configure the "certificate revocation method" setting to organizational standards. CC ID 09586 | System hardening through configuration management | Preventive | |
Configure the "allow incomplete revocation checks" setting to organizational standards. CC ID 09587 | System hardening through configuration management | Preventive | |
Configure the "the global responder specified in the certificate" setting to organizational standards. CC ID 09588 | System hardening through configuration management | Preventive | |
Configure the "require login for system access" setting to organizational standards. CC ID 09589 | System hardening through configuration management | Preventive | |
Configure the "allow the local password to be used for remote access" setting to organizational standards. CC ID 09590 | System hardening through configuration management | Preventive | |
Configure the "allow remote access via web" setting to organizational standards. CC ID 09591 | System hardening through configuration management | Preventive | |
Configure the "web access port number" setting to organizational standards. CC ID 09592 | System hardening through configuration management | Preventive | |
Configure the "require whitelist" setting to organizational standards. CC ID 09593 | System hardening through configuration management | Preventive | |
Configure the "allow remote access via telnet" setting to organizational standards. CC ID 09594 | System hardening through configuration management | Preventive | |
Configure the "allow remote access via SNMP" setting to organizational standards. CC ID 09595 | System hardening through configuration management | Preventive | |
Configure the "allow video display on the web" setting to organizational standards. CC ID 09596 | System hardening through configuration management | Preventive | |
Configure the "require display of a security banner upon login" setting to organizational standards. CC ID 09597 | System hardening through configuration management | Preventive | |
Configure the "custom text for the local security banner" setting to organizational standards. CC ID 09598 | System hardening through configuration management | Preventive | |
Configure the "custom text for the web security banner" setting to organizational standards. CC ID 09599 | System hardening through configuration management | Preventive | |
Configure the "allow a non-admin user to make changes to the local system address book" setting to organizational standards. CC ID 09600 | System hardening through configuration management | Preventive | |
Configure the "allow a non-admin user to make changes to the camera presets" setting to organizational standards. CC ID 09601 | System hardening through configuration management | Preventive | |
Configure the "allow mixed protocol (IP and ISDN) multipoint calls" setting to organizational standards. CC ID 09602 | System hardening through configuration management | Preventive | |
Configure the "require Active Directory authentication" setting to organizational standards. CC ID 09603 | System hardening through configuration management | Preventive | |
Configure the "Active Directory server address" setting to organizational standards. CC ID 09604 | System hardening through configuration management | Preventive | |
Configure the "Active Directory admin group" setting to organizational standards. CC ID 09605 | System hardening through configuration management | Preventive | |
Configure the "Active Directory user group" setting to organizational standards. CC ID 09606 | System hardening through configuration management | Preventive | |
Configure the "require admin password for remote login" setting to organizational standards. CC ID 09607 | System hardening through configuration management | Preventive | |
Configure the "RS-232 serial port access mode" setting to organizational standards. CC ID 09608 | System hardening through configuration management | Preventive | |
Configure the "RS-232 serial port baud rate" setting to organizational standards. CC ID 09609 | System hardening through configuration management | Preventive | |
Configure the "require AES encryption" setting to organizational standards. CC ID 09610 | System hardening through configuration management | Preventive | |
Configure the "SIP" setting to organizational standards. CC ID 09611 | System hardening through configuration management | Preventive | |
Configure the "allow recent call list to be accessible" setting to organizational standards. CC ID 09612 | System hardening through configuration management | Preventive | |
Configure the "allow the last number dialed to be accessible" setting to organizational standards. CC ID 09613 | System hardening through configuration management | Preventive | |
Configure the "allow far end control of the near camera" setting to organizational standards. CC ID 09614 | System hardening through configuration management | Preventive | |
Configure the "allow a call detail report to be created and maintained" setting to organizational standards. CC ID 09615 | System hardening through configuration management | Preventive | |
Configure the "Availability Control (Do Not Disturb) for all calls" setting to organizational standards. CC ID 09616 | System hardening through configuration management | Preventive | |
Configure the "Do Not Disturb only for point to point calls" setting to organizational standards. CC ID 09617 | System hardening through configuration management | Preventive | |
Configure the "Do Not Disturb only for multipoint calls" setting to organizational standards. CC ID 09618 | System hardening through configuration management | Preventive | |
Configure the "require the admin account to be locked after a certain number of failed login attempts" setting to organizational standards. CC ID 09619 | System hardening through configuration management | Preventive | |
Configure the "admin account lock duration (in minutes)" setting to organizational standards. CC ID 09620 | System hardening through configuration management | Preventive | |
Configure the "require the user account to be locked after a certain number of unsuccessful logon attempts" setting to organizational standards. CC ID 09621 | System hardening through configuration management | Preventive | |
Configure the "user account lock duration (in minutes)" setting to organizational standards. CC ID 09622 | System hardening through configuration management | Preventive | |
Configure the "idle session timeout (in minutes)" setting to organizational standards. CC ID 09623 | System hardening through configuration management | Preventive | |
Configure the "monitoring of inactive web sessions " setting to organizational standards. CC ID 09624 | System hardening through configuration management | Preventive | |
Configure the "list of all sessions (local, web and serial) visible on the local or web GUI" setting to organizational standards. CC ID 09625 | System hardening through configuration management | Preventive | |
Configure the "maximum number of concurrent active web sessions" setting to organizational standards. CC ID 09626 | System hardening through configuration management | Preventive | |
Configure the "number of failed login attempts on the web interface and serial port (port lockout) after which the interface will be locked" setting to organizational standards. CC ID 09627 | System hardening through configuration management | Preventive | |
Configure the "web interface and serial port (port lockout) lock duration should (in minutes) be configured" setting to organizational standards. CC ID 09628 | System hardening through configuration management | Preventive | |
Configure the "local (room) admin password" setting to organizational standards. CC ID 09629 | System hardening through configuration management | Preventive | |
Configure the "remote access admin password" setting to organizational standards. CC ID 09630 | System hardening through configuration management | Preventive | |
Configure the "local (room) user password" setting to organizational standards. CC ID 09631 | System hardening through configuration management | Preventive | |
Configure the "meeting password" setting to organizational standards. CC ID 09632 | System hardening through configuration management | Preventive | |
Configure the "MCU password" setting to organizational standards. CC ID 09633 | System hardening through configuration management | Preventive | |
Configure the "minimum length required for a local (room) admin password" setting to organizational standards. CC ID 09634 | System hardening through configuration management | Preventive | |
Configure the "require that the local (room) admin password contain lower case characters" setting to organizational standards. CC ID 09635 | System hardening through configuration management | Preventive | |
Configure the "require that the local (room) admin password contain upper case characters" setting to organizational standards. CC ID 09636 | System hardening through configuration management | Preventive | |
Configure the "require that the local (room) admin password contain numbers" setting to organizational standards. CC ID 09637 | System hardening through configuration management | Preventive | |
Configure the "require that the local (room) admin password contain special characters" setting to organizational standards. CC ID 09638 | System hardening through configuration management | Preventive | |
Configure the "reject a certain number of previous local (room) admin passwords when creating a new password" setting to organizational standards. CC ID 09639 | System hardening through configuration management | Preventive | |
Configure the "minimum age for the local (room) admin password before it can be changed" setting to organizational standards. CC ID 09640 | System hardening through configuration management | Preventive | |
Configure the "maximum age for the local (room) admin password after which it must be changed" setting to organizational standards. CC ID 09641 | System hardening through configuration management | Preventive | |
Configure the "how many days ahead of time a password expiration warning should be provided when the local (room) admin password is about to expire" setting to organizational standards. CC ID 09642 | System hardening through configuration management | Preventive | |
Configure the "minimum number of characters that must be changed when creating a new local (room) admin password" setting to organizational standards. CC ID 09643 | System hardening through configuration management | Preventive | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new local (room) admin password" setting to organizational standards. CC ID 09644 | System hardening through configuration management | Preventive | |
Configure the "the local (room) admin password can contain the admin account name or the reverse of the account name" setting to organizational standards. CC ID 09645 | System hardening through configuration management | Preventive | |
Configure the "minimum length required for a remote admin password" setting to organizational standards. CC ID 09646 | System hardening through configuration management | Preventive | |
Configure the "require that the remote admin password contain lower case characters" setting to organizational standards. CC ID 09647 | System hardening through configuration management | Preventive | |
Configure the "require that the remote admin password contain upper case characters" setting to organizational standards. CC ID 09648 | System hardening through configuration management | Preventive | |
Configure the "require that the remote admin password contain numbers" setting to organizational standards. CC ID 09649 | System hardening through configuration management | Preventive | |
Configure the "require that the remote admin password contain special characters" setting to organizational standards. CC ID 09650 | System hardening through configuration management | Preventive | |
Configure the "reject a certain number of previous remote admin passwords when creating a new password" setting to organizational standards. CC ID 09651 | System hardening through configuration management | Preventive | |
Configure the "minimum age for the remote admin password before it can be changed" setting to organizational standards. CC ID 09652 | System hardening through configuration management | Preventive | |
Configure the "maximum age for the remote admin password after which it must be changed" setting to organizational standards. CC ID 09653 | System hardening through configuration management | Preventive | |
Configure the "how many days ahead of time a password expiration warning should be provided when the remote admin password is about to expire" setting to organizational standards. CC ID 09654 | System hardening through configuration management | Preventive | |
Configure the "minimum number of characters that must be changed when creating a new remote admin password" setting to organizational standards. CC ID 09655 | System hardening through configuration management | Preventive | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new remote admin password" setting to organizational standards. CC ID 09656 | System hardening through configuration management | Preventive | |
Configure the "remote admin password can contain the admin account name or the reverse of the account name" setting to organizational standards. CC ID 09657 | System hardening through configuration management | Preventive | |
Configure the "minimum length required for a local (room) user password" setting to organizational standards. CC ID 09658 | System hardening through configuration management | Preventive | |
Configure the "require that the local (room) user password contain lower case characters" setting to organizational standards. CC ID 09659 | System hardening through configuration management | Preventive | |
Configure the "require that the local (room) user password contain upper case characters" setting to organizational standards. CC ID 09660 | System hardening through configuration management | Preventive | |
Configure the "require that the local (room) user password contain numbers" setting to organizational standards. CC ID 09661 | System hardening through configuration management | Preventive | |
Configure the "require that the local (room) user password contain special characters" setting to organizational standards. CC ID 09662 | System hardening through configuration management | Preventive | |
Configure the "reject a certain number of previous local (room) user passwords when creating a new password" setting to organizational standards. CC ID 09663 | System hardening through configuration management | Preventive | |
Configure the "minimum age for the local (room) user password before it can be changed" setting to organizational standards. CC ID 09664 | System hardening through configuration management | Preventive | |
Configure the "maximum age for the local (room) user password after which it must be changed" setting to organizational standards. CC ID 09665 | System hardening through configuration management | Preventive | |
Configure the "how many days ahead of time a password expiration warning should be provided when the local (room) user password is about to expire" setting to organizational standards. CC ID 09666 | System hardening through configuration management | Preventive | |
Configure the "minimum number of characters that must be changed when creating a new local (room) user password" setting to organizational standards. CC ID 09667 | System hardening through configuration management | Preventive | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new local (room) user password" setting to organizational standards. CC ID 09668 | System hardening through configuration management | Preventive | |
Configure the "the local (room) user password can contain the user account name or the reverse of the account name" setting to organizational standards. CC ID 09669 | System hardening through configuration management | Preventive | |
Configure the "minimum length required for a meeting password" setting to organizational standards. CC ID 09670 | System hardening through configuration management | Preventive | |
Configure the "require that the meeting password contain lower case characters" setting to organizational standards. CC ID 09671 | System hardening through configuration management | Preventive | |
Configure the "require that the meeting password contain upper case characters" setting to organizational standards. CC ID 09672 | System hardening through configuration management | Preventive | |
Configure the "require that the meeting password contain numbers" setting to organizational standards. CC ID 09673 | System hardening through configuration management | Preventive | |
Configure the "require that the meeting password contain special characters" setting to organizational standards. CC ID 09674 | System hardening through configuration management | Preventive | |
Configure the "reject a certain number of previous meeting passwords when creating a new meeting password" setting to organizational standards. CC ID 09675 | System hardening through configuration management | Preventive | |
Configure the "minimum age for the meeting password before it can be changed" setting to organizational standards. CC ID 09676 | System hardening through configuration management | Preventive | |
Configure the "maximum age for the meeting password after which it must be changed" setting to organizational standards. CC ID 09677 | System hardening through configuration management | Preventive | |
Configure the "how many days ahead of time a password expiration warning should be provided when the meeting password is about to expire" setting to organizational standards. CC ID 09678 | System hardening through configuration management | Preventive | |
Configure the "minimum number of characters that must be changed when creating a new meeting password" setting to organizational standards. CC ID 09679 | System hardening through configuration management | Preventive | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new meeting password" setting to organizational standards. CC ID 09680 | System hardening through configuration management | Preventive | |
Configure the "allow access to security related settings by non-admin users" setting to organizational standards. CC ID 09681 | System hardening through configuration management | Preventive | |
Configure the "NTLM version" setting to organizational standards. CC ID 09682 | System hardening through configuration management | Preventive | |
Configure the "folder name to be used when downloading log files" setting to organizational standards. CC ID 09683 | System hardening through configuration management | Preventive | |
Configure the "percent filled threshold above which a warning will be provided if log files exceed it" setting to organizational standards. CC ID 09684 | System hardening through configuration management | Preventive | |
Configure the "frequency of transferring logs to a storage device then deleting the logs from the system" setting to organizational standards. CC ID 09685 | System hardening through configuration management | Preventive | |
Configure the "show content immediately upon connecting a computer to the system" setting to organizational standards. CC ID 09686 | System hardening through configuration management | Preventive | |
Configure the "require an account number to dial a call" setting to organizational standards. CC ID 09687 | System hardening through configuration management | Preventive | |
Configure the "require validation of an account number before allowing a call to be dialed" setting to organizational standards. CC ID 09688 | System hardening through configuration management | Preventive | |
Configure the "maximum time that a call can be connected" setting to organizational standards. CC ID 09689 | System hardening through configuration management | Preventive | |
Configure the "mute a call that is auto answered" setting to organizational standards. CC ID 09690 | System hardening through configuration management | Preventive | |
Configure the "H.460 firewall traversal" setting to organizational standards CC ID 09691 | System hardening through configuration management | Preventive | |
Configure the "POTS" setting to organizational standards. CC ID 09692 | System hardening through configuration management | Preventive | |
Configure the "POTS area code manually" setting to organizational standards. CC ID 09693 | System hardening through configuration management | Preventive | |
Configure the "POTS number manually" setting to organizational standards. CC ID 09694 | System hardening through configuration management | Preventive | |
Configure the "allow a Polycom Touch Control panel to pair with the system" setting to organizational standards. CC ID 09695 | System hardening through configuration management | Preventive | |
Configure the "screen saver wait time" setting to organizational standards. CC ID 09696 | System hardening through configuration management | Preventive | |
Configure the "video call dial order" setting to organizational standards. CC ID 09697 | System hardening through configuration management | Preventive | |
Configure the "voice call dial order" setting to organizational standards. CC ID 09698 | System hardening through configuration management | Preventive | |
Configure the "diagnostic (basic) mode" setting to organizational standards. CC ID 09699 | System hardening through configuration management | Preventive | |
Configure the "dual monitor emulation" setting to organizational standards. CC ID 09700 | System hardening through configuration management | Preventive | |
Configure the "H.239" setting to organizational standards CC ID 09701 | System hardening through configuration management | Preventive | |
Configure the "VGA quality preference" setting to organizational standards. CC ID 09702 | System hardening through configuration management | Preventive | |
Configure the "power button on the IR remote control" setting to organizational standards. CC ID 09703 | System hardening through configuration management | Preventive | |
Configure the "numeric keypad function on the IR remote control" setting to organizational standards. CC ID 09704 | System hardening through configuration management | Preventive | |
Configure the "allow use of a non-Polycom IR remote control" setting to organizational standards. CC ID 09705 | System hardening through configuration management | Preventive | |
Configure the "channel ID for the IR remote control" setting to organizational standards. CC ID 09706 | System hardening through configuration management | Preventive | |
Configure the "transcoding" setting to organizational standards. CC ID 09707 | System hardening through configuration management | Preventive | |
Configure the "allow the system to dial any calls" setting to organizational standards. CC ID 09708 | System hardening through configuration management | Preventive | |
Configure the "preferred dialing method" setting to organizational standards. CC ID 09709 | System hardening through configuration management | Preventive | |
Configure the "domain of the provisioning server" setting to organizational standards. CC ID 09710 | System hardening through configuration management | Preventive | |
Configure the "user name to connect to the provisioning server" setting to organizational standards. CC ID 09711 | System hardening through configuration management | Preventive | |
Configure the "password to connect to the provisioning server" setting to organizational standards. CC ID 09712 | System hardening through configuration management | Preventive | |
Configure the "server address of the provisioning server" setting to organizational standards. CC ID 09713 | System hardening through configuration management | Preventive | |
Configure the "SNMP admin name" setting to organizational standards. CC ID 09714 | System hardening through configuration management | Preventive | |
Configure the "SNMP community name" setting to organizational standards. CC ID 09715 | System hardening through configuration management | Preventive | |
Configure the "SNMP console address" setting to organizational standards. CC ID 09716 | System hardening through configuration management | Preventive | |
Configure the "SNMP location" setting to organizational standards. CC ID 09717 | System hardening through configuration management | Preventive | |
Configure the "SNMP system description" setting to organizational standards. CC ID 09718 | System hardening through configuration management | Preventive | |
Configure the "SNMP trap version" setting to organizational standards. CC ID 09719 | System hardening through configuration management | Preventive | |
Configure Apache and Tomcat to Organizational Standards. CC ID 08987 | System hardening through configuration management | Preventive | |
Configure the "demo CGI printenv.pl" setting to organizational standards. CC ID 08993 | System hardening through configuration management | Preventive | |
Configure the "testcgi" setting to organizational standards. CC ID 08994 | System hardening through configuration management | Preventive | |
Configure the "FollowSymLinks" setting for the "DocumentRoot" to organizational standards. CC ID 08995 | System hardening through configuration management | Preventive | |
Configure the "IncludesNOEXEC" setting for the "DocumentRoot" to organizational standards. CC ID 08996 | System hardening through configuration management | Preventive | |
Configure the "Indexes" setting for the "DocumentRoot" to organizational standards. CC ID 08997 | System hardening through configuration management | Preventive | |
Configure the "Allow" setting for the "OS root" to organizational standards. CC ID 08998 | System hardening through configuration management | Preventive | |
Configure the "Allow" setting to organizational standards. CC ID 08999 | System hardening through configuration management | Preventive | |
Configure the "KeepAlive" setting to organizational standards. CC ID 09000 | System hardening through configuration management | Preventive | |
Configure the "KeepAliveTimeout" setting to organizational standards. CC ID 09001 | System hardening through configuration management | Preventive | |
Configure the "LimitRequestBody" setting to organizational standards. CC ID 09002 | System hardening through configuration management | Preventive | |
Configure the "LimitRequestFields" setting to organizational standards. CC ID 09003 | System hardening through configuration management | Preventive | |
Configure the "LimitRequestFieldSizeBody" setting to organizational standards. CC ID 09004 | System hardening through configuration management | Preventive | |
Configure the "LimitRequestline" setting to organizational standards. CC ID 09005 | System hardening through configuration management | Preventive | |
Configure the "loglevel" setting to organizational standards. CC ID 09006 | System hardening through configuration management | Preventive | |
Configure the "MaxClients" setting to organizational standards. CC ID 09007 | System hardening through configuration management | Preventive | |
Configure the "ServerTokens" setting to organizational standards. CC ID 09008 | System hardening through configuration management | Preventive | |
Configure the "Timeout" setting to organizational standards. CC ID 09009 | System hardening through configuration management | Preventive | |
Configure the "apache access log file" setting to organizational standards. CC ID 09010 | System hardening through configuration management | Preventive | |
Configure the "AllowOverride" for "OS root" to organizational standards. CC ID 09011 | System hardening through configuration management | Preventive | |
Configure the "AllowOverride" setting for "web site root directories" to organizational standards. CC ID 09012 | System hardening through configuration management | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 400 errors" to organizational standards. CC ID 09013 | System hardening through configuration management | Preventive | |
Configure the "Group" setting to organizational standards. CC ID 09014 | System hardening through configuration management | Preventive | |
Configure the "runtime rewriting engine" setting to organizational standards. CC ID 09015 | System hardening through configuration management | Preventive | |
Configure the "ServerSignature" setting to organizational standards. CC ID 09016 | System hardening through configuration management | Preventive | |
Configure the "apache system logging" setting to organizational standards. CC ID 09017 | System hardening through configuration management | Preventive | |
Configure the "User" setting to organizational standards. CC ID 09019 | System hardening through configuration management | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 401 errors" to organizational standards. CC ID 09020 | System hardening through configuration management | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 403 errors" to organizational standards. CC ID 09021 | System hardening through configuration management | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 404 errors" to organizational standards. CC ID 09022 | System hardening through configuration management | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 405 errors" to organizational standards. CC ID 09023 | System hardening through configuration management | Preventive | |
Configure the "ErrorDocument" setting for "HTTP 500 errors" to organizational standards. CC ID 09024 | System hardening through configuration management | Preventive | |
Configure the "Deny" setting for the "OS root" to organizational standards. CC ID 09025 | System hardening through configuration management | Preventive | |
Configure the "Deny" setting to organizational standards. CC ID 09026 | System hardening through configuration management | Preventive | |
Configure the "error log file" setting to organizational standards. CC ID 09040 | System hardening through configuration management | Preventive | |
Configure the "Includes" setting for the "DocumentRoot" to organizational standards. CC ID 09046 | System hardening through configuration management | Preventive | |
Configure the "MultiViews" setting for the "DocumentRoot" to organizational standards. CC ID 09047 | System hardening through configuration management | Preventive | |
Configure the "Order" setting for the "OS root" to organizational standards. CC ID 09048 | System hardening through configuration management | Preventive | |
Configure the "permitted HTTP request methods" setting to organizational standards. CC ID 09049 | System hardening through configuration management | Preventive | |
Configure the "httpd.conf" file to organizational standards. CC ID 09050 | System hardening through configuration management | Preventive | |
Configure the "htpasswd" file to organizational standards. CC ID 09053 | System hardening through configuration management | Preventive | |
Configure the "Server Administrator email address" setting to organizational standards. CC ID 09054 | System hardening through configuration management | Preventive | |
Configure the "StartServers" setting to organizational standards. CC ID 09060 | System hardening through configuration management | Preventive | |
Configure the "MinSpareServers" setting to organizational standards. CC ID 09061 | System hardening through configuration management | Preventive | |
Configure the "MaxSpareServers" setting to organizational standards. CC ID 09062 | System hardening through configuration management | Preventive | |
Configure the "ExecCGI" setting for the "DocumentRoot" to organizational standards. CC ID 09063 | System hardening through configuration management | Preventive | |
Configure the "Order" setting for "all DocumentRoots" to organizational standards. CC ID 09064 | System hardening through configuration management | Preventive | |
Configure the "Order" setting to organizational standards. CC ID 09065 | System hardening through configuration management | Preventive | |
Configure the "action directive" setting to organizational standards. CC ID 09066 | System hardening through configuration management | Preventive | |
Configure the "AddHandler directive" setting to organizational standards. CC ID 09067 | System hardening through configuration management | Preventive | |
Configure the "Anonymous sharing of Apache's web content directories with nfs" setting to organizational standards. CC ID 09068 | System hardening through configuration management | Preventive | |
Configure the "Anonymous sharing of Apache's web content directories with smb" setting to organizational standards. CC ID 09069 | System hardening through configuration management | Preventive | |
Configure the "MaxKeepAliveRequests" setting to organizational standards. CC ID 09070 | System hardening through configuration management | Preventive | |
Configure the "log_config_module" setting to organizational standards. CC ID 09072 | System hardening through configuration management | Preventive | |
Configure the "disallow paths and files" setting for "robots.txt" to organizational standards. CC ID 09105 | System hardening through configuration management | Preventive | |
Configure the "ssl_module" setting to organizational standards. CC ID 09106 | System hardening through configuration management | Preventive | |
Configure the "SSLProtocol" setting to organizational standards. CC ID 09107 | System hardening through configuration management | Preventive | |
Configure the "SSLEngine" setting to organizational standards. CC ID 09108 | System hardening through configuration management | Preventive | |
Configure the "apache online manual" setting to organizational standards. CC ID 09109 | System hardening through configuration management | Preventive | |
Configure the "FollowSymLinks" setting for "all options directives" to organizational standards. CC ID 09110 | System hardening through configuration management | Preventive | |
Configure the "Includes" setting for "all options directives" to organizational standards. CC ID 09111 | System hardening through configuration management | Preventive | |
Configure the "IncludesNoExec" setting for "all options directives" to organizational standards. CC ID 09112 | System hardening through configuration management | Preventive | |
Configure the "MultiViews" setting for "all options directives" to organizational standards. CC ID 09113 | System hardening through configuration management | Preventive | |
Configure the "Indexes" setting for "all options directives" to organizational standards. CC ID 09114 | System hardening through configuration management | Preventive | |
Configure the "dav_module" setting to organizational standards. CC ID 09115 | System hardening through configuration management | Preventive | |
Configure the "dav_fs_module" setting to organizational standards. CC ID 09116 | System hardening through configuration management | Preventive | |
Configure the "info_module" setting to organizational standards. CC ID 09117 | System hardening through configuration management | Preventive | |
Configure the "status_module" setting to organizational standards. CC ID 09118 | System hardening through configuration management | Preventive | |
Configure the "proxy_module" setting to organizational standards. CC ID 09119 | System hardening through configuration management | Preventive | |
Configure the "proxy_ftp_module" setting to organizational standards. CC ID 09120 | System hardening through configuration management | Preventive | |
Configure the "proxy_http_module" setting to organizational standards. CC ID 09121 | System hardening through configuration management | Preventive | |
Configure the "proxy_connect_module" setting to organizational standards. CC ID 09122 | System hardening through configuration management | Preventive | |
Configure the "ExecCGI" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09130 | System hardening through configuration management | Preventive | |
Configure the "FollowSymLinks" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09131 | System hardening through configuration management | Preventive | |
Configure the "Includes" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09132 | System hardening through configuration management | Preventive | |
Configure the "IncludesNoExec" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09133 | System hardening through configuration management | Preventive | |
Configure the "Indexes" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09134 | System hardening through configuration management | Preventive | |
Configure the "MultiViews" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09135 | System hardening through configuration management | Preventive | |
Configure the "SymLinksIfOwnerMatch" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09136 | System hardening through configuration management | Preventive | |
Configure the "TraceEnable" setting to organizational standards. CC ID 09137 | System hardening through configuration management | Preventive | |
Configure the "listening IP address" setting to organizational standards. CC ID 09138 | System hardening through configuration management | Preventive | |
Configure the "listening port" setting to organizational standards. CC ID 09139 | System hardening through configuration management | Preventive | |
Configure the "ScriptAlias" setting to organizational standards. CC ID 09140 | System hardening through configuration management | Preventive | |
Configure the "automatic directory indexing" setting to organizational standards. CC ID 09141 | System hardening through configuration management | Preventive | |
Configure the "Anonymous sharing of Apache's web content directories" setting to organizational standards. CC ID 09142 | System hardening through configuration management | Preventive | |
Configure the "apache web server" setting to organizational standards. CC ID 09147 | System hardening through configuration management | Preventive | |
Configure the "dav_lock_module" setting to organizational standards. CC ID 09150 | System hardening through configuration management | Preventive | |
Configure the "proxy_ajp_module" setting to organizational standards. CC ID 09151 | System hardening through configuration management | Preventive | |
Configure the "proxy_balancer_module" setting to organizational standards. CC ID 09152 | System hardening through configuration management | Preventive | |
Configure the "CGI scripts for Apache Tomcat" setting to organizational standards. CC ID 09720 | System hardening through configuration management | Preventive | |
Configure the "Access to Apache Tomcat's interactive scripts" setting to organizational standards. CC ID 09721 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Apache's backup CGI *.bak" files to organizational standards CC ID 09722 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Apache's backup CGI *.old" files to organizational standards CC ID 09723 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Apache's backup CGI *.temp" files to organizational standards CC ID 09724 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Apache's backup CGI *.tmp" files to organizational standards CC ID 09725 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Apache's backup CGI *.backup" files to organizational standards CC ID 09726 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Apache's backup CGI copy of*.*" files to organizational standards CC ID 09727 | System hardening through configuration management | Preventive | |
Configure the "maxProcessors attribute" setting to organizational standards. CC ID 09728 | System hardening through configuration management | Preventive | |
Configure the "access log valve" setting for the "tomcat Engine container" to organizational standards. CC ID 09730 | System hardening through configuration management | Preventive | |
Configure the "access log valve" setting for the "tomcat Host container" to organizational standards. CC ID 09731 | System hardening through configuration management | Preventive | |
Configure the "access log valve" setting for the "tomcat Context container" to organizational standards. CC ID 09732 | System hardening through configuration management | Preventive | |
Configure the "disallow paths and files" setting for the "tomcat site robots.txt" file to organizational standards. CC ID 09745 | System hardening through configuration management | Preventive | |
Configure the "tomcat SSLProtocol atribute" setting to organizational standards. CC ID 09746 | System hardening through configuration management | Preventive | |
Configure the "tomcat Connector SSLEngine attribute" setting to organizational standards. CC ID 09747 | System hardening through configuration management | Preventive | |
Configure the "tomcat Listener SSLEngine attribute" setting to organizational standards. CC ID 09748 | System hardening through configuration management | Preventive | |
Configure the "tomcat server attribute" setting to organizational standards. CC ID 09749 | System hardening through configuration management | Preventive | |
Configure the "account running the tomcat service" setting to organizational standards. CC ID 09750 | System hardening through configuration management | Preventive | |
Configure the "tomcat server documentation" setting to organizational standards. CC ID 09751 | System hardening through configuration management | Preventive | |
Configure the "tomcat js examples" setting to organizational standards. CC ID 09752 | System hardening through configuration management | Preventive | |
Configure the "tomcat servlet examples" setting to organizational standards. CC ID 09753 | System hardening through configuration management | Preventive | |
Configure the "tomcat webdav" folder to organizational standards. CC ID 09754 | System hardening through configuration management | Preventive | |
Configure the "tomcat examples" folder to organizational standards. CC ID 09755 | System hardening through configuration management | Preventive | |
Configure the "tomcat balancer" folder to organizational standards. CC ID 09756 | System hardening through configuration management | Preventive | |
Configure the "tomcat pattern attribute" setting to organizational standards. CC ID 09757 | System hardening through configuration management | Preventive | |
Configure the "Java Security Manager (JSM)" setting to organizational standards. CC ID 09758 | System hardening through configuration management | Preventive | |
Configure the "run with the Java Security Manager upon startup" setting to organizational standards. CC ID 09759 | System hardening through configuration management | Preventive | |
Configure the "shutdown port number" for the "tomcat server" to organizational standards. CC ID 09760 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Legacy JK AJP 1.3 connector" setting to organizational standards. CC ID 09761 | System hardening through configuration management | Preventive | |
Configure the "port number" setting for the "Tomcat Legacy JK AJP 1.3 connector" to organizational standards. CC ID 09762 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Legacy HTTP/1.1 connector" setting to organizational standards. CC ID 09763 | System hardening through configuration management | Preventive | |
Configure the "port number" for the "Tomcat Legacy HTTP/1.1 connector" to organizational standards. CC ID 09764 | System hardening through configuration management | Preventive | |
Configure the "Tomcat login authentication method" setting to organizational standards. CC ID 09765 | System hardening through configuration management | Preventive | |
Configure the "security roles" for the "Tomcat manager app" to organizational standards. CC ID 09766 | System hardening through configuration management | Preventive | |
Configure the "security roles" setting for the "tomcat admin app" to organizational standards. CC ID 09767 | System hardening through configuration management | Preventive | |
Configure the "deny access to the Tomcat Admin app" setting to organizational standards. CC ID 09768 | System hardening through configuration management | Preventive | |
Configure the "allow access to the Tomcat Admin app" setting to organizational standards. CC ID 09769 | System hardening through configuration management | Preventive | |
Configure the "deny access to the Tomcat manager app" setting to organizational standards. CC ID 09770 | System hardening through configuration management | Preventive | |
Configure the "allow access to the Tomcat manager app" setting to organizational standards. CC ID 09771 | System hardening through configuration management | Preventive | |
Configure the "password digest algorithm" setting for "JDBCRealm (database) connections" to organizational standards. CC ID 09779 | System hardening through configuration management | Preventive | |
Configure the "JDBCRealm (database) password digest algorithm" setting to organizational standards. CC ID 09780 | System hardening through configuration management | Preventive | |
Configure the "password digest algorithm" setting for "JNDIRealm (LDAP) connections" to organizational standards. CC ID 09781 | System hardening through configuration management | Preventive | |
Configure the "JNDIRealm (LDAP) password digest" setting to organizational standards. CC ID 09782 | System hardening through configuration management | Preventive | |
Configure the "Tomcat HTTP/1.1 connector" setting to organizational standards. CC ID 09783 | System hardening through configuration management | Preventive | |
Configure the "port number" setting for the "Tomcat HTTP/1.1 connector" to organizational standards. CC ID 09784 | System hardening through configuration management | Preventive | |
Configure the "secure attribute" for the "Tomcat HTTP/1.1 connectors" to organizational standards. CC ID 09785 | System hardening through configuration management | Preventive | |
Configure the "Tomcat Legacy JK/JK2 AJP 1.3 connector" setting to organizational standards. CC ID 09786 | System hardening through configuration management | Preventive | |
Configure the "port number" setting for the "JK/JK2 AJP 1.3 connector" to organizational standards. CC ID 09787 | System hardening through configuration management | Preventive | |
Configure the "Tomcat WARP connector" setting to organizational standards. CC ID 09788 | System hardening through configuration management | Preventive | |
Configure the "port number" setting for the "WARP connector" to organizational standards. CC ID 09789 | System hardening through configuration management | Preventive | |
Configure the "location of the log files directory" setting for the "Logger element" to organizational standards. CC ID 09790 | System hardening through configuration management | Preventive | |
Configure the "example server.xml" file to organizational standards. CC ID 09791 | System hardening through configuration management | Preventive | |
Configure the "file prefix" setting for the "Logger element" to organizational standards. CC ID 09794 | System hardening through configuration management | Preventive | |
Configure the "verbosity" setting for the "Logger element" to organizational standards. CC ID 09795 | System hardening through configuration management | Preventive | |
Configure the "Tomcat server port number" setting to organizational standards. CC ID 09797 | System hardening through configuration management | Preventive | |
Configure the "secure attribute" for the "Tomcat JK/JK2 AJP 1.3 connectors" to organizational standards. CC ID 09803 | System hardening through configuration management | Preventive | |
Configure the "JULI container level logging" setting to organizational standards. CC ID 09804 | System hardening through configuration management | Preventive | |
Configure the "JULI FileHandler threshold level " setting to organizational standards. CC ID 09805 | System hardening through configuration management | Preventive | |
Configure the "JULI FileHandler save directory " setting to organizational standards. CC ID 09806 | System hardening through configuration management | Preventive | |
Configure the "JULI FileHandlerlog file name prefix " setting to organizational standards. CC ID 09807 | System hardening through configuration management | Preventive | |
Configure the "grant of all permissions to Tomcat web applications" setting to organizational standards. CC ID 09808 | System hardening through configuration management | Preventive | |
Configure the "example" files to organizational standards. CC ID 09809 | System hardening through configuration management | Preventive | |
Configure the "WebDAV app" setting to organizational standards. CC ID 09810 | System hardening through configuration management | Preventive | |
Configure the "Tomcat-docs" setting to organizational standards. CC ID 09811 | System hardening through configuration management | Preventive | |
Configure the "Balancer app" setting to organizational standards. CC ID 09812 | System hardening through configuration management | Preventive | |
Configure the "save directory for log files" setting to organizational standards. CC ID 09816 | System hardening through configuration management | Preventive | |
Configure the "verify passwords in tomcat-users.xml are stored using an authorized digest" setting to organizational standards. CC ID 09817 | System hardening through configuration management | Preventive | |
Configure IIS to Organizational Standards. CC ID 08988 | System hardening through configuration management | Preventive | |
Configure the "IIS Web Root folder path" setting to organizational standards. CC ID 09153 | System hardening through configuration management | Preventive | |
Configure the "IIS Web Root" directory to organizational standards. CC ID 09154 | System hardening through configuration management | Preventive | |
Configure the "use the appropriate network interface" setting to organizational standards. CC ID 09155 | System hardening through configuration management | Preventive | |
Configure the "Enable Logging" setting to organizational standards. CC ID 09167 | System hardening through configuration management | Preventive | |
Configure the "Integrated Windows Authentication" setting to organizational standards. CC ID 09176 | System hardening through configuration management | Preventive | |
Configure the "Special Characters In Shells" setting for the "WWW service" to organizational standards. CC ID 09177 | System hardening through configuration management | Preventive | |
Configure the "IIS WWW service SSL error logging" setting to organizational standards. CC ID 09178 | System hardening through configuration management | Preventive | |
Configure the "RDSServer.DataFactory object" setting to organizational standards. CC ID 09179 | System hardening through configuration management | Preventive | |
Configure the "AdvancedDataFactory object" setting to organizational standards. CC ID 09180 | System hardening through configuration management | Preventive | |
Configure the "VbBusObj.VbBusObjCls object" setting to organizational standards. CC ID 09181 | System hardening through configuration management | Preventive | |
Configure the ".printer extension mapping" setting to organizational standards CC ID 09182 | System hardening through configuration management | Preventive | |
Configure the ".htw extension mapping" setting to organizational standards CC ID 09183 | System hardening through configuration management | Preventive | |
Configure the ".ida extension mapping" setting to organizational standards CC ID 09184 | System hardening through configuration management | Preventive | |
Configure the ".idq extension mapping" setting to organizational standards CC ID 09185 | System hardening through configuration management | Preventive | |
Configure the ".idc extension mapping" setting to organizational standards CC ID 09186 | System hardening through configuration management | Preventive | |
Configure the ".shtm extension mapping" setting to organizational standards CC ID 09187 | System hardening through configuration management | Preventive | |
Configure the ".stm extension mapping" setting to organizational standards CC ID 09188 | System hardening through configuration management | Preventive | |
Configure the ".shtml extension mapping" setting to organizational standards CC ID 09189 | System hardening through configuration management | Preventive | |
Configure the "Relative path traversal" setting to organizational standards. CC ID 09190 | System hardening through configuration management | Preventive | |
Configure the "HTTP protocol logging" setting to organizational standards. CC ID 09199 | System hardening through configuration management | Preventive | |
Configure the "Date logging" setting to organizational standards. CC ID 09200 | System hardening through configuration management | Preventive | |
Configure the "Time logging" setting to organizational standards. CC ID 09201 | System hardening through configuration management | Preventive | |
Configure the "Client IP Address logging" setting to organizational standards. CC ID 09202 | System hardening through configuration management | Preventive | |
Configure the "User name logging" setting to organizational standards. CC ID 09203 | System hardening through configuration management | Preventive | |
Configure the "User agent logging" setting to organizational standards. CC ID 09204 | System hardening through configuration management | Preventive | |
Configure the "Method logging" setting to organizational standards. CC ID 09205 | System hardening through configuration management | Preventive | |
Configure the "URI stem logging" setting to organizational standards. CC ID 09206 | System hardening through configuration management | Preventive | |
Configure the "URL query logging" setting to organizational standards. CC ID 09207 | System hardening through configuration management | Preventive | |
Configure the "Server IP address logging" setting to organizational standards. CC ID 09208 | System hardening through configuration management | Preventive | |
Configure the "Server port logging" setting to organizational standards. CC ID 09209 | System hardening through configuration management | Preventive | |
Configure the "Protocol status logging" setting to organizational standards. CC ID 09210 | System hardening through configuration management | Preventive | |
Configure the "Win32 status logging" setting to organizational standards. CC ID 09211 | System hardening through configuration management | Preventive | |
Configure the "HTTP Log folder path" setting to organizational standards. CC ID 09212 | System hardening through configuration management | Preventive | |
Configure the "Web-based password reset IIS application mappings (.htr)" setting to organizational standards CC ID 09215 | System hardening through configuration management | Preventive | |
Configure the "IIS Sample files" setting to organizational standards. CC ID 09216 | System hardening through configuration management | Preventive | |
Configure the "sample Data Access files" setting to organizational standards. CC ID 09217 | System hardening through configuration management | Preventive | |
Configure the "IIS Help files" setting to organizational standards. CC ID 09218 | System hardening through configuration management | Preventive | |
Configure the "Remote Account password changes" setting to organizational standards. CC ID 09219 | System hardening through configuration management | Preventive | |
Configure the "execution context of the IIS CGI processes" setting to organizational standards. CC ID 09220 | System hardening through configuration management | Preventive | |
Configure the "Server Side Includes command shell" setting to organizational standards. CC ID 09229 | System hardening through configuration management | Preventive | |
Configure the "IIS sample Web Printing files" setting to organizational standards. CC ID 09230 | System hardening through configuration management | Preventive | |
Configure the "AllowRestrictedChars" setting to organizational standards. CC ID 09231 | System hardening through configuration management | Preventive | |
Configure the "EnableNonUTF8" setting to organizational standards. CC ID 09232 | System hardening through configuration management | Preventive | |
Configure the "FavorUTF8" setting to organizational standards. CC ID 09233 | System hardening through configuration management | Preventive | |
Configure the "maximum possible size of request headers" setting to organizational standards. CC ID 09234 | System hardening through configuration management | Preventive | |
Configure the "maximum possible combined size of request line and headers" setting to organizational standards. CC ID 09235 | System hardening through configuration management | Preventive | |
Configure the "maximum number of characters in a URL path setting" setting to organizational standards. CC ID 09236 | System hardening through configuration management | Preventive | |
Configure the "maximum number of URL path segments" setting to organizational standards. CC ID 09237 | System hardening through configuration management | Preventive | |
Configure the "allowance of %U notation in request URLs" setting to organizational standards. CC ID 09238 | System hardening through configuration management | Preventive | |
Configure the "maximum response size that can be cached in the kernel" setting to organizational standards. CC ID 09239 | System hardening through configuration management | Preventive | |
Configure the "maximum size of the entire request body" setting to organizational standards. CC ID 09240 | System hardening through configuration management | Preventive | |
Configure the "URLScan ISAPI filters" setting to organizational standards. CC ID 09241 | System hardening through configuration management | Preventive | |
Configure the "HTTP SSL (HTTPFilter) service" setting to organizational standards. CC ID 09242 | System hardening through configuration management | Preventive | |
Configure the "identity" setting for the "IIS Application Pools service" to organizational standards. CC ID 09243 | System hardening through configuration management | Preventive | |
Configure the "worker process isolation" setting to organizational standards. CC ID 09244 | System hardening through configuration management | Preventive | |
Configure the "Recycle worker process (in minutes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09245 | System hardening through configuration management | Preventive | |
Configure the "Recycle worker process (number of requests)" setting for the "IIS Application Pool" to organizational standards. CC ID 09246 | System hardening through configuration management | Preventive | |
Configure the "Maximum virtual memory (in megabytes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09247 | System hardening through configuration management | Preventive | |
Configure the "Maximum used memory (in megabytes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09248 | System hardening through configuration management | Preventive | |
Configure the "Shutdown worker processes after being idle (time in minutes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09249 | System hardening through configuration management | Preventive | |
Configure the "Limit the kernel request queue (number of requests)" setting for the "IIS Application Pool" to organizational standards. CC ID 09250 | System hardening through configuration management | Preventive | |
Configure the "Enable pinging" setting for the "IIS Application Pool" to organizational standards. CC ID 09251 | System hardening through configuration management | Preventive | |
Configure the "Ping worker process every (frequency in seconds)" setting for the "IIS Application Pool" to organizational standards. CC ID 09252 | System hardening through configuration management | Preventive | |
Configure the "Enable rapid-fail protection" setting for the "IIS Application Pool" to organizational standards. CC ID 09253 | System hardening through configuration management | Preventive | |
Configure the "Enable rapid-fail protection - Failures" setting for the "IIS Application Pool" to organizational standards. CC ID 09254 | System hardening through configuration management | Preventive | |
Configure the "Enable rapid-fail protection - Time Period" setting for the "IIS Application Pool" to organizational standards. CC ID 09255 | System hardening through configuration management | Preventive | |
Configure the "auditing" setting for the "MetaBase.xml" file to organizational standards. CC ID 09256 | System hardening through configuration management | Preventive | |
Configure Microsoft SQL Server to Organizational Standards. CC ID 08989 | System hardening through configuration management | Preventive | |
Configure the "allowing DDL statements to modify the application schema" permissions for the "Database application" to organizational standards. CC ID 09258 | System hardening through configuration management | Preventive | |
Configure the "encrypt custom and GOTS application source code" setting to organizational standards. CC ID 09259 | System hardening through configuration management | Preventive | |
Configure the "Access to DBMS software files and directories" setting to organizational standards. CC ID 09264 | System hardening through configuration management | Preventive | |
Configure the "Default demonstration and sample database objects and applications" setting to organizational standards. CC ID 09265 | System hardening through configuration management | Preventive | |
Configure the "auditing parameters" for "database auditing" to organizational standards. CC ID 09266 | System hardening through configuration management | Preventive | |
Configure the "DBMS login account password complexity requirements" setting to organizational standards. CC ID 09268 | System hardening through configuration management | Preventive | |
Configure the "Passwords for DBMS default accounts" setting to organizational standards. CC ID 09269 | System hardening through configuration management | Preventive | |
Configure the "Remote DBMS administration" setting to organizational standards. CC ID 09270 | System hardening through configuration management | Preventive | |
Configure the "C2 Audit records" setting to organizational standards. CC ID 09271 | System hardening through configuration management | Preventive | |
Configure the "SQL Mail XPs" setting to organizational standards. CC ID 09272 | System hardening through configuration management | Preventive | |
Configure the "SQL Server Service" setting to organizational standards. CC ID 09275 | System hardening through configuration management | Preventive | |
Configure the "Access extended stored procedure xp_cmdshell" setting to organizational standards. CC ID 09277 | System hardening through configuration management | Preventive | |
Configure the "xp_cmdshell" setting to organizational standards. CC ID 09278 | System hardening through configuration management | Preventive | |
Configure the "OLE Automation extended stored procedures" setting to organizational standards. CC ID 09279 | System hardening through configuration management | Preventive | |
Configure the "Access to registry extended stored procedures" setting to organizational standards. CC ID 09280 | System hardening through configuration management | Preventive | |
Configure the "Remote access" setting to organizational standards. CC ID 09281 | System hardening through configuration management | Preventive | |
Configure "Set time limit for active but idle Remote Desktop Services sessions" to organizational standards. CC ID 15382 | System hardening through configuration management | Preventive | |
Configure the "Always show desktop on connection" setting to organizational standards. CC ID 10753 | System hardening through configuration management | Preventive | |
Configure the "Automatic reconnection" setting to organizational standards. CC ID 10760 | System hardening through configuration management | Preventive | |
Configure the "keep-alive connection interval" setting to organizational standards. CC ID 10790 | System hardening through configuration management | Preventive | |
Configure the "RD Connection Broker farm name" setting to organizational standards. CC ID 10800 | System hardening through configuration management | Preventive | |
Configure the "RD Connection Broker server name" setting to organizational standards. CC ID 10801 | System hardening through configuration management | Preventive | |
Configure the "server authentication for client" setting for "Remote Desktop Connection Client" to organizational standards. CC ID 10817 | System hardening through configuration management | Preventive | |
Configure the "Do not use Remote Desktop Session Host server IP address when virtual IP address is not available" setting to organizational standards. CC ID 10938 | System hardening through configuration management | Preventive | |
Configure the "Enforce Removal of Remote Desktop Wallpaper" setting to organizational standards. CC ID 10957 | System hardening through configuration management | Preventive | |
Configure the "Hide previous versions list for remote files" setting to organizational standards. CC ID 10990 | System hardening through configuration management | Preventive | |
Configure the "Join RD Connection Broker" setting to organizational standards. CC ID 11003 | System hardening through configuration management | Preventive | |
Configure the "Limit number of connections" setting to organizational standards. CC ID 11011 | System hardening through configuration management | Preventive | |
Configure the "Optimize visual experience for Remote Desktop Services sessions" setting to organizational standards. CC ID 11058 | System hardening through configuration management | Preventive | |
Configure the "Prevent restoring remote previous versions" setting to organizational standards. CC ID 11089 | System hardening through configuration management | Preventive | |
Configure the "Require strict target SPN match on remote procedure calls" setting to organizational standards. CC ID 11136 | System hardening through configuration management | Preventive | |
Configure the "Require use of specific security layer for remote (RDP) connections" setting to organizational standards. CC ID 11137 | System hardening through configuration management | Preventive | |
Configure the "Restrict Remote Desktop Services users to a single Remote Desktop Services session" setting to organizational standards. CC ID 11142 | System hardening through configuration management | Preventive | |
Configure the "Select the network adapter to be used for Remote Desktop IP Virtualization" setting to organizational standards. CC ID 11164 | System hardening through configuration management | Preventive | |
Configure the "Set maximum wait time for the network if a user has a roaming user profile or remote home directory" setting to organizational standards. CC ID 11175 | System hardening through configuration management | Preventive | |
Configure the "Set path for Remote Desktop Services Roaming User Profile" setting to organizational standards. CC ID 11176 | System hardening through configuration management | Preventive | |
Configure the "Set Remote Desktop Services User Home Directory" setting to organizational standards. CC ID 11181 | System hardening through configuration management | Preventive | |
Configure the "Set rules for remote control of Remote Desktop Services user sessions" setting to organizational standards. CC ID 11183 | System hardening through configuration management | Preventive | |
Configure the "Set the Remote Desktop licensing mode" setting to organizational standards. CC ID 11188 | System hardening through configuration management | Preventive | |
Configure the "Set time limit for active Remote Desktop Services sessions" setting to organizational standards. CC ID 11194 | System hardening through configuration management | Preventive | |
Configure the "Set time limit for logoff of RemoteApp sessions" setting to organizational standards. CC ID 11195 | System hardening through configuration management | Preventive | |
Configure the "Specify maximum number of remote shells per user" setting to organizational standards. CC ID 11213 | System hardening through configuration management | Preventive | |
Configure the "Start a program on connection" setting to organizational standards. CC ID 11228 | System hardening through configuration management | Preventive | |
Configure the "Turn off desktop gadgets" setting to organizational standards. CC ID 11275 | System hardening through configuration management | Preventive | |
Configure the "Turn off legacy remote shutdown interface" setting to organizational standards. CC ID 11285 | System hardening through configuration management | Preventive | |
Configure the "Turn Off user-installed desktop gadgets" setting to organizational standards. CC ID 11322 | System hardening through configuration management | Preventive | |
Configure the "Turn on Remote Desktop IP Virtualization" setting to organizational standards. CC ID 11348 | System hardening through configuration management | Preventive | |
Configure the "Use RD Connection Broker load balancing" setting to organizational standards. CC ID 11364 | System hardening through configuration management | Preventive | |
Configure the "Use the specified Remote Desktop license servers" setting to organizational standards. CC ID 11366 | System hardening through configuration management | Preventive | |
Configure the "Wait for remote user profile" setting to organizational standards. CC ID 11370 | System hardening through configuration management | Preventive | |
Configure the "SQL Server authentication" setting to organizational standards. CC ID 09282 | System hardening through configuration management | Preventive | |
Configure the "Access to CmdExec and ActiveScripting jobs" setting to organizational standards. CC ID 09283 | System hardening through configuration management | Preventive | |
Configure the "Error log retention" setting to organizational standards. CC ID 09284 | System hardening through configuration management | Preventive | |
Configure the "Trace rollover" setting to organizational standards. CC ID 09285 | System hardening through configuration management | Preventive | |
Configure the "Named Pipes network protocol" setting to organizational standards. CC ID 09286 | System hardening through configuration management | Preventive | |
Configure the "SQL Server event forwarding" setting to organizational standards. CC ID 09287 | System hardening through configuration management | Preventive | |
Configure the "Access to manage the database master key" setting to organizational standards. CC ID 09288 | System hardening through configuration management | Preventive | |
Configure the "Encryption of the asymmetric keys" setting to organizational standards. CC ID 09290 | System hardening through configuration management | Preventive | |
Configure the "audit unauthorized access to the asymmetric keys" setting to organizational standards. CC ID 09291 | System hardening through configuration management | Preventive | |
Configure the "Database Master key encryption password" setting to organizational standards. CC ID 09292 | System hardening through configuration management | Preventive | |
Configure the "encrypt Database Master Key" setting to organizational standards. CC ID 09293 | System hardening through configuration management | Preventive | |
Configure the "store the database master key password" setting to organizational standards. CC ID 09294 | System hardening through configuration management | Preventive | |
Configure the "protect symmetric keys" setting to organizational standards. CC ID 09295 | System hardening through configuration management | Preventive | |
Configure the "clear residual data from memory, data objects or files, or other storage locations" setting to organizational standards. CC ID 09296 | System hardening through configuration management | Preventive | |
Configure the "DBMS account passwords expiration" setting to organizational standards. CC ID 09297 | System hardening through configuration management | Preventive | |
Configure the "audit attempts to bypass access controls" setting to organizational standards. CC ID 09310 | System hardening through configuration management | Preventive | |
Configure the "default audit trace" setting to organizational standards. CC ID 09311 | System hardening through configuration management | Preventive | |
Configure the "Audit records contents" setting to organizational standards. CC ID 09312 | System hardening through configuration management | Preventive | |
Configure the "port" setting for "Sql Server Analysis Services" to organizational standards. CC ID 09313 | System hardening through configuration management | Preventive | |
Configure the "port" setting for the "DBMS" to organizational standards. CC ID 09314 | System hardening through configuration management | Preventive | |
Configure the "Fixed server roll membership" setting to organizational standards. CC ID 09315 | System hardening through configuration management | Preventive | |
Configure the "Database Mail XPs" setting to organizational standards. CC ID 09316 | System hardening through configuration management | Preventive | |
Configure the "SQL Server Agent Email" setting to organizational standards. CC ID 09317 | System hardening through configuration management | Preventive | |
Configure the "scan for startup procs" setting to organizational standards. CC ID 09331 | System hardening through configuration management | Preventive | |
Configure the "Access to SQL Server Agent CmdExec" setting to organizational standards. CC ID 09332 | System hardening through configuration management | Preventive | |
Configure the "Access to ActiveScripting jobs" setting to organizational standards. CC ID 09333 | System hardening through configuration management | Preventive | |
Configure the "SQL Server Agent proxies" setting to organizational standards. CC ID 09334 | System hardening through configuration management | Preventive | |
Configure the "Replication snapshot folders" setting to organizational standards. CC ID 09335 | System hardening through configuration management | Preventive | |
Configure the "Ad hoc data mining queries configuration" setting to organizational standards. CC ID 09336 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services Anonymous Connections" setting to organizational standards. CC ID 09337 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services Links to Objects" setting to organizational standards. CC ID 09338 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services Links From Objects" setting to organizational standards. CC ID 09339 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services user-defined COM functions" setting to organizational standards. CC ID 09340 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services Required Protection Levels" setting to organizational standards. CC ID 09341 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services Security Package List" setting to organizational standards. CC ID 09342 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services server role" setting to organizational standards. CC ID 09343 | System hardening through configuration management | Preventive | |
Configure the "Analysis Services database roles" setting to organizational standards. CC ID 09344 | System hardening through configuration management | Preventive | |
Configure the "Reporting Services Web service requests and HTTP" setting to organizational standards. CC ID 09345 | System hardening through configuration management | Preventive | |
Configure the "Reporting Services scheduled events and report delivery" setting to organizational standards. CC ID 09346 | System hardening through configuration management | Preventive | |
Configure the "Command Language Runtime objects" setting to organizational standards. CC ID 09348 | System hardening through configuration management | Preventive | |
Configure the "XML Web Services endpoints" setting to organizational standards. CC ID 09349 | System hardening through configuration management | Preventive | |
Configure the "db_owner role members" setting to organizational standards. CC ID 09350 | System hardening through configuration management | Preventive | |
Configure the "Web Assistant procedures configuration" setting to organizational standards. CC ID 09351 | System hardening through configuration management | Preventive | |
Configure the "Disallow adhoc access" setting for "linked servers" to organizational standards. CC ID 09353 | System hardening through configuration management | Preventive | |
Configure the "Ad Hoc distributed queries" setting to organizational standards. CC ID 09354 | System hardening through configuration management | Preventive | |
Configure the "Access to Analysis Services data sources" setting to organizational standards. CC ID 09355 | System hardening through configuration management | Preventive | |
Configure the "Database TRUSTWORTHY status" setting to organizational standards. CC ID 09356 | System hardening through configuration management | Preventive | |
Configure the "Agent XPs" setting to organizational standards. CC ID 09357 | System hardening through configuration management | Preventive | |
Configure the "SMO and DMO XPs" setting to organizational standards. CC ID 09358 | System hardening through configuration management | Preventive | |
Configure Oracle WebLogic Server to Organizational Standards. CC ID 08990 | System hardening through configuration management | Preventive | |
Configure the "Complete Message Timeout" setting to organizational standards. CC ID 09818 | System hardening through configuration management | Preventive | |
Configure the "FIPS- compliant cryptographic module" setting to organizational standards. CC ID 09819 | System hardening through configuration management | Preventive | |
Configure the "Allow Unencrypted Null Cipher" setting to organizational standards. CC ID 09820 | System hardening through configuration management | Preventive | |
Configure the "Maximum Message Size" setting to organizational standards. CC ID 09821 | System hardening through configuration management | Preventive | |
Configure the "Security Interoperability Mode" setting to organizational standards. CC ID 09822 | System hardening through configuration management | Preventive | |
Configure the "Severity field" setting to organizational standards. CC ID 09824 | System hardening through configuration management | Preventive | |
Configure the "servlet.HttpServletResponse" setting for "Active Context Handler" to organizational standards. CC ID 09825 | System hardening through configuration management | Preventive | |
Configure the "wli.Message" setting for "Active Context Handler" to organizational standards. CC ID 09826 | System hardening through configuration management | Preventive | |
Configure the "channel.Port" setting for "Active Context Handler" to organizational standards. CC ID 09827 | System hardening through configuration management | Preventive | |
Configure the "channel.PublicPort" setting for "Active Context Handler" to organizational standards. CC ID 09828 | System hardening through configuration management | Preventive | |
Configure the "channel.RemotePort" setting for "Active Context Handler" to organizational standards. CC ID 09829 | System hardening through configuration management | Preventive | |
Configure the "channel.Protocol" setting for "Active Context Handler" to organizational standards. CC ID 09830 | System hardening through configuration management | Preventive | |
Configure the "channel.Address" setting for "Active Context Handler" to organizational standards. CC ID 09831 | System hardening through configuration management | Preventive | |
Configure the "channel.PublicAddress" setting for "Active Context Handler" to organizational standards. CC ID 09832 | System hardening through configuration management | Preventive | |
Configure the "channel.RemoteAddress" setting for "Active Context Handler" to organizational standards. CC ID 09833 | System hardening through configuration management | Preventive | |
Configure the "channel.ChannelName" setting for "Active Context Handler" to organizational standards. CC ID 09834 | System hardening through configuration management | Preventive | |
Configure the "channel.Secure" setting for "Active Context Handler" to organizational standards. CC ID 09835 | System hardening through configuration management | Preventive | |
Configure the "ejb20.Parameter" setting for "Active Context Handler" to organizational standards CC ID 09836 | System hardening through configuration management | Preventive | |
Configure the "wsee.SOAPmessage" setting for "Active Context Handler" to organizational standards. CC ID 09837 | System hardening through configuration management | Preventive | |
Configure the "entitlement.EAuxilaryID" setting for "Active Context Handler" to organizational standards. CC ID 09838 | System hardening through configuration management | Preventive | |
Configure the "security.ChainPrevalidatedBySSL" setting for "Active Context Handler" to organizational standards. CC ID 09839 | System hardening through configuration management | Preventive | |
Configure the "xml.SecurityToken" setting for "Active Context Handler" to organizational standards. CC ID 09840 | System hardening through configuration management | Preventive | |
Configure the "webservice.Integrity" setting for "Active Context Handler" to organizational standards. CC ID 09841 | System hardening through configuration management | Preventive | |
Configure the "saml.SSLClientCertificateChain" setting for "Active Context Handler" to organizational standards. CC ID 09842 | System hardening through configuration management | Preventive | |
Configure the "saml.MessageSignerCerficate" setting for "Active Context Handler" to organizational standards. CC ID 09843 | System hardening through configuration management | Preventive | |
Configure the "saml.subject.ConfirmationMethod" setting for "Active Context Handler" to organizational standards. CC ID 09844 | System hardening through configuration management | Preventive | |
Configure the "saml.subject.dom.KeyInfo" setting for "Active Context Handler" to organizational standards. CC ID 09845 | System hardening through configuration management | Preventive | |
Configure the "jmx.ObjectName" setting for "Active Context Handler" to organizational standards. CC ID 09846 | System hardening through configuration management | Preventive | |
Configure the "jmx.ShortName" setting for "Active Context Handler" to organizational standards. CC ID 09847 | System hardening through configuration management | Preventive | |
Configure the "jmx.Parameters" setting for "Active Context Handler" to organizational standards. CC ID 09848 | System hardening through configuration management | Preventive | |
Configure the "jmx.Signature" setting for "Active Context Handler" to organizational standards. CC ID 09849 | System hardening through configuration management | Preventive | |
Configure the "jmx.AuditProtectedArgInfo" setting for "Active Context Handler" to organizational standards. CC ID 09850 | System hardening through configuration management | Preventive | |
Configure the "jmx.OldAttributeValue" setting for "Active Context Handler" to organizational standards. CC ID 09851 | System hardening through configuration management | Preventive | |
Configure the "Reject if Password Contains the User Name" setting to organizational standards. CC ID 09852 | System hardening through configuration management | Preventive | |
Configure the "Reject if Password Contains the User Name Reversed" setting to organizational standards. CC ID 09853 | System hardening through configuration management | Preventive | |
Configure the "maximum instances of any character field" setting to organizational standards. CC ID 09854 | System hardening through configuration management | Preventive | |
Configure the "maximum consecutive characters field" setting to organizational standards. CC ID 09855 | System hardening through configuration management | Preventive | |
Configure the "minimum number of alphabetic characters field" setting to organizational standards. CC ID 09856 | System hardening through configuration management | Preventive | |
Configure the "minimum number of numeric characters field" setting to organizational standards. CC ID 09857 | System hardening through configuration management | Preventive | |
Configure the "minimum number of non-alphanumeric characters field" setting to organizational standards. CC ID 09858 | System hardening through configuration management | Preventive | |
Configure the "Lockout Threshold" setting in the "Security Realm" to organizational standards. CC ID 09861 | System hardening through configuration management | Preventive | |
Configure the "Lockout Duration" setting in the "Security Realm" to organizational standards. CC ID 09862 | System hardening through configuration management | Preventive | |
Configure the "Lockout Reset Duration" setting in the "Security Realm" to organizational standards. CC ID 09863 | System hardening through configuration management | Preventive | |
Configure the "Require Unanimous Permit" setting to organizational standards. CC ID 09864 | System hardening through configuration management | Preventive | |
Configure the "Host Name Verification" setting on the "Administration Server" to organizational standards. CC ID 09865 | System hardening through configuration management | Preventive | |
Configure the "Minimum Number of Non-Alphabetic Characters" setting to organizational standards. CC ID 09866 | System hardening through configuration management | Preventive | |
Configure the "SSL Enabled" setting for "LDAP Server connections" to organizational standards. CC ID 09867 | System hardening through configuration management | Preventive | |
Configure the "Host Name Verification" setting to organizational standards. CC ID 09868 | System hardening through configuration management | Preventive | |
Configure the "Domain Credentials" setting to organizational standards. CC ID 09869 | System hardening through configuration management | Preventive | |
Configure the "Configuration Archive Enabled" setting to organizational standards. CC ID 09870 | System hardening through configuration management | Preventive | |
Configure the "Archive Configuration Count" setting to organizational standards. CC ID 09871 | System hardening through configuration management | Preventive | |
Configure the "Default Administrator field" setting to organizational standards. CC ID 09872 | System hardening through configuration management | Preventive | |
Configure the "SSL Listen Port" setting to organizational standards. CC ID 09873 | System hardening through configuration management | Preventive | |
Configure the "Administration Console Session Timeout field" setting to organizational standards. CC ID 09874 | System hardening through configuration management | Preventive | |
Configure the "Production Mode" setting to organizational standards. CC ID 09875 | System hardening through configuration management | Preventive | |
Configure the "WebLogic Auditing provider" setting to organizational standards. CC ID 09876 | System hardening through configuration management | Preventive | |
Configure the "Invocation Timeout Seconds" setting to organizational standards. CC ID 09877 | System hardening through configuration management | Preventive | |
Configure the "Anonymous Admin Lookup Enabled" setting to organizational standards. CC ID 09878 | System hardening through configuration management | Preventive | |
Configure the "Web App Files Case Insensitive" setting to organizational standards. CC ID 09879 | System hardening through configuration management | Preventive | |
Configure the "Enable Administration Port" setting to organizational standards. CC ID 09880 | System hardening through configuration management | Preventive | |
Configure the "SSL Rejection Logging Enabled" setting to organizational standards. CC ID 09881 | System hardening through configuration management | Preventive | |
Configure the "Export Key Lifespan" setting to organizational standards. CC ID 09882 | System hardening through configuration management | Preventive | |
Configure the "Client Cert Proxy Enabled" setting for the "Administration Server" to organizational standards. CC ID 09883 | System hardening through configuration management | Preventive | |
Configure the "Client Cert Proxy Enabled" setting for the "managed server" to organizational standards. CC ID 09884 | System hardening through configuration management | Preventive | |
Configure the "Frontend Host" setting to organizational standards. CC ID 09885 | System hardening through configuration management | Preventive | |
Configure the "Check Roles and Policies" setting to organizational standards. CC ID 09886 | System hardening through configuration management | Preventive | |
Configure the "Security Model Default" setting to organizational standards. CC ID 09887 | System hardening through configuration management | Preventive | |
Configure the "When Deploying Web Applications or EJBS" setting to organizational standards. CC ID 09888 | System hardening through configuration management | Preventive | |
Configure the "Configuration Audit Type field" setting to organizational standards. CC ID 09889 | System hardening through configuration management | Preventive | |
Configure the "EditMBeanServerEnabled" setting for the "Administration Server" to organizational standards. CC ID 09890 | System hardening through configuration management | Preventive | |
Configure the "two-way SSL" setting to organizational standards. CC ID 09891 | System hardening through configuration management | Preventive | |
Configure the "Embedded LDAP Timeout" setting to organizational standards. CC ID 09892 | System hardening through configuration management | Preventive | |
Configure the "Anonymous Bind Allowed" setting to organizational standards. CC ID 09893 | System hardening through configuration management | Preventive | |
Configure the "Post Timeout field" setting to organizational standards. CC ID 09894 | System hardening through configuration management | Preventive | |
Configure the "HTTP Duration" setting to organizational standards. CC ID 09895 | System hardening through configuration management | Preventive | |
Configure the "HTTPS Duration" setting to organizational standards. CC ID 09896 | System hardening through configuration management | Preventive | |
Configure the "HTTP Maximum Message Size" setting to organizational standards. CC ID 09897 | System hardening through configuration management | Preventive | |
Configure the "Connection Filter" setting for the "managed server" to organizational standards. CC ID 09898 | System hardening through configuration management | Preventive | |
Configure the "connection filter" setting to organizational standards. CC ID 09899 | System hardening through configuration management | Preventive | |
Configure the "Client Cert Proxy Enabled" setting to organizational standards. CC ID 09904 | System hardening through configuration management | Preventive | |
Configure the "Auth Cookie Enabled" setting to organizational standards. CC ID 09905 | System hardening through configuration management | Preventive | |
Configure the "Maximum Open Sockets" setting on the "Administration server" to organizational standards. CC ID 09906 | System hardening through configuration management | Preventive | |
Configure the "Complete Message Timeout" setting for "each custom channel" to organizational standards. CC ID 09908 | System hardening through configuration management | Preventive | |
Configure the "Idle Connection Timeout" setting for "each custom channel" to organizational standards. CC ID 09909 | System hardening through configuration management | Preventive | |
Configure the "Maximum Message Size" setting for "each custom channel" to organizational standards. CC ID 09910 | System hardening through configuration management | Preventive | |
Configure the "Node Manager Listen Address" setting to organizational standards. CC ID 09911 | System hardening through configuration management | Preventive | |
Configure the "Node Manager Type" setting to organizational standards. CC ID 09912 | System hardening through configuration management | Preventive | |
Configure the "Policy Selection Preference" setting to organizational standards. CC ID 09913 | System hardening through configuration management | Preventive | |
Configure the "Maximum Open Sockets" setting for "all Managed Servers" to organizational standards. CC ID 09914 | System hardening through configuration management | Preventive | |
Configure the "Enforce Constraints" setting for "digital certificates" to organizational standards. CC ID 09915 | System hardening through configuration management | Preventive | |
Configure the "Keystores field" setting to organizational standards. CC ID 09916 | System hardening through configuration management | Preventive | |
Configure the "HTTP Access Log File" setting to organizational standards. CC ID 09917 | System hardening through configuration management | Preventive | |
Configure the "Custom Hostname Verifier field" setting to organizational standards. CC ID 09918 | System hardening through configuration management | Preventive | |
Configure the "SSL port enabled" setting to organizational standards. CC ID 09919 | System hardening through configuration management | Preventive | |
Configure the "Listen Port Enabled" setting to organizational standards. CC ID 09920 | System hardening through configuration management | Preventive | |
Configure security and protection software according to Organizational Standards. CC ID 11917 | System hardening through configuration management | Preventive | |
Configure security and protection software to automatically run at startup. CC ID 12443 | System hardening through configuration management | Preventive | |
Configure security and protection software to enable automatic updates. CC ID 11945 | System hardening through configuration management | Preventive | |
Configure security and protection software to check e-mail attachments. CC ID 11860 | System hardening through configuration management | Preventive | |
Configure Windows Defender Remote Credential Guard to organizational standards. CC ID 16515 | System hardening through configuration management | Preventive | |
Configure Windows Defender Credential Guard to organizational standards. CC ID 16514 | System hardening through configuration management | Preventive | |
Configure dedicated systems used for system management according to organizational standards. CC ID 12132 | System hardening through configuration management | Preventive | |
Configure dedicated systems used for system management to prohibit them from composing documents. CC ID 12161 | System hardening through configuration management | Preventive | |
Configure dedicated systems used for system management so they are prohibited from accessing e-mail. CC ID 12160 | System hardening through configuration management | Preventive | |
Configure Application Programming Interfaces in accordance with organizational standards. CC ID 12170 | System hardening through configuration management | Preventive | |
Configure Application Programming Interfaces to enforce authentication. CC ID 12172 | System hardening through configuration management | Preventive | |
Configure Application Programming Interfaces to employ strong cryptography. CC ID 12171 | System hardening through configuration management | Preventive | |
Configure the Domain Name System in accordance with organizational standards. CC ID 12202 | System hardening through configuration management | Preventive | |
Configure the Domain Name System query logging to organizational standards. CC ID 12210 | System hardening through configuration management | Preventive | |
Configure the secure name/address resolution service (recursive or caching resolver). CC ID 01625 | System hardening through configuration management | Preventive | |
Configure the secure name/address resolution service (authoritative source). CC ID 01624 | System hardening through configuration management | Preventive | |
Configure payment systems in accordance with organizational standards. CC ID 12217 | System hardening through configuration management | Preventive | |
Configure payment systems to disable storing transactions when offline. CC ID 12220 | System hardening through configuration management | Preventive | |
Configure payment systems to disable authorizing transactions when offline. CC ID 12219 | System hardening through configuration management | Preventive | |
Configure payment applications to become disabled when suspicious activity is detected. CC ID 12221 | System hardening through configuration management | Corrective | |
Configure File Integrity Monitoring Software to Organizational Standards. CC ID 11923 | System hardening through configuration management | Preventive | |
Configure the file integrity monitoring software to perform critical file comparisons, as necessary. CC ID 11924 | System hardening through configuration management | Preventive | |
Configure Bluetooth settings according to organizational standards. CC ID 12422 | System hardening through configuration management | Preventive | |
Unpair Bluetooth devices when the pairing is no longer required. CC ID 15232 | System hardening through configuration management | Preventive | |
Use authorized versions of Bluetooth to pair Bluetooth devices. CC ID 15231 | System hardening through configuration management | Preventive | |
Refrain from using unit keys on Bluetooth devices. CC ID 12541 | System hardening through configuration management | Preventive | |
Configure link keys to be based on combination keys in Bluetooth devices. CC ID 12539 | System hardening through configuration management | Preventive | |
Refrain from using the "Just Works" model of Secure Simple Pairing in Bluetooth settings. CC ID 12538 | System hardening through configuration management | Preventive | |
Disable all Bluetooth profiles other than the Serial Port Profile. CC ID 12536 | System hardening through configuration management | Preventive | |
Lock Bluetooth profiles to prevent them being altered by end users. CC ID 12535 | System hardening through configuration management | Preventive | |
Configure Bluetooth to refrain from allowing multiple profiles of Bluetooth stacks. CC ID 12433 | System hardening through configuration management | Preventive | |
Remove backup files after initializing and hardening is complete. CC ID 01602 | System hardening through configuration management | Preventive | |
Configure systems to protect against unauthorized data mining. CC ID 10095 | System hardening through configuration management | Preventive | |
Implement safeguards to prevent unauthorized code execution. CC ID 10686 | System hardening through configuration management | Preventive | |
Configure network switches to organizational standards. CC ID 12120 | System hardening through configuration management | Preventive | |
Enable Virtual Local Area Networks on network switches, as necessary. CC ID 12129 | System hardening through configuration management | Preventive | |
Encrypt electronic commerce transactions and messages. CC ID 08621 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish test environments separate from the production environment to support feasibility testing before product acquisition. CC ID 01130 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include passwords, Personal Identification Numbers, and card security codes in the personal data definition. CC ID 04699 | Privacy protection for information and data | Preventive | |
Store payment card data in secure chips, if possible. CC ID 13065 | Privacy protection for information and data | Preventive | |
Refrain from storing data elements containing sensitive authentication data after authorization is approved. CC ID 04758 | Privacy protection for information and data | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Address Information Security during the business planning processes. CC ID 06495 | Leadership and high level objectives | Preventive | |
Include the system components that generate audit records in the event logging procedures. CC ID 16426 | Monitoring and measurement | Preventive | |
Overwrite the oldest records when audit logging fails. CC ID 14308 | Monitoring and measurement | Preventive | |
Include data quality in the risk management strategies. CC ID 15308 | Audits and risk management | Preventive | |
Establish and maintain contact information for user accounts, as necessary. CC ID 15418 | Technical security | Preventive | |
Enforce access restrictions for restricted data. CC ID 01921 [{access controls} Review whether management does the following: Establishes controls to limit access to data. App A Objective 6.18.b] | Technical security | Preventive | |
Include the date and time that access was reviewed in the system record. CC ID 16416 | Technical security | Preventive | |
Disseminate and communicate user identifiers and authenticators using secure communication protocols. CC ID 06791 | Technical security | Preventive | |
Include virtual systems in the network diagram. CC ID 16324 | Technical security | Preventive | |
Restrict inbound network traffic into the Demilitarized Zone. CC ID 01285 | Technical security | Preventive | |
Segregate applications and databases that contain restricted data or restricted information in an internal network zone. CC ID 01289 | Technical security | Preventive | |
Protect data stored at external locations. CC ID 16333 | Technical security | Preventive | |
Restrict outbound network traffic from systems that contain restricted data or restricted information. CC ID 01295 | Technical security | Preventive | |
Deny direct Internet access to databases that store restricted data or restricted information. CC ID 01271 | Technical security | Preventive | |
Establish, implement, and maintain an automated information flow approval process or semi-automated information flow approval process for transmitting or receiving restricted data or restricted information. CC ID 06734 | Technical security | Detective | |
Constrain the information flow of restricted data or restricted information. CC ID 06763 [Review whether management does the following: Implements appropriate controls over the electronic transmission of information or, if appropriate safeguards are unavailable, restricts the type of information that can be transmitted. App A Objective 6.18.d] | Technical security | Preventive | |
Quarantine data that fails security tests. CC ID 16500 | Technical security | Corrective | |
Restrict access to restricted data and restricted information on a need to know basis. CC ID 12453 | Technical security | Preventive | |
Prohibit restricted data or restricted information from being sent to mobile devices. CC ID 04725 | Technical security | Preventive | |
Prohibit restricted data or restricted information from being copied or moved absent approval of system boundaries for information flow control. CC ID 06310 | Technical security | Preventive | |
Define risk tolerance to illicit data flow for each type of information classification. CC ID 01923 | Technical security | Preventive | |
Disclose non-privacy related restricted information after a court makes a determination the information is material to a court case. CC ID 06242 | Technical security | Preventive | |
Exchange non-privacy related restricted information with approved third parties if the information supports an approved activity. CC ID 06243 | Technical security | Preventive | |
Perform content sanitization on data-in-transit. CC ID 16512 | Technical security | Preventive | |
Perform content conversion on data-in-transit. CC ID 16510 | Technical security | Preventive | |
Protect data from unauthorized access while transmitting between separate parts of the system. CC ID 16499 | Technical security | Preventive | |
Protect data from modification or loss while transmitting between separate parts of the system. CC ID 04554 | Technical security | Preventive | |
Protect data from unauthorized disclosure while transmitting between separate parts of the system. CC ID 11859 | Technical security | Preventive | |
Establish, implement, and maintain whitelists and blacklists of web content. CC ID 15234 | Technical security | Preventive | |
Implement the documented cryptographic module security functions. CC ID 06755 | Technical security | Preventive | |
Establish, implement, and maintain digital signatures. CC ID 13828 | Technical security | Preventive | |
Include the expiration date in digital signatures. CC ID 13833 | Technical security | Preventive | |
Include audience restrictions in digital signatures. CC ID 13834 | Technical security | Preventive | |
Include the subject in digital signatures. CC ID 13832 | Technical security | Preventive | |
Include the issuer in digital signatures. CC ID 13831 | Technical security | Preventive | |
Include identifiers in the digital signature. CC ID 13829 | Technical security | Preventive | |
Encrypt in scope data or in scope information, as necessary. CC ID 04824 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30 Management should implement the type and level of encryption commensurate with the sensitivity of the information. II.C.19 Encryption Management should implement the type and level of encryption commensurate with the sensitivity of the information. II.C.19 Encryption] | Technical security | Preventive | |
Digitally sign records and data, as necessary. CC ID 16507 | Technical security | Preventive | |
Decrypt restricted data for the minimum time required. CC ID 12308 | Technical security | Preventive | |
Decrypt personal data only on dedicated networks, not on public networks. CC ID 12309 | Technical security | Preventive | |
Establish, implement, and maintain cryptographic key creation domain parameter requirements. CC ID 06575 | Technical security | Preventive | |
Protect salt values and hash values in accordance with organizational standards. CC ID 16471 | Technical security | Preventive | |
Recover encrypted data for lost cryptographic keys, compromised cryptographic keys, or damaged cryptographic keys. CC ID 01301 | Technical security | Preventive | |
Generate strong cryptographic keys. CC ID 01299 | Technical security | Preventive | |
Use approved random number generators for creating cryptographic keys. CC ID 06574 | Technical security | Preventive | |
Disseminate and communicate cryptographic keys securely. CC ID 01300 | Technical security | Preventive | |
Control the input and output of cryptographic keys from a cryptographic module. CC ID 06541 | Technical security | Preventive | |
Store cryptographic keys securely. CC ID 01298 | Technical security | Preventive | |
Restrict access to cryptographic keys. CC ID 01297 | Technical security | Preventive | |
Store cryptographic keys in encrypted format. CC ID 06084 | Technical security | Preventive | |
Change cryptographic keys in accordance with organizational standards. CC ID 01302 | Technical security | Preventive | |
Destroy cryptographic keys promptly after the retention period. CC ID 01303 | Technical security | Preventive | |
Control cryptographic keys with split knowledge and dual control. CC ID 01304 | Technical security | Preventive | |
Prevent the unauthorized substitution of cryptographic keys. CC ID 01305 | Technical security | Preventive | |
Revoke old cryptographic keys or invalid cryptographic keys immediately. CC ID 01307 | Technical security | Corrective | |
Replace known or suspected compromised cryptographic keys immediately. CC ID 01306 | Technical security | Corrective | |
Archive outdated cryptographic keys. CC ID 06884 | Technical security | Preventive | |
Archive revoked cryptographic keys. CC ID 11819 | Technical security | Preventive | |
Manage the digital signature cryptographic key pair. CC ID 06576 | Technical security | Preventive | |
Track restricted storage media while it is in transit. CC ID 00967 | Physical and environmental protection | Detective | |
Establish, implement, and maintain removable storage media controls. CC ID 06680 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Secures or removes external drives and portable media from system consoles, terminals, or PCs running terminal emulations, residing outside of physically secure locations. App A Objective 6.21.d As part of management's process to secure the operating system and all system components, determine whether management does the following: Secures or removes external drives and portable media from system consoles, terminals, or PCs running terminal emulations, residing outside of physically secure locations. App A Objective 6.21.d] | Physical and environmental protection | Preventive | |
Control access to restricted storage media. CC ID 04889 | Physical and environmental protection | Preventive | |
Encrypt information stored on devices in publicly accessible areas. CC ID 16410 | Physical and environmental protection | Preventive | |
Wipe information from mobile devices after a predetermined number of unsuccessful logon attempts. CC ID 14242 | Physical and environmental protection | Preventive | |
Encrypt information stored on mobile devices. CC ID 01422 | Physical and environmental protection | Preventive | |
Include a removable storage media use policy in the Acceptable Use Policy. CC ID 06772 | Operational management | Preventive | |
Identify the sender in all electronic messages. CC ID 13996 | Operational management | Preventive | |
Identify processes, Information Systems, and third parties that transmit, process, or store restricted data. CC ID 06289 | Operational management | Preventive | |
Record a unique name for each asset in the asset inventory. CC ID 16305 | Operational management | Preventive | |
Record the status of information systems in the asset inventory. CC ID 16304 | Operational management | Preventive | |
Record the communication interfaces for applicable assets in the asset inventory. CC ID 16301 | Operational management | Preventive | |
Record software license information for each asset in the asset inventory. CC ID 11736 | Operational management | Preventive | |
Record the operating system version for applicable assets in the asset inventory. CC ID 11748 | Operational management | Preventive | |
Record rooms at external locations in the asset inventory. CC ID 16302 | Operational management | Preventive | |
Record trusted keys and certificates in the asset inventory. CC ID 15486 | Operational management | Preventive | |
Record cipher suites and protocols in the asset inventory. CC ID 15489 | Operational management | Preventive | |
Wipe all data on systems prior to when the system is redeployed or the system is disposed. CC ID 06401 | Operational management | Preventive | |
Include a description of the restored data that was restored manually in the restoration log. CC ID 15463 | Operational management | Preventive | |
Include a description of the restored data in the restoration log. CC ID 15462 | Operational management | Preventive | |
Approve tested change requests. CC ID 11783 [Determine whether management does the following: Verifies the application or system owner has authorized changes in advance. App A Objective 6.11.i] | Operational management | Preventive | |
Allow interested personnel and affected parties to opt out of specific version releases and software updates. CC ID 06809 | Operational management | Preventive | |
Disable the use of removable storage media for systems that process restricted data or restricted information, as necessary. CC ID 06681 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain a repository of authenticators. CC ID 16372 | System hardening through configuration management | Preventive | |
Ensure the root account is the first entry in password files. CC ID 16323 | System hardening through configuration management | Detective | |
Sanitize electronic storage media in accordance with organizational standards. CC ID 16464 | Records management | Preventive | |
Sanitize all electronic storage media before disposing a system or redeploying a system. CC ID 01643 | Records management | Preventive | |
Use a second person to confirm and sign-off that manually deleted data was deleted. CC ID 12313 | Records management | Preventive | |
Automate a programmatic process to remove stored data and records that exceed retention requirements. CC ID 06082 | Records management | Preventive | |
Establish, implement, and maintain Automated Data Processing validation checks and editing checks. CC ID 00924 | Records management | Preventive | |
Protect confidential information during the system development life cycle program. CC ID 13479 | Systems design, build, and implementation | Preventive | |
Include required information in electronic commerce transactions and messages. CC ID 15318 | Acquisition or sale of facilities, technology, and services | Preventive | |
Prohibit personal data from being sent by e-mail or instant messaging. CC ID 00565 | Privacy protection for information and data | Preventive | |
Establish, implement, and maintain record structures to support information confidentiality. CC ID 00360 | Privacy protection for information and data | Preventive | |
Automate the disposition process for records that contain "do not store" data or "delete after transaction process" data. CC ID 06083 | Privacy protection for information and data | Preventive | |
Limit data leakage. CC ID 00356 | Privacy protection for information and data | Preventive | |
Establish, implement, and maintain suspicious personal data procedures. CC ID 04853 | Privacy protection for information and data | Detective | |
Compare certain personal data such as name, date of birth, address, driver's license, or other identification against personal data on file for the applicant. CC ID 04855 | Privacy protection for information and data | Detective | |
Match consumer reports with current accounts on file to ensure account misuse or information misuse has not occurred. CC ID 04873 | Privacy protection for information and data | Detective | |
Send change notices for change of address requests to the old address and the new address. CC ID 04877 | Privacy protection for information and data | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Assign legislative body jurisdiction to the organization's assets, as necessary. CC ID 06956 | Leadership and high level objectives | Preventive | |
Define the Information Assurance strategic roles and responsibilities. CC ID 00608 [{delineate}{communicate} Determine whether management responsibilities are appropriate and include the following: Delineation of clear lines of responsibility and communication of accountability for information security. App A Objective 2.5.d] | Leadership and high level objectives | Preventive | |
Establish and maintain a compliance oversight committee. CC ID 00765 | Leadership and high level objectives | Detective | |
Assign the review of project plans for critical projects to the compliance oversight committee. CC ID 01182 | Leadership and high level objectives | Preventive | |
Assign the corporate governance of Information Technology to the compliance oversight committee. CC ID 01178 | Leadership and high level objectives | Preventive | |
Assign the review of Information Technology policies and procedures to the compliance oversight committee. CC ID 01179 [Review whether management has processes to do the following: Report changes of the information security program to the board. App A Objective 4.5.c] | Leadership and high level objectives | Preventive | |
Involve the Board of Directors or senior management in Information Governance. CC ID 00609 | Leadership and high level objectives | Preventive | |
Assign reviewing and approving Quality Management standards to the appropriate oversight committee. CC ID 07192 | Leadership and high level objectives | Preventive | |
Define and assign the Chief Executive's Information Assurance roles and responsibilities. CC ID 06089 | Leadership and high level objectives | Preventive | |
Define and assign the Chief Financial Officer's Information Assurance roles and responsibilities. CC ID 06090 | Leadership and high level objectives | Preventive | |
Define and assign the Chief of Risk's Information Assurance roles and responsibilities. CC ID 06092 | Leadership and high level objectives | Preventive | |
Define and assign log management roles and responsibilities. CC ID 06311 | Monitoring and measurement | Preventive | |
Assign penetration testing to a qualified internal resource or external third party. CC ID 06429 | Monitoring and measurement | Preventive | |
Assign ownership of the vulnerability management program to the appropriate role. CC ID 15723 | Monitoring and measurement | Preventive | |
Define the roles and responsibilities for personnel assigned to tasks in the Audit function. CC ID 00678 | Audits and risk management | Preventive | |
Define and assign the external auditor's roles and responsibilities. CC ID 00683 | Audits and risk management | Preventive | |
Assign the audit to impartial auditors. CC ID 07118 [Verify whether management ensures the following are done: Audits performed by independent internal departments or third parties. App A Objective 10.3.d] | Audits and risk management | Preventive | |
Notify interested personnel and affected parties participating in the audit of their roles and responsibilities during the audit. CC ID 07151 | Audits and risk management | Preventive | |
Define and assign the roles and responsibilities for the risk assessment framework, as necessary. CC ID 06456 | Audits and risk management | Preventive | |
Assign Information System access authorizations if implementing segregation of duties. CC ID 06323 | Technical security | Preventive | |
Use biometric authentication for identification and authentication, as necessary. CC ID 06857 | Technical security | Preventive | |
Include assigned roles and responsibilities in the network access control standard. CC ID 06410 | Technical security | Preventive | |
Assign appropriate roles for enabling or disabling information flow controls. CC ID 06760 | Technical security | Preventive | |
Define and assign cryptographic, encryption and key management roles and responsibilities. CC ID 15470 | Technical security | Preventive | |
Establish a Registration Authority to support the Public Key Infrastructure. CC ID 15725 | Technical security | Preventive | |
Define and assign roles and responsibilities for malicious code protection. CC ID 15474 | Technical security | Preventive | |
Assign application security reviews for web-facing applications to an organization that specializes in application security. CC ID 12035 | Technical security | Preventive | |
Employ security guards to provide physical security, as necessary. CC ID 06653 | Physical and environmental protection | Preventive | |
Assign roles and responsibilities for the issuance of payment cards. CC ID 16134 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain continuity roles and responsibilities. CC ID 00733 [{information security personnel} Review management's ability to do the following: Identify personnel with key information security roles during a disaster and training of personnel in those roles. App A Objective 6.34.a {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Operational and Systems Continuity | Preventive | |
Include the roles and responsibilities of the organization's legal counsel in the continuity plan. CC ID 16233 | Operational and Systems Continuity | Preventive | |
Include restoration procedures in the continuity plan. CC ID 01169 [{restoration strategy} {follow-up strategy} Determine whether management has effective incident response processes, including the following: Restoration and follow-up strategies. App A Objective 8.6.i] | Operational and Systems Continuity | Preventive | |
Establish, implement, and maintain high level operational roles and responsibilities. CC ID 00806 | Human Resources management | Preventive | |
Define and assign the Board of Directors roles and responsibilities and senior management roles and responsibilities, including signing off on key policies and procedures. CC ID 00807 [Determine whether the board holds management accountable for the following: App A Objective 2.3 Determine whether the board holds management accountable for the following: Assignment of responsibility. App A Objective 2.3.b] | Human Resources management | Preventive | |
Assign senior management to the role of authorizing official. CC ID 14238 | Human Resources management | Preventive | |
Assign roles and responsibilities for physical security, as necessary. CC ID 13113 [{layered security} {information security} {coordinate} Determine whether management responsibilities are appropriate and include the following: Coordination of both information and physical security. App A Objective 2.5.h] | Human Resources management | Preventive | |
Assign security clearance procedures to qualified personnel. CC ID 06812 | Human Resources management | Preventive | |
Assign personnel screening procedures to qualified personnel. CC ID 11699 | Human Resources management | Preventive | |
Establish and maintain the staff structure in line with the strategic plan. CC ID 00764 | Human Resources management | Preventive | |
Assign ownership of the internal control framework to the appropriate organizational role. CC ID 06437 | Operational management | Preventive | |
Define and assign the roles and responsibilities for interested personnel and affected parties when establishing, implementing, and maintaining the internal control framework. CC ID 07146 | Operational management | Preventive | |
Assign ownership of the information security program to the appropriate role. CC ID 00814 | Operational management | Preventive | |
Classify assets according to the Asset Classification Policy. CC ID 07186 [Review whether management does the following: Classifies assets appropriately. App A Objective 6.6.b Management should inventory and classify assets, including hardware, software, information, and connections. II.C.5 Inventory and Classification of Assets] | Operational management | Preventive | |
Apply asset protection mechanisms for all assets according to their assigned Asset Classification Policy. CC ID 07184 [{asset classification} Specifically, review whether management does the following: Uses the classification to implement controls required to safeguard the institution's assets. App A Objective 6.6.d] | Operational management | Preventive | |
Include the incident response team member's roles and responsibilities in the Incident Response program. CC ID 01652 [{incident response personnel} Determine whether management has effective incident identification and assessment processes to do the following: Identify personnel empowered to declare an incident. App A Objective 8.5.g {assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g] | Operational management | Preventive | |
Include the incident response point of contact's roles and responsibilities in the Incident Response program. CC ID 01877 | Operational management | Preventive | |
Include the head of information security's roles and responsibilities in the Incident Response program. CC ID 01878 | Operational management | Preventive | |
Include the customer database owner's roles and responsibilities in the Incident Response program. CC ID 01879 | Operational management | Preventive | |
Include the online sales department's roles and responsibilities in the Incident Response program. CC ID 01880 | Operational management | Preventive | |
Include the incident response point of contact for credit card payment system's roles and responsibilities in the Incident Response program. CC ID 01881 | Operational management | Preventive | |
Include the organizational legal counsel's roles and responsibilities in the Incident Response program. CC ID 01882 | Operational management | Preventive | |
Include the Human Resources point of contact's roles and responsibilities in the Incident Response program. CC ID 01883 | Operational management | Preventive | |
Include the organizational incident response network architecture point of contact's roles and responsibilities in the Incident Response program. CC ID 01884 | Operational management | Preventive | |
Include the organizational incident response public relations point of contact's roles and responsibilities in the Incident Response program. CC ID 01885 | Operational management | Preventive | |
Include the organizational incident response location manager's roles and responsibilities in the Incident Response program. CC ID 01886 | Operational management | Preventive | |
Assign system hardening to qualified personnel. CC ID 06813 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain data processing integrity controls. CC ID 00923 [{data validation control} Review whether applications in use provide the following capabilities: Use validation controls for data entry and data processing. App A Objective 6.27.e] | Records management | Preventive | |
Establish and maintain the overall system development project management roles and responsibilities. CC ID 00991 | Systems design, build, and implementation | Preventive | |
Assign the role of information security management as a part of developing systems. CC ID 06823 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Systems design, build, and implementation | Preventive | |
Assign the review of custom code changes to individuals other than the code author. CC ID 06291 | Systems design, build, and implementation | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Establish, implement, and maintain communication protocols. CC ID 12245 | Leadership and high level objectives | Preventive | |
Align the information being disseminated and communicated with the communication requirements according to the organization's communication protocol. CC ID 12419 [{clear and conspicuous language} Review whether policies, standards, and procedures have the following characteristics: Are communicated in a clear and understandable manner. App A Objective 6.1.c] | Leadership and high level objectives | Preventive | |
Establish, implement, and maintain organizational objectives. CC ID 09959 | Leadership and high level objectives | Preventive | |
Document and communicate the linkage between organizational objectives, functions, activities, and general controls. CC ID 12398 [Determine whether management implements controls that appropriately align security with the nature of the institution's operations and strategic direction. Specifically, review whether management does the following: App A Objective 6.5 Determine whether management appropriately integrates the information security program across the institution's lines of business and support functions. Review whether management has the following: App A Objective 3.2] | Leadership and high level objectives | Preventive | |
Establish and maintain the scope of the organizational compliance framework and Information Assurance controls. CC ID 01241 | Leadership and high level objectives | Preventive | |
Establish, implement, and maintain a policy and procedure management program. CC ID 06285 | Leadership and high level objectives | Preventive | |
Include threats in the organization’s policies, standards, and procedures. CC ID 12953 [{risk identification} Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Identification of threats and risks. App A Objective 3.1.a] | Leadership and high level objectives | Preventive | |
Establish and maintain an Authority Document list. CC ID 07113 [Determine whether the institution's security operations activities include the following: Law enforcement interface (e.g., data retention and lawful intercepts). App A Objective 8.1.f] | Leadership and high level objectives | Preventive | |
Map in scope assets and in scope records to external requirements. CC ID 12189 | Leadership and high level objectives | Detective | |
Document organizational procedures that harmonize external requirements, including all legal requirements. CC ID 00623 | Leadership and high level objectives | Preventive | |
Establish, implement, and maintain full documentation of all policies, standards, and procedures that support the organization's compliance framework. CC ID 01636 | Leadership and high level objectives | Preventive | |
Disseminate and communicate the list of Authority Documents that support the organization's compliance framework to interested personnel and affected parties. CC ID 01312 | Leadership and high level objectives | Preventive | |
Classify controls according to their preventive, detective, or corrective status. CC ID 06436 [Review whether management does the following: Uses controls of different classifications, including preventive, detective, and corrective. App A Objective 6.4.b {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security] | Leadership and high level objectives | Preventive | |
Publish, disseminate, and communicate a Statement on Internal Control, as necessary. CC ID 06727 | Leadership and high level objectives | Preventive | |
Include signatures of c-level executives in the Statement on Internal Control. CC ID 14778 | Leadership and high level objectives | Preventive | |
Include management's assertions on the effectiveness of internal control in the Statement on Internal Control. CC ID 14771 | Leadership and high level objectives | Corrective | |
Include confirmation of any significant weaknesses in the Statement on Internal Control. CC ID 06861 | Leadership and high level objectives | Preventive | |
Include roles and responsibilities in the Statement on Internal Control. CC ID 14774 | Leadership and high level objectives | Preventive | |
Include an assurance statement regarding the counterterror protective security plan in the Statement on Internal Control. CC ID 06866 | Leadership and high level objectives | Preventive | |
Include limitations of internal control systems in the Statement on Internal Control. CC ID 14773 | Leadership and high level objectives | Preventive | |
Include a description of the methodology used to evaluate internal controls in the Statement on Internal Control. CC ID 14772 | Leadership and high level objectives | Preventive | |
Include the counterterror protective security plan test results in the Statement on Internal Control. CC ID 06867 | Leadership and high level objectives | Detective | |
Review and document the meetings and actions of the Board of Directors or audit committee in the Board Report. CC ID 01151 [{audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8 {audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8] | Leadership and high level objectives | Detective | |
Include recommendations for changes or updates to the information security program in the Board Report. CC ID 13180 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Recommendations for changes or updates to the information security program. App A Objective 2.4.f] | Leadership and high level objectives | Preventive | |
Provide critical project reports to the compliance oversight committee in a timely manner. CC ID 01183 | Leadership and high level objectives | Detective | |
Document the requirements of stakeholders during the business planning process regarding Information Security. CC ID 06498 | Leadership and high level objectives | Preventive | |
Establish, implement, and maintain a strategic plan. CC ID 12784 | Leadership and high level objectives | Preventive | |
Establish, implement, and maintain a decision management strategy. CC ID 06913 | Leadership and high level objectives | Preventive | |
Include criteria for risk tolerance in the decision-making criteria. CC ID 12950 [{validate} {threat identification} Review whether management has the following: A validation though audits, self-assessments, penetration tests, and vulnerability assessments that risk decisions are informed by appropriate identification and analysis of threats and other potential causes of loss. App A Objective 4.2.e {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5] | Leadership and high level objectives | Preventive | |
Establish, implement, and maintain a Strategic Information Technology Plan. CC ID 00628 | Leadership and high level objectives | Preventive | |
Establish, implement, and maintain Responding to Failures in Security Controls procedures. CC ID 12514 [Determine whether the institution's security operations activities include the following: Vulnerability cataloging and remediation tracking. App A Objective 8.1.d {credit loss} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Credit or operating losses primarily attributable (or thought to be attributable) to IT (e.g., system problems, fraud occurring due to poor controls, and improperly implemented changes to systems). App A Objective 1.3.g {credit loss} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Credit or operating losses primarily attributable (or thought to be attributable) to IT (e.g., system problems, fraud occurring due to poor controls, and improperly implemented changes to systems). App A Objective 1.3.g] | Monitoring and measurement | Preventive | |
Include resuming security system monitoring and logging operations in the Responding to Failures in Security Controls procedure. CC ID 12521 | Monitoring and measurement | Preventive | |
Include implementing mitigating controls to prevent the root cause of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12520 [Review whether management has the following: The ability to identify and implement controls over the root causes of an incident. App A Objective 3.2.e Review whether management has the following: The ability to identify and implement controls over the root causes of an incident. App A Objective 3.2.e] | Monitoring and measurement | Preventive | |
Include performing a risk assessment to determine whether further actions are required because of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12519 | Monitoring and measurement | Preventive | |
Include identification of the root cause of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 15481 | Monitoring and measurement | Preventive | |
Include correcting security issues caused by the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12518 | Monitoring and measurement | Preventive | |
Include documenting the duration of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12517 | Monitoring and measurement | Preventive | |
Include restoring security functions in the Responding to Failures in Security Controls procedure. CC ID 12515 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain an audit and accountability policy. CC ID 14035 | Monitoring and measurement | Preventive | |
Include compliance requirements in the audit and accountability policy. CC ID 14103 | Monitoring and measurement | Preventive | |
Include coordination amongst entities in the audit and accountability policy. CC ID 14102 | Monitoring and measurement | Preventive | |
Include the purpose in the audit and accountability policy. CC ID 14100 | Monitoring and measurement | Preventive | |
Include roles and responsibilities in the audit and accountability policy. CC ID 14098 | Monitoring and measurement | Preventive | |
Include management commitment in the audit and accountability policy. CC ID 14097 | Monitoring and measurement | Preventive | |
Include the scope in the audit and accountability policy. CC ID 14096 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain audit and accountability procedures. CC ID 14057 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain an intrusion detection and prevention program. CC ID 15211 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain an intrusion detection and prevention policy. CC ID 15169 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain an event logging policy. CC ID 15217 | Monitoring and measurement | Preventive | |
Provide predefined suspicious activity reports for suspicious activity discovered in the event log. CC ID 06774 | Monitoring and measurement | Corrective | |
Include identity information of suspects in the suspicious activity report. CC ID 16648 | Monitoring and measurement | Preventive | |
Review and update the list of auditable events in the event logging procedures. CC ID 10097 | Monitoring and measurement | Preventive | |
Report a data loss event when non-truncated payment card numbers are outputted. CC ID 04741 | Monitoring and measurement | Corrective | |
Establish, implement, and maintain a continuous monitoring program for configuration management. CC ID 06757 | Monitoring and measurement | Detective | |
Include a change history and identify who made the changes in the file integrity monitoring report. CC ID 12091 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a risk monitoring program. CC ID 00658 [Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Monitoring and reporting of risks. App A Objective 3.1.d {risk monitoring process}{risk reporting process} Determine whether management has effective risk monitoring and reporting processes. App A Objective 7 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g Determine whether program monitoring and reporting instigate appropriate changes that are effective in maintaining an acceptable level of risk. App A Objective 7.3 Determine whether management has effective threat monitoring processes, including the following: App A Objective 8.4 {risk monitoring process}{risk reporting process}{be operational and effective} Determine whether the risk monitoring and reporting process is regular and prompts action, when necessary, in a timely manner. App A Objective 7.2 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a compliance testing strategy. CC ID 00659 | Monitoring and measurement | Preventive | |
Include a system description in the system security plan. CC ID 16467 | Monitoring and measurement | Preventive | |
Include a description of the operational context in the system security plan. CC ID 14301 | Monitoring and measurement | Preventive | |
Include the results of the security categorization in the system security plan. CC ID 14281 | Monitoring and measurement | Preventive | |
Include the information types in the system security plan. CC ID 14696 | Monitoring and measurement | Preventive | |
Include the security requirements in the system security plan. CC ID 14274 | Monitoring and measurement | Preventive | |
Include threats in the system security plan. CC ID 14693 | Monitoring and measurement | Preventive | |
Include network diagrams in the system security plan. CC ID 14273 | Monitoring and measurement | Preventive | |
Include roles and responsibilities in the system security plan. CC ID 14682 | Monitoring and measurement | Preventive | |
Include the results of the privacy risk assessment in the system security plan. CC ID 14676 | Monitoring and measurement | Preventive | |
Include remote access methods in the system security plan. CC ID 16441 | Monitoring and measurement | Preventive | |
Include a description of the operational environment in the system security plan. CC ID 14272 | Monitoring and measurement | Preventive | |
Include the security categorizations and rationale in the system security plan. CC ID 14270 | Monitoring and measurement | Preventive | |
Include the authorization boundary in the system security plan. CC ID 14257 | Monitoring and measurement | Preventive | |
Include security controls in the system security plan. CC ID 14239 | Monitoring and measurement | Preventive | |
Create specific test plans to test each system component. CC ID 00661 | Monitoring and measurement | Preventive | |
Include the roles and responsibilities in the test plan. CC ID 14299 | Monitoring and measurement | Preventive | |
Include the assessment team in the test plan. CC ID 14297 | Monitoring and measurement | Preventive | |
Include the scope in the test plans. CC ID 14293 | Monitoring and measurement | Preventive | |
Include the assessment environment in the test plan. CC ID 14271 | Monitoring and measurement | Preventive | |
Review the test plans for each system component. CC ID 00662 | Monitoring and measurement | Preventive | |
Document validated testing processes in the testing procedures. CC ID 06200 | Monitoring and measurement | Preventive | |
Include error details, identifying the root causes, and mitigation actions in the testing procedures. CC ID 11827 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a security assessment and authorization policy. CC ID 14031 | Monitoring and measurement | Preventive | |
Establish and maintain a scoring method for Red Team exercise results. CC ID 12136 | Monitoring and measurement | Preventive | |
Include coordination amongst entities in the security assessment and authorization policy. CC ID 14222 | Monitoring and measurement | Preventive | |
Include the scope in the security assessment and authorization policy. CC ID 14220 | Monitoring and measurement | Preventive | |
Include the purpose in the security assessment and authorization policy. CC ID 14219 | Monitoring and measurement | Preventive | |
Include management commitment in the security assessment and authorization policy. CC ID 14189 | Monitoring and measurement | Preventive | |
Include compliance requirements in the security assessment and authorization policy. CC ID 14183 | Monitoring and measurement | Preventive | |
Include roles and responsibilities in the security assessment and authorization policy. CC ID 14179 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain security assessment and authorization procedures. CC ID 14056 | Monitoring and measurement | Preventive | |
Document improvement actions based on test results and exercises. CC ID 16840 | Monitoring and measurement | Preventive | |
Define the test requirements for each testing program. CC ID 13177 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Proxy testing. App A Objective 10.2.g Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality, integrity, and availability of the institution's information. App A Objective 10.2.d] | Monitoring and measurement | Preventive | |
Include mechanisms for emergency stops in the testing program. CC ID 14398 | Monitoring and measurement | Preventive | |
Document the business need justification for authorized wireless access points. CC ID 12044 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain conformity assessment procedures. CC ID 15032 | Monitoring and measurement | Preventive | |
Create technical documentation assessment certificates in an official language. CC ID 15110 | Monitoring and measurement | Preventive | |
Define the test frequency for each testing program. CC ID 13176 [{test frequency} Determine whether management considers the following key testing factors when developing and implementing independent tests: Frequency. App A Objective 10.2.f] | Monitoring and measurement | Preventive | |
Compare port scan reports for in scope systems against their port scan baseline. CC ID 12162 | Monitoring and measurement | Detective | |
Establish, implement, and maintain a stress test program for identification cards or badges. CC ID 15424 | Monitoring and measurement | Preventive | |
Align the penetration test program with industry standards. CC ID 12469 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a business line testing strategy. CC ID 13245 | Monitoring and measurement | Preventive | |
Include facilities in the business line testing strategy. CC ID 13253 | Monitoring and measurement | Preventive | |
Include electrical systems in the business line testing strategy. CC ID 13251 | Monitoring and measurement | Preventive | |
Include mechanical systems in the business line testing strategy. CC ID 13250 | Monitoring and measurement | Preventive | |
Include Heating Ventilation and Air Conditioning systems in the business line testing strategy. CC ID 13248 | Monitoring and measurement | Preventive | |
Include emergency power supplies in the business line testing strategy. CC ID 13247 | Monitoring and measurement | Preventive | |
Include environmental controls in the business line testing strategy. CC ID 13246 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a vulnerability management program. CC ID 15721 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a vulnerability assessment program. CC ID 11636 [{establish} Determine whether management has continuous, established routines to identify and assess vulnerabilities. Determine whether management has processes to receive vulnerability information disclosed by external individuals or groups, such as security or vulnerability researchers. App A Objective 4.4] | Monitoring and measurement | Preventive | |
Record the vulnerability scanning activity in the vulnerability scan report. CC ID 12097 | Monitoring and measurement | Preventive | |
Recommend mitigation techniques based on penetration test results. CC ID 04881 | Monitoring and measurement | Corrective | |
Establish, implement, and maintain a compliance monitoring policy. CC ID 00671 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a metrics policy. CC ID 01654 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain an approach for compliance monitoring. CC ID 01653 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain risk management metrics. CC ID 01656 [{risk metric} Review whether management does the following: Uses metrics to quantify and report risks in the information security program. App A Objective 7.4.e {risk management metrics} Review whether management does the following: Uses metrics that are timely, comprehensive, and actionable to improve the program's effectiveness and efficiency. App A Objective 7.4.a Determine whether management develops and effectively uses metrics as part of the risk monitoring and reporting processes for the information security program. Review whether management does the following: App A Objective 7.4] | Monitoring and measurement | Preventive | |
Identify and document instances of non-compliance with the compliance framework. CC ID 06499 | Monitoring and measurement | Preventive | |
Identify and document events surrounding non-compliance with the organizational compliance framework. CC ID 12935 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain disciplinary action notices. CC ID 16577 | Monitoring and measurement | Preventive | |
Include a copy of the order in the disciplinary action notice. CC ID 16606 | Monitoring and measurement | Preventive | |
Include the sanctions imposed in the disciplinary action notice. CC ID 16599 | Monitoring and measurement | Preventive | |
Include the effective date of the sanctions in the disciplinary action notice. CC ID 16589 | Monitoring and measurement | Preventive | |
Include the requirements that were violated in the disciplinary action notice. CC ID 16588 | Monitoring and measurement | Preventive | |
Include responses to charges from interested personnel and affected parties in the disciplinary action notice. CC ID 16587 | Monitoring and measurement | Preventive | |
Include the reasons for imposing sanctions in the disciplinary action notice. CC ID 16586 | Monitoring and measurement | Preventive | |
Include required information in the disciplinary action notice. CC ID 16584 | Monitoring and measurement | Preventive | |
Include a justification for actions taken in the disciplinary action notice. CC ID 16583 | Monitoring and measurement | Preventive | |
Include a statement on the conclusions of the investigation in the disciplinary action notice. CC ID 16582 | Monitoring and measurement | Preventive | |
Include the investigation results in the disciplinary action notice. CC ID 16581 | Monitoring and measurement | Preventive | |
Include a description of the causes of the actions taken in the disciplinary action notice. CC ID 16580 | Monitoring and measurement | Preventive | |
Include the name of the person responsible for the charges in the disciplinary action notice. CC ID 16579 | Monitoring and measurement | Preventive | |
Include contact information in the disciplinary action notice. CC ID 16578 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a security program metrics program. CC ID 01660 [{risk metric} Review whether management does the following: Develops metrics that demonstrate the extent to which the information security program is implemented and whether the program is effective. App A Objective 7.4.b] | Monitoring and measurement | Preventive | |
Establish, implement, and maintain an Information Security metrics program. CC ID 01665 [Determine whether the annual information security report is timely and contains adequate information. App A Objective 10.6 Determine whether the annual information security report is timely and contains adequate information. App A Objective 10.6 Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Monitoring and measurement | Preventive | |
Monitor the supply chain for Information Assurance effectiveness. CC ID 02043 [{outsourced process} If the institution outsources activities to a third-party service provider, determine whether management integrates those activities with the information security program. Verify that the third-party management program evidences expectations that align with the institution's information security program. App A Objective 3.3] | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a technical measurement metrics policy. CC ID 01655 | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a log management program. CC ID 00673 [Determine whether management has an effective log management process that involves a central logging repository, timely transmission of log files, and effective log analysis. Review whether management has the following: App A Objective 6.35] | Monitoring and measurement | Preventive | |
Establish, implement, and maintain a cross-organizational audit sharing agreement. CC ID 10595 | Monitoring and measurement | Preventive | |
Retain copies of external auditor outsourcing contracts and engagement letters. CC ID 01188 | Audits and risk management | Preventive | |
Review external auditor outsourcing contracts and engagement letters. CC ID 01189 | Audits and risk management | Preventive | |
Include the scope and work to be performed in external auditor outsourcing contracts. CC ID 01190 | Audits and risk management | Preventive | |
Review the conclusions of the external auditor's work papers and audit reports. CC ID 01200 [Review preliminary conclusions with the examiner-in-charge regarding the following: App A Objective 11.1 {include} Review preliminary conclusions with the examiner-in-charge regarding the following: Significant issues warranting inclusion as matters requiring attention or recommendations in the report of examination. App A Objective 11.1.b] | Audits and risk management | Preventive | |
Establish, implement, and maintain an audit program. CC ID 00684 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Audits and risk management | Preventive | |
Establish, implement, and maintain audit policies. CC ID 13166 | Audits and risk management | Preventive | |
Include resource requirements in the audit program. CC ID 15237 | Audits and risk management | Preventive | |
Include risks and opportunities in the audit program. CC ID 15236 | Audits and risk management | Preventive | |
Establish and maintain audit terms. CC ID 13880 | Audits and risk management | Preventive | |
Include a statement about the inherent limitations of the audit in the audit terms. CC ID 13883 | Audits and risk management | Preventive | |
Include a statement that the audit will be conducted in accordance with attestation standards in the audit terms. CC ID 13882 | Audits and risk management | Preventive | |
Establish, implement, and maintain agreed upon procedures that are in scope for the audit. CC ID 13893 | Audits and risk management | Preventive | |
Establish, implement, and maintain an in scope system description. CC ID 14873 | Audits and risk management | Preventive | |
Include third party services in the audit assertion's in scope system description. CC ID 16503 | Audits and risk management | Preventive | |
Include monitoring controls in the audit assertion's in scope system description. CC ID 16501 | Audits and risk management | Preventive | |
Include availability commitments in the audit assertion's in scope system description. CC ID 14914 | Audits and risk management | Preventive | |
Include changes in the audit assertion's in scope system description. CC ID 14894 | Audits and risk management | Preventive | |
Include external communications in the audit assertion's in scope system description. CC ID 14913 | Audits and risk management | Preventive | |
Include a section regarding incidents related to the system in the audit assertion’s in scope system description. CC ID 14878 | Audits and risk management | Preventive | |
Include the function performed by the in scope system in the audit assertion's in scope system description. CC ID 14911 | Audits and risk management | Preventive | |
Include the disposition of the incident in the audit assertion's in scope system description. CC ID 14896 | Audits and risk management | Preventive | |
Include the extent of the incident in the audit assertion's in scope system description. CC ID 14895 | Audits and risk management | Preventive | |
Include the timing of each incident in the audit assertion's in scope system description. CC ID 14891 | Audits and risk management | Preventive | |
Include the nature of each incident in the audit assertion's in scope system description. CC ID 14889 | Audits and risk management | Preventive | |
Include a section regarding in scope controls related to the system in the audit assertion's in scope system description. CC ID 14897 | Audits and risk management | Preventive | |
Include how the in scope system meets external requirements in the audit assertion's in scope system description. CC ID 16502 | Audits and risk management | Preventive | |
Include the timing of each control in the audit assertion's in scope system description. CC ID 14916 | Audits and risk management | Preventive | |
Include the nature of the control in the audit assertion's in scope system description. CC ID 14910 | Audits and risk management | Preventive | |
Include the information sources used in performing the control in the audit assertion's in scope system description. CC ID 14909 | Audits and risk management | Preventive | |
Include the responsible party for performing the control in the audit assertion's in scope system description. CC ID 14907 | Audits and risk management | Preventive | |
Include the subject matter to which the control is applied in the audit assertion's in scope system description. CC ID 14904 | Audits and risk management | Preventive | |
Refrain from omitting or distorting information in the audit assertion's in scope system description. CC ID 14893 | Audits and risk management | Preventive | |
Include the timing of each change in the audit assertion's in scope system description. CC ID 14892 | Audits and risk management | Preventive | |
Include the system boundaries in the audit assertion's in scope system description. CC ID 14887 | Audits and risk management | Preventive | |
Determine the presentation method of the audit assertion's in scope system description. CC ID 14885 | Audits and risk management | Detective | |
Include the time frame covered by the description in the audit assertion's in scope system description. CC ID 14884 | Audits and risk management | Preventive | |
Include commitments to third parties in the audit assertion. CC ID 14899 | Audits and risk management | Preventive | |
Determine the completeness of the audit assertion's in scope system description. CC ID 14883 | Audits and risk management | Preventive | |
Include system requirements in the audit assertion's in scope system description. CC ID 14881 | Audits and risk management | Preventive | |
Include third party controls in the audit assertion's in scope system description. CC ID 14880 | Audits and risk management | Preventive | |
Include agreement to the audit scope and audit terms in the audit program. CC ID 06965 | Audits and risk management | Preventive | |
Establish and maintain a bespoke audit scope for each audit being performed. CC ID 13077 [Determine the appropriate scope and objectives for the examination. App A Objective 1] | Audits and risk management | Preventive | |
Include audit subject matter in the audit program. CC ID 07103 | Audits and risk management | Preventive | |
Examine the objectivity of the audit criteria in the audit program. CC ID 07104 | Audits and risk management | Preventive | |
Examine the measurability of the audit criteria in the audit program. CC ID 07105 | Audits and risk management | Preventive | |
Examine the completeness of the audit criteria in the audit program. CC ID 07106 | Audits and risk management | Preventive | |
Examine the relevance of the audit criteria in the audit program. CC ID 07107 | Audits and risk management | Preventive | |
Disseminate and communicate the audit program with the audit subject matter and audit criteria to all interested personnel and affected parties. CC ID 07116 | Audits and risk management | Preventive | |
Include in scope information in the audit program. CC ID 16198 | Audits and risk management | Preventive | |
Include the out of scope material or out of scope products in the audit program. CC ID 08962 | Audits and risk management | Preventive | |
Provide a representation letter in support of the audit assertion. CC ID 07158 | Audits and risk management | Preventive | |
Include a statement that management has evaluated compliance with external requirements in the representation letter. CC ID 13942 | Audits and risk management | Preventive | |
Include a statement that the assumptions used for estimates are reasonable in the representation letter. CC ID 13934 | Audits and risk management | Preventive | |
Include a statement that uncorrected misstatements are believed to be immaterial in the representation letter. CC ID 13884 | Audits and risk management | Preventive | |
Include a statement that system incidents have been disclosed to the auditor in the representation letter. CC ID 16772 | Audits and risk management | Preventive | |
Include a statement that incidents of fraud and non-compliance have been disclosed to the auditor in the representation letter. CC ID 16769 | Audits and risk management | Preventive | |
Include a statement of responsibility for the subject matter in the representation letter. CC ID 07159 | Audits and risk management | Preventive | |
Include a statement of responsibility for selecting the audit criteria in the representation letter. CC ID 07160 | Audits and risk management | Preventive | |
Include a statement of responsibility regarding the appropriateness of the audit criteria in the representation letter. CC ID 07161 | Audits and risk management | Preventive | |
Include an assertion about the subject matter based on the selected audit criteria in the representation letter. CC ID 07162 | Audits and risk management | Preventive | |
Include a statement that all known matters contradicting the audit assertion have been disclosed to the auditor in the representation letter. CC ID 07163 | Audits and risk management | Preventive | |
Include the availability of all in scope records relevant to the subject matter in the representation letter. CC ID 07164 | Audits and risk management | Preventive | |
Include a statement that any known subsequent events have been disclosed to the auditor in the representation letter. CC ID 07165 | Audits and risk management | Preventive | |
Include a statement that deficiencies in internal controls have been disclosed to the auditor in the representation letter. CC ID 13899 | Audits and risk management | Preventive | |
Establish and maintain audit assertions, as necessary. CC ID 14871 | Audits and risk management | Detective | |
Include an in scope system description in the audit assertion. CC ID 14872 | Audits and risk management | Preventive | |
Include any assumptions that are improbable in the audit assertion. CC ID 13950 | Audits and risk management | Preventive | |
Include investigations and legal proceedings in the audit assertion. CC ID 16846 | Audits and risk management | Preventive | |
Include how the audit scope matches in scope controls in the audit assertion. CC ID 06969 | Audits and risk management | Preventive | |
Include why specific criteria are ignored by in scope controls in the audit assertion. CC ID 07027 | Audits and risk management | Preventive | |
Include how the in scope system is designed and implemented in the audit assertion. CC ID 06970 | Audits and risk management | Preventive | |
Include the responsible party's opinion of the quality of the evidence in the audit assertion. CC ID 13949 | Audits and risk management | Preventive | |
Include the end users and affected parties of the in scope system in the audit assertion. CC ID 07028 | Audits and risk management | Preventive | |
Include the in scope services offered or in scope transactions processed in the audit assertion. CC ID 06971 | Audits and risk management | Preventive | |
Include the in scope procedures in the audit assertion. CC ID 06972 | Audits and risk management | Preventive | |
Include the in scope records produced in the audit assertion. CC ID 06968 | Audits and risk management | Preventive | |
Include how in scope material events are monitored and logged in the audit assertion. CC ID 06973 | Audits and risk management | Preventive | |
Include any in scope material events that might affect the assertion in the audit assertion. CC ID 06991 | Audits and risk management | Preventive | |
Include the in scope controls and compliance documents in the audit assertion. CC ID 06974 | Audits and risk management | Preventive | |
Include the in scope risk assessment processes in the audit assertion. CC ID 06975 [Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d] | Audits and risk management | Preventive | |
Include in scope change controls in the audit assertion. CC ID 06976 | Audits and risk management | Preventive | |
Include any in scope uncorrected errors or non-compliance issues in the audit assertion. CC ID 06989 | Audits and risk management | Preventive | |
Disseminate and communicate a written audit assertion of the audit scope and audit terms to interested personnel and affected parties. CC ID 06967 | Audits and risk management | Preventive | |
Include conditions that might require modification of the audit program in the audit terms. CC ID 07149 | Audits and risk management | Preventive | |
Include how access to in scope systems, personnel and in scope records are provided to the auditor in the audit terms. CC ID 06988 | Audits and risk management | Preventive | |
Establish, implement, and maintain procedures for determining the desired level of assurance in the audit program. CC ID 12794 | Audits and risk management | Preventive | |
Include the expectations for the audit report in the audit terms. CC ID 07148 | Audits and risk management | Preventive | |
Establish and maintain a practitioner’s report on management’s assertions, as necessary. CC ID 13888 | Audits and risk management | Preventive | |
Refrain from changing the date of the practitioner's report on agreed-upon procedures when reissuing it. CC ID 13896 | Audits and risk management | Corrective | |
Include materiality levels in the audit terms. CC ID 01238 | Audits and risk management | Preventive | |
Include material changes in information processes, Information Systems, and assets that could affect audits in the audit terms. CC ID 01239 [{hardware inventory} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Hardware and software inventories. App A Objective 1.3.c {hardware inventory} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Hardware and software inventories. App A Objective 1.3.c Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d] | Audits and risk management | Preventive | |
Include material weaknesses, material failures, and material errors in information processes, Information Systems, and assets that could affect audits in the audit terms. CC ID 01240 | Audits and risk management | Preventive | |
Document any after the fact changes to the engagement file. CC ID 07002 | Audits and risk management | Preventive | |
Protect access to the engagement file and all associated audit documentation in compliance with Authority Documents the organization must follow. CC ID 07179 | Audits and risk management | Preventive | |
Disclose work papers in the engagement file in compliance with legal requirements. CC ID 07180 | Audits and risk management | Preventive | |
Edit the audit assertion for accuracy. CC ID 07030 | Audits and risk management | Preventive | |
Determine if the audit assertion's in scope procedures are accurately documented. CC ID 06982 | Audits and risk management | Preventive | |
Include the process of using evidential matter to test in scope controls in the test plan. CC ID 06996 | Audits and risk management | Preventive | |
Establish, implement, and maintain interview procedures. CC ID 16282 | Audits and risk management | Preventive | |
Establish and maintain work papers, as necessary. CC ID 13891 | Audits and risk management | Preventive | |
Include the auditor's conclusions on work performed by individuals assigned to the audit in the work papers. CC ID 16775 | Audits and risk management | Preventive | |
Include audit irregularities in the work papers. CC ID 16774 | Audits and risk management | Preventive | |
Include corrective actions in the work papers. CC ID 16771 | Audits and risk management | Preventive | |
Include information about the organization being audited and the auditor performing the audit in the work papers. CC ID 16770 | Audits and risk management | Preventive | |
Include discussions with interested personnel and affected parties in the work papers. CC ID 16768 | Audits and risk management | Preventive | |
Include justification for departing from mandatory requirements in the work papers. CC ID 13935 | Audits and risk management | Preventive | |
Include the reviewer, and dates, for using evidential matter to test in scope controls in the work papers. CC ID 06998 | Audits and risk management | Preventive | |
Include the tests, examinations, interviews and observations performed during the audit in the work papers. CC ID 07190 | Audits and risk management | Preventive | |
Include if any subject matter experts or additional research had to be undertaken to test in scope controls in the work papers. CC ID 07026 | Audits and risk management | Preventive | |
Include the tester, and dates, for using evidential matter to test in scope controls in the work papers. CC ID 06997 | Audits and risk management | Preventive | |
Include the causes of identified in scope control deficiencies in the work papers. CC ID 07000 | Audits and risk management | Preventive | |
Include discussions regarding the causes of identified in scope control deficiencies in the work papers. CC ID 06999 | Audits and risk management | Preventive | |
Establish, implement, and maintain a practitioner’s report on agreed-upon procedures. CC ID 13894 | Audits and risk management | Preventive | |
Establish and maintain a practitioner's examination report on pro forma financial information. CC ID 13968 | Audits and risk management | Preventive | |
Include references to where financial information was derived in the practitioner's review report on pro forma financial information. CC ID 13982 | Audits and risk management | Preventive | |
Include a statement that the financial statements used were audited by other practitioners in the practitioner's examination report on pro forma financial information, as necessary. CC ID 13981 | Audits and risk management | Preventive | |
Establish and maintain organizational audit reports. CC ID 06731 | Audits and risk management | Preventive | |
Determine what disclosures are required in the audit report. CC ID 14888 | Audits and risk management | Detective | |
Include audit subject matter in the audit report. CC ID 14882 | Audits and risk management | Preventive | |
Include an other-matter paragraph in the audit report. CC ID 14901 | Audits and risk management | Preventive | |
Include that the auditee did not provide comments in the audit report. CC ID 16849 | Audits and risk management | Preventive | |
Write the audit report using clear and conspicuous language. CC ID 13948 | Audits and risk management | Preventive | |
Include a statement that the sufficiency of the agreed upon procedures is the responsibility of the specified parties in the audit report. CC ID 13936 | Audits and risk management | Preventive | |
Include a statement that the financial statements were audited in the audit report. CC ID 13963 | Audits and risk management | Preventive | |
Include the criteria that financial information was measured against in the audit report. CC ID 13966 | Audits and risk management | Preventive | |
Include a description of the financial information being reported on in the audit report. CC ID 13965 | Audits and risk management | Preventive | |
Include references to any adjustments of financial information in the audit report. CC ID 13964 | Audits and risk management | Preventive | |
Include in the audit report that audit opinions are not dependent on references to subject matter experts, as necessary. CC ID 13953 | Audits and risk management | Preventive | |
Include references to historical financial information used in the audit report. CC ID 13961 | Audits and risk management | Preventive | |
Include a statement about the inherent limitations of the audit in the audit report. CC ID 14900 | Audits and risk management | Preventive | |
Include a description of the limitations on the usefulness of hypothetical assumptions in the audit report. CC ID 13958 | Audits and risk management | Preventive | |
Structure the audit report to be in the form of procedures and findings. CC ID 13940 | Audits and risk management | Preventive | |
Include any discussions of significant findings in the audit report. CC ID 13955 | Audits and risk management | Preventive | |
Include the date and with whom discussions about significant findings took place in the audit report. CC ID 13962 | Audits and risk management | Preventive | |
Include the audit criteria in the audit report. CC ID 13945 | Audits and risk management | Preventive | |
Include a statement in the audit report that the agreed upon procedures were potentially insufficient in identifying material risks, as necessary. CC ID 13957 | Audits and risk management | Preventive | |
Include all hypothetical assumptions in the audit report. CC ID 13947 | Audits and risk management | Preventive | |
Include a statement that identifies the distribution list for the report in the audit report. CC ID 07172 | Audits and risk management | Preventive | |
Include a statement that identifies the use restrictions for the report in the audit report. CC ID 07173 | Audits and risk management | Preventive | |
Include a statement that the agreed upon procedures involves collecting evidence in the audit report. CC ID 13956 | Audits and risk management | Preventive | |
Include all of the facts and demonstrated plausibility in the audit report. CC ID 08929 | Audits and risk management | Preventive | |
Include a statement that the agreed upon procedures were performed by all parties in the audit report. CC ID 13931 | Audits and risk management | Preventive | |
Include references to subject matter experts in the audit report when citing qualified opinions. CC ID 13929 | Audits and risk management | Preventive | |
Include a description of the assistance provided by Subject Matter Experts in the audit report. CC ID 13939 | Audits and risk management | Preventive | |
Include a review of the subject matter expert's findings in the audit report. CC ID 13972 | Audits and risk management | Preventive | |
Include a statement of the character of the engagement in the audit report. CC ID 07166 | Audits and risk management | Preventive | |
Include the nature and scope of the audit performed in the statement of the character of the engagement in the audit report. CC ID 07167 | Audits and risk management | Preventive | |
Include the professional standards governing the audit in the statement of the character of the engagement in the audit report. CC ID 07168 | Audits and risk management | Preventive | |
Include all restrictions on the audit in the audit report. CC ID 13930 | Audits and risk management | Preventive | |
Include a statement that the auditor has no responsibility to update the audit report after its submission. CC ID 13943 | Audits and risk management | Preventive | |
Include a statement on the auditor's ethical requirements in the audit report. CC ID 16767 | Audits and risk management | Preventive | |
Include a statement that the responsible party refused to provide a written assertion in the audit report. CC ID 13887 | Audits and risk management | Preventive | |
Include a statement that the examination involves procedures for collecting evidence in the audit report. CC ID 13941 | Audits and risk management | Preventive | |
Express an adverse opinion in the audit report when significant assumptions are not suitably supported. CC ID 13944 | Audits and risk management | Preventive | |
Include a statement that modifications to historical evidence accurately reflect current evidence in the audit report. CC ID 13938 | Audits and risk management | Preventive | |
Refrain from referencing other auditor's work in the audit report. CC ID 13881 | Audits and risk management | Preventive | |
Include that the audit findings are not a predictive analysis of future compliance in the audit report. CC ID 07018 | Audits and risk management | Preventive | |
Include how in scope controls meet external requirements in the audit report. CC ID 16450 | Audits and risk management | Preventive | |
Include the in scope records used to obtain audit evidence in the description of tests of controls and results in the audit report. CC ID 14915 | Audits and risk management | Preventive | |
Include recommended corrective actions in the audit report. CC ID 16197 | Audits and risk management | Preventive | |
Include risks and opportunities in the audit report. CC ID 16196 | Audits and risk management | Preventive | |
Include the description of tests of controls and results in the audit report. CC ID 14898 | Audits and risk management | Preventive | |
Include the nature of the tests performed in the description of tests of controls and results in the audit report. CC ID 14908 | Audits and risk management | Preventive | |
Include the test scope in the description of tests of controls and results in the audit report. CC ID 14906 | Audits and risk management | Preventive | |
Identify the stakeholders interviewed to obtain audit evidence in the description of tests of controls and results in the audit report. CC ID 14905 | Audits and risk management | Preventive | |
Include the controls that were tested in the description of tests of controls and results in the audit report. CC ID 14902 | Audits and risk management | Preventive | |
Include subsequent events related to the audit assertion or audit subject matter in the audit report. CC ID 16773 | Audits and risk management | Preventive | |
Include that the organization is the responsible party for the content of its audit assertion and in scope system description in the audit report. CC ID 07010 | Audits and risk management | Preventive | |
Include that the organization is the responsible party for providing in scope services in the audit report. CC ID 14903 | Audits and risk management | Preventive | |
Include that the organization is the responsible party for specifying in scope controls not defined by law or contractual obligation in the audit report. CC ID 07011 | Audits and risk management | Preventive | |
Include that the organization is the responsible party for designing and implementing the in scope controls it identified in the audit scope in the audit report. CC ID 07014 | Audits and risk management | Preventive | |
Include the audit opinion regarding the accurateness of the in scope system description in the audit report. CC ID 07019 | Audits and risk management | Preventive | |
Include the attestation standards the auditor follows in the audit report. CC ID 07015 | Audits and risk management | Preventive | |
Include the audit opinion about the audit assertion in relation to the audit criteria used for evaluation in the audit report. CC ID 07169 [Document conclusions in a memo to the examiner-in-charge that provides report-ready comments for all relevant sections of the report of examination and guidance to future examiners. App A Objective 11.3] | Audits and risk management | Preventive | |
Include the auditor's significant reservations about the engagement, the audit assertion, or the audit subject matter in the audit report. CC ID 07170 | Audits and risk management | Preventive | |
Include an emphasis-of-matter paragraph in the audit report. CC ID 14890 | Audits and risk management | Preventive | |
Include any out of scope components of in scope systems in the audit report. CC ID 07006 | Audits and risk management | Preventive | |
Include that the organization is the responsible party for identifying material risks in the audit report. CC ID 07012 | Audits and risk management | Preventive | |
Include that the organization is the responsible party for selecting the audit criteria in the audit report. CC ID 07013 | Audits and risk management | Preventive | |
Compare the evaluations completed by the internal auditors and the external auditors in past audit reports. CC ID 01158 | Audits and risk management | Detective | |
Review past audit reports. CC ID 01155 [{audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8 With respect to developed software, determine whether institution management does the following: Reviews available audit reports, and considers and implements appropriate control recommendations. App A Objective 6.28.e Review past reports for outstanding issues or previous problems. Consider the following: Internal and external audit reports. App A Objective 1.1.b] | Audits and risk management | Detective | |
Review past audit reports for specific process steps and calculations that were stated to support the audit report's conclusions. CC ID 01160 | Audits and risk management | Detective | |
Review the reporting of material weaknesses and risks in past audit reports. CC ID 01161 [Review past reports for outstanding issues or previous problems. Consider the following: Regulatory reports of examination. App A Objective 1.1.a Review past reports for outstanding issues or previous problems. Consider the following: Independent security tests. App A Objective 1.1.c Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk management and control decisions. App A Objective 2.4.b Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk management and control decisions. App A Objective 2.4.b {risk monitoring process}{risk reporting process}{be operational and effective} Determine whether the risk monitoring and reporting process is regular and prompts action, when necessary, in a timely manner. App A Objective 7.2] | Audits and risk management | Detective | |
Refrain from including the description of the audit in the audit report when the auditor is disclaiming an audit opinion. CC ID 13975 | Audits and risk management | Preventive | |
Refrain from including scope limitations from changed attestation engagements in the audit report. CC ID 13983 | Audits and risk management | Preventive | |
Refrain from including in the audit report any procedures that were performed that the auditor is disclaiming in an audit opinion. CC ID 13974 | Audits and risk management | Preventive | |
Include deficiencies and non-compliance in the audit report. CC ID 14879 | Audits and risk management | Corrective | |
Include an audit opinion in the audit report. CC ID 07017 | Audits and risk management | Preventive | |
Include qualified opinions in the audit report. CC ID 13928 | Audits and risk management | Preventive | |
Include that the auditor is the responsible party to express an opinion on the audit subject matter based on examination of evidence in the audit report. CC ID 07174 | Audits and risk management | Preventive | |
Include a description of the reasons for modifying the audit opinion in the audit report. CC ID 13898 | Audits and risk management | Corrective | |
Include that the auditor did not express an opinion in the audit report, as necessary. CC ID 13886 | Audits and risk management | Preventive | |
Include items that were excluded from the audit report in the audit report. CC ID 07007 | Audits and risk management | Preventive | |
Include the organization's privacy practices in the audit report. CC ID 07029 | Audits and risk management | Preventive | |
Include items that pertain to third parties in the audit report. CC ID 07008 | Audits and risk management | Preventive | |
Refrain from including reference to procedures performed in previous attestation engagements in the audit report. CC ID 13970 | Audits and risk management | Preventive | |
Include a statement in the audit report that no procedures were performed subsequent to the date of the practitioner's review report on pro forma financial information, as necessary. CC ID 13969 | Audits and risk management | Preventive | |
Include any of the organization's use of compensating controls that were not audited in the audit report. CC ID 07009 | Audits and risk management | Preventive | |
Include whether the use of compensating controls are necessary in the audit report. CC ID 07020 | Audits and risk management | Preventive | |
Include the pass or fail test status of all in scope controls in the audit report. CC ID 07016 | Audits and risk management | Preventive | |
Include the process of using evidential matter to test in scope controls in the audit report. CC ID 07021 | Audits and risk management | Preventive | |
Include the nature and causes of identified in scope control deviations in the audit report. CC ID 07022 | Audits and risk management | Preventive | |
Modify the audit opinion in the audit report under defined conditions. CC ID 13937 | Audits and risk management | Corrective | |
Include the written signature of the auditor's organization in the audit report. CC ID 13897 | Audits and risk management | Preventive | |
Include a statement that additional reports are being submitted in the audit report. CC ID 16848 | Audits and risk management | Preventive | |
Disseminate and communicate the audit report to all interested personnel and affected parties identified in the distribution list. CC ID 07117 | Audits and risk management | Preventive | |
Disseminate and communicate documents that contain information in support of the audit report. CC ID 07175 | Audits and risk management | Preventive | |
Correct any material misstatements in documents that contain information in support of the audit report. CC ID 07176 | Audits and risk management | Preventive | |
Review the issues of non-compliance from past audit reports. CC ID 01148 [Review past reports for outstanding issues or previous problems. Consider the following: App A Objective 1.1 {regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d Review preliminary conclusions with the examiner-in-charge regarding the following: Violations of laws or regulations. App A Objective 11.1.a {include} Review preliminary conclusions with the examiner-in-charge regarding the following: Significant issues warranting inclusion as matters requiring attention or recommendations in the report of examination. App A Objective 11.1.b] | Audits and risk management | Detective | |
Accept the audit report. CC ID 07025 | Audits and risk management | Preventive | |
Implement a corrective action plan in response to the audit report. CC ID 06777 | Audits and risk management | Corrective | |
Define penalties for uncorrected audit findings or remaining non-compliant with the audit report. CC ID 08963 | Audits and risk management | Preventive | |
Include the audit criteria in the audit plan. CC ID 15262 | Audits and risk management | Preventive | |
Include a list of reference documents in the audit plan. CC ID 15260 | Audits and risk management | Preventive | |
Include the languages to be used for the audit in the audit plan. CC ID 15252 | Audits and risk management | Preventive | |
Include the allocation of resources in the audit plan. CC ID 15251 | Audits and risk management | Preventive | |
Include communication protocols in the audit plan. CC ID 15247 | Audits and risk management | Preventive | |
Include the level of audit sampling necessary to collect sufficient audit evidence in the audit plan. CC ID 15246 | Audits and risk management | Preventive | |
Include meeting schedules in the audit plan. CC ID 15245 | Audits and risk management | Preventive | |
Include the time frames for the audit in the audit plan. CC ID 15244 | Audits and risk management | Preventive | |
Include the time frames for conducting the audit in the audit plan. CC ID 15243 | Audits and risk management | Preventive | |
Include the locations to be audited in the audit plan. CC ID 15242 | Audits and risk management | Preventive | |
Include the processes to be audited in the audit plan. CC ID 15241 | Audits and risk management | Preventive | |
Include audit objectives in the audit plan. CC ID 15240 | Audits and risk management | Preventive | |
Include the risks associated with audit activities in the audit plan. CC ID 15239 | Audits and risk management | Preventive | |
Establish, implement, and maintain an audit schedule for the audit program. CC ID 13158 | Audits and risk management | Preventive | |
Establish, implement, and maintain a risk management program. CC ID 12051 [[threat assessment} Determine whether the institution's security operations activities include the following: Threat identification and assessment. App A Objective 8.1.i {threat and vulnerability management procedure} Determine whether management has effective threat identification and assessment processes, including the following: Maintaining procedures for obtaining, monitoring, assessing, and responding to evolving threat and vulnerability information. App A Objective 8.3.a {threat and vulnerability management policy} Determine whether management has effective threat identification and assessment processes, including the following: Designing policies to allow immediate and consequential threats to be dealt with expeditiously. App A Objective 8.3.e {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Audits and risk management | Preventive | |
Include the scope of risk management activities in the risk management program. CC ID 13658 | Audits and risk management | Preventive | |
Include managing mobile risks in the risk management program. CC ID 13535 | Audits and risk management | Preventive | |
Establish, implement, and maintain risk management strategies. CC ID 13209 | Audits and risk management | Preventive | |
Include off-site storage of supplies in the risk management strategies. CC ID 13221 | Audits and risk management | Preventive | |
Include the use of alternate service providers in the risk management strategies. CC ID 13217 | Audits and risk management | Preventive | |
Include minimizing service interruptions in the risk management strategies. CC ID 13215 | Audits and risk management | Preventive | |
Include off-site storage in the risk mitigation strategies. CC ID 13213 | Audits and risk management | Preventive | |
Establish, implement, and maintain the risk assessment framework. CC ID 00685 | Audits and risk management | Preventive | |
Establish, implement, and maintain a risk assessment program. CC ID 00687 | Audits and risk management | Preventive | |
Include the need for risk assessments in the risk assessment program. CC ID 06447 [[threat assessment} Determine whether the institution's security operations activities include the following: Threat identification and assessment. App A Objective 8.1.i] | Audits and risk management | Preventive | |
Include the information flow of restricted data in the risk assessment program. CC ID 12339 | Audits and risk management | Preventive | |
Establish, implement, and maintain a financial plan to support the risk management strategy. CC ID 12786 | Audits and risk management | Preventive | |
Establish, implement, and maintain insurance requirements. CC ID 16562 | Audits and risk management | Preventive | |
Address cybersecurity risks in the risk assessment program. CC ID 13193 | Audits and risk management | Preventive | |
Include a Data Protection Impact Assessment in the risk assessment program. CC ID 12630 | Audits and risk management | Preventive | |
Include an assessment of the necessity and proportionality of the processing operations in relation to the purposes in the Data Protection Impact Assessment. CC ID 12681 | Audits and risk management | Preventive | |
Include an assessment of the relationship between the data subject and the parties processing the data in the Data Protection Impact Assessment. CC ID 16371 | Audits and risk management | Preventive | |
Include a risk assessment of data subject's rights in the Data Protection Impact Assessment. CC ID 12674 | Audits and risk management | Preventive | |
Include the description and purpose of processing restricted data in the Data Protection Impact Assessment. CC ID 12673 | Audits and risk management | Preventive | |
Include consideration of the data subject's expectations in the Data Protection Impact Assessment. CC ID 16370 | Audits and risk management | Preventive | |
Include monitoring unsecured areas in the Data Protection Impact Assessment. CC ID 12671 | Audits and risk management | Preventive | |
Include security measures for protecting restricted data in the Data Protection Impact Assessment. CC ID 12635 | Audits and risk management | Preventive | |
Establish, implement, and maintain a risk assessment policy. CC ID 14026 | Audits and risk management | Preventive | |
Include compliance requirements in the risk assessment policy. CC ID 14121 | Audits and risk management | Preventive | |
Include coordination amongst entities in the risk assessment policy. CC ID 14120 | Audits and risk management | Preventive | |
Include management commitment in the risk assessment policy. CC ID 14119 | Audits and risk management | Preventive | |
Include roles and responsibilities in the risk assessment policy. CC ID 14118 | Audits and risk management | Preventive | |
Include the scope in the risk assessment policy. CC ID 14117 | Audits and risk management | Preventive | |
Include the purpose in the risk assessment policy. CC ID 14116 | Audits and risk management | Preventive | |
Establish, implement, and maintain risk assessment procedures. CC ID 06446 [As part of the information security program, determine whether management has established risk identification processes. App A Objective 4 Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: App A Objective 5.1 Determine whether management has effective threat identification and assessment processes, including the following: Identifying and assessing threats (e.g., threat information is often ad hoc, although some providers present threat information within a defined framework that readily lends itself to analytical operations). App A Objective 8.3.b Determine whether management has effective threat identification and assessment processes, including the following: Identifying and assessing threats (e.g., threat information is often ad hoc, although some providers present threat information within a defined framework that readily lends itself to analytical operations). App A Objective 8.3.b {risk monitoring process}{risk reporting process} Determine whether management has effective risk monitoring and reporting processes. App A Objective 7 Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Audits and risk management | Preventive | |
Employ risk assessment procedures that follow legal requirements and contractual obligations when risk profiling. CC ID 06472 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Incorporate legal and regulatory requirements. App A Objective 5.1.b] | Audits and risk management | Preventive | |
Document cybersecurity risks. CC ID 12281 | Audits and risk management | Preventive | |
Employ risk assessment procedures that follow standards and best practices, as necessary. CC ID 06473 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Improve consistency in risk measurement. App A Objective 5.1.c Management should develop risk measurement processes that evaluate the inherent risk to the institution. II.B Risk Measurement] | Audits and risk management | Preventive | |
Employ risk assessment procedures that take into account both electronic records and printed records. CC ID 06476 | Audits and risk management | Preventive | |
Employ risk assessment procedures that take into account information classification. CC ID 06477 | Audits and risk management | Preventive | |
Employ risk assessment procedures that align with strategic objectives. CC ID 06474 | Audits and risk management | Preventive | |
Employ risk assessment procedures that take into account prior risk assessment findings of the same scope. CC ID 06478 | Audits and risk management | Preventive | |
Employ risk assessment procedures that take into account the target environment. CC ID 06479 [{information security program review} Verify whether that review does the following: Addresses the program in its current environment. App A Objective 9.1.a] | Audits and risk management | Preventive | |
Employ risk assessment procedures that take into account incidents associated with the target environment. CC ID 06480 [{indicators of compromise} Determine whether management has effective incident identification and assessment processes to do the following: Analyze the event associated with the indicators. App A Objective 8.5.b {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Audits and risk management | Preventive | |
Include compliance with disposition requirements in the risk assessment procedures. CC ID 12342 | Audits and risk management | Preventive | |
Include compliance with retention requirements in the risk assessment procedures. CC ID 12341 | Audits and risk management | Preventive | |
Employ risk assessment procedures that include appropriate risk treatment options for each identified risk. CC ID 06484 | Audits and risk management | Preventive | |
Establish, implement, and maintain a threat and risk classification scheme. CC ID 07183 [Review whether management has the following: A method or taxonomy for categorizing threats, sources, and vulnerabilities. App A Objective 4.2.b Determine whether the risk identification process produces manageable groupings of information security threats, including cybersecurity threats. Review whether management has the following: App A Objective 4.2 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {risk response} Determine whether management has effective threat identification and assessment processes, including the following: Using threat knowledge to drive risk assessment and response. App A Objective 8.3.d {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Audits and risk management | Preventive | |
Document organizational risk criteria. CC ID 12277 | Audits and risk management | Preventive | |
Include the traceability of malicious code in the threat and risk classification scheme. CC ID 06600 | Audits and risk management | Preventive | |
Include language that is easy to understand in the risk assessment report. CC ID 06461 | Audits and risk management | Preventive | |
Include the environments that call for risk assessments in the risk assessment program. CC ID 06448 | Audits and risk management | Preventive | |
Include the process for defining the scope of each risk assessment in the risk assessment program. CC ID 06462 | Audits and risk management | Preventive | |
Include the circumstances that call for risk assessments in the risk assessment program. CC ID 06449 | Audits and risk management | Preventive | |
Include the roles and responsibilities involved in risk assessments in the risk assessment program. CC ID 06450 | Audits and risk management | Preventive | |
Include the methods of managing and responding to the risk assessment report in the risk assessment program. CC ID 06451 | Audits and risk management | Preventive | |
Approve the risk assessment program and associated risk assessment procedures at the senior management level. CC ID 06458 | Audits and risk management | Preventive | |
Include the probability and potential impact of pandemics in the scope of the risk assessment. CC ID 13241 | Audits and risk management | Preventive | |
Include physical assets in the scope of the risk assessment. CC ID 13075 | Audits and risk management | Preventive | |
Include the results of the risk assessment in the risk assessment report. CC ID 06481 | Audits and risk management | Preventive | |
Update the risk assessment upon discovery of a new threat. CC ID 00708 | Audits and risk management | Detective | |
Update the risk assessment upon changes to the risk profile. CC ID 11627 | Audits and risk management | Detective | |
Document any reasons for modifying or refraining from modifying the organization's risk assessment when the risk assessment has been reviewed. CC ID 13312 | Audits and risk management | Preventive | |
Create a risk assessment report based on the risk assessment results. CC ID 15695 | Audits and risk management | Preventive | |
Include recovery of the critical path in the Business Impact Analysis. CC ID 13224 | Audits and risk management | Preventive | |
Include acceptable levels of data loss in the Business Impact Analysis. CC ID 13264 | Audits and risk management | Preventive | |
Include Recovery Point Objectives in the Business Impact Analysis. CC ID 13223 | Audits and risk management | Preventive | |
Include the Recovery Time Objectives in the Business Impact Analysis. CC ID 13222 | Audits and risk management | Preventive | |
Include pandemic risks in the Business Impact Analysis. CC ID 13219 | Audits and risk management | Preventive | |
Include tolerance to downtime in the Business Impact Analysis report. CC ID 01172 | Audits and risk management | Preventive | |
Establish, implement, and maintain a risk register. CC ID 14828 | Audits and risk management | Preventive | |
Document organizational risk tolerance in a risk register. CC ID 09961 | Audits and risk management | Preventive | |
Establish a risk acceptance level that is appropriate to the organization's risk appetite. CC ID 00706 | Audits and risk management | Preventive | |
Select the appropriate risk treatment option for each identified risk in the risk register. CC ID 06483 | Audits and risk management | Preventive | |
Perform a gap analysis to review in scope controls for identified risks and implement new controls, as necessary. CC ID 00704 | Audits and risk management | Detective | |
Document the results of the gap analysis. CC ID 16271 | Audits and risk management | Preventive | |
Establish, implement, and maintain a risk treatment plan. CC ID 11983 [{oversee} Determine whether management responsibilities are appropriate and include the following: Oversight of risk mitigation activities that support the information security program. App A Objective 2.5.f Determine whether management effectively implements controls to mitigate identified risk. App A Objective 6 Management should develop and implement appropriate controls to mitigate identified risks. II.C Risk Mitigation] | Audits and risk management | Preventive | |
Include the date of the risk assessment in the risk treatment plan. CC ID 16321 | Audits and risk management | Preventive | |
Include the risk treatment strategy in the risk treatment plan. CC ID 12159 | Audits and risk management | Preventive | |
Revise the risk treatment strategies in the risk treatment plan, as necessary. CC ID 12552 | Audits and risk management | Corrective | |
Include an overview of the migration project plan in the risk treatment plan. CC ID 11982 | Audits and risk management | Preventive | |
Include change control processes in the risk treatment plan. CC ID 11981 | Audits and risk management | Preventive | |
Include a description of the processes to check for new vulnerabilities in the risk treatment plan. CC ID 11980 | Audits and risk management | Preventive | |
Include the implemented risk management controls in the risk treatment plan. CC ID 11979 [Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Implementation of risk mitigation. App A Objective 3.1.c] | Audits and risk management | Preventive | |
Include requirements for monitoring and reporting in the risk treatment plan, as necessary. CC ID 13620 | Audits and risk management | Preventive | |
Include risk assessment results in the risk treatment plan. CC ID 11978 | Audits and risk management | Preventive | |
Include a description of usage in the risk treatment plan. CC ID 11977 | Audits and risk management | Preventive | |
Document all constraints applied to the risk treatment plan, as necessary. CC ID 13619 | Audits and risk management | Preventive | |
Integrate the corrective action plan based on the risk assessment findings with other risk management activities. CC ID 06457 | Audits and risk management | Preventive | |
Document and communicate a corrective action plan based on the risk assessment findings. CC ID 00705 [Discuss corrective action and communicate findings. App A Objective 11 Discuss corrective action and communicate findings. App A Objective 11 Discuss findings with management and obtain proposed corrective action for significant deficiencies. App A Objective 11.2] | Audits and risk management | Corrective | |
Review and approve the risk assessment findings. CC ID 06485 [Review preliminary conclusions with the examiner-in-charge regarding the following: The proposed Uniform Rating System for Information Technology management component rating and the potential impact of the conclusion on the composite or other component IT ratings. App A Objective 11.1.c] | Audits and risk management | Preventive | |
Include risk responses in the risk management program. CC ID 13195 | Audits and risk management | Preventive | |
Document residual risk in a residual risk report. CC ID 13664 | Audits and risk management | Corrective | |
Establish, implement, and maintain an artificial intelligence risk management program. CC ID 16220 | Audits and risk management | Preventive | |
Include diversity and equal opportunity in the artificial intelligence risk management program. CC ID 16255 | Audits and risk management | Preventive | |
Include a commitment to continuous improvement In the cybersecurity risk management program. CC ID 16839 | Audits and risk management | Preventive | |
Establish, implement, and maintain a cybersecurity risk management policy. CC ID 16834 | Audits and risk management | Preventive | |
Establish, implement, and maintain a cybersecurity risk management strategy. CC ID 11991 | Audits and risk management | Preventive | |
Include a risk prioritization approach in the Cybersecurity Risk Management Strategy. CC ID 12276 | Audits and risk management | Preventive | |
Include defense in depth strategies in the cybersecurity risk management strategy. CC ID 15582 | Audits and risk management | Preventive | |
Establish, implement, and maintain a cybersecurity supply chain risk management program. CC ID 16826 | Audits and risk management | Preventive | |
Establish, implement, and maintain cybersecurity supply chain risk management procedures. CC ID 16830 | Audits and risk management | Preventive | |
Establish, implement, and maintain a supply chain risk management policy. CC ID 14663 | Audits and risk management | Preventive | |
Include compliance requirements in the supply chain risk management policy. CC ID 14711 | Audits and risk management | Preventive | |
Include coordination amongst entities in the supply chain risk management policy. CC ID 14710 | Audits and risk management | Preventive | |
Include management commitment in the supply chain risk management policy. CC ID 14709 | Audits and risk management | Preventive | |
Include roles and responsibilities in the supply chain risk management policy. CC ID 14708 | Audits and risk management | Preventive | |
Include the scope in the supply chain risk management policy. CC ID 14707 | Audits and risk management | Preventive | |
Include the purpose in the supply chain risk management policy. CC ID 14706 | Audits and risk management | Preventive | |
Establish, implement, and maintain a supply chain risk management plan. CC ID 14713 | Audits and risk management | Preventive | |
Include processes for monitoring and reporting in the supply chain risk management plan. CC ID 15619 | Audits and risk management | Preventive | |
Include dates in the supply chain risk management plan. CC ID 15617 | Audits and risk management | Preventive | |
Include implementation milestones in the supply chain risk management plan. CC ID 15615 | Audits and risk management | Preventive | |
Include roles and responsibilities in the supply chain risk management plan. CC ID 15613 | Audits and risk management | Preventive | |
Include supply chain risk management procedures in the risk management program. CC ID 13190 | Audits and risk management | Preventive | |
Establish, implement, and maintain an access classification scheme. CC ID 00509 [{network connection type} Review whether management does the following: Identifies access points and connection types that pose risk. App A Objective 6.7.b {network connection type} Review whether management does the following: Identifies access points and connection types that pose risk. App A Objective 6.7.b] | Technical security | Preventive | |
Include restricting access to confidential data or restricted information to a need to know basis in the access classification scheme. CC ID 00510 | Technical security | Preventive | |
Include business security requirements in the access classification scheme. CC ID 00002 | Technical security | Preventive | |
Interpret and apply security requirements based upon the information classification of the system. CC ID 00003 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Technical security | Preventive | |
Include third party access in the access classification scheme. CC ID 11786 [Identify unique products and services and any required third-party access requirements. App A Objective 1.4.b] | Technical security | Preventive | |
Establish, implement, and maintain security classifications for organizational assets. CC ID 00005 | Technical security | Preventive | |
Review connection requirements for all systems. CC ID 06411 | Technical security | Detective | |
Establish, implement, and maintain an access control program. CC ID 11702 [{controls} Review whether management does the following: Develops and maintains a culture that fosters responsible and controlled access for users. App A Objective 6.8.a] | Technical security | Preventive | |
Include instructions to change authenticators as often as necessary in the access control program. CC ID 11931 | Technical security | Preventive | |
Include guidance for how users should protect their authentication credentials in the access control program. CC ID 11929 | Technical security | Preventive | |
Include guidance on selecting authentication credentials in the access control program. CC ID 11928 | Technical security | Preventive | |
Establish, implement, and maintain access control policies. CC ID 00512 [{access control policy} {data transfer policy} Determine whether management maintains policies and effectively controls and protects access to and transmission of information to avoid loss or damage. Review whether management does the following: App A Objective 6.18 {enforce} Determine whether the institution's security operations activities include the following: Enforcement of access controls. App A Objective 8.1.k Determine whether management effectively provides secure customer access to financial services and plans for potential interruptions in service. Review whether management does the following: App A Objective 6.25] | Technical security | Preventive | |
Include compliance requirements in the access control policy. CC ID 14006 | Technical security | Preventive | |
Include coordination amongst entities in the access control policy. CC ID 14005 | Technical security | Preventive | |
Include management commitment in the access control policy. CC ID 14004 | Technical security | Preventive | |
Include roles and responsibilities in the access control policy. CC ID 14003 | Technical security | Preventive | |
Include the scope in the access control policy. CC ID 14002 | Technical security | Preventive | |
Include the purpose in the access control policy. CC ID 14001 | Technical security | Preventive | |
Document the business need justification for user accounts. CC ID 15490 | Technical security | Preventive | |
Establish, implement, and maintain an instant messaging and chat system usage policy. CC ID 11815 | Technical security | Preventive | |
Disseminate and communicate the access control policies to all interested personnel and affected parties. CC ID 10061 [Review whether management does the following: Communicates and enforces the responsibilities of programmers, security administrators, and application owners in maintaining effective application access control. App A Objective 6.22.d] | Technical security | Preventive | |
Establish, implement, and maintain an access rights management plan. CC ID 00513 [Review whether management has the following: A process to control privileged access. App A Objective 6.20.d Review whether management has the following: A monitoring process to oversee and manage the access rights granted to each user on the system. App A Objective 6.20.c Determine whether management has an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices. Review whether management has the following: App A Objective 6.20 Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Technical security | Preventive | |
Inventory all user accounts. CC ID 13732 | Technical security | Preventive | |
Add all devices requiring access control to the Access Control List. CC ID 06264 | Technical security | Preventive | |
Include the objects and users subject to access control in the security policy. CC ID 11836 | Technical security | Preventive | |
Establish, implement, and maintain a system use agreement for each information system. CC ID 06500 | Technical security | Preventive | |
Accept and sign the system use agreement before data or system access is enabled. CC ID 06501 | Technical security | Preventive | |
Document actions that can be performed on an information system absent identification and authentication of the user. CC ID 06771 | Technical security | Preventive | |
Establish and maintain a Digital Rights Management program. CC ID 07093 | Technical security | Preventive | |
Establish, implement, and maintain an authority for access authorization list. CC ID 06782 | Technical security | Preventive | |
Establish, implement, and maintain a password policy. CC ID 16346 | Technical security | Preventive | |
Disseminate and communicate the password policies and password procedures to all users who have access to restricted data or restricted information. CC ID 00518 | Technical security | Preventive | |
Establish, implement, and maintain biometric collection procedures. CC ID 15419 | Technical security | Preventive | |
Document the business need justification for authentication data storage. CC ID 06325 | Technical security | Preventive | |
Establish, implement, and maintain access control procedures. CC ID 11663 | Technical security | Preventive | |
Document approving and granting access in the access control log. CC ID 06786 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts and logs access to and activity on operating system parameters, system utilities (especially those with data-altering capabilities), and sensitive system resources (including files, programs, and processes), and supplements with additional security software, as necessary. App A Objective 6.21.b] | Technical security | Preventive | |
Include the user identifiers of all personnel who are authorized to access a system in the system record. CC ID 15171 | Technical security | Preventive | |
Include identity information of all personnel who are authorized to access a system in the system record. CC ID 16406 | Technical security | Preventive | |
Include the date and time that access rights were changed in the system record. CC ID 16415 | Technical security | Preventive | |
Establish, implement, and maintain an identification and authentication policy. CC ID 14033 | Technical security | Preventive | |
Include the purpose in the identification and authentication policy. CC ID 14234 | Technical security | Preventive | |
Include the scope in the identification and authentication policy. CC ID 14232 | Technical security | Preventive | |
Include roles and responsibilities in the identification and authentication policy. CC ID 14230 | Technical security | Preventive | |
Include management commitment in the identification and authentication policy. CC ID 14229 | Technical security | Preventive | |
Include coordination amongst entities in the identification and authentication policy. CC ID 14227 | Technical security | Preventive | |
Include compliance requirements in the identification and authentication policy. CC ID 14225 | Technical security | Preventive | |
Establish, implement, and maintain identification and authentication procedures. CC ID 14053 | Technical security | Preventive | |
Include instructions to refrain from using previously used authenticators in the access control program. CC ID 11930 | Technical security | Preventive | |
Establish and maintain a memorized secret list. CC ID 13791 | Technical security | Preventive | |
Establish, implement, and maintain a network configuration standard. CC ID 00530 | Technical security | Preventive | |
Establish, implement, and maintain network segmentation requirements. CC ID 16380 | Technical security | Preventive | |
Establish, implement, and maintain a network security policy. CC ID 06440 | Technical security | Preventive | |
Include compliance requirements in the network security policy. CC ID 14205 | Technical security | Preventive | |
Include coordination amongst entities in the network security policy. CC ID 14204 | Technical security | Preventive | |
Include management commitment in the network security policy. CC ID 14203 | Technical security | Preventive | |
Include roles and responsibilities in the network security policy. CC ID 14202 | Technical security | Preventive | |
Include the scope in the network security policy. CC ID 14201 | Technical security | Preventive | |
Include the purpose in the network security policy. CC ID 14200 | Technical security | Preventive | |
Establish, implement, and maintain system and communications protection procedures. CC ID 14052 | Technical security | Preventive | |
Establish, implement, and maintain a wireless networking policy. CC ID 06732 [{wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Review whether management does the following: Implements appropriate controlspan> over wired and style="background-color:#F0BBBC;" class="term_primary-noun">wireless networks. App A Objective 6.10.c] | Technical security | Preventive | |
Include usage restrictions for Bluetooth in the wireless networking policy. CC ID 16443 | Technical security | Preventive | |
Maintain up-to-date network diagrams. CC ID 00531 [Review whether management does the following: Maintains accurate network diagrams and data flow charts. App A Objective 6.10.b {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical security | Preventive | |
Include the date of the most recent update on the network diagram. CC ID 14319 | Technical security | Preventive | |
Include the organization's name in the network diagram. CC ID 14318 | Technical security | Preventive | |
Include Internet Protocol addresses in the network diagram. CC ID 16244 | Technical security | Preventive | |
Include Domain Name System names in the network diagram. CC ID 16240 | Technical security | Preventive | |
Accept, by formal signature, the security implications of the network topology. CC ID 12323 | Technical security | Preventive | |
Maintain up-to-date data flow diagrams. CC ID 10059 [Review whether management does the following: Maintains accurate network diagrams and data flow charts. App A Objective 6.10.b {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical security | Preventive | |
Establish, implement, and maintain a sensitive information inventory. CC ID 13736 | Technical security | Detective | |
Include information flows to third parties in the data flow diagram. CC ID 13185 | Technical security | Preventive | |
Document where data-at-rest and data in transit is encrypted on the data flow diagram. CC ID 16412 | Technical security | Preventive | |
Establish, implement, and maintain a Boundary Defense program. CC ID 00544 [Review whether applications in use provide the following capabilities: Protect web or Internet-facing applications through additional controls, including web application firewalls, regular scanning for new or recurring vulnerabilities, mitigation or remediation of common security weaknesses, and network segregation. App A Objective 6.27.g] | Technical security | Preventive | |
Establish, implement, and maintain a network access control standard. CC ID 00546 [Determine whether management secures access to its computer networks through multiple layers of access controls. Review whether management does the following: App A Objective 6.10 {network zone} Review whether management does the following: Establishes zones (e.g., trusted and untrusted) according to risk with appropriate access requirements within and between each zone. App A Objective 6.10.a {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical security | Preventive | |
Include configuration management and rulesets in the network access control standard. CC ID 11845 | Technical security | Preventive | |
Secure the network access control standard against unauthorized changes. CC ID 11920 | Technical security | Preventive | |
Include compensating controls implemented for insecure protocols in the firewall and router configuration standard. CC ID 11948 | Technical security | Preventive | |
Include restricting inbound network traffic in the firewall and router configuration standard. CC ID 11960 | Technical security | Preventive | |
Include restricting outbound network traffic in the firewall and router configuration standard. CC ID 11961 | Technical security | Preventive | |
Include requirements for a firewall at each Internet connection and between any demilitarized zone and the internal network zone in the firewall and router configuration standard. CC ID 12435 | Technical security | Preventive | |
Include network diagrams that identify connections between all subnets and wireless networks in the firewall and router configuration standard. CC ID 12434 | Technical security | Preventive | |
Include network diagrams that identify storage or processing locations of all restricted data in the firewall and router configuration standard. CC ID 12426 | Technical security | Preventive | |
Include a protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 00537 | Technical security | Preventive | |
Include approval of the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 12547 | Technical security | Preventive | |
Include the use of protocols above and beyond common information service protocols in the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 00539 | Technical security | Preventive | |
Include justifying the use of risky protocols in the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 01280 | Technical security | Preventive | |
Document and implement security features for each identified insecure service, protocol, and port in the protocols, ports, applications, and services list. CC ID 12033 | Technical security | Preventive | |
Identify the insecure services, protocols, and ports in the protocols, ports, applications, and services list in the firewall and router configuration. CC ID 12032 | Technical security | Preventive | |
Record the configuration rules for network access and control points in the configuration management system. CC ID 12105 | Technical security | Preventive | |
Record the duration of the business need associated with changes to the configuration rules for network access and control points in the configuration management system. CC ID 12107 | Technical security | Preventive | |
Record each individual's name and business need associated with changes to the configuration rules for network access and control points in the configuration management system. CC ID 12106 | Technical security | Preventive | |
Establish, implement, and maintain Voice over Internet Protocol Configuration Management standards. CC ID 11853 | Technical security | Preventive | |
Establish, implement, and maintain a Wireless Local Area Network Configuration Management standard. CC ID 11854 | Technical security | Preventive | |
Establish, implement, and maintain Voice over Internet Protocol design specification. CC ID 01449 | Technical security | Preventive | |
Establish, implement, and maintain a Wireless Local Area Network Configuration Management program. CC ID 01646 | Technical security | Preventive | |
Establish, implement, and maintain information flow control configuration standards. CC ID 01924 [Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Technical security | Preventive | |
Maintain a record of the challenge state during identification and authentication in an automated information exchange. CC ID 06629 | Technical security | Preventive | |
Develop and implement a content filtering word and phrase library. CC ID 07071 | Technical security | Preventive | |
Establish, implement, and maintain information flow control policies inside the system and between interconnected systems. CC ID 01410 [{access control policy} {data transfer policy} Determine whether management maintains policies and effectively controls and protects access to and transmission of information to avoid loss or damage. Review whether management does the following: App A Objective 6.18 {network connection} {low risk system} Review whether management does the following: Identifies connections between and access across low-risk and high-risk systems. App A Objective 6.7.c {network connection} {low risk system} Review whether management does the following: Identifies connections between and access across low-risk and high-risk systems. App A Objective 6.7.c Review whether management does the following: Implements and assesses the adequacy of appropriate controls to ensure the security of connections. App A Objective 6.7.e Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7 Determine the extent of network connectivity internally and externally and the boundaries and functions of security domains. App A Objective 1.4.c {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical security | Preventive | |
Establish, implement, and maintain a document printing policy. CC ID 14384 | Technical security | Preventive | |
Include printing to personal printers during a continuity event in the document printing policy. CC ID 14396 | Technical security | Preventive | |
Establish, implement, and maintain information flow procedures. CC ID 04542 | Technical security | Preventive | |
Establish, implement, and maintain information exchange procedures. CC ID 11782 | Technical security | Preventive | |
Establish, implement, and maintain whitelists and blacklists of domain names. CC ID 07097 | Technical security | Preventive | |
Revoke membership in the whitelist, as necessary. CC ID 13827 | Technical security | Corrective | |
Establish, implement, and maintain whitelists and blacklists of software. CC ID 11780 | Technical security | Preventive | |
Establish, implement, and maintain a data loss prevention program. CC ID 13050 [Determine whether management responsibilities are appropriate and include the following: Protection of data consistently throughout the institution. App A Objective 2.5.j Review whether management does the following: Requires secure storage of all types of sensitive information, whether on computer systems, portable devices, physical media, or hard-copy documents. App A Objective 6.18.a {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical security | Preventive | |
Include the data loss prevention strategy as part of the data loss prevention program. CC ID 13051 | Technical security | Preventive | |
Establish, implement, and maintain a remote access and teleworking program. CC ID 04545 [{employee-owned device} Determine whether management has policies and procedures to ensure that remote access by employees, whether using institution or personally owned devices, is provided in a safe and sound manner. Review whether management does the following: App A Objective 6.23] | Technical security | Preventive | |
Include information security requirements in the remote access and teleworking program. CC ID 15704 | Technical security | Preventive | |
Document and approve requests to bypass multifactor authentication. CC ID 15464 | Technical security | Preventive | |
Define the cryptographic module security functions and the cryptographic module operational modes. CC ID 06542 | Technical security | Preventive | |
Define the cryptographic boundaries. CC ID 06543 | Technical security | Preventive | |
Establish and maintain the documentation requirements for cryptographic modules. CC ID 06544 | Technical security | Preventive | |
Establish and maintain the security requirements for cryptographic module ports and cryptographic module interfaces. CC ID 06545 | Technical security | Preventive | |
Establish, implement, and maintain documentation for the delivery and operation of cryptographic modules. CC ID 06547 | Technical security | Preventive | |
Document the operation of the cryptographic module. CC ID 06546 | Technical security | Preventive | |
Generate and protect a secret random number for each digital signature. CC ID 06577 | Technical security | Preventive | |
Establish the security strength requirements for the digital signature process. CC ID 06578 | Technical security | Preventive | |
Establish, implement, and maintain an encryption management and cryptographic controls policy. CC ID 04546 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30] | Technical security | Preventive | |
Provide guidance to customers on how to securely transmit, store, and update cryptographic keys. CC ID 12040 | Technical security | Preventive | |
Establish, implement, and maintain encryption management procedures. CC ID 15475 | Technical security | Preventive | |
Establish, implement, and maintain cryptographic key management procedures. CC ID 00571 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30] | Technical security | Preventive | |
Include recommended cryptographic key management procedures for cloud service providers in the cryptographic key management procedures. CC ID 13152 | Technical security | Preventive | |
Include requesting cryptographic key types in the cryptographic key management procedures. CC ID 13151 | Technical security | Preventive | |
Include the establishment of cryptographic keys in the cryptographic key management procedures. CC ID 06540 | Technical security | Preventive | |
Include offsite backups of cryptographic keys in the cryptographic key management procedures. CC ID 13127 | Technical security | Preventive | |
Require key custodians to sign the cryptographic key management policy. CC ID 01308 | Technical security | Preventive | |
Establish, implement, and maintain requirements for Personal Identity Verification authentication certificates. CC ID 06587 | Technical security | Preventive | |
Establish, implement, and maintain Public Key certificate application procedures. CC ID 07079 | Technical security | Preventive | |
Include the Identification and Authentication of individuals or entities in the Public Key certificate application procedures. CC ID 07080 | Technical security | Preventive | |
Include approving or rejecting Public Key certificate applications in the Public Key certificate application procedure. CC ID 07081 | Technical security | Preventive | |
Include revocation of Public Key certificates in the Public Key certificate procedures. CC ID 07082 | Technical security | Preventive | |
Publish revoked Public Key certificates in the Certificate Revocation List. CC ID 07089 | Technical security | Preventive | |
Establish, implement, and maintain Public Key renewal or rekeying request procedures. CC ID 07083 | Technical security | Preventive | |
Include identification and authentication in Public Key renewal or rekeying request procedures. CC ID 11816 | Technical security | Preventive | |
Establish, implement, and maintain Public Key certificate procedures. CC ID 07085 | Technical security | Preventive | |
Include signing and issuing Public Key certificates in the Public Key certificate procedures. CC ID 11817 | Technical security | Preventive | |
Include publishing Public Key certificates in the Public Key certificate procedures. CC ID 07087 | Technical security | Preventive | |
Include access to issued Public Key certificates in the Public Key certificate procedures. CC ID 07086 | Technical security | Preventive | |
Authorize transactions of data transmitted over public networks or shared data networks. CC ID 00566 | Technical security | Preventive | |
Establish, implement, and maintain a malicious code protection program. CC ID 00574 [Determine whether management has implemented defense-in-depth to protect, detect, and respond to malware. App A Objective 6.17] | Technical security | Preventive | |
Establish, implement, and maintain malicious code protection procedures. CC ID 15483 | Technical security | Preventive | |
Establish, implement, and maintain a malicious code protection policy. CC ID 15478 | Technical security | Preventive | |
Establish, implement, and maintain a malicious code outbreak recovery plan. CC ID 01310 | Technical security | Corrective | |
Establish, implement, and maintain an application security policy. CC ID 06438 | Technical security | Preventive | |
Establish, implement, and maintain a physical security program. CC ID 11757 [Determine whether the institution's security operations activities include the following: Physical security management (e.g., CCTV, guards, and badge systems). App A Objective 8.1.e] | Physical and environmental protection | Preventive | |
Establish, implement, and maintain physical security plans. CC ID 13307 | Physical and environmental protection | Preventive | |
Include a maintenance schedule for the physical security plan in the physical security plan. CC ID 13309 | Physical and environmental protection | Preventive | |
Document any reasons for modifying or refraining from modifying the physical security plan after it has been reviewed. CC ID 13315 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain physical security procedures. CC ID 13076 [Determine whether management applies appropriate physical security controls to protect its premises and more sensitive areas, such as its data center(s). App A Objective 6.9] | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a facility physical security program. CC ID 00711 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain opening procedures for businesses. CC ID 16671 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain closing procedures for businesses. CC ID 16670 | Physical and environmental protection | Preventive | |
Establish and maintain a contract for accessing facilities that transmit, process, or store restricted data. CC ID 12050 | Physical and environmental protection | Preventive | |
Define communication methods for reporting crimes. CC ID 06349 | Physical and environmental protection | Preventive | |
Include identification cards or badges in the physical security program. CC ID 14818 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain security procedures for virtual meetings. CC ID 15581 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain floor plans. CC ID 16419 | Physical and environmental protection | Preventive | |
Include network infrastructure and cabling infrastructure on the floor plan. CC ID 16420 | Physical and environmental protection | Preventive | |
Post and maintain security signage for all facilities. CC ID 02201 | Physical and environmental protection | Preventive | |
Identify and document physical access controls for all physical entry points. CC ID 01637 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain physical access procedures. CC ID 13629 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a visitor access permission policy. CC ID 06699 | Physical and environmental protection | Preventive | |
Escort visitors within the facility, as necessary. CC ID 06417 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain procedures for changing a visitor's access requirements. CC ID 12048 | Physical and environmental protection | Preventive | |
Maintain and review facility access lists of personnel who have been granted authorized entry to (and within) facilities that contain restricted data or restricted information. CC ID 01436 | Physical and environmental protection | Preventive | |
Authorize physical access to sensitive areas based on job functions. CC ID 12462 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain physical identification procedures. CC ID 00713 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain lost or damaged identification card procedures, as necessary. CC ID 14819 | Physical and environmental protection | Preventive | |
Document all lost badges in a lost badge list. CC ID 12448 | Physical and environmental protection | Corrective | |
Establish, implement, and maintain identification issuance procedures for identification cards or badges. CC ID 06598 | Physical and environmental protection | Preventive | |
Include error handling controls in identification issuance procedures. CC ID 13709 | Physical and environmental protection | Preventive | |
Include information security in the identification issuance procedures. CC ID 15425 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain post-issuance update procedures for identification cards or badges. CC ID 15426 | Physical and environmental protection | Preventive | |
Include an identity registration process in the identification issuance procedures. CC ID 11671 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain identification renewal procedures for identification cards or badges. CC ID 06599 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain identification re-issuing procedures for identification cards or badges. CC ID 06596 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain identification mechanism termination procedures. CC ID 06306 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a door security standard. CC ID 06686 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a lock and access mechanism inventory (keys, lock combinations, or key cards) for all physical access control systems. CC ID 00748 | Physical and environmental protection | Preventive | |
Record the assigned access mechanism serial number or cipher lock code when issuing controlled items. CC ID 06715 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a window security standard. CC ID 06689 | Physical and environmental protection | Preventive | |
Post signs at all physical entry points stating the organization's right to inspect upon entry. CC ID 02204 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain after hours facility access procedures. CC ID 06340 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a guideline for working in a secure area. CC ID 04538 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain emergency re-entry procedures. CC ID 11672 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain emergency exit procedures. CC ID 01252 | Physical and environmental protection | Preventive | |
Establish, Implement, and maintain a camera operating policy. CC ID 15456 | Physical and environmental protection | Preventive | |
Require all visitors to sign in to the visitor log before the entrance of a visitor to the facility. CC ID 06700 | Physical and environmental protection | Preventive | |
Record the date and time of entry in the visitor log. CC ID 13255 | Physical and environmental protection | Preventive | |
Record the onsite personnel authorizing physical access for the visitor in the visitor log. CC ID 12466 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a physical access log. CC ID 12080 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain physical security threat reports. CC ID 02207 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a facility wall standard. CC ID 06692 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a media protection policy. CC ID 14029 | Physical and environmental protection | Preventive | |
Include compliance requirements in the media protection policy. CC ID 14185 | Physical and environmental protection | Preventive | |
Include coordination amongst entities in the media protection policy. CC ID 14184 | Physical and environmental protection | Preventive | |
Include management commitment in the media protection policy. CC ID 14182 | Physical and environmental protection | Preventive | |
Include roles and responsibilities in the media protection policy. CC ID 14180 | Physical and environmental protection | Preventive | |
Include the scope in the media protection policy. CC ID 14167 | Physical and environmental protection | Preventive | |
Include the purpose in the media protection policy. CC ID 14166 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain media protection procedures. CC ID 14062 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain storage media access control procedures. CC ID 00959 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain electronic media storage container repair guidelines. CC ID 02200 | Physical and environmental protection | Preventive | |
Include Information Technology assets in the asset removal policy. CC ID 13162 | Physical and environmental protection | Preventive | |
Specify the assets to be returned or removed in the asset removal policy. CC ID 13163 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain asset removal procedures or asset decommissioning procedures. CC ID 04540 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain missing asset reporting procedures. CC ID 06336 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain end user computing device security guidelines. CC ID 00719 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a locking screen saver policy. CC ID 06717 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a mobile device management program. CC ID 15212 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a mobile device management policy. CC ID 15214 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain mobile device emergency sanitization procedures. CC ID 16454 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain mobile device security guidelines. CC ID 04723 [{information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Physical and environmental protection | Preventive | |
Include the expectation of data loss in the event of sanitizing the mobile device in the mobile device security guidelines. CC ID 12292 | Physical and environmental protection | Preventive | |
Include legal requirements in the mobile device security guidelines. CC ID 12291 | Physical and environmental protection | Preventive | |
Include prohibiting the usage of unapproved application stores in the mobile device security guidelines. CC ID 12290 | Physical and environmental protection | Preventive | |
Include requiring users to create data backups in the mobile device security guidelines. CC ID 12289 | Physical and environmental protection | Preventive | |
Include the definition of mobile devices in the mobile device security guidelines. CC ID 12288 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain asset return procedures. CC ID 04537 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain open storage container procedures. CC ID 02198 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a clean desk policy. CC ID 06534 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain contact card reader security guidelines. CC ID 06588 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain contactless card reader security guidelines. CC ID 06589 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain Personal Identification Number input device security guidelines. CC ID 06590 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a vehicle access program. CC ID 02216 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain returned card procedures. CC ID 13567 | Physical and environmental protection | Preventive | |
Establish and maintain the physical security of non-issued payment cards. CC ID 06402 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain payment card disposal procedures. CC ID 16137 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a mailing control log. CC ID 16136 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain payment card usage security measures. CC ID 06406 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain payment card disposal procedures. CC ID 16135 | Physical and environmental protection | Preventive | |
Establish and maintain security classifications for network cabling. CC ID 08627 | Physical and environmental protection | Preventive | |
Establish and maintain documentation for network cabling schemes. CC ID 08641 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain a business continuity program. CC ID 13210 | Operational and Systems Continuity | Preventive | |
Establish, implement, and maintain a continuity framework. CC ID 00732 | Operational and Systems Continuity | Preventive | |
Establish and maintain the scope of the continuity framework. CC ID 11908 | Operational and Systems Continuity | Preventive | |
Include the organization's business products and services in the scope of the continuity framework. CC ID 12235 [Determine whether management effectively provides secure customer access to financial services and plans for potential interruptions in service. Review whether management does the following: App A Objective 6.25 Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Operational and Systems Continuity | Preventive | |
Establish, implement, and maintain a continuity plan. CC ID 00752 [Review whether patch management processes include the following: A documentation process to ensure the institution's information assets and technology inventory and disaster recovery plans are updated as appropriate when patches are applied. App A Objective 6.15.g] | Operational and Systems Continuity | Preventive | |
Identify all stakeholders in the continuity plan. CC ID 13256 | Operational and Systems Continuity | Preventive | |
Include a business continuity testing policy in the continuity plan, as necessary. CC ID 13234 | Operational and Systems Continuity | Preventive | |
Allocate financial resources to implement the continuity plan, as necessary. CC ID 12993 | Operational and Systems Continuity | Preventive | |
Include identification procedures in the continuity plan, as necessary. CC ID 14372 | Operational and Systems Continuity | Preventive | |
Include the continuity strategy in the continuity plan. CC ID 13189 | Operational and Systems Continuity | Preventive | |
Document and use the lessons learned to update the continuity plan. CC ID 10037 | Operational and Systems Continuity | Preventive | |
Include roles and responsibilities in the continuity plan, as necessary. CC ID 13254 | Operational and Systems Continuity | Preventive | |
Coordinate and incorporate supply chain members' continuity plans, as necessary. CC ID 13242 | Operational and Systems Continuity | Preventive | |
Include incident management procedures in the continuity plan. CC ID 13244 | Operational and Systems Continuity | Preventive | |
Include the use of virtual meeting tools in the continuity plan. CC ID 14390 | Operational and Systems Continuity | Preventive | |
Include scenario analyses of various contingency scenarios in the continuity plan. CC ID 13057 | Operational and Systems Continuity | Preventive | |
Include the annual statement based on the continuity plan review in the continuity plan. CC ID 12775 | Operational and Systems Continuity | Preventive | |
Establish, implement, and maintain the continuity procedures. CC ID 14236 | Operational and Systems Continuity | Corrective | |
Document the uninterrupted power requirements for all in scope systems. CC ID 06707 | Operational and Systems Continuity | Preventive | |
Document all supporting information in the continuity plan, such as purpose, scope, and requirements. CC ID 01371 | Operational and Systems Continuity | Preventive | |
Include notifications to alternate facilities in the continuity plan. CC ID 13220 | Operational and Systems Continuity | Preventive | |
Document the concept of operations in the continuity plan, including a line of succession. CC ID 01372 | Operational and Systems Continuity | Preventive | |
Establish, implement, and maintain damage assessment procedures. CC ID 01267 | Operational and Systems Continuity | Preventive | |
Establish, implement, and maintain a recovery plan. CC ID 13288 | Operational and Systems Continuity | Preventive | |
Include procedures to restore network connectivity in the recovery plan. CC ID 16250 | Operational and Systems Continuity | Preventive | |
Include addressing backup failures in the recovery plan. CC ID 13298 | Operational and Systems Continuity | Preventive | |
Include procedures to verify completion of the data backup procedure in the recovery plan. CC ID 13297 | Operational and Systems Continuity | Preventive | |
Include the procedures for the storage of information necessary to recover functionality in the recovery plan. CC ID 13295 | Operational and Systems Continuity | Preventive | |
Include the backup procedures for information necessary to recover functionality in the recovery plan. CC ID 13294 | Operational and Systems Continuity | Preventive | |
Include the criteria for activation in the recovery plan. CC ID 13293 | Operational and Systems Continuity | Preventive | |
Include escalation procedures in the recovery plan. CC ID 16248 | Operational and Systems Continuity | Preventive | |
Include procedures to preserve data before beginning the recovery process in the recovery plan. CC ID 13292 | Operational and Systems Continuity | Preventive | |
Document lessons learned from testing the recovery plan or an actual event. CC ID 13301 | Operational and Systems Continuity | Detective | |
Include risk prioritized recovery procedures for each business unit in the recovery plan. CC ID 01166 | Operational and Systems Continuity | Preventive | |
Include the recovery plan in the continuity plan. CC ID 01377 | Operational and Systems Continuity | Preventive | |
Define and assign the roles and responsibilities of the chairman of the board. CC ID 14786 | Human Resources management | Preventive | |
Establish, implement, and maintain candidate selection procedures to the board of directors. CC ID 14782 | Human Resources management | Preventive | |
Include the criteria of mixed experiences and skills in the candidate selection procedures. CC ID 14791 | Human Resources management | Preventive | |
Define and assign the security staff roles and responsibilities. CC ID 11750 [Determine whether security officers and employees know, understand, and are accountable for fulfilling their security responsibilities. App A Objective 2.7 Determine whether management has effective threat monitoring processes, including the following: Establishing responsibility and accountability for security personnel and system administrators for monitoring. App A Objective 8.4.b Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Human Resources management | Preventive | |
Establish, implement, and maintain a personnel management program. CC ID 14018 | Human Resources management | Preventive | |
Establish, implement, and maintain a personnel security program. CC ID 10628 | Human Resources management | Preventive | |
Establish, implement, and maintain personnel screening procedures. CC ID 11700 | Human Resources management | Preventive | |
Perform a criminal records check during personnel screening. CC ID 06643 | Human Resources management | Preventive | |
Document any reasons a full criminal records check could not be performed. CC ID 13305 | Human Resources management | Preventive | |
Perform an academic records check during personnel screening. CC ID 06647 | Human Resources management | Preventive | |
Document the personnel risk assessment results. CC ID 11764 | Human Resources management | Detective | |
Establish, implement, and maintain security clearance procedures. CC ID 00783 [Review whether management does the following: Establishes and effectively administers appropriate security screening in IT hiring practices. App A Objective 6.8.b {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Preventive | |
Document the security clearance procedure results. CC ID 01635 | Human Resources management | Detective | |
Include evidence of experience in applications for professional certification. CC ID 16193 | Human Resources management | Preventive | |
Include supporting documentation in applications for professional certification. CC ID 16195 | Human Resources management | Preventive | |
Document all training in a training record. CC ID 01423 | Human Resources management | Detective | |
Review the current published guidance and awareness and training programs. CC ID 01245 | Human Resources management | Preventive | |
Establish, implement, and maintain training plans. CC ID 00828 | Human Resources management | Preventive | |
Include portions of the visitor control program in the training plan. CC ID 13287 | Human Resources management | Preventive | |
Establish, implement, and maintain a security awareness program. CC ID 11746 [{facilitate} Determine whether management responsibilities are appropriate and include the following: Facilitation of annual information security and awareness training and ongoing security-related communications to employees. App A Objective 2.5.l {security awareness training} {compliance training} Review whether management does the following: Provides training to support awareness and policy compliance. App A Objective 6.8.f {security awareness program} Review whether management has the following: Common awareness and enforcement mechanisms between lines of business and information security. App A Objective 3.2.c Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Preventive | |
Establish, implement, and maintain a security awareness and training policy. CC ID 14022 | Human Resources management | Preventive | |
Include compliance requirements in the security awareness and training policy. CC ID 14092 | Human Resources management | Preventive | |
Include coordination amongst entities in the security awareness and training policy. CC ID 14091 | Human Resources management | Preventive | |
Establish, implement, and maintain security awareness and training procedures. CC ID 14054 | Human Resources management | Preventive | |
Include management commitment in the security awareness and training policy. CC ID 14049 | Human Resources management | Preventive | |
Include roles and responsibilities in the security awareness and training policy. CC ID 14048 | Human Resources management | Preventive | |
Include the scope in the security awareness and training policy. CC ID 14047 | Human Resources management | Preventive | |
Include the purpose in the security awareness and training policy. CC ID 14045 | Human Resources management | Preventive | |
Include configuration management procedures in the security awareness program. CC ID 13967 | Human Resources management | Preventive | |
Document security awareness requirements. CC ID 12146 | Human Resources management | Preventive | |
Include safeguards for information systems in the security awareness program. CC ID 13046 | Human Resources management | Preventive | |
Include security policies and security standards in the security awareness program. CC ID 13045 | Human Resources management | Preventive | |
Include mobile device security guidelines in the security awareness program. CC ID 11803 | Human Resources management | Preventive | |
Include training based on the participants' level of responsibility and access level in the security awareness program. CC ID 11802 [{security requirements} {align} Review whether management ascertains assurance through the following: Alignment of personnel skills and program needs. App A Objective 10.1.b {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Human Resources management | Preventive | |
Include a requirement to train all new hires and interested personnel in the security awareness program. CC ID 11800 | Human Resources management | Preventive | |
Include remote access in the security awareness program. CC ID 13892 | Human Resources management | Preventive | |
Document the goals of the security awareness program. CC ID 12145 | Human Resources management | Preventive | |
Compare current security awareness assessment reports to the security awareness baseline. CC ID 12150 | Human Resources management | Preventive | |
Document the scope of the security awareness program. CC ID 12148 | Human Resources management | Preventive | |
Establish, implement, and maintain a security awareness baseline. CC ID 12147 | Human Resources management | Preventive | |
Require personnel to acknowledge, through writing their signature, that they have read and understand the organization's security policies. CC ID 01363 [Determine whether security officers and employees know, understand, and are accountable for fulfilling their security responsibilities. App A Objective 2.7] | Human Resources management | Preventive | |
Establish, implement, and maintain an environmental management system awareness program. CC ID 15200 | Human Resources management | Preventive | |
Establish, implement, and maintain cloud service agreements. CC ID 13157 | Operational management | Preventive | |
Include the asset removal policy in the cloud service agreement. CC ID 13161 | Operational management | Preventive | |
Include cloud security requirements in the cloud management procedures. CC ID 16366 | Operational management | Preventive | |
Establish, implement, and maintain a cloud service usage standard. CC ID 13143 | Operational management | Preventive | |
Include the roles and responsibilities of cloud service users in the cloud service usage standard. CC ID 13984 | Operational management | Preventive | |
Include information security requirements in the cloud service usage standard. CC ID 13148 | Operational management | Preventive | |
Establish, implement, and maintain a Governance, Risk, and Compliance framework. CC ID 01406 | Operational management | Preventive | |
Establish, implement, and maintain an internal control framework. CC ID 00820 [Specifically, review whether management does the following: Reviews and improves or updates the security controls, where necessary. App A Objective 6.5.c] | Operational management | Preventive | |
Include the business need justification for excluding controls in the baseline of internal controls. CC ID 16129 | Operational management | Preventive | |
Include the implementation status of controls in the baseline of internal controls. CC ID 16128 | Operational management | Preventive | |
Include procedures for continuous quality improvement in the internal control framework. CC ID 00819 [Review whether policies, standards, and procedures have the following characteristics: Are appropriately flexible to address changes in the environment. App A Objective 6.1.e] | Operational management | Preventive | |
Include continuous service account management procedures in the internal control framework. CC ID 13860 | Operational management | Preventive | |
Include threat assessment in the internal control framework. CC ID 01347 [Review whether management has the following: A threat assessment to help focus the risk identification efforts. App A Objective 4.2.a {threat identification process}{threat assessment process} Determine whether management has effective threat identification and assessment processes, including the following: App A Objective 8.3 Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3 {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Operational management | Preventive | |
Include vulnerability management and risk assessment in the internal control framework. CC ID 13102 [Determine whether management effectively identifies threats and vulnerabilities continuously. App A Objective 4.1 Determine whether the institution's security operations activities include the following: Vulnerability identification (e.g., operation or supervision of vulnerability scans, self-assessments, penetration tests, and analysis of audit results). App A Objective 8.1.c Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk assessment process, including threat identification and assessment. App A Objective 2.4.a] | Operational management | Preventive | |
Include personnel security procedures in the internal control framework. CC ID 01349 | Operational management | Preventive | |
Include continuous security warning monitoring procedures in the internal control framework. CC ID 01358 | Operational management | Preventive | |
Include incident alert thresholds in the continuous security warning monitoring procedures. CC ID 13205 | Operational management | Preventive | |
Include security information sharing procedures in the internal control framework. CC ID 06489 | Operational management | Preventive | |
Include security incident response procedures in the internal control framework. CC ID 01359 [{incident response policy} Review management's ability to do the following: Develop policies that address the concepts of information security incident response and resilience and test information security incident scenarios. App A Objective 6.34.c Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1 {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Operational management | Preventive | |
Include incident response escalation procedures in the internal control framework. CC ID 11745 | Operational management | Preventive | |
Include continuous user account management procedures in the internal control framework. CC ID 01360 | Operational management | Preventive | |
Include emergency response procedures in the internal control framework. CC ID 06779 | Operational management | Detective | |
Authorize and document all exceptions to the internal control framework. CC ID 06781 | Operational management | Preventive | |
Establish, implement, and maintain an information security program. CC ID 00812 [{implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 {information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Determine whether the information security program is subject to periodic review and whether management provides for continual improvement in the program's effectiveness. Verify whether that review does the following: App A Objective 9.1 {security program} Review whether management has the following: Security policies, standards, and procedures that are designed to support and to align with the policies in the lines of business. App A Objective 3.2.a Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Operational management | Preventive | |
Include physical safeguards in the information security program. CC ID 12375 | Operational management | Preventive | |
Include technical safeguards in the information security program. CC ID 12374 | Operational management | Preventive | |
Include administrative safeguards in the information security program. CC ID 12373 | Operational management | Preventive | |
Include system development in the information security program. CC ID 12389 | Operational management | Preventive | |
Include system maintenance in the information security program. CC ID 12388 | Operational management | Preventive | |
Include system acquisition in the information security program. CC ID 12387 | Operational management | Preventive | |
Include access control in the information security program. CC ID 12386 | Operational management | Preventive | |
Include operations management in the information security program. CC ID 12385 [Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 Determine whether management appropriately integrates the information security program across the institution's lines of business and support functions. Review whether management has the following: App A Objective 3.2 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Operational management | Preventive | |
Include communication management in the information security program. CC ID 12384 | Operational management | Preventive | |
Include environmental security in the information security program. CC ID 12383 | Operational management | Preventive | |
Include physical security in the information security program. CC ID 12382 | Operational management | Preventive | |
Include human resources security in the information security program. CC ID 12381 | Operational management | Preventive | |
Include asset management in the information security program. CC ID 12380 [Determine whether the institution's security operations activities include the following: Security software and device management (e.g., maintaining the signatures on signaturebased devices and firewall rules). App A Objective 8.1.a] | Operational management | Preventive | |
Include a continuous monitoring program in the information security program. CC ID 14323 | Operational management | Preventive | |
Include change management procedures in the continuous monitoring plan. CC ID 16227 | Operational management | Preventive | |
include recovery procedures in the continuous monitoring plan. CC ID 16226 | Operational management | Preventive | |
Include mechanisms for decommissioning a system in the continuous monitoring plan. CC ID 16225 | Operational management | Preventive | |
Include mechanisms for appeal and override in the continuous monitoring plan. CC ID 16223 | Operational management | Preventive | |
Include how the information security department is organized in the information security program. CC ID 12379 | Operational management | Preventive | |
Include risk management in the information security program. CC ID 12378 [Determine whether management has adequately incorporated information security into its overall ITRM process. App A Objective 2.10 Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Measurement of risks. App A Objective 3.1.b {risk identification} Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Identification of threats and risks. App A Objective 3.1.a Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: App A Objective 3.1 Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management Management should develop and implement a process to identify risk. II.A Risk Identification] | Operational management | Preventive | |
Include mitigating supply chain risks in the information security program. CC ID 13352 | Operational management | Preventive | |
Establish, implement, and maintain an information security policy. CC ID 11740 [{information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Review whether management has processes to do the following: Update the information security program to reflect changes. App A Objective 4.5.b] | Operational management | Preventive | |
Include business processes in the information security policy. CC ID 16326 | Operational management | Preventive | |
Include the information security strategy in the information security policy. CC ID 16125 | Operational management | Preventive | |
Include a commitment to continuous improvement in the information security policy. CC ID 16123 | Operational management | Preventive | |
Include roles and responsibilities in the information security policy. CC ID 16120 | Operational management | Preventive | |
Include a commitment to the information security requirements in the information security policy. CC ID 13496 | Operational management | Preventive | |
Include information security objectives in the information security policy. CC ID 13493 | Operational management | Preventive | |
Include the use of Cloud Services in the information security policy. CC ID 13146 | Operational management | Preventive | |
Include notification procedures in the information security policy. CC ID 16842 | Operational management | Preventive | |
Describe the group activities that protect restricted data in the information security procedures. CC ID 12294 | Operational management | Preventive | |
Document the roles and responsibilities for all activities that protect restricted data in the information security procedures. CC ID 12304 | Operational management | Preventive | |
Assign information security responsibilities to interested personnel and affected parties in the information security program. CC ID 11885 [Determine whether management has designated one or more individuals as an information security officer and determine appropriateness of the reporting line. App A Objective 2.6 {define} Determine whether management responsibilities are appropriate and include the following: Definition of the information security responsibilities of third parties. App A Objective 2.5.k Review whether policies, standards, and procedures have the following characteristics: Delineate areas of responsibility. App A Objective 6.1.b Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Operational management | Preventive | |
Establish, implement, and maintain a social media governance program. CC ID 06536 | Operational management | Preventive | |
Include instant messaging, texting, and tweeting in the social media acceptable use policy. CC ID 04578 | Operational management | Preventive | |
Include explicit restrictions in the social media acceptable use policy. CC ID 06655 | Operational management | Preventive | |
Include contributive content sites in the social media acceptable use policy. CC ID 06656 | Operational management | Preventive | |
Establish, implement, and maintain operational control procedures. CC ID 00831 | Operational management | Preventive | |
Include assigning and approving operations in operational control procedures. CC ID 06382 | Operational management | Preventive | |
Include startup processes in operational control procedures. CC ID 00833 | Operational management | Preventive | |
Include change control processes in the operational control procedures. CC ID 16793 | Operational management | Preventive | |
Establish and maintain a data processing run manual. CC ID 00832 | Operational management | Preventive | |
Establish, implement, and maintain a Standard Operating Procedures Manual. CC ID 00826 | Operational management | Preventive | |
Include metrics in the standard operating procedures manual. CC ID 14988 | Operational management | Preventive | |
Include maintenance measures in the standard operating procedures manual. CC ID 14986 | Operational management | Preventive | |
Include the expected lifetime of the system in the standard operating procedures manual. CC ID 14984 | Operational management | Preventive | |
Include technical measures used to interpret output in the standard operating procedures manual. CC ID 14982 | Operational management | Preventive | |
Include predetermined changes in the standard operating procedures manual. CC ID 14977 | Operational management | Preventive | |
Include specifications for input data in the standard operating procedures manual. CC ID 14975 | Operational management | Preventive | |
Include risks to health and safety or fundamental rights in the standard operating procedures manual. CC ID 14973 | Operational management | Preventive | |
Include circumstances that may impact the system in the standard operating procedures manual. CC ID 14972 | Operational management | Preventive | |
Include what the system was tested and validated for in the standard operating procedures manual. CC ID 14969 | Operational management | Preventive | |
Include the intended purpose in the standard operating procedures manual. CC ID 14967 | Operational management | Preventive | |
Include information on system performance in the standard operating procedures manual. CC ID 14965 | Operational management | Preventive | |
Include contact details in the standard operating procedures manual. CC ID 14962 | Operational management | Preventive | |
Update operating procedures that contribute to user errors. CC ID 06935 | Operational management | Corrective | |
Establish, implement, and maintain a job scheduling methodology. CC ID 00834 | Operational management | Preventive | |
Establish and maintain a job schedule exceptions list. CC ID 00835 | Operational management | Preventive | |
Establish, implement, and maintain a data processing continuity plan. CC ID 00836 | Operational management | Preventive | |
Establish, implement, and maintain Voice over Internet Protocol operating procedures. CC ID 04583 | Operational management | Preventive | |
Establish, implement, and maintain the Acceptable Use Policy. CC ID 01350 [{unapproved information technology resources} Review whether management does the following: Has policies restricting the use of unsanctioned or unapproved IT resources (e.g., online storage services, unapproved mobile device applications, and unapproved devices). App A Objective 6.18.g Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Operational management | Preventive | |
Include that explicit management authorization must be given for the use of all technologies and their documentation in the Acceptable Use Policy. CC ID 01351 | Operational management | Preventive | |
Include requiring users to protect restricted data in accordance with the Governance, Risk, and Compliance framework in the Acceptable Use Policy. CC ID 11894 | Operational management | Preventive | |
Include Bring Your Own Device agreements in the Acceptable Use Policy. CC ID 15703 | Operational management | Preventive | |
Include the obligations of users in the Bring Your Own Device agreement. CC ID 15708 | Operational management | Preventive | |
Include the rights of the organization in the Bring Your Own Device agreement. CC ID 15707 | Operational management | Preventive | |
Include the circumstances in which the organization may confiscate, audit, or inspect assets in the Bring Your Own Device agreement. CC ID 15706 | Operational management | Preventive | |
Include the circumstances in which the organization may manage assets in the Bring Your Own Device agreement. CC ID 15705 | Operational management | Preventive | |
Include Bring Your Own Device usage in the Acceptable Use Policy. CC ID 12293 | Operational management | Preventive | |
Include a web usage policy in the Acceptable Use Policy. CC ID 16496 | Operational management | Preventive | |
Include Bring Your Own Device security guidelines in the Acceptable Use Policy. CC ID 01352 [{employee-owned device} Review whether management does the following: Implements controls over institution owned and personally owned devices used by employees to access the network (e.g., disallows remote access without business justification, requires management approval, reviews remote access approvals, restricts access to authorized network areas, logs remote access, implements robust authentication, uses encryption, and uses application white-listing). App A Objective 6.24.a {employee-owned device} Review whether management does the following: Uses an effective method to ensure personally owned devices meet defined institution security standards (e.g., such as operating system version, patch levels, and anti-malware solutions). App A Objective 6.24.c] | Operational management | Preventive | |
Include asset tags in the Acceptable Use Policy. CC ID 01354 | Operational management | Preventive | |
Specify the owner of applicable assets in the Acceptable Use Policy. CC ID 15699 | Operational management | Preventive | |
Include asset use policies in the Acceptable Use Policy. CC ID 01355 | Operational management | Preventive | |
Include authority for access authorization lists for assets in all relevant Acceptable Use Policies. CC ID 11872 | Operational management | Preventive | |
Include access control mechanisms in the Acceptable Use Policy. CC ID 01353 [{employee-owned device} Review whether management does the following: Implements controls over institution owned and personally owned devices used by employees to access the network (e.g., disallows remote access without business justification, requires management approval, reviews remote access approvals, restricts access to authorized network areas, logs remote access, implements robust authentication, uses encryption, and uses application white-listing). App A Objective 6.24.a] | Operational management | Preventive | |
Include prohibiting the copying or moving of restricted data from its original source onto local hard drives or removable storage media in the Acceptable Use Policy. CC ID 11893 | Operational management | Preventive | |
Correlate the Acceptable Use Policy with the network security policy. CC ID 01356 | Operational management | Preventive | |
Include appropriate network locations for each technology in the Acceptable Use Policy. CC ID 11881 | Operational management | Preventive | |
Correlate the Acceptable Use Policy with the approved product list. CC ID 01357 | Operational management | Preventive | |
Include facility access and facility use in the Acceptable Use Policy. CC ID 06441 | Operational management | Preventive | |
Include disciplinary actions in the Acceptable Use Policy. CC ID 00296 | Operational management | Corrective | |
Include the usage restrictions of mobile code technologies in the Acceptable Use Policy. CC ID 15311 | Operational management | Preventive | |
Include a software installation policy in the Acceptable Use Policy. CC ID 06749 | Operational management | Preventive | |
Document idle session termination and logout for remote access technologies in the Acceptable Use Policy. CC ID 12472 | Operational management | Preventive | |
Require interested personnel and affected parties to sign Acceptable Use Policies. CC ID 06661 [Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Operational management | Preventive | |
Require interested personnel and affected parties to re-sign Acceptable Use Policies, as necessary. CC ID 06663 | Operational management | Preventive | |
Establish, implement, and maintain an Intellectual Property Right program. CC ID 00821 | Operational management | Preventive | |
Establish, implement, and maintain Intellectual Property Rights protection procedures. CC ID 11512 | Operational management | Preventive | |
Protect against circumvention of the organization's Intellectual Property Rights. CC ID 11513 | Operational management | Preventive | |
Establish, implement, and maintain an e-mail policy. CC ID 06439 | Operational management | Preventive | |
Include business use of personal e-mail in the e-mail policy. CC ID 14381 | Operational management | Preventive | |
Protect policies, standards, and procedures from unauthorized modification or disclosure. CC ID 10603 | Operational management | Preventive | |
Establish, implement, and maintain nondisclosure agreements. CC ID 04536 | Operational management | Preventive | |
Require interested personnel and affected parties to sign nondisclosure agreements. CC ID 06667 [Review the institution's policies, standards, and procedures related to the use of the following: Nondisclosure agreements with third-party service providers with access to the institution's systems and data (including before, during, and following termination of the contract). App A Objective 6.31.d {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Operational management | Preventive | |
Require interested personnel and affected parties to re-sign nondisclosure agreements, as necessary. CC ID 06669 | Operational management | Preventive | |
Establish, implement, and maintain a use of information agreement. CC ID 06215 [{nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Operational management | Preventive | |
Include use limitations in the use of information agreement. CC ID 06244 | Operational management | Preventive | |
Include disclosure requirements in the use of information agreement. CC ID 11735 | Operational management | Preventive | |
Include information recipients in the use of information agreement. CC ID 06245 | Operational management | Preventive | |
Include reporting out of scope use of information in the use of information agreement. CC ID 06246 | Operational management | Preventive | |
Include disclosure of information in the use of information agreement. CC ID 11830 | Operational management | Preventive | |
Include information security procedures assigned to the information recipient in the use of information agreement. CC ID 07130 | Operational management | Preventive | |
Include information security procedures assigned to the originator in the use of information agreement. CC ID 14418 | Operational management | Preventive | |
Include a do not contact rule for the individuals identified in a data set in the use of information agreement. CC ID 07131 | Operational management | Preventive | |
Include the information recipient's third parties accepting the agreement in the use of information agreement. CC ID 07132 | Operational management | Preventive | |
Establish, implement, and maintain classification schemes for all systems and assets. CC ID 01902 [{sensitivity of assets} (asset classification} Review whether management does the following: Uses the classification to determine the sensitivity and criticality of assets. App A Objective 6.6.c {sensitivity of assets} (asset classification} Review whether management does the following: Uses the classification to determine the sensitivity and criticality of assets. App A Objective 6.6.c] | Operational management | Preventive | |
Establish, implement, and maintain the systems' confidentiality level. CC ID 01904 | Operational management | Preventive | |
Define confidentiality controls. CC ID 01908 | Operational management | Preventive | |
Establish, implement, and maintain the systems' availability level. CC ID 01905 | Operational management | Preventive | |
Define integrity controls. CC ID 01909 | Operational management | Preventive | |
Establish, implement, and maintain the systems' integrity level. CC ID 01906 | Operational management | Preventive | |
Define availability controls. CC ID 01911 | Operational management | Preventive | |
Establish safety classifications for systems according to their potential harmful effects to operators or end users. CC ID 06603 | Operational management | Preventive | |
Establish, implement, and maintain an asset safety classification scheme. CC ID 06604 [Review whether management does the following: Identifies assets that require protection, such as those that store, transmit, or process sensitive customer information, or trade secrets. App A Objective 6.6.a] | Operational management | Preventive | |
Establish, implement, and maintain the Asset Classification Policy. CC ID 06642 | Operational management | Preventive | |
Document the decision for assigning an asset to a specific asset classification in the Asset Classification Policy. CC ID 07185 | Operational management | Preventive | |
Assign decomposed system components the same asset classification as the originating system. CC ID 06605 | Operational management | Preventive | |
Establish, implement, and maintain an Information Technology inventory with asset discovery audit trails. CC ID 00689 [Determine whether management effectively maintains an inventory(ies) of hardware, software, information, and connections. Review whether management does the following: App A Objective 6.6 Management should inventory and classify assets, including hardware, software, information, and connections. II.C.5 Inventory and Classification of Assets] | Operational management | Preventive | |
Include all account types in the Information Technology inventory. CC ID 13311 | Operational management | Preventive | |
Include each Information System's major applications in the Information Technology inventory. CC ID 01407 | Operational management | Preventive | |
Categorize all major applications according to the business information they process. CC ID 07182 | Operational management | Preventive | |
Document the resources, hazards, and Evaluation Assurance Levels for each major application. CC ID 01164 | Operational management | Preventive | |
Include the General Support Systems and security support structure in the Information Technology inventory. CC ID 01408 | Operational management | Preventive | |
Include each Information System's minor applications in the Information Technology inventory. CC ID 01409 | Operational management | Preventive | |
Categorize facilities in the Information Technology inventory according to their environmental risks. CC ID 06729 | Operational management | Preventive | |
Establish, implement, and maintain a hardware asset inventory. CC ID 00691 [{software asset inventory}{information technology inventory} Review whether the institution's life cycle management includes the following: Maintaining inventories of systems and applications. App A Objective 6.16.a] | Operational management | Preventive | |
Include network equipment in the Information Technology inventory. CC ID 00693 | Operational management | Preventive | |
Include mobile devices that store restricted data or restricted information in the Information Technology inventory. CC ID 04719 | Operational management | Preventive | |
Include software in the Information Technology inventory. CC ID 00692 [{software asset inventory}{information technology inventory} Review whether the institution's life cycle management includes the following: Maintaining inventories of systems and applications. App A Objective 6.16.a] | Operational management | Preventive | |
Establish and maintain a list of authorized software and versions required for each system. CC ID 12093 | Operational management | Preventive | |
Establish, implement, and maintain a storage media inventory. CC ID 00694 | Operational management | Preventive | |
Include all electronic storage media containing restricted data or restricted information in the storage media inventory. CC ID 00962 | Operational management | Detective | |
Establish, implement, and maintain a records inventory and database inventory. CC ID 01260 | Operational management | Preventive | |
Add inventoried assets to the asset register database, as necessary. CC ID 07051 | Operational management | Preventive | |
Organize the asset register database by grouping objects according to an organizational information classification standard. CC ID 07181 | Operational management | Preventive | |
Record the decommission date for applicable assets in the asset inventory. CC ID 14920 | Operational management | Preventive | |
Record the Uniform Resource Locator for applicable assets in the asset inventory. CC ID 14918 | Operational management | Preventive | |
Record the review date for applicable assets in the asset inventory. CC ID 14919 | Operational management | Preventive | |
Record services for applicable assets in the asset inventory. CC ID 13733 | Operational management | Preventive | |
Record protocols for applicable assets in the asset inventory. CC ID 13734 | Operational management | Preventive | |
Record the software version in the asset inventory. CC ID 12196 | Operational management | Preventive | |
Record the publisher for applicable assets in the asset inventory. CC ID 13725 | Operational management | Preventive | |
Record the authentication system in the asset inventory. CC ID 13724 | Operational management | Preventive | |
Tag unsupported assets in the asset inventory. CC ID 13723 | Operational management | Preventive | |
Record the install date for applicable assets in the asset inventory. CC ID 13720 | Operational management | Preventive | |
Record the make, model of device for applicable assets in the asset inventory. CC ID 12465 | Operational management | Preventive | |
Record the asset tag for physical assets in the asset inventory. CC ID 06632 | Operational management | Preventive | |
Record the host name of applicable assets in the asset inventory. CC ID 13722 | Operational management | Preventive | |
Record network ports for applicable assets in the asset inventory. CC ID 13730 | Operational management | Preventive | |
Record the MAC address for applicable assets in the asset inventory. CC ID 13721 | Operational management | Preventive | |
Record the operating system type for applicable assets in the asset inventory. CC ID 06633 | Operational management | Preventive | |
Record the department associated with the asset in the asset inventory. CC ID 12084 | Operational management | Preventive | |
Record the physical location for applicable assets in the asset inventory. CC ID 06634 | Operational management | Preventive | |
Record the manufacturer's serial number for applicable assets in the asset inventory. CC ID 06635 | Operational management | Preventive | |
Record the firmware version for applicable assets in the asset inventory. CC ID 12195 | Operational management | Preventive | |
Record the related business function for applicable assets in the asset inventory. CC ID 06636 | Operational management | Preventive | |
Record the deployment environment for applicable assets in the asset inventory. CC ID 06637 | Operational management | Preventive | |
Record the Internet Protocol address for applicable assets in the asset inventory. CC ID 06638 | Operational management | Preventive | |
Link the software asset inventory to the hardware asset inventory. CC ID 12085 | Operational management | Preventive | |
Record the owner for applicable assets in the asset inventory. CC ID 06640 | Operational management | Preventive | |
Record all compliance requirements for applicable assets in the asset inventory. CC ID 15696 | Operational management | Preventive | |
Record all changes to assets in the asset inventory. CC ID 12190 | Operational management | Preventive | |
Record cloud service derived data in the asset inventory. CC ID 13007 | Operational management | Preventive | |
Include cloud service customer data in the asset inventory. CC ID 13006 | Operational management | Preventive | |
Establish, implement, and maintain a system redeployment program. CC ID 06276 [Review whether the institution's life cycle management includes the following: Planning for the update or replacement of und-color:#CBD0E5;" class="term_secondary-verb">tyle="background-color:#F0BBBC;" class="term_primary-noun">systems nearing obsolescence. App A Objective 6.16.d] | Operational management | Preventive | |
Document the staff's operating knowledge of the system prior to a personnel status change. CC ID 06937 | Operational management | Preventive | |
Redeploy systems to other organizational units, as necessary. CC ID 11452 | Operational management | Preventive | |
Establish, implement, and maintain a system disposal program. CC ID 14431 [Review whether the institution's life cycle management includes the following: Adhering to an approved end-of-life or sunset policy for older systems. App A Objective 6.16.b Determine whether management plans for the life cycles of the institution's systems, eventual end of life, and any corresponding business impacts. Review whether the institution's life cycle management includes the following: App A Objective 6.16 {system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Operational management | Preventive | |
Establish, implement, and maintain disposal procedures. CC ID 16513 | Operational management | Preventive | |
Establish, implement, and maintain asset sanitization procedures. CC ID 16511 | Operational management | Preventive | |
Establish, implement, and maintain system destruction procedures. CC ID 16474 | Operational management | Preventive | |
Establish, implement, and maintain printer and multifunction device disposition procedures. CC ID 15216 | Operational management | Preventive | |
Establish, implement, and maintain a customer service program. CC ID 00846 | Operational management | Preventive | |
Include incident escalation procedures in the Incident Management program. CC ID 00856 [Determine whether management has effective incident identification and assessment processes to do the following: Escalate the event consistent with the classification. App A Objective 8.5.e {notification process} Determine whether management has effective incident response processes, including the following: Thresholds for reporting significant security incidents and processes to notify, as appropriate, the institution's regulators of those incidents that may affect the institution or the financial system. App A Objective 8.6.f {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Operational management | Preventive | |
Define the characteristics of the Incident Management program. CC ID 00855 | Operational management | Preventive | |
Include the criteria for an incident in the Incident Management program. CC ID 12173 [Determine whether management has effective incident identification and assessment processes to do the following: Identify indicators of compromise. App A Objective 8.5.a {incident response procedures} Determine whether management has effective incident response processes, including the following: Protocols defined in the incident response policy to declare and respond to an incident once identified. App A Objective 8.6.a {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Operational management | Preventive | |
Include detection procedures in the Incident Management program. CC ID 00588 | Operational management | Preventive | |
Define and document impact thresholds to be used in categorizing incidents. CC ID 10033 [{adhere} {information security incident} Determine whether management responsibilities are appropriate and include the following: Adherence to risk thresholds established by the board relating to information security threats or incidents, including those relating to cybersecurity. App A Objective 2.5.e {notification process} Determine whether management has effective incident response processes, including the following: Thresholds for reporting significant security incidents and processes to notify, as appropriate, the institution's regulators of those incidents that may affect the institution or the financial system. App A Objective 8.6.f] | Operational management | Preventive | |
Record actions taken by investigators during a forensic investigation in the forensic investigation report. CC ID 07095 | Operational management | Preventive | |
Include where the digital forensic evidence was found in the forensic investigation report. CC ID 08674 | Operational management | Detective | |
Include the condition of the digital forensic evidence in the forensic investigation report. CC ID 08678 | Operational management | Detective | |
Include data loss event notifications in the Incident Response program. CC ID 00364 | Operational management | Preventive | |
Include required information in the written request to delay the notification to affected parties. CC ID 16785 | Operational management | Preventive | |
Design the text of the notice for all incident response notifications to be no smaller than 10-point type. CC ID 12985 | Operational management | Preventive | |
Establish, implement, and maintain incident response notifications. CC ID 12975 | Operational management | Corrective | |
Include information required by law in incident response notifications. CC ID 00802 | Operational management | Detective | |
Title breach notifications "Notice of Data Breach". CC ID 12977 | Operational management | Preventive | |
Display titles of incident response notifications clearly and conspicuously. CC ID 12986 | Operational management | Preventive | |
Display headings in incident response notifications clearly and conspicuously. CC ID 12987 | Operational management | Preventive | |
Design the incident response notification to call attention to its nature and significance. CC ID 12984 | Operational management | Preventive | |
Use plain language to write incident response notifications. CC ID 12976 | Operational management | Preventive | |
Include directions for changing the user's authenticator or security questions and answers in the breach notification. CC ID 12983 | Operational management | Preventive | |
Include the affected parties rights in the incident response notification. CC ID 16811 | Operational management | Preventive | |
Include details of the investigation in incident response notifications. CC ID 12296 | Operational management | Preventive | |
Include the issuer's name in incident response notifications. CC ID 12062 | Operational management | Preventive | |
Include a "What Happened" heading in breach notifications. CC ID 12978 | Operational management | Preventive | |
Include a general description of the data loss event in incident response notifications. CC ID 04734 | Operational management | Preventive | |
Include time information in incident response notifications. CC ID 04745 | Operational management | Preventive | |
Include the identification of the data source in incident response notifications. CC ID 12305 | Operational management | Preventive | |
Include a "What Information Was Involved" heading in the breach notification. CC ID 12979 | Operational management | Preventive | |
Include the type of information that was lost in incident response notifications. CC ID 04735 | Operational management | Preventive | |
Include the type of information the organization maintains about the affected parties in incident response notifications. CC ID 04776 | Operational management | Preventive | |
Include a "What We Are Doing" heading in the breach notification. CC ID 12982 | Operational management | Preventive | |
Include what the organization has done to enhance data protection controls in incident response notifications. CC ID 04736 | Operational management | Preventive | |
Include what the organization is offering or has already done to assist affected parties in incident response notifications. CC ID 04737 | Operational management | Preventive | |
Include a "For More Information" heading in breach notifications. CC ID 12981 | Operational management | Preventive | |
Include details of the companies and persons involved in incident response notifications. CC ID 12295 | Operational management | Preventive | |
Include the credit reporting agencies' contact information in incident response notifications. CC ID 04744 | Operational management | Preventive | |
Include the reporting individual's contact information in incident response notifications. CC ID 12297 | Operational management | Preventive | |
Include any consequences in the incident response notifications. CC ID 12604 | Operational management | Preventive | |
Include whether the notification was delayed due to a law enforcement investigation in incident response notifications. CC ID 04746 | Operational management | Preventive | |
Include a "What You Can Do" heading in the breach notification. CC ID 12980 | Operational management | Preventive | |
Include how the affected parties can protect themselves from identity theft in incident response notifications. CC ID 04738 | Operational management | Detective | |
Include contact information in incident response notifications. CC ID 04739 | Operational management | Preventive | |
Include contact information in the substitute incident response notification. CC ID 16776 | Operational management | Preventive | |
Post substitute incident response notifications to the organization's website, as necessary. CC ID 04748 | Operational management | Preventive | |
Include incident recovery procedures in the Incident Management program. CC ID 01758 [{preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Operational management | Corrective | |
Establish, implement, and maintain a restoration log. CC ID 12745 | Operational management | Preventive | |
Establish, implement, and maintain compromised system reaccreditation procedures. CC ID 00592 | Operational management | Preventive | |
Analyze security violations in Suspicious Activity Reports. CC ID 00591 | Operational management | Preventive | |
Include incident monitoring procedures in the Incident Management program. CC ID 01207 [{incident management] Determine whether the institution's security operations activities include the following: Incident detection and management. App A Objective 8.1.j {incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a {incident identification process}{incident assessment process} Determine whether management has effective incident identification and assessment processes to do the following: App A Objective 8.5] | Operational management | Preventive | |
Include incident response procedures in the Incident Management program. CC ID 01218 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {incident identification process}{incident assessment process} Determine whether management has effective incident identification and assessment processes to do the following: App A Objective 8.5] | Operational management | Preventive | |
Include incident management procedures in the Incident Management program. CC ID 12689 [{incident management] Determine whether the institution's security operations activities include the following: Incident detection and management. App A Objective 8.1.j] | Operational management | Preventive | |
Establish, implement, and maintain temporary and emergency access authorization procedures. CC ID 00858 | Operational management | Corrective | |
Establish, implement, and maintain temporary and emergency access revocation procedures. CC ID 15334 | Operational management | Preventive | |
Include after-action analysis procedures in the Incident Management program. CC ID 01219 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Operational management | Preventive | |
Log incidents in the Incident Management audit log. CC ID 00857 [{incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f] | Operational management | Preventive | |
Include corrective actions in the incident management audit log. CC ID 16466 | Operational management | Preventive | |
Include incident reporting procedures in the Incident Management program. CC ID 11772 [{incident reporting procedure} Determine whether management has effective incident identification and assessment processes to do the following: Report internally and externally as appropriate. App A Objective 8.5.f {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Operational management | Preventive | |
Establish, implement, and maintain an Incident Response program. CC ID 00579 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Operational management | Preventive | |
Create an incident response report following an incident response. CC ID 12700 | Operational management | Preventive | |
Include disciplinary actions taken in the incident response report. CC ID 16810 | Operational management | Preventive | |
Include the persons responsible for the incident in the incident response report. CC ID 16808 | Operational management | Preventive | |
Include the number of individuals the incident response notification was sent to in the incident response report. CC ID 16789 | Operational management | Preventive | |
Include any consequences to organizational reputation and confidence due to the incident in the incident response report. CC ID 12728 | Operational management | Preventive | |
Include the number of customers that were affected by the incident in the incident response report. CC ID 12727 | Operational management | Preventive | |
Include investments associated with the incident in the incident response report. CC ID 12726 | Operational management | Preventive | |
Include costs associated with the incident in the incident response report. CC ID 12725 | Operational management | Preventive | |
Include losses due to the incident in the incident response report. CC ID 12724 | Operational management | Preventive | |
Include a description of the impact the incident had on customer service in the incident response report. CC ID 12735 | Operational management | Preventive | |
Include foregone revenue from the incident in the incident response report. CC ID 12723 | Operational management | Preventive | |
Include the magnitude of the incident in the incident response report. CC ID 12722 | Operational management | Preventive | |
Include implications of the incident in the incident response report. CC ID 12721 | Operational management | Preventive | |
Include measures to prevent similar incidents from occurring in the incident response report. CC ID 12720 | Operational management | Preventive | |
Include breaches of regulatory requirements due to the incident in the incident response report. CC ID 12719 | Operational management | Preventive | |
Include information on all affected assets in the incident response report. CC ID 12718 | Operational management | Preventive | |
Include the scope of the incident in the incident response report. CC ID 12717 | Operational management | Preventive | |
Include the duration of the incident in the incident response report. CC ID 12716 | Operational management | Preventive | |
Include the extent of the incident in the incident response report. CC ID 12715 | Operational management | Preventive | |
Include measures to mitigate the root causes of the incident in the incident response report. CC ID 12714 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Highlight potential areas for mitigation. App A Objective 5.1.d Review management's response to issues raised at, or since, the last examination. Consider the following: Resolution of root causes rather than just specific issues. App A Objective 1.2.b] | Operational management | Preventive | |
Include the reasons the incident occurred in the incident response report. CC ID 12711 | Operational management | Preventive | |
Include the frequency of similar incidents occurring in the incident response report. CC ID 12712 | Operational management | Preventive | |
Include lessons learned from the incident in the incident response report. CC ID 12713 | Operational management | Preventive | |
Include where the incident occurred in the incident response report. CC ID 12710 | Operational management | Preventive | |
Include when the incident occurred in the incident response report. CC ID 12709 | Operational management | Preventive | |
Include corrective action taken to eradicate the incident in the incident response report. CC ID 12708 | Operational management | Preventive | |
Include a description of the impact the incident had on regulatory compliance in the incident response report. CC ID 12704 | Operational management | Preventive | |
Include a description of the impact the incident had on operations in the incident response report. CC ID 12703 [Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Operational management | Preventive | |
Include an executive summary of the incident in the incident response report. CC ID 12702 | Operational management | Preventive | |
Include a root cause analysis of the incident in the incident response report. CC ID 12701 | Operational management | Preventive | |
Define target resolution times for incident response in the Incident Response program. CC ID 13072 | Operational management | Preventive | |
Establish, implement, and maintain an incident response plan. CC ID 12056 | Operational management | Preventive | |
Include addressing external communications in the incident response plan. CC ID 13351 | Operational management | Preventive | |
Include addressing internal communications in the incident response plan. CC ID 13350 | Operational management | Preventive | |
Include change control procedures in the incident response plan. CC ID 15479 | Operational management | Preventive | |
Include addressing information sharing in the incident response plan. CC ID 13349 | Operational management | Preventive | |
Include dynamic reconfiguration in the incident response plan. CC ID 14306 | Operational management | Preventive | |
Include a definition of reportable incidents in the incident response plan. CC ID 14303 | Operational management | Preventive | |
Include the management support needed for incident response in the incident response plan. CC ID 14300 | Operational management | Preventive | |
Include root cause analysis in the incident response plan. CC ID 16423 | Operational management | Preventive | |
Include how incident response fits into the organization in the incident response plan. CC ID 14294 | Operational management | Preventive | |
Include the resources needed for incident response in the incident response plan. CC ID 14292 | Operational management | Preventive | |
Establish, implement, and maintain a cyber incident response plan. CC ID 13286 | Operational management | Preventive | |
Include incident response team structures in the Incident Response program. CC ID 01237 | Operational management | Preventive | |
Assign establishing, implementing, and maintaining incident response procedures to the appropriate role in the incident response program. CC ID 12473 | Operational management | Preventive | |
Include personnel contact information in the event of an incident in the Incident Response program. CC ID 06385 | Operational management | Preventive | |
Include what information interested personnel and affected parties need in the event of an incident in the Incident Response program. CC ID 11789 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d] | Operational management | Preventive | |
Include identifying remediation actions in the incident response plan. CC ID 13354 | Operational management | Preventive | |
Include procedures for providing updated status information to the crisis management team in the incident response plan. CC ID 12776 | Operational management | Preventive | |
Include coverage of all system components in the Incident Response program. CC ID 11955 | Operational management | Preventive | |
Prepare for incident response notifications. CC ID 00584 [Review the institution's policies, standards, and procedures related to the use of the following: Coordination of incident response policies and contractual notification requirements. App A Objective 6.31.f {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Operational management | Preventive | |
Include incident response team services in the Incident Response program. CC ID 11766 [Determine whether management has effective incident identification and assessment processes to do the following: Enable the use of response teams and responses depending on the type of event. App A Objective 8.5.d] | Operational management | Preventive | |
Include the incident response training program in the Incident Response program. CC ID 06750 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Operational management | Preventive | |
Establish, implement, and maintain an incident response policy. CC ID 14024 | Operational management | Preventive | |
Include compliance requirements in the incident response policy. CC ID 14108 | Operational management | Preventive | |
Include coordination amongst entities in the incident response policy. CC ID 14107 | Operational management | Preventive | |
Include management commitment in the incident response policy. CC ID 14106 | Operational management | Preventive | |
Include roles and responsibilities in the incident response policy. CC ID 14105 | Operational management | Preventive | |
Include the scope in the incident response policy. CC ID 14104 | Operational management | Preventive | |
Include the purpose in the incident response policy. CC ID 14101 | Operational management | Preventive | |
Establish, implement, and maintain incident response procedures. CC ID 01206 [Determine whether management has effective incident identification and assessment processes to do the following: Enable the use of response teams and responses depending on the type of event. App A Objective 8.5.d {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f Determine whether management has effective incident response processes, including the following: App A Objective 8.6 {restoration strategy} {follow-up strategy} Determine whether management has effective incident response processes, including the following: Restoration and follow-up strategies. App A Objective 8.6.i {incident response procedures} Determine whether management has effective incident response processes, including the following: Protocols defined in the incident response policy to declare and respond to an incident once identified. App A Objective 8.6.a {incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Operational management | Detective | |
Include references to industry best practices in the incident response procedures. CC ID 11956 | Operational management | Preventive | |
Include responding to alerts from security monitoring systems in the incident response procedures. CC ID 11949 | Operational management | Preventive | |
Include business continuity procedures in the Incident Response program. CC ID 06433 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Operational management | Preventive | |
Coordinate backup procedures as defined in the system continuity plan with backup procedures necessary for incident response procedures. CC ID 06432 | Operational management | Preventive | |
Include business recovery procedures in the Incident Response program. CC ID 11774 [Review whether management has the following: Incident response programs that include all affected lines of business and support units. App A Objective 3.2.b] | Operational management | Preventive | |
Establish, implement, and maintain a digital forensic evidence framework. CC ID 08652 [Determine whether the institution's security operations activities include the following: Forensics (e.g., analysis of potentially compromised systems). App A Objective 8.1.b] | Operational management | Preventive | |
Establish, implement, and maintain a chain of custody for all devices containing digital forensic evidence. CC ID 08686 | Operational management | Detective | |
Define the business scenarios that require digital forensic evidence. CC ID 08653 | Operational management | Preventive | |
Define the circumstances for collecting digital forensic evidence. CC ID 08657 | Operational management | Preventive | |
Document the legal requirements for evidence collection. CC ID 08654 | Operational management | Preventive | |
Establish, implement, and maintain a digital forensic evidence collection program. CC ID 08655 | Operational management | Preventive | |
Include roles and responsibilities in the digital forensic evidence collection program. CC ID 15724 | Operational management | Preventive | |
Include the hardware configuration and software configuration of the digital forensic equipment in the forensic investigation report. CC ID 08693 | Operational management | Detective | |
Include documentation of the system containing and surrounding digital forensic evidence in the forensic investigation report. CC ID 08679 | Operational management | Detective | |
Include the configuration settings of devices associated with digital forensic evidence in the forensic investigation report. CC ID 08676 | Operational management | Detective | |
Include the external connections to systems containing digital forensic evidence in the forensic investigation report. CC ID 08680 | Operational management | Detective | |
Include the electronic media storage devices containing digital forensic evidence in the forensic investigation report. CC ID 08695 | Operational management | Detective | |
Include all system components of systems containing digital forensic evidence in the forensic investigation report. CC ID 08696 | Operational management | Detective | |
Disseminate and communicate the incident response procedures to all interested personnel and affected parties. CC ID 01215 | Operational management | Preventive | |
Establish, implement, and maintain a change control program. CC ID 00886 [Determine whether management has a process to introduce changes to the environment (e.g., configuration management of IT systems and applications, hardening of systems and applications, use of standard builds, and patch management) in a controlled manner. Determine whether management does the following: App A Objective 6.11 {change control program} Determine whether management does the following: Maintains procedures to guide the process of introducing changes to the environment. App A Objective 6.11.a Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Operational management | Preventive | |
Include potential consequences of unintended changes in the change control program. CC ID 12243 | Operational management | Preventive | |
Include version control in the change control program. CC ID 13119 | Operational management | Preventive | |
Include service design and transition in the change control program. CC ID 13920 | Operational management | Preventive | |
Establish, implement, and maintain a back-out plan. CC ID 13623 | Operational management | Preventive | |
Establish, implement, and maintain back-out procedures for each proposed change in a change request. CC ID 00373 [Determine whether management does the following: Defines rollback procedures in the event of unintended or negative consequences with the introduced changes. App A Objective 6.11.h] | Operational management | Preventive | |
Approve back-out plans, as necessary. CC ID 13627 | Operational management | Corrective | |
Include documentation of the impact level of proposed changes in the change request. CC ID 11942 [Determine whether management does the following: Reviews the potential impact changes have on security controls. App A Objective 6.11.d] | Operational management | Preventive | |
Establish and maintain a change request approver list. CC ID 06795 | Operational management | Preventive | |
Document all change requests in change request forms. CC ID 06794 | Operational management | Preventive | |
Establish, implement, and maintain emergency change procedures. CC ID 00890 | Operational management | Preventive | |
Log emergency changes after they have been performed. CC ID 12733 | Operational management | Preventive | |
Provide audit trails for all approved changes. CC ID 13120 [Determine whether management does the following: Maintains an audit trail of all changes. App A Objective 6.11.m Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Operational management | Preventive | |
Document the sources of all software updates. CC ID 13316 | Operational management | Preventive | |
Establish, implement, and maintain a patch management policy. CC ID 16432 | Operational management | Preventive | |
Establish, implement, and maintain patch management procedures. CC ID 15224 | Operational management | Preventive | |
Establish, implement, and maintain a patch log. CC ID 01642 [{system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Operational management | Preventive | |
Establish, implement, and maintain a software release policy. CC ID 00893 | Operational management | Preventive | |
Establish, implement, and maintain approved change acceptance testing procedures. CC ID 06391 [{system test} Determine whether management does the following: Performs necessary tests of all changes to the environment (e.g., systems testing, integration testing, functional testing, user acceptance testing, and security testing). App A Objective 6.11.g] | Operational management | Detective | |
Establish, implement, and maintain a change acceptance testing log. CC ID 06392 | Operational management | Corrective | |
Update associated documentation after the system configuration has been changed. CC ID 00891 [Review whether patch management processes include the following: A documentation process to ensure the institution's information assets and technology inventory and disaster recovery plans are updated as appropriate when patches are applied. App A Objective 6.15.g] | Operational management | Preventive | |
Document approved configuration deviations. CC ID 08711 | Operational management | Corrective | |
Document the organization's local environments. CC ID 06726 [Are appropriately implemented and enforced. App A Objective 6.1.a As part of management's process to secure the operating system and all system components, determine whether management does the following: App A Objective 6.21 If the institution outsources cloud computing or storage to a third-party service provider, refer to the FFIEC's "Outsourced Cloud Computing" statement. App A Objective 6.32 If the institution outsources the management of security services to a third-party service provider, refer to the information available in appendix D of the IT Handbook's "Outsourcing Technology Services" booklet and the related examination procedures. App A Objective 6.33] | Operational management | Preventive | |
Establish, implement, and maintain local environment security profiles. CC ID 07037 | Operational management | Preventive | |
Include individuals assigned to the local environment in the local environment security profile. CC ID 07038 | Operational management | Preventive | |
Include security requirements in the local environment security profile. CC ID 15717 | Operational management | Preventive | |
Include the business processes assigned to the local environment in the local environment security profile. CC ID 07039 | Operational management | Preventive | |
Include the technology used in the local environment in the local environment security profile. CC ID 07040 | Operational management | Preventive | |
Include contact information for critical personnel assigned to the local environment in the local environment security profile. CC ID 07041 | Operational management | Preventive | |
Include facility information for the local environment in the local environment security profile. CC ID 07042 | Operational management | Preventive | |
Include facility access information for the local environment in the local environment security profile. CC ID 11773 | Operational management | Preventive | |
Update the local environment security profile, as necessary. CC ID 07043 | Operational management | Preventive | |
Establish, implement, and maintain a Configuration Management program. CC ID 00867 [Determine whether appropriate processes exist for configuration management (managing and controlling configurations of systems, applications, and other technology). App A Objective 6.12 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | System hardening through configuration management | Preventive | |
Establish, implement, and maintain appropriate system labeling. CC ID 01900 | System hardening through configuration management | Preventive | |
Include the identification number of the third party who performed the conformity assessment procedures on all promotional materials. CC ID 15041 | System hardening through configuration management | Preventive | |
Include the identification number of the third party who conducted the conformity assessment procedures after the CE marking of conformity. CC ID 15040 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain a configuration management policy. CC ID 14023 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain configuration management procedures. CC ID 14074 | System hardening through configuration management | Preventive | |
Include compliance requirements in the configuration management policy. CC ID 14072 | System hardening through configuration management | Preventive | |
Include coordination amongst entities in the configuration management policy. CC ID 14071 | System hardening through configuration management | Preventive | |
Include management commitment in the configuration management policy. CC ID 14070 | System hardening through configuration management | Preventive | |
Include roles and responsibilities in the configuration management policy. CC ID 14069 | System hardening through configuration management | Preventive | |
Include the scope in the configuration management policy. CC ID 14068 | System hardening through configuration management | Preventive | |
Include the purpose in the configuration management policy. CC ID 14067 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain a configuration management plan. CC ID 01901 | System hardening through configuration management | Preventive | |
Include configuration management procedures in the configuration management plan. CC ID 14248 | System hardening through configuration management | Preventive | |
Include roles and responsibilities in the configuration management plan. CC ID 14247 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain system tracking documentation. CC ID 15266 | System hardening through configuration management | Preventive | |
Include prioritization codes in the system tracking documentation. CC ID 15283 | System hardening through configuration management | Preventive | |
Include the type and category of the request in the system tracking documentation. CC ID 15281 | System hardening through configuration management | Preventive | |
Include contact information in the system tracking documentation. CC ID 15280 | System hardening through configuration management | Preventive | |
Include the username in the system tracking documentation. CC ID 15278 | System hardening through configuration management | Preventive | |
Include a problem description in the system tracking documentation. CC ID 15276 | System hardening through configuration management | Preventive | |
Include affected systems in the system tracking documentation. CC ID 15275 | System hardening through configuration management | Preventive | |
Include root causes in the system tracking documentation. CC ID 15274 | System hardening through configuration management | Preventive | |
Include the name of who is responsible for resolution in the system tracking documentation. CC ID 15273 | System hardening through configuration management | Preventive | |
Include current status in the system tracking documentation. CC ID 15272 | System hardening through configuration management | Preventive | |
Record Configuration Management items in the Configuration Management database. CC ID 00861 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain a Configuration Management Database with accessible reporting capabilities. CC ID 02132 [{software development} With respect to developed software, determine whether institution management does the following: Collects data to build metrics and reporting of configuration management compliance, and vulnerability management. App A Objective 6.28.f] | System hardening through configuration management | Preventive | |
Establish, implement, and maintain a configuration baseline based on the least functionality principle. CC ID 00862 [Determine whether management uses standard builds, allowing one documented configuration to be applied to multiple computers in a controlled manner, to create hardware and software inventories, update or patch systems, restore systems, investigate anomalies, and audit configurations. App A Objective 6.14 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | System hardening through configuration management | Preventive | |
Include the measures used to account for any differences in operation between the test environments and production environments in the baseline configuration. CC ID 13285 | System hardening through configuration management | Preventive | |
Include the differences between test environments and production environments in the baseline configuration. CC ID 13284 | System hardening through configuration management | Preventive | |
Include the applied security patches in the baseline configuration. CC ID 13271 | System hardening through configuration management | Preventive | |
Include the installed application software and version numbers in the baseline configuration. CC ID 13270 | System hardening through configuration management | Preventive | |
Include installed custom software in the baseline configuration. CC ID 13274 | System hardening through configuration management | Preventive | |
Include network ports in the baseline configuration. CC ID 13273 | System hardening through configuration management | Preventive | |
Include the operating systems and version numbers in the baseline configuration. CC ID 13269 | System hardening through configuration management | Preventive | |
Include backup procedures in the Configuration Management policy. CC ID 01314 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain system hardening procedures. CC ID 12001 [{application hardening process}{system hardening process} Determine whether management has processes to harden applications and systems (e.g., installing minimum services, installing necessary patches, configuring appropriate security settings, enforcing principle of least privilege, changing default passwords, and enabling logging). App A Objective 6.13 {application hardening process}{system hardening process} Determine whether management has processes to harden applications and systems (e.g., installing minimum services, installing necessary patches, configuring appropriate security settings, enforcing principle of least privilege, changing default passwords, and enabling logging). App A Objective 6.13 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | System hardening through configuration management | Preventive | |
Establish, implement, and maintain procedures to standardize operating system software installation. CC ID 00869 | System hardening through configuration management | Preventive | |
Verify operating system installation plans include software security considerations. CC ID 00870 | System hardening through configuration management | Preventive | |
Document that all enabled functions support secure configurations. CC ID 11985 | System hardening through configuration management | Preventive | |
Validate, approve, and document all UNIX shells prior to use. CC ID 02161 | System hardening through configuration management | Preventive | |
Configure the "global Package signature checking" setting to organizational standards. CC ID 08735 | System hardening through configuration management | Preventive | |
Configure the "Package signature checking" setting for "all configured repositories" to organizational standards. CC ID 08736 | System hardening through configuration management | Preventive | |
Configure the "verify against the package database" setting for "all installed software packages" to organizational standards. CC ID 08737 | System hardening through configuration management | Preventive | |
Configure the "isdn4k-utils" package to organizational standards. CC ID 08738 | System hardening through configuration management | Preventive | |
Configure the "postfix" package to organizational standards. CC ID 08739 | System hardening through configuration management | Preventive | |
Configure the "vsftpd" package to organizational standards. CC ID 08740 | System hardening through configuration management | Preventive | |
Configure the "net-snmpd" package to organizational standards. CC ID 08741 | System hardening through configuration management | Preventive | |
Configure the "rsyslog" package to organizational standards. CC ID 08742 | System hardening through configuration management | Preventive | |
Configure the "ipsec-tools" package to organizational standards. CC ID 08743 | System hardening through configuration management | Preventive | |
Configure the "pam_ccreds" package to organizational standards. CC ID 08744 | System hardening through configuration management | Preventive | |
Configure the "talk-server" package to organizational standards. CC ID 08745 | System hardening through configuration management | Preventive | |
Configure the "talk" package to organizational standards. CC ID 08746 | System hardening through configuration management | Preventive | |
Configure the "irda-utils" package to organizational standards. CC ID 08747 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain the interactive logon settings. CC ID 01739 | System hardening through configuration management | Preventive | |
Include the date and time that access was granted in the system record. CC ID 15174 | System hardening through configuration management | Preventive | |
Include the access level granted in the system record. CC ID 15173 | System hardening through configuration management | Preventive | |
Include when access is withdrawn in the system record. CC ID 15172 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain an authenticator standard. CC ID 01702 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain an authenticator management system. CC ID 12031 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain authenticator procedures. CC ID 12002 | System hardening through configuration management | Preventive | |
Configure the "minimum number of digits required for new passwords" setting to organizational standards. CC ID 08717 | System hardening through configuration management | Preventive | |
Configure the "minimum number of upper case characters required for new passwords" setting to organizational standards. CC ID 08718 | System hardening through configuration management | Preventive | |
Configure the "minimum number of lower case characters required for new passwords" setting to organizational standards. CC ID 08719 | System hardening through configuration management | Preventive | |
Configure the "minimum number of special characters required for new passwords" setting to organizational standards. CC ID 08720 | System hardening through configuration management | Preventive | |
Configure the "require new passwords to differ from old ones by the appropriate minimum number of characters" setting to organizational standards. CC ID 08722 | System hardening through configuration management | Preventive | |
Configure the "password reuse" setting to organizational standards. CC ID 08724 | System hardening through configuration management | Preventive | |
Configure the "shadow password for all accounts in /etc/passwd" setting to organizational standards. CC ID 08721 | System hardening through configuration management | Preventive | |
Configure the "password hashing algorithm" setting to organizational standards. CC ID 08723 | System hardening through configuration management | Preventive | |
Configure the "all world-writable directories" user ownership to organizational standards. CC ID 08714 | System hardening through configuration management | Preventive | |
Configure the "all rsyslog log" files group ownership to organizational standards. CC ID 08715 | System hardening through configuration management | Preventive | |
Configure the "all rsyslog log" files user ownership to organizational standards. CC ID 08716 | System hardening through configuration management | Preventive | |
Configure the "all rsyslog log files" permissions to organizational standards. CC ID 08748 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain an account lockout policy. CC ID 01709 | System hardening through configuration management | Preventive | |
Establish and maintain specific directory installation rules and domain controller installation rules. CC ID 01734 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain appropriate shutdown procedures. CC ID 01778 | System hardening through configuration management | Preventive | |
Configure the "nodev" option for "/tmp" setting to organizational standards. CC ID 08725 | System hardening through configuration management | Preventive | |
Configure the "nodev" option for "/dev/shm" setting to organizational standards. CC ID 08726 | System hardening through configuration management | Preventive | |
Configure the "/tmp filesystem partition" setting to organizational standards. CC ID 08727 | System hardening through configuration management | Preventive | |
Configure the "var/log" filesystem to organizational standards. CC ID 08728 | System hardening through configuration management | Preventive | |
Configure the “var/log/audit” filesystem to organizational standards. CC ID 08729 | System hardening through configuration management | Preventive | |
Configure the "nosuid" setting on the "/tmp" directory to organizational standards. CC ID 08730 | System hardening through configuration management | Preventive | |
Configure the "noexec" setting on the "/tmp" directory to organizational standards. CC ID 08731 | System hardening through configuration management | Preventive | |
Configure the "nosuid" setting on the "/dev/shm" directory to organizational standards. CC ID 08732 | System hardening through configuration management | Preventive | |
Configure the "noexec" option for "/dev/shm" to organizational standards. CC ID 08733 | System hardening through configuration management | Preventive | |
Configure the "/var/tmp filesystem partition" setting to organizational standards. CC ID 08734 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain network parameter modification procedures. CC ID 01517 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain a network addressing plan. CC ID 16399 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain firewall rules in accordance with organizational standards. CC ID 16353 | System hardening through configuration management | Preventive | |
Configure Apple iOS to Organizational Standards. CC ID 09986 | System hardening through configuration management | Preventive | |
Configure the "kernel arguments" setting for "auditing early in the boot process" to organizational standards. CC ID 08749 | System hardening through configuration management | Preventive | |
Configure the "record date and time modification events" setting for "auditing" to organizational standards. CC ID 08750 | System hardening through configuration management | Preventive | |
Configure the "record user/group information modification events" setting for "auditing" to organizational standards. CC ID 08751 | System hardening through configuration management | Preventive | |
Configure the "record changes to the system network environment" setting for "auditing" to organizational standards. CC ID 08752 | System hardening through configuration management | Preventive | |
Configure the "record changes to the system's mandatory access controls" setting for "auditing" to organizational standards. CC ID 08753 | System hardening through configuration management | Preventive | |
Configure the "record logon and logout events" setting for "auditing" to organizational standards. CC ID 08754 | System hardening through configuration management | Preventive | |
Configure the "record process and session initiation events" setting for "auditing" to organizational standards. CC ID 08755 | System hardening through configuration management | Preventive | |
Configure the "record changes to discretionary access control permissions" setting for "auditing" to organizational standards. CC ID 08756 | System hardening through configuration management | Preventive | |
Configure the "record unauthorized attempts to access files" setting for "auditing" to organizational standards. CC ID 08757 | System hardening through configuration management | Preventive | |
Configure the "record use of privileged commands" setting for "auditing" to organizational standards. CC ID 08758 | System hardening through configuration management | Preventive | |
Configure the "record data export to media events" setting for "auditing" to organizational standards. CC ID 08759 | System hardening through configuration management | Preventive | |
Configure the "record file and program deletion events" setting for "auditing" to organizational standards. CC ID 08760 | System hardening through configuration management | Preventive | |
Configure the "record administrator and security personnel action events" setting for "auditing" to organizational standards. CC ID 08761 | System hardening through configuration management | Preventive | |
Configure the "record kernel module loading and unloading events" setting for "auditing" to organizational standards. CC ID 08762 | System hardening through configuration management | Preventive | |
Configure the "Ensure auditd configuration is immutable" setting for "auditing" to organizational standards. CC ID 08763 | System hardening through configuration management | Preventive | |
Configure Red Hat Enterprise Linux to Organizational Standards. CC ID 08713 | System hardening through configuration management | Preventive | |
Configure the "GPG Key for package manager" setting to organizational standards. CC ID 08764 | System hardening through configuration management | Preventive | |
Configure the "Support for cramfs filesystems" setting to organizational standards. CC ID 08765 | System hardening through configuration management | Preventive | |
Configure the "Support for freevxfs filesystems" setting to organizational standards. CC ID 08766 | System hardening through configuration management | Preventive | |
Configure the "Support for hfs filesystems" setting to organizational standards. CC ID 08767 | System hardening through configuration management | Preventive | |
Configure the "Support for hfsplus filesystems" setting to organizational standards. CC ID 08768 | System hardening through configuration management | Preventive | |
Configure the "Support for jffs2 filesystems" setting to organizational standards. CC ID 08769 | System hardening through configuration management | Preventive | |
Configure the "Support for squashfs filesystems" setting to organizational standards. CC ID 08770 | System hardening through configuration management | Preventive | |
Configure the "Support for udf filesystems" setting to organizational standards. CC ID 08771 | System hardening through configuration management | Preventive | |
Configure the "NIS file inclusions" setting for the"/etc/group" file to organizational standards. CC ID 08772 | System hardening through configuration management | Preventive | |
Configure the "NIS file inclusions" setting for the"/etc/shadow" file to organizational standards. CC ID 08773 | System hardening through configuration management | Preventive | |
Configure the "setuid" attribute for "all files" to organizational standards. CC ID 08774 | System hardening through configuration management | Preventive | |
Configure the "setgid" attribute for "all files" to organizational standards. CC ID 08775 | System hardening through configuration management | Preventive | |
Configure the "gnome desktop screensaver" setting for "all users" to organizational standards. CC ID 08776 | System hardening through configuration management | Preventive | |
Configure the "screen blanking function of the gnome desktop screensaver" as a "mandatory setting" for "all users" to organizational standards. CC ID 08777 | System hardening through configuration management | Preventive | |
Configure the "device files with the unlabeled SELinux type" setting for "system includes" to organizational standards. CC ID 08778 | System hardening through configuration management | Preventive | |
Configure the "system should act as a network sniffer" setting to organizational standards. CC ID 08779 | System hardening through configuration management | Preventive | |
Configure the "default policy" setting for "iptables INPUT table" to organizational standards. CC ID 08780 | System hardening through configuration management | Preventive | |
Configure the "DCCP" setting to organizational standards. CC ID 08781 | System hardening through configuration management | Preventive | |
Configure the Stream Control Transmission Protocol setting to organizational standards. CC ID 08782 | System hardening through configuration management | Preventive | |
Configure the "RDS" setting to organizational standards. CC ID 08783 | System hardening through configuration management | Preventive | |
Configure the "TIPC" setting to organizational standards. CC ID 08784 | System hardening through configuration management | Preventive | |
Configure the "Bluetooth kernel modules" setting to organizational standards. CC ID 08785 | System hardening through configuration management | Preventive | |
Configure the "Zeroconf networking" setting to organizational standards. CC ID 08786 | System hardening through configuration management | Preventive | |
Configure the "at daemon" setting to organizational standards. CC ID 08787 | System hardening through configuration management | Preventive | |
Configure the "SSH 'keep alive' message count" setting to organizational standards. CC ID 08788 | System hardening through configuration management | Preventive | |
Configure the "set environment options for SSH" setting to organizational standards. CC ID 08789 | System hardening through configuration management | Preventive | |
Configure the Secure Shell setting to organizational standards. CC ID 08790 | System hardening through configuration management | Preventive | |
Configure the "sendmail" setting to organizational standards. CC ID 08791 | System hardening through configuration management | Preventive | |
Configure the "Postfix network listening" setting to organizational standards. CC ID 08792 | System hardening through configuration management | Preventive | |
Configure the "require LDAP servers to use TLS for SSL communications" setting for "LDAP client" to organizational standards. CC ID 08793 | System hardening through configuration management | Preventive | |
Configure the "Client SMB packet signing" setting for "smbclient" to organizational standards. CC ID 08794 | System hardening through configuration management | Preventive | |
Configure the "Client SMB packet signing" setting for "mount.cifs" to organizational standards. CC ID 08795 | System hardening through configuration management | Preventive | |
Configure the "'wheel' group" setting to organizational standards. CC ID 08796 | System hardening through configuration management | Preventive | |
Configure the "Access to the root account via su should be restricted to the wheel group" setting to organizational standards. CC ID 08797 | System hardening through configuration management | Preventive | |
Configure the "retry value" setting to organizational standards. CC ID 08798 | System hardening through configuration management | Preventive | |
Configure the "rsyslog service" setting to organizational standards. CC ID 08799 | System hardening through configuration management | Preventive | |
Configure the "send to a remote log host" setting for "Rsyslog logs" to organizational standards. CC ID 08800 | System hardening through configuration management | Preventive | |
Configure the "accept remote messages" setting for "Rsyslog" to organizational standards. CC ID 08801 | System hardening through configuration management | Preventive | |
Configure the "irda service" setting to organizational standards. CC ID 08802 | System hardening through configuration management | Preventive | |
Configure the "avahi service" firewall setting to organizational standards. CC ID 08803 | System hardening through configuration management | Preventive | |
Configure the "rawdevices service" setting to organizational standards. CC ID 08804 | System hardening through configuration management | Preventive | |
Configure the "login_defs" variable in "libuser.conf" for "libuser library" to organizational standards. CC ID 08805 | System hardening through configuration management | Preventive | |
Configure the "User accounts may or may not be inactivated a specified number of days after account expiration" setting to organizational standards. CC ID 08806 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain records management policies. CC ID 00903 | Records management | Preventive | |
Define each system's preservation requirements for records and logs. CC ID 00904 | Records management | Detective | |
Establish, implement, and maintain storage media disposition and destruction procedures. CC ID 11657 [Review whether the institution's life cycle management includes the following: Outlining procedures for the secure destruction or wiping of hard drives being returned to vendors or donated to prevent the inadvertent disclosure of sensitive information. App A Objective 6.16.e] | Records management | Preventive | |
Establish, implement, and maintain records disposition procedures. CC ID 00971 [Review whether management does the following: Has appropriate disposal procedures for both paper-based and electronic information. App A Objective 6.18.e {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Records management | Preventive | |
Include methods to identify records that meet or exceed the record's retention event in the records disposition procedures. CC ID 11962 | Records management | Preventive | |
Maintain disposal records or redeployment records. CC ID 01644 | Records management | Preventive | |
Include the name of the signing officer in the disposal record. CC ID 15710 | Records management | Preventive | |
Establish, implement, and maintain records management procedures. CC ID 11619 | Records management | Preventive | |
Establish, implement, and maintain Automated Data Processing error handling procedures. CC ID 00925 | Records management | Preventive | |
Establish, implement, and maintain Automated Data Processing error handling reporting. CC ID 11659 | Records management | Preventive | |
Establish, implement, and maintain a system design project management framework. CC ID 00990 | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain project management standards. CC ID 00992 | Systems design, build, and implementation | Preventive | |
Include in the system documentation methodologies for authenticating the hardware security module. CC ID 12258 | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain an acceptable use policy for the hardware security module. CC ID 12247 | Systems design, build, and implementation | Preventive | |
Include roles and responsibilities in the acceptable use policy for the hardware security module. CC ID 12264 | Systems design, build, and implementation | Preventive | |
Include the environmental requirements in the acceptable use policy for the hardware security module. CC ID 12263 | Systems design, build, and implementation | Preventive | |
Include device identification in the acceptable use policy for the hardware security module. CC ID 12262 | Systems design, build, and implementation | Preventive | |
Include device functionality in the acceptable use policy for the hardware security module. CC ID 12261 [{network device configuration} Determine whether management does the following: Verifies network devices are properly configured and function appropriately within the environment App A Objective 6.11.l] | Systems design, build, and implementation | Preventive | |
Include administrative responsibilities in the acceptable use policy for the hardware security module. CC ID 12260 | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain session security coding standards. CC ID 04584 | Systems design, build, and implementation | Preventive | |
Establish and maintain a cryptographic architecture document. CC ID 12476 | Systems design, build, and implementation | Preventive | |
Include the algorithms used in the cryptographic architecture document. CC ID 12483 | Systems design, build, and implementation | Preventive | |
Include an inventory of all protected areas in the cryptographic architecture document. CC ID 12486 | Systems design, build, and implementation | Preventive | |
Include a description of the key usage for each key in the cryptographic architecture document. CC ID 12484 | Systems design, build, and implementation | Preventive | |
Include descriptions of all cryptographic keys in the cryptographic architecture document. CC ID 12487 | Systems design, build, and implementation | Preventive | |
Include descriptions of the cryptographic key strength of all cryptographic keys in the cryptographic architecture document. CC ID 12488 | Systems design, build, and implementation | Preventive | |
Include each cryptographic key's expiration date in the cryptographic architecture document. CC ID 12489 | Systems design, build, and implementation | Preventive | |
Include the protocols used in the cryptographic architecture document. CC ID 12485 | Systems design, build, and implementation | Preventive | |
Establish and maintain a coding manual for secure coding techniques. CC ID 11863 | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain system testing procedures. CC ID 11744 [Determine whether management does the following: Develops test scripts and implementation plans. App A Objective 6.11.f] | Systems design, build, and implementation | Preventive | |
Evaluate and document all known code anomalies and code deficiencies. CC ID 06611 | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain poor quality material removal procedures. CC ID 06214 | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain a system testing program for all system development projects. CC ID 01101 | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain a system implementation standard. CC ID 01111 | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain an implementation plan. CC ID 01114 [Determine whether management does the following: Develops test scripts and implementation plans. App A Objective 6.11.f] | Systems design, build, and implementation | Preventive | |
Include an implementation schedule in the implementation plan. CC ID 16124 | Systems design, build, and implementation | Preventive | |
Include the allocation of resources in the implementation plan. CC ID 16122 | Systems design, build, and implementation | Preventive | |
Include roles and responsibilities in the implementation plan. CC ID 16121 | Systems design, build, and implementation | Preventive | |
Approve implementation plans, as necessary. CC ID 13628 | Systems design, build, and implementation | Corrective | |
Establish, implement, and maintain a product upgrade program. CC ID 12216 [{internal user} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Products or services delivered to either internal or external users. App A Objective 1.3.a] | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain product update procedures. CC ID 12218 [Determine whether management has a process to update and patch operating systems, network devices, and software applications, including internally developed software provided to customers, for newly discovered vulnerabilities. Review whether patch management processes include the following: App A Objective 6.15] | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain a mobile payment acceptance security program. CC ID 12182 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain system acquisition contracts. CC ID 14758 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include security requirements in system acquisition contracts. CC ID 01124 [With respect to developed software, determine whether institution management does the following: Obtains attestation or evidence from third-party developers that the applications acquired by the institution meet the necessary security requirements and that noted vulnerabilities or flaws are remediated in a timely manner. App A Objective 6.28.b Review the institution's policies, standards, and procedures related to the use of the following: Contractual assurances from third-party service providers for security responsibilities, controls, and reporting. App A Objective 6.31.c {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Acquisition or sale of facilities, technology, and services | Preventive | |
Include operational requirements in system acquisition contracts. CC ID 00825 | Acquisition or sale of facilities, technology, and services | Preventive | |
Provide suppliers with operational requirement information needed to define required service levels in system acquisition contracts. CC ID 06890 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include required service levels in system acquisition contracts. CC ID 11652 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include security controls in system acquisition contracts. CC ID 01125 | Acquisition or sale of facilities, technology, and services | Preventive | |
Obtain system documentation before acquiring products and services. CC ID 01445 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include a description of the use and maintenance of security functions in the administration documentation. CC ID 14309 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include a description of the known vulnerabilities for administrative functions in the administration documentation. CC ID 14302 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include instructions on how to use the security functions in the user documentation. CC ID 14314 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include security functions in the user documentation. CC ID 14313 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include user responsibilities for maintaining system security in the user documentation. CC ID 14312 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include a description of user interactions in the user documentation. CC ID 14311 | Acquisition or sale of facilities, technology, and services | Preventive | |
Require the information system developer to create a continuous monitoring plan. CC ID 14307 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include roles and responsibilities in system acquisition contracts. CC ID 14765 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain a product and services acquisition strategy. CC ID 01133 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain a product and services acquisition program. CC ID 01136 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain a product and services acquisition policy. CC ID 14028 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include compliance requirements in the product and services acquisition policy. CC ID 14163 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include coordination amongst entities in the product and services acquisition policy. CC ID 14162 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include management commitment in the product and services acquisition policy. CC ID 14161 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include roles and responsibilities in the product and services acquisition policy. CC ID 14160 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include the scope in the product and services acquisition policy. CC ID 14159 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include the purpose in the product and services acquisition policy. CC ID 14158 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain product and services acquisition procedures. CC ID 14065 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain acquisition approval requirements. CC ID 13704 | Acquisition or sale of facilities, technology, and services | Preventive | |
Include preventive maintenance contracts in system acquisition contracts. CC ID 06658 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain a software product acquisition methodology. CC ID 01138 | Acquisition or sale of facilities, technology, and services | Preventive | |
Align the service management program with the Code of Conduct. CC ID 14211 | Acquisition or sale of facilities, technology, and services | Preventive | |
Review software licensing agreements to ensure compliance. CC ID 01140 | Acquisition or sale of facilities, technology, and services | Detective | |
Establish, implement, and maintain third party Software Maintenance Agreements. CC ID 01143 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish and maintain a register of approved third parties, technologies and tools. CC ID 06836 | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain facilities, assets, and services acceptance procedures. CC ID 01144 [Determine whether management does the following: Validates that new hardware complies with institution policies and guidelines. App A Objective 6.11.k] | Acquisition or sale of facilities, technology, and services | Preventive | |
Establish, implement, and maintain a privacy framework that protects restricted data. CC ID 11850 | Privacy protection for information and data | Preventive | |
Establish, implement, and maintain a data handling program. CC ID 13427 | Privacy protection for information and data | Preventive | |
Establish, implement, and maintain data handling policies. CC ID 00353 | Privacy protection for information and data | Preventive | |
Establish, implement, and maintain data and information confidentiality policies. CC ID 00361 [{test data} Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality of test plans and data. App A Objective 10.2.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Privacy protection for information and data | Preventive | |
Establish, implement, and maintain suspicious document procedures. CC ID 04852 | Privacy protection for information and data | Detective | |
Establish, implement, and maintain a supply chain management program. CC ID 11742 | Third Party and supply chain oversight | Preventive | |
Include a nondisclosure agreement in third party contracts if a separate nondisclosure agreement does not exist. CC ID 06505 [{nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e] | Third Party and supply chain oversight | Preventive | |
Include incident management procedures and incident reporting procedures in third party contracts. CC ID 01214 [Review whether management does the following: Plans and coordinates with ISPs and third parties to minimize exposure to incidents and continue services when faced with an incident (e.g., monitors threat alerts, service availability, applications, and network traffic for indicators of nefarious activity, and ensures traffic filtering). App A Objective 6.25.b] | Third Party and supply chain oversight | Preventive | |
Approve all Service Level Agreements. CC ID 00843 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Service provider arrangements. App A Objective 2.4.c] | Third Party and supply chain oversight | Detective | |
Include risk management procedures in the supply chain management policy. CC ID 08811 [Determine whether management identifies factors that may increase risk from supply chain attacks and responds with appropriate risk mitigation. Review whether management implements the following as appropriate: App A Objective 6.19 Determine whether management identifies factors that may increase risk from supply chain attacks and responds with appropriate risk mitigation. Review whether management implements the following as appropriate: App A Objective 6.19] | Third Party and supply chain oversight | Preventive | |
Include a determination of financial benefits over actual costs of third party relationships in the supply chain risk assessment report. CC ID 10025 | Third Party and supply chain oversight | Preventive | |
Include a determination of how third party relationships affect strategic initiatives in the supply chain risk assessment report. CC ID 10026 | Third Party and supply chain oversight | Preventive | |
Include a determination of customer interactions with third parties in the supply chain risk assessment report. CC ID 10028 | Third Party and supply chain oversight | Preventive | |
Include a determination on the risks third parties pose to Information Security in the supply chain risk assessment report. CC ID 10029 | Third Party and supply chain oversight | Preventive | |
Establish, implement, and maintain a supply chain management policy. CC ID 08808 | Third Party and supply chain oversight | Preventive | |
Include the third party selection process in the supply chain management policy. CC ID 13132 | Third Party and supply chain oversight | Preventive | |
Select suppliers based on their qualifications. CC ID 00795 [Review whether management implements the following as appropriate: Purchases are made only through reputable sellers. App A Objective 6.19.a] | Third Party and supply chain oversight | Preventive | |
Document and maintain records of supply chain transactions in a transaction file. CC ID 08858 | Third Party and supply chain oversight | Preventive | |
Review transaction files for compliance with the supply chain audit standard. CC ID 08864 | Third Party and supply chain oversight | Preventive | |
Provide additional documentation to validate and approve the use of non-compliant materials. CC ID 08865 | Third Party and supply chain oversight | Preventive | |
Include a requirement in outsourcing contracts that supply chain members must implement security controls to protect information. CC ID 13353 | Third Party and supply chain oversight | Preventive | |
Request attestation of compliance from third parties. CC ID 12067 | Third Party and supply chain oversight | Detective | |
Establish, implement, and maintain information security controls for the supply chain. CC ID 13109 [Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Third Party and supply chain oversight | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Assign responsibility for enforcing the requirements of the Information Governance Plan to senior management. CC ID 12058 | Leadership and high level objectives | Preventive | |
Assign roles and responsibilities for overseeing access to restricted data or restricted information. CC ID 11950 | Monitoring and measurement | Detective | |
Assign senior management to approve test plans. CC ID 13071 | Monitoring and measurement | Preventive | |
Employ third parties to carry out testing programs, as necessary. CC ID 13178 [{third party} Determine whether management uses independent organizations to test aspects of its information security programs. App A Objective 10.4] | Monitoring and measurement | Preventive | |
Align disciplinary actions with the level of compliance violation. CC ID 12404 | Monitoring and measurement | Preventive | |
Include roles and responsibilities in the interview procedures. CC ID 16297 | Audits and risk management | Preventive | |
Identify the audit team members in the audit report. CC ID 15259 | Audits and risk management | Detective | |
Define the roles and responsibilities for distributing the audit report. CC ID 16845 | Audits and risk management | Preventive | |
Assign responsibility for remediation actions. CC ID 13622 | Audits and risk management | Preventive | |
Evaluate the competency of auditors. CC ID 15253 | Audits and risk management | Detective | |
Employ third parties when implementing a risk assessment, as necessary. CC ID 16306 | Audits and risk management | Detective | |
Engage appropriate parties to assist with risk assessments, as necessary. CC ID 12153 | Audits and risk management | Preventive | |
Assign key stakeholders to review and approve supply chain risk management procedures. CC ID 13199 | Audits and risk management | Preventive | |
Define roles for information systems. CC ID 12454 | Technical security | Preventive | |
Define access needs for each role assigned to an information system. CC ID 12455 | Technical security | Preventive | |
Change authenticators after personnel status changes. CC ID 12284 | Technical security | Preventive | |
Assign roles and responsibilities for administering user account management. CC ID 11900 | Technical security | Preventive | |
Require multiple forms of personal identification prior to issuing user identifiers. CC ID 08712 | Technical security | Preventive | |
Require key custodians to sign the key custodian's roles and responsibilities. CC ID 11820 | Technical security | Preventive | |
Disallow opting out of wearing or displaying identification cards or badges. CC ID 13030 | Physical and environmental protection | Preventive | |
Direct each employee to be responsible for their identification card or badge. CC ID 12332 | Physical and environmental protection | Preventive | |
Assign employees the responsibility for controlling their identification badges. CC ID 12333 | Physical and environmental protection | Preventive | |
Lead or manage business continuity and system continuity, as necessary. CC ID 12240 | Operational and Systems Continuity | Preventive | |
Allocate personnel to implement the continuity plan, as necessary. CC ID 12992 | Operational and Systems Continuity | Preventive | |
Include the roles and responsibilities of responders in the recovery plan. CC ID 13296 | Operational and Systems Continuity | Preventive | |
Assign the roles and responsibilities of management in establishing, implementing, and maintaining the information security program. CC ID 13112 [{information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Determine whether the board, or a committee of the board, is responsible for overseeing the development, implementation, and maintenance of the institution's information security program. App A Objective 2.2 Determine whether the board holds management accountable for the following: Central oversight and coordination. App A Objective 2.3.a Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3] | Human Resources management | Preventive | |
Establish and maintain board committees, as necessary. CC ID 14789 | Human Resources management | Preventive | |
Assign oversight of C-level executives to the Board of Directors. CC ID 14784 | Human Resources management | Preventive | |
Assign oversight of the financial management program to the board of directors. CC ID 14781 | Human Resources management | Preventive | |
Assign senior management to the role of supporting Quality Management. CC ID 13692 | Human Resources management | Preventive | |
Assign members who are independent from management to the Board of Directors. CC ID 12395 | Human Resources management | Preventive | |
Assign ownership of risks to the Board of Directors or senior management. CC ID 13662 | Human Resources management | Preventive | |
Assign the organization's board and senior management to oversee the continuity planning process. CC ID 12991 | Human Resources management | Preventive | |
Rotate members of the board of directors, as necessary. CC ID 14803 | Human Resources management | Corrective | |
Define and assign workforce roles and responsibilities. CC ID 13267 | Human Resources management | Preventive | |
Perform security skills assessments for all critical employees. CC ID 12102 | Human Resources management | Detective | |
Perform a background check during personnel screening. CC ID 11758 | Human Resources management | Detective | |
Perform a personal identification check during personnel screening. CC ID 06721 | Human Resources management | Preventive | |
Perform a personal references check during personnel screening. CC ID 06645 | Human Resources management | Preventive | |
Perform a credit check during personnel screening. CC ID 06646 | Human Resources management | Preventive | |
Perform a resume check during personnel screening. CC ID 06659 | Human Resources management | Preventive | |
Perform a curriculum vitae check during personnel screening. CC ID 06660 | Human Resources management | Preventive | |
Allow personnel being screened to appeal findings and appeal decisions. CC ID 06720 | Human Resources management | Preventive | |
Perform personnel screening procedures, as necessary. CC ID 11763 | Human Resources management | Preventive | |
Perform periodic background checks on designated roles, as necessary. CC ID 11759 | Human Resources management | Detective | |
Perform security clearance procedures, as necessary. CC ID 06644 | Human Resources management | Preventive | |
Establish and maintain security clearances. CC ID 01634 | Human Resources management | Preventive | |
Support certification programs as viable training programs. CC ID 13268 | Human Resources management | Preventive | |
Hire third parties to conduct training, as necessary. CC ID 13167 | Human Resources management | Preventive | |
Include ethical culture in the training plan, as necessary. CC ID 12801 | Human Resources management | Preventive | |
Include duties and responsibilities in the training plan, as necessary. CC ID 12800 | Human Resources management | Preventive | |
Establish and maintain management's commitment to supporting the security awareness program. CC ID 12151 | Human Resources management | Preventive | |
Establish and maintain a steering committee to guide the security awareness program. CC ID 12149 | Human Resources management | Preventive | |
Encourage interested personnel to obtain security certification. CC ID 11804 | Human Resources management | Preventive | |
Assign the responsibility for establishing, implementing, and maintaining the information security program to the appropriate role. CC ID 11884 [Determine whether management responsibilities are appropriate and include the following: App A Objective 2.5 {implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a Determine whether the board holds management accountable for the following: Effectiveness of the information security program. App A Objective 2.3.d] | Operational management | Preventive | |
Assign the responsibility for distributing the information security program to the appropriate role. CC ID 11883 [{delineate}{communicate} Determine whether management responsibilities are appropriate and include the following: Delineation of clear lines of responsibility and communication of accountability for information security. App A Objective 2.5.d {implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a] | Operational management | Preventive | |
Assign ownership of maintaining the asset inventory, as necessary. CC ID 12344 | Operational management | Preventive | |
Define and assign the roles and responsibilities for Incident Management program. CC ID 13055 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Operational management | Preventive | |
Implement security controls for personnel that have accessed information absent authorization. CC ID 10611 | Operational management | Corrective | |
Assign the distribution of security alerts to the appropriate role in the incident response program. CC ID 11887 | Operational management | Preventive | |
Involve all stakeholders in the acquisition process. CC ID 13169 | Acquisition or sale of facilities, technology, and services | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Leadership and high level objectives CC ID 00597 | Leadership and high level objectives | IT Impact Zone | |
Monitoring and measurement CC ID 00636 | Monitoring and measurement | IT Impact Zone | |
Audits and risk management CC ID 00677 | Audits and risk management | IT Impact Zone | |
Technical security CC ID 00508 | Technical security | IT Impact Zone | |
Physical and environmental protection CC ID 00709 | Physical and environmental protection | IT Impact Zone | |
Operational and Systems Continuity CC ID 00731 | Operational and Systems Continuity | IT Impact Zone | |
Human Resources management CC ID 00763 | Human Resources management | IT Impact Zone | |
Operational management CC ID 00805 | Operational management | IT Impact Zone | |
System hardening through configuration management CC ID 00860 | System hardening through configuration management | IT Impact Zone | |
Records management CC ID 00902 | Records management | IT Impact Zone | |
Systems design, build, and implementation CC ID 00989 | Systems design, build, and implementation | IT Impact Zone | |
Acquisition or sale of facilities, technology, and services CC ID 01123 | Acquisition or sale of facilities, technology, and services | IT Impact Zone | |
Privacy protection for information and data CC ID 00008 | Privacy protection for information and data | IT Impact Zone | |
Third Party and supply chain oversight CC ID 08807 | Third Party and supply chain oversight | IT Impact Zone |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Follow up exceptions and anomalies identified when reviewing logs. CC ID 11925 | Monitoring and measurement | Corrective | |
Monitor and evaluate the effectiveness of detection tools. CC ID 13505 | Monitoring and measurement | Detective | |
Determine if high rates of retail payment activities are from Originating Depository Financial Institutions. CC ID 13546 | Monitoring and measurement | Detective | |
Review retail payment service reports, as necessary. CC ID 13545 | Monitoring and measurement | Detective | |
Rank discovered vulnerabilities. CC ID 11940 | Monitoring and measurement | Detective | |
Determine the causes of compliance violations. CC ID 12401 | Monitoring and measurement | Corrective | |
Determine if multiple compliance violations of the same type could occur. CC ID 12402 | Monitoring and measurement | Detective | |
Review the effectiveness of disciplinary actions carried out for compliance violations. CC ID 12403 | Monitoring and measurement | Detective | |
Examine the availability of the audit criteria in the audit program. CC ID 16520 | Audits and risk management | Preventive | |
Audit cybersecurity risk management within the policies, standards, and procedures of the organization. CC ID 13011 | Audits and risk management | Detective | |
Audit information systems, as necessary. CC ID 13010 | Audits and risk management | Detective | |
Audit the potential costs of compromise to information systems. CC ID 13012 | Audits and risk management | Detective | |
Permit assessment teams to conduct audits, as necessary. CC ID 16430 | Audits and risk management | Detective | |
Determine the effect of deficiencies on the audit report, as necessary. CC ID 14886 | Audits and risk management | Detective | |
Include an analysis of system interdependencies in the threat and risk classification scheme. CC ID 13056 | Audits and risk management | Detective | |
Evaluate the effectiveness of threat and vulnerability management procedures. CC ID 13491 | Audits and risk management | Detective | |
Identify changes to in scope systems that could threaten communication between business units. CC ID 13173 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Communication lines with other business units (e.g., loan review, credit risk management, line of business quality assurance, and internal audit). App A Objective 1.3.f] | Audits and risk management | Detective | |
Investigate alternative risk control strategies appropriate to the organization's risk appetite. CC ID 12887 | Audits and risk management | Preventive | |
Take appropriate action to address information flow anomalies. CC ID 12164 | Technical security | Corrective | |
Document information flow anomalies that do not fit normal traffic patterns. CC ID 12163 | Technical security | Detective | |
Scan for malicious code, as necessary. CC ID 11941 | Technical security | Detective | |
Inspect device surfaces to detect tampering. CC ID 11868 | Physical and environmental protection | Detective | |
Inspect device surfaces to detect unauthorized substitution. CC ID 11869 | Physical and environmental protection | Detective | |
Detect anomalies in physical barriers. CC ID 13533 | Physical and environmental protection | Detective | |
Report anomalies in the visitor log to appropriate personnel. CC ID 14755 | Physical and environmental protection | Detective | |
Inspect mobile devices for the storage of restricted data or restricted information. CC ID 08707 | Physical and environmental protection | Detective | |
Determine the cause for the activation of the recovery plan. CC ID 13291 | Operational and Systems Continuity | Detective | |
Perform social network analysis, as necessary. CC ID 14864 | Operational management | Detective | |
Refrain from turning on any in scope devices that are turned off when a security incident is detected. CC ID 08677 | Operational management | Detective | |
Analyze the incident response process following an incident response. CC ID 13179 [Determine whether management has effective incident response processes, including the following: Appropriate balance of adequate people and technologies in the response. App A Objective 8.6.c] | Operational management | Detective | |
Assign monitoring and analyzing the security alert when a security alert is received to the appropriate role in the incident response program. CC ID 11886 | Operational management | Detective | |
Protect devices containing digital forensic evidence during transport. CC ID 08687 | Operational management | Detective | |
Protect devices containing digital forensic evidence in sealed containers. CC ID 08685 | Operational management | Detective | |
Conduct forensic investigations in the event of a security compromise. CC ID 11951 | Operational management | Corrective | |
Identify potential sources of digital forensic evidence. CC ID 08651 | Operational management | Preventive | |
Prepare digital forensic equipment. CC ID 08688 | Operational management | Detective | |
Use digital forensic equipment suitable to the circumstances. CC ID 08690 | Operational management | Detective | |
Provide relevant user manuals for digital forensic equipment during use. CC ID 08691 | Operational management | Detective | |
Maintain digital forensic equipment for proper performance. CC ID 08689 | Operational management | Detective | |
Refrain from altering the state of compromised systems when collecting digital forensic evidence. CC ID 08671 | Operational management | Detective | |
Follow all applicable laws and principles when collecting digital forensic evidence. CC ID 08672 | Operational management | Detective | |
Remove everyone except interested personnel and affected parties from the proximity of digital forensic evidence. CC ID 08675 | Operational management | Detective | |
Secure devices containing digital forensic evidence. CC ID 08681 | Operational management | Detective | |
Use a write blocker to prevent digital forensic evidence from being modified. CC ID 08692 | Operational management | Detective | |
Capture volatile information from devices containing digital forensic evidence prior to shutdown. CC ID 08684 | Operational management | Detective | |
Create a system image of the device before collecting digital forensic evidence. CC ID 08673 | Operational management | Detective | |
Shut down stand alone devices containing digital forensic evidence. CC ID 08682 | Operational management | Detective | |
Disconnect electronic media storage devices of systems containing digital forensic evidence. CC ID 08697 | Operational management | Detective | |
Place evidence tape over devices containing digital forensic evidence. CC ID 08683 | Operational management | Detective | |
Analyze mitigating controls for vulnerabilities in the network when certifying the network. CC ID 13126 | Operational management | Detective | |
Collect data about the network environment when certifying the network. CC ID 13125 | Operational management | Detective | |
Perform an identity check prior to approving an account change request. CC ID 13670 | Privacy protection for information and data | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Establish, implement, and maintain logging and monitoring operations. CC ID 00637 [Determine whether the institution's security operations activities include the following: Monitoring of network, host, and application activity. App A Objective 8.1.h {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f] | Monitoring and measurement | Detective | |
Enable monitoring and logging operations on all assets that meet the organizational criteria to maintain event logs. CC ID 06312 | Monitoring and measurement | Preventive | |
Document and communicate the log locations to the owning entity. CC ID 12047 | Monitoring and measurement | Preventive | |
Make logs available for review by the owning entity. CC ID 12046 | Monitoring and measurement | Preventive | |
Operationalize key monitoring and logging concepts to ensure the audit trails capture sufficient information. CC ID 00638 | Monitoring and measurement | Detective | |
Establish, implement, and maintain event logging procedures. CC ID 01335 | Monitoring and measurement | Detective | |
Include a standard to collect and interpret event logs in the event logging procedures. CC ID 00643 | Monitoring and measurement | Preventive | |
Protect the event logs from failure. CC ID 06290 | Monitoring and measurement | Preventive | |
Review and update event logs and audit logs, as necessary. CC ID 00596 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Filters and reviews logs for potential security events and provides adequate reports and alerts. App A Objective 6.21.f Review whether management has the following: Processes to effectively collect, aggregate, analyze, and correlate security event information from discrete systems and applications. App A Objective 6.35.d Review whether management has the following: Independent review of logging practices. App A Objective 6.35.c] | Monitoring and measurement | Detective | |
Eliminate false positives in event logs and audit logs. CC ID 07047 | Monitoring and measurement | Corrective | |
Correlate log entries to security controls to verify the security control's effectiveness. CC ID 13207 | Monitoring and measurement | Detective | |
Reproduce the event log if a log failure is captured. CC ID 01426 | Monitoring and measurement | Preventive | |
Enable logging for all systems that meet a traceability criteria. CC ID 00640 | Monitoring and measurement | Detective | |
Analyze firewall logs for the correct capturing of data. CC ID 00549 | Monitoring and measurement | Detective | |
Define the frequency to capture and log events. CC ID 06313 | Monitoring and measurement | Preventive | |
Include logging frequencies in the event logging procedures. CC ID 00642 | Monitoring and measurement | Preventive | |
Log account usage to determine dormant accounts. CC ID 12118 | Monitoring and measurement | Detective | |
Log account usage times. CC ID 07099 | Monitoring and measurement | Detective | |
Log Internet Protocol addresses used during logon. CC ID 07100 | Monitoring and measurement | Detective | |
Restrict access to logs to authorized individuals. CC ID 01342 | Monitoring and measurement | Preventive | |
Refrain from recording unnecessary restricted data in logs. CC ID 06318 | Monitoring and measurement | Preventive | |
Back up logs according to backup procedures. CC ID 01344 | Monitoring and measurement | Preventive | |
Copy logs from all predefined hosts onto a log management infrastructure. CC ID 01346 | Monitoring and measurement | Preventive | |
Identify hosts with logs that are not being stored. CC ID 06314 | Monitoring and measurement | Preventive | |
Identify hosts with logs that are being stored at the system level only. CC ID 06315 | Monitoring and measurement | Preventive | |
Identify hosts with logs that should be stored at both the system level and the infrastructure level. CC ID 06316 | Monitoring and measurement | Preventive | |
Identify hosts with logs that are being stored at the infrastructure level only. CC ID 06317 | Monitoring and measurement | Preventive | |
Protect logs from unauthorized activity. CC ID 01345 | Monitoring and measurement | Preventive | |
Perform testing and validating activities on all logs. CC ID 06322 | Monitoring and measurement | Preventive | |
Archive the audit trail in accordance with compliance requirements. CC ID 00674 | Monitoring and measurement | Preventive | |
Preserve the identity of individuals in audit trails. CC ID 10594 | Monitoring and measurement | Preventive | |
Disseminate and communicate the reviews of audit reports to organizational management. CC ID 00653 | Audits and risk management | Detective | |
Log issuers who send personal data in cleartext in the transfer audit log. CC ID 12312 | Technical security | Preventive | |
Establish and maintain a visitor log. CC ID 00715 | Physical and environmental protection | Preventive | |
Record the visitor's name in the visitor log. CC ID 00557 | Physical and environmental protection | Preventive | |
Record the visitor's organization in the visitor log. CC ID 12121 | Physical and environmental protection | Preventive | |
Record the visitor's acceptable access areas in the visitor log. CC ID 12237 | Physical and environmental protection | Preventive | |
Retain all records in the visitor log as prescribed by law. CC ID 00572 | Physical and environmental protection | Preventive | |
Log the entrance of a staff member to a facility or designated rooms within the facility. CC ID 01641 | Physical and environmental protection | Preventive | |
Log when the vault is accessed. CC ID 06725 | Physical and environmental protection | Detective | |
Log when the cabinet is accessed. CC ID 11674 | Physical and environmental protection | Detective | |
Store facility access logs in off-site storage. CC ID 06958 | Physical and environmental protection | Preventive | |
Log the transiting, internal distribution, and external distribution of restricted storage media. CC ID 12321 | Physical and environmental protection | Preventive | |
Log the transfer of removable storage media. CC ID 12322 | Physical and environmental protection | Preventive | |
Maintain records of all system components entering and exiting the facility. CC ID 14304 | Physical and environmental protection | Preventive | |
Store system logs for in scope systems as digital forensic evidence after a security incident has been detected. CC ID 01754 | Operational management | Corrective | |
Include who the incident was reported to in the incident management audit log. CC ID 16487 | Operational management | Preventive | |
Include the organizational functions affected by disruption in the Incident Management audit log. CC ID 12238 | Operational management | Corrective | |
Include the organization's business products and services affected by disruptions in the Incident Management audit log. CC ID 12234 | Operational management | Preventive | |
Verify the log file configured to capture critical sendmail messages is owned by an appropriate user or group. CC ID 05319 | System hardening through configuration management | Preventive | |
Set the file permissions for log file that is configured to capture critical sendmail messages properly. CC ID 05461 | System hardening through configuration management | Preventive | |
Provide the reference database used to verify input data in the logging capability. CC ID 15018 | System hardening through configuration management | Preventive | |
Configure the log to capture audit log initialization, along with auditable event selection. CC ID 00649 | System hardening through configuration management | Detective | |
Configure the log to capture creates, reads, updates, or deletes of records containing personal data. CC ID 11890 | System hardening through configuration management | Detective | |
Configure the log to capture the information referent when personal data is being accessed. CC ID 11968 | System hardening through configuration management | Detective | |
Configure the log to capture each auditable event's origination. CC ID 01338 | System hardening through configuration management | Detective | |
Configure the log to capture the amount of data uploaded and downloaded. CC ID 16494 | System hardening through configuration management | Preventive | |
Configure the log to capture startups and shutdowns. CC ID 16491 | System hardening through configuration management | Preventive | |
Configure the log to capture user queries and searches. CC ID 16479 | System hardening through configuration management | Preventive | |
Configure the log to capture Internet Protocol addresses. CC ID 16495 | System hardening through configuration management | Preventive | |
Configure the log to capture error messages. CC ID 16477 | System hardening through configuration management | Preventive | |
Configure the log to capture system failures. CC ID 16475 | System hardening through configuration management | Preventive | |
Configure the log to capture all malicious code that has been discovered, quarantined, and/or eradicated. CC ID 00577 | System hardening through configuration management | Detective | |
Capture successful operating system access and successful software access. CC ID 00527 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Independently monitors operating system access by user, terminal, date, and time of access. App A Objective 6.21.g] | System hardening through configuration management | Detective | |
Configure the log to capture hardware and software access attempts. CC ID 01220 | System hardening through configuration management | Detective | |
Configure the log to capture logons, logouts, logon attempts, and logout attempts. CC ID 01915 | System hardening through configuration management | Detective | |
Configure the log to capture access to restricted data or restricted information. CC ID 00644 | System hardening through configuration management | Detective | |
Configure the log to capture actions taken by individuals with root privileges or administrative privileges and add logging option to the root file system. CC ID 00645 [{privileged users} Determine whether management has effective threat monitoring processes, including the following: Establishing and documenting a process to independently monitor administrators and other users with higher privileges. App A Objective 8.4.f] | System hardening through configuration management | Detective | |
Configure the log to capture identification and authentication mechanism use. CC ID 00648 | System hardening through configuration management | Detective | |
Configure the log to capture all access to the audit trail. CC ID 00646 | System hardening through configuration management | Detective | |
Configure the log to capture Object access to key directories or key files. CC ID 01697 | System hardening through configuration management | Detective | |
Configure the log to capture both access and access attempts to security-relevant objects and security-relevant directories. CC ID 01916 | System hardening through configuration management | Detective | |
Configure the log to capture system level object creation and deletion. CC ID 00650 | System hardening through configuration management | Detective | |
Configure the log to capture changes to User privileges, audit policies, and trust policies by enabling audit policy changes. CC ID 01698 | System hardening through configuration management | Detective | |
Configure the log to capture user account additions, modifications, and deletions. CC ID 16482 | System hardening through configuration management | Preventive | |
Configure the log to capture user authenticator changes. CC ID 01917 | System hardening through configuration management | Detective | |
Enable or disable NFS server logging, as appropriate. CC ID 05593 | System hardening through configuration management | Detective | |
Log Pluggable Authentication Modules access at an appropriate level. CC ID 05599 | System hardening through configuration management | Detective | |
Enable or disable the logging of "martian" packets (impossible addresses), as appropriate. CC ID 05601 | System hardening through configuration management | Detective | |
Enable or disable dhcpd logging, as appropriate. CC ID 05602 | System hardening through configuration management | Detective | |
Enable or disable attempted stack exploit logging, as appropriate. CC ID 05614 | System hardening through configuration management | Detective | |
Enable or disable the debug logging option, as appropriate. CC ID 05617 | System hardening through configuration management | Detective | |
Enable or disable the logging of vsftpd transactions, as appropriate. CC ID 06032 | System hardening through configuration management | Detective | |
Configure the log to send alerts for each auditable events success or failure. CC ID 01337 | System hardening through configuration management | Preventive | |
Verify auditing is logged to an appropriate directory. CC ID 05603 | System hardening through configuration management | Detective | |
Enable or disable the /var/log/authlog log, as appropriate. CC ID 05606 | System hardening through configuration management | Detective | |
Enable or disable the /var/log/syslog log, as appropriate. CC ID 05607 | System hardening through configuration management | Detective | |
Enable or disable the /var/adm/messages log, as appropriate. CC ID 05608 | System hardening through configuration management | Detective | |
Enable or disable the /var/adm/sulog log, as appropriate. CC ID 05609 | System hardening through configuration management | Detective | |
Enable or disable the /var/adm/utmp(x) log, as appropriate. CC ID 05610 | System hardening through configuration management | Detective | |
Enable or disable the /var/adm/wtmp(x) log, as appropriate. CC ID 05611 | System hardening through configuration management | Detective | |
Enable or disable the /var/adm/sshlog log, as appropriate. CC ID 05612 | System hardening through configuration management | Detective | |
Enable or disable the /var/log/pamlog log, as appropriate. CC ID 05613 | System hardening through configuration management | Detective | |
Perform filesystem logging and filesystem journaling. CC ID 05615 | System hardening through configuration management | Detective | |
Log the disclosure of personal data. CC ID 06628 | Privacy protection for information and data | Preventive | |
Log the modification of personal data. CC ID 11844 | Privacy protection for information and data | Preventive | |
Log account access dates and report when dormant accounts suddenly exhibit unusual activity. CC ID 04874 | Privacy protection for information and data | Detective | |
Log dates for account name changes or address changes. CC ID 04876 | Privacy protection for information and data | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Separate the production environment from development environment or test environment for the change control process. CC ID 11864 | Operational management | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Analyze organizational objectives, functions, and activities. CC ID 00598 | Leadership and high level objectives | Preventive | |
Monitor for changes which affect organizational objectives in the internal business environment. CC ID 12862 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Leadership and high level objectives | Preventive | |
Monitor regulatory trends to maintain compliance. CC ID 00604 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5 Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5 Review whether management has processes to do the following: Maintain awareness of new legal and regulatory requirements or changes to industry practices. App A Objective 4.5.a] | Leadership and high level objectives | Detective | |
Monitor for new Information Security solutions. CC ID 07078 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Leadership and high level objectives | Detective | |
Monitor and evaluate the implementation and effectiveness of Information Technology Plans. CC ID 00634 | Leadership and high level objectives | Detective | |
Establish, implement, and maintain intrusion management operations. CC ID 00580 | Monitoring and measurement | Preventive | |
Monitor systems for inappropriate usage and other security violations. CC ID 00585 [{cyber threat indicator} Determine whether management has effective threat monitoring processes, including the following: Monitoring of indicators, including vulnerabilities, attacks, compromised systems, and suspicious users. App A Objective 8.4.d {incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Monitoring and measurement | Detective | |
Monitor systems for blended attacks and multiple component incidents. CC ID 01225 | Monitoring and measurement | Detective | |
Monitor systems for Denial of Service attacks. CC ID 01222 | Monitoring and measurement | Detective | |
Monitor systems for unauthorized data transfers. CC ID 12971 [Determine whether management has effective threat monitoring processes, including the following: Monitoring both incoming and outgoing network traffic to identify malicious activity and data exfiltration. App A Objective 8.4.e] | Monitoring and measurement | Preventive | |
Monitor systems for access to restricted data or restricted information. CC ID 04721 | Monitoring and measurement | Detective | |
Detect unauthorized access to systems. CC ID 06798 | Monitoring and measurement | Detective | |
Incorporate potential red flags into the organization's incident management system. CC ID 04652 | Monitoring and measurement | Detective | |
Alert interested personnel when suspicious activity is detected by an Intrusion Detection System or Intrusion Prevention System. CC ID 06430 | Monitoring and measurement | Detective | |
Alert interested personnel and affected parties when an incident causes an outage. CC ID 06808 | Monitoring and measurement | Detective | |
Monitor systems for unauthorized mobile code. CC ID 10034 | Monitoring and measurement | Preventive | |
Monitor and evaluate system performance. CC ID 00651 | Monitoring and measurement | Detective | |
Monitor for and react to when suspicious activities are detected. CC ID 00586 | Monitoring and measurement | Detective | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has control of electronic information. CC ID 04727 | Monitoring and measurement | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has control of printed records. CC ID 04728 | Monitoring and measurement | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has accessed information in either paper or electronic form. CC ID 04740 | Monitoring and measurement | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the information has been or will likely be used in an unauthorized manner. CC ID 04729 | Monitoring and measurement | Corrective | |
Report a data loss event after a security incident is detected and there are indications that the information has been or will likely be used in an unauthorized manner that could cause substantial economic impact. CC ID 04742 | Monitoring and measurement | Corrective | |
Establish, implement, and maintain network monitoring operations. CC ID 16444 | Monitoring and measurement | Preventive | |
Monitor and review retail payment activities, as necessary. CC ID 13541 | Monitoring and measurement | Detective | |
Establish, implement, and maintain an automated configuration monitoring system. CC ID 07058 | Monitoring and measurement | Detective | |
Monitor for and report when a software configuration is updated. CC ID 06746 | Monitoring and measurement | Detective | |
Notify the appropriate personnel when the software configuration is updated absent authorization. CC ID 04886 | Monitoring and measurement | Detective | |
Monitor for firmware updates absent authorization. CC ID 10675 | Monitoring and measurement | Detective | |
Implement file integrity monitoring. CC ID 01205 | Monitoring and measurement | Detective | |
Monitor for software configurations updates absent authorization. CC ID 10676 | Monitoring and measurement | Preventive | |
Monitor for when documents are being updated absent authorization. CC ID 10677 | Monitoring and measurement | Preventive | |
Monitor and evaluate user account activity. CC ID 07066 [Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Monitoring and measurement | Detective | |
Generate daily reports of user logons during hours outside of their usage profile. CC ID 07068 | Monitoring and measurement | Detective | |
Generate daily reports of users who have grossly exceeded their usage profile logon duration. CC ID 07069 | Monitoring and measurement | Detective | |
Log account usage durations. CC ID 12117 | Monitoring and measurement | Detective | |
Report red flags when logon credentials are used on a computer different from the one in the usage profile. CC ID 07070 | Monitoring and measurement | Detective | |
Monitor the organization's exposure to threats, as necessary. CC ID 06494 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Monitoring and measurement | Preventive | |
Monitor and evaluate environmental threats. CC ID 13481 | Monitoring and measurement | Detective | |
Monitor for new vulnerabilities. CC ID 06843 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Monitoring and measurement | Preventive | |
Monitor devices continuously for conformance with production specifications. CC ID 06201 [Review whether management implements the following as appropriate: Hardware is reviewed for anomalies. App A Objective 6.19.c] | Monitoring and measurement | Detective | |
Alert appropriate personnel when rogue devices are discovered on the network. CC ID 06428 | Monitoring and measurement | Corrective | |
Monitor personnel and third parties for compliance to the organizational compliance framework. CC ID 04726 [{regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d {regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d] | Monitoring and measurement | Detective | |
Establish, implement, and maintain compliance program metrics. CC ID 11625 [{risk metric} Review whether management does the following: Establishes metrics to measure conformance to the standards and procedures that are used to implement policies. App A Objective 7.4.d] | Monitoring and measurement | Preventive | |
Report actions taken on known security issues to the Board of Directors or Senior Executive Committee on a regular basis. CC ID 12330 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Results of security operations activities and summaries of assurance reports. App A Objective 2.4.d Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Results of security operations activities and summaries of assurance reports. App A Objective 2.4.d] | Monitoring and measurement | Preventive | |
Report known security issues to interested personnel and affected parties on a regular basis. CC ID 12329 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Filters and reviews logs for potential security events and provides adequate reports and alerts. App A Objective 6.21.f Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Monitoring and measurement | Preventive | |
Supervise interested personnel and affected parties participating in the audit. CC ID 07150 | Audits and risk management | Preventive | |
Track and measure the implementation of the organizational compliance framework. CC ID 06445 | Audits and risk management | Preventive | |
Monitor the effectiveness of the cybersecurity risk management program. CC ID 16831 | Audits and risk management | Preventive | |
Monitor the effectiveness of the cybersecurity supply chain risk management program. CC ID 16828 | Audits and risk management | Preventive | |
Enforce information flow control. CC ID 11781 [Review whether management does the following: Implements a layered control system using different controls at different points in a transaction process. App A Objective 6.4.a Review whether management does the following: Implements appropriate controls over the electronic transmission of information or, if appropriate safeguards are unavailable, restricts the type of information that can be transmitted. App A Objective 6.18.d {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical security | Preventive | |
Monitor information flows for anomalies. CC ID 16365 | Technical security | Preventive | |
Monitor and report on the organization's interconnectivity risk. CC ID 13172 [Review whether management does the following: Monitors and reports on the institution's interconnectivity risk. App A Objective 6.7.f {network infrastructure} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Network topology or diagram including changes to configuration or components and all internal and external connections. App A Objective 1.3.b] | Technical security | Detective | |
Perform content filtering scans on network traffic. CC ID 06761 | Technical security | Detective | |
Perform content filtering scans on incoming and outgoing e-mail. CC ID 06733 | Technical security | Detective | |
Create a full text analysis on executed privileged functions. CC ID 06778 | Technical security | Detective | |
Monitor and evaluate all remote access usage. CC ID 00563 [Review whether management does the following: Measures the risk associated with connections with third parties with remote access. App A Objective 6.7.d As part of management's process to secure the operating system and all system components, determine whether management does the following: Prohibits remote access to operating system and system utilities, where feasible, and, at a minimum, requires strong authentication and encrypted sessions before allowing such remote access. App A Objective 6.21.e] | Technical security | Detective | |
Log and react to all malicious code activity. CC ID 07072 | Technical security | Detective | |
Establish, implement, and maintain an anti-tamper protection program. CC ID 10638 | Physical and environmental protection | Detective | |
Monitor for evidence of when tampering indicators are being identified. CC ID 11905 | Physical and environmental protection | Detective | |
Inspect for tampering, as necessary. CC ID 10640 | Physical and environmental protection | Detective | |
Escort uncleared personnel who need to work in or access controlled access areas. CC ID 00747 | Physical and environmental protection | Preventive | |
Monitor for unauthorized physical access at physical entry points and physical exit points. CC ID 01638 | Physical and environmental protection | Detective | |
Log the exit of a staff member to a facility or designated rooms within the facility. CC ID 11675 | Physical and environmental protection | Preventive | |
Observe restricted areas with motion detectors or closed-circuit television systems. CC ID 01328 | Physical and environmental protection | Detective | |
Review and correlate all data collected from video cameras and/or access control mechanisms with other entries. CC ID 11609 | Physical and environmental protection | Detective | |
Evaluate and react to when unauthorized access is detected by physical entry point alarms. CC ID 11677 | Physical and environmental protection | Detective | |
Monitor for alarmed security doors being propped open. CC ID 06684 | Physical and environmental protection | Detective | |
Monitor the location of distributed assets. CC ID 11684 | Physical and environmental protection | Detective | |
Log an incident if unauthorized restricted data or unauthorized restricted information is discovered on a mobile device. CC ID 08708 | Physical and environmental protection | Corrective | |
Monitor and evaluate business continuity management system performance. CC ID 12410 | Operational and Systems Continuity | Detective | |
Record business continuity management system performance for posterity. CC ID 12411 | Operational and Systems Continuity | Preventive | |
Identify and watch individuals that pose a risk to the organization. CC ID 10674 [Determine whether management effectively mitigates risks posed by users. Review whether management does the following: App A Objective 6.8 {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Detective | |
Monitor and measure the effectiveness of security awareness. CC ID 06262 | Human Resources management | Detective | |
Analyze and evaluate training records to improve the training program. CC ID 06380 | Human Resources management | Detective | |
Monitor managing cloud services. CC ID 13150 | Operational management | Detective | |
Monitor and review the effectiveness of the information security program. CC ID 12744 [Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether policies, standards, and procedures are of sufficient scope and depth to guide information security-related decisions. Review whether policies, standards, and procedures have the following characteristics: App A Objective 6.1 Determine whether management has an effective information security program. App A Objective 9 {information security testing] Determine whether management uses the following types of tests and evaluations to determine the effectiveness of the information security program. Verify whether management ensures the following are done: App A Objective 10.3 Determine whether the information security program is subject to periodic review and whether management provides for continual improvement in the program's effectiveness. Verify whether that review does the following: App A Objective 9.1 Determine whether assurance activities provide sufficient confidence that the security program is operating as expected and reaching intended goals. App A Objective 10 Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 Review whether the program includes the following: Methods to assess the program's effectiveness. App A Objective 3.1.e {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Operational management | Preventive | |
Identify discrepancies between the asset register database and the Information Technology inventory, as necessary. CC ID 07052 | Operational management | Corrective | |
Investigate and resolve discrepancies between the asset register database and the Information Technology inventory. CC ID 07053 | Operational management | Corrective | |
Determine the incident severity level when assessing the security incidents. CC ID 01650 [Determine whether management has effective incident identification and assessment processes to do the following: Classify the event. App A Objective 8.5.c {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Operational management | Corrective | |
Detect any potentially undiscovered security vulnerabilities on previously compromised systems. CC ID 06265 | Operational management | Detective | |
Include lessons learned from analyzing security violations in the Incident Management program. CC ID 01234 [{information security program review} Verify whether that review does the following: Demonstrates that lessons learned from experience, audit findings, and other opportunities for improvement are identified and applied. App A Objective 9.1.b Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Security breaches or violations and management's responses. App A Objective 2.4.e] | Operational management | Preventive | |
Identify potential red flags to alert the organization before a data leakage has occurred. CC ID 04654 | Privacy protection for information and data | Preventive | |
Establish, implement, and maintain suspicious user account activity procedures. CC ID 04854 | Privacy protection for information and data | Detective | |
Report fraudulent account activity, unauthorized transactions, or discrepancies with current accounts. CC ID 04875 | Privacy protection for information and data | Corrective | |
Review accounts that are changed for additional user requests. CC ID 11846 | Privacy protection for information and data | Detective | |
Review monitored websites for data leakage. CC ID 10593 | Privacy protection for information and data | Detective | |
Monitor third parties for performance and effectiveness, as necessary. CC ID 00799 [{technical capability} Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Oversight of third parties when they supplement an institution's technical and managerial capabilities. App A Objective 2.9.d Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Third Party and supply chain oversight | Detective | |
Monitor third parties' financial conditions. CC ID 13170 | Third Party and supply chain oversight | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Analyze and evaluate engineering systems. CC ID 13080 | Physical and environmental protection | Preventive | |
Analyze and evaluate facilities and their structural elements. CC ID 13079 | Physical and environmental protection | Preventive | |
Analyze and evaluate mechanical systems, as necessary. CC ID 13078 | Physical and environmental protection | Preventive | |
Protect assets from tampering or unapproved substitution. CC ID 11902 | Physical and environmental protection | Preventive | |
Protect the facility from crime. CC ID 06347 | Physical and environmental protection | Preventive | |
Protect facilities from eavesdropping. CC ID 02222 | Physical and environmental protection | Preventive | |
Inspect telephones for eavesdropping devices. CC ID 02223 | Physical and environmental protection | Detective | |
Hold conferences requiring sensitive information discussions in spaces that have commensurate security. CC ID 11440 | Physical and environmental protection | Preventive | |
Provide one-time meeting support for discussions involving Top Secret information. CC ID 11441 | Physical and environmental protection | Preventive | |
Create security zones in facilities, as necessary. CC ID 16295 | Physical and environmental protection | Preventive | |
Establish clear zones around any sensitive facilities. CC ID 02214 | Physical and environmental protection | Preventive | |
Inspect items brought into the facility. CC ID 06341 | Physical and environmental protection | Preventive | |
Maintain all physical security systems. CC ID 02206 | Physical and environmental protection | Preventive | |
Maintain all security alarm systems. CC ID 11669 | Physical and environmental protection | Preventive | |
Control physical access to (and within) the facility. CC ID 01329 | Physical and environmental protection | Preventive | |
Meet the physical access requirements of disabled individuals, if reasonably possible. CC ID 00419 | Physical and environmental protection | Preventive | |
Secure physical entry points with physical access controls or security guards. CC ID 01640 | Physical and environmental protection | Detective | |
Configure the access control system to grant access only during authorized working hours. CC ID 12325 | Physical and environmental protection | Preventive | |
Check the visitor's stated identity against a provided government issued identification. CC ID 06701 | Physical and environmental protection | Preventive | |
Change access requirements to organizational assets for personnel and visitors, as necessary. CC ID 12463 | Physical and environmental protection | Corrective | |
Issue photo identification badges to all employees. CC ID 12326 | Physical and environmental protection | Preventive | |
Report lost badges, stolen badges, and broken badges to the Security Manager. CC ID 12334 | Physical and environmental protection | Preventive | |
Manage visitor identification inside the facility. CC ID 11670 | Physical and environmental protection | Preventive | |
Secure unissued visitor identification badges. CC ID 06712 | Physical and environmental protection | Preventive | |
Include name, date of entry, and validity period on disposable identification cards or badges. CC ID 12331 | Physical and environmental protection | Preventive | |
Restrict access to the badge system to authorized personnel. CC ID 12043 | Physical and environmental protection | Preventive | |
Enforce dual control for badge assignments. CC ID 12328 | Physical and environmental protection | Preventive | |
Enforce dual control for accessing unassigned identification cards or badges. CC ID 12327 | Physical and environmental protection | Preventive | |
Refrain from imprinting the company name or company logo on identification cards or badges. CC ID 12282 | Physical and environmental protection | Preventive | |
Prevent tailgating through physical entry points. CC ID 06685 | Physical and environmental protection | Preventive | |
Use locks to protect against unauthorized physical access. CC ID 06342 | Physical and environmental protection | Preventive | |
Install and maintain security lighting at all physical entry points. CC ID 02205 | Physical and environmental protection | Preventive | |
Use vandal resistant light fixtures for all security lighting. CC ID 16130 | Physical and environmental protection | Preventive | |
Manage access to loading docks, unloading docks, and mail rooms. CC ID 02210 | Physical and environmental protection | Preventive | |
Secure the loading dock with physical access controls or security guards. CC ID 06703 | Physical and environmental protection | Preventive | |
Isolate loading areas from information processing facilities, if possible. CC ID 12028 | Physical and environmental protection | Preventive | |
Screen incoming mail and deliveries. CC ID 06719 | Physical and environmental protection | Preventive | |
Protect access to the facility's mechanical systems area. CC ID 02212 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain elevator security guidelines. CC ID 02232 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain stairwell security guidelines. CC ID 02233 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain glass opening security guidelines. CC ID 02234 | Physical and environmental protection | Preventive | |
Establish a security room, if necessary. CC ID 00738 | Physical and environmental protection | Preventive | |
Implement physical security standards for mainframe rooms or data centers. CC ID 00749 | Physical and environmental protection | Preventive | |
Establish and maintain equipment security cages in a shared space environment. CC ID 06711 | Physical and environmental protection | Preventive | |
Secure systems in lockable equipment cabinets, as necessary. CC ID 06716 | Physical and environmental protection | Preventive | |
Lock all lockable equipment cabinets. CC ID 11673 | Physical and environmental protection | Detective | |
Establish, implement, and maintain vault physical security standards. CC ID 02203 | Physical and environmental protection | Preventive | |
Monitor physical entry point alarms. CC ID 01639 | Physical and environmental protection | Detective | |
Build and maintain fencing, as necessary. CC ID 02235 | Physical and environmental protection | Preventive | |
Implement security measures for all interior spaces that allow for any payment transactions. CC ID 06352 | Physical and environmental protection | Preventive | |
Physically segregate business areas in accordance with organizational standards. CC ID 16718 | Physical and environmental protection | Preventive | |
Design interior walls with sound absorbing materials as well as thermal resistant materials. CC ID 06372 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain physical security controls for distributed assets. CC ID 00718 | Physical and environmental protection | Preventive | |
Use locked containers to transport non-digital media outside of controlled areas. CC ID 14286 | Physical and environmental protection | Preventive | |
Restrict physical access to distributed assets. CC ID 11865 | Physical and environmental protection | Preventive | |
House network hardware in lockable rooms or lockable equipment cabinets. CC ID 01873 | Physical and environmental protection | Preventive | |
Protect electronic storage media with physical access controls. CC ID 00720 | Physical and environmental protection | Preventive | |
Protect physical assets with earthquake-resistant mechanisms. CC ID 06360 | Physical and environmental protection | Preventive | |
Physically secure all electronic storage media that store restricted data or restricted information. CC ID 11664 | Physical and environmental protection | Preventive | |
Store removable storage media containing restricted data or restricted information using electronic media storage cabinets or electronic media storage vaults. CC ID 00717 | Physical and environmental protection | Preventive | |
Protect the combinations for all combination locks. CC ID 02199 | Physical and environmental protection | Preventive | |
Establish and maintain eavesdropping protection for vaults. CC ID 02231 | Physical and environmental protection | Preventive | |
Protect distributed assets against theft. CC ID 06799 | Physical and environmental protection | Preventive | |
Control the delivery of assets through physical entry points and physical exit points. CC ID 01441 | Physical and environmental protection | Preventive | |
Control the removal of assets through physical entry points and physical exit points. CC ID 11681 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain on-site physical controls for all distributed assets. CC ID 04820 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain off-site physical controls for all distributed assets. CC ID 04539 | Physical and environmental protection | Preventive | |
Attach asset location technologies to distributed assets. CC ID 10626 | Physical and environmental protection | Detective | |
Employ asset location technologies in accordance with applicable laws and regulations. CC ID 10627 | Physical and environmental protection | Preventive | |
Unpair missing Bluetooth devices. CC ID 12428 | Physical and environmental protection | Corrective | |
Secure workstations to desks with security cables. CC ID 04724 | Physical and environmental protection | Preventive | |
Include the use of privacy filters in the mobile device security guidelines. CC ID 16452 | Physical and environmental protection | Preventive | |
Refrain from responding to unsolicited Personal Identification Number requests. CC ID 12430 | Physical and environmental protection | Preventive | |
Refrain from pairing Bluetooth devices in unsecured areas. CC ID 12429 | Physical and environmental protection | Preventive | |
Separate systems that transmit, process, or store restricted data from those that do not by deploying physical access controls. CC ID 00722 | Physical and environmental protection | Preventive | |
Secure system components from unauthorized viewing. CC ID 01437 | Physical and environmental protection | Preventive | |
Identify customer property within the organizational facility. CC ID 06612 | Physical and environmental protection | Preventive | |
Protect customer property under the care of the organization. CC ID 11685 | Physical and environmental protection | Preventive | |
Provide storage media shelving capable of bearing all potential loads. CC ID 11400 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain proper aircraft security. CC ID 02213 | Physical and environmental protection | Preventive | |
Establish parking requirements for vehicles. CC ID 02218 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain proper container security. CC ID 02208 | Physical and environmental protection | Preventive | |
Inspect the physical integrity of all containers before loading the containers. CC ID 02209 | Physical and environmental protection | Detective | |
Lock closable storage containers. CC ID 06307 | Physical and environmental protection | Preventive | |
Control the issuance of payment cards. CC ID 06403 | Physical and environmental protection | Preventive | |
Store non-issued payment cards in a lockable cabinet or safe. CC ID 06404 | Physical and environmental protection | Preventive | |
Deliver payment cards to customers using secure methods. CC ID 06405 | Physical and environmental protection | Preventive | |
Establish and maintain physical security of assets used for publicity. CC ID 06724 | Physical and environmental protection | Preventive | |
Install and protect network cabling. CC ID 08624 | Physical and environmental protection | Preventive | |
Install and protect fiber optic cable, as necessary. CC ID 08625 | Physical and environmental protection | Preventive | |
Restrict fiber optic cables to carry only specific security classification traffic. CC ID 08628 | Physical and environmental protection | Preventive | |
Restrict the length of fiber optic flying leads to 5 meters. CC ID 08639 | Physical and environmental protection | Detective | |
Label fiber optic flying leads according to security classification of data being carried over the fiber optic cables. CC ID 08640 | Physical and environmental protection | Preventive | |
Install network cable in a way that allows ease of inspecting. CC ID 08626 | Physical and environmental protection | Preventive | |
Inspect network cabling at distances determined by security classification. CC ID 08644 | Physical and environmental protection | Detective | |
Bundle network cables together at each inspection point by security classification of data being carried over that cable. CC ID 08649 | Physical and environmental protection | Preventive | |
Label conduit according to security classification of data being carried over the network cable inside the conduit. CC ID 08630 | Physical and environmental protection | Preventive | |
Label each end of a network cable run. CC ID 08632 | Physical and environmental protection | Preventive | |
Terminate approved network cables on the patch panel. CC ID 08633 | Physical and environmental protection | Preventive | |
Color code cables in accordance with organizational standards. CC ID 16422 | Physical and environmental protection | Preventive | |
Prevent installing network cabling inside walls shared with third parties. CC ID 08648 | Physical and environmental protection | Preventive | |
Install network cabling specifically for maintenance purposes. CC ID 10613 | Physical and environmental protection | Preventive | |
Install and maintain network jacks and outlet boxes. CC ID 08635 | Physical and environmental protection | Preventive | |
Color code outlet boxes in accordance with organizational standards. CC ID 16451 | Physical and environmental protection | Preventive | |
Maintain wiring circuits and outlets that are separate from the computer room. CC ID 16142 | Physical and environmental protection | Preventive | |
Implement physical controls to restrict access to publicly accessible network jacks. CC ID 11989 | Physical and environmental protection | Preventive | |
Label network cabling outlet boxes. CC ID 08631 | Physical and environmental protection | Preventive | |
Implement logical controls to enable network jacks, as necessary. CC ID 11934 | Physical and environmental protection | Preventive | |
Identify network jacks by security classification according to security classification of data being carried over the cable. CC ID 08634 | Physical and environmental protection | Preventive | |
Identify network cable faceplates by security classification according to security classification of data being carried over the cable. CC ID 08643 | Physical and environmental protection | Preventive | |
Install and maintain network patch panels. CC ID 08636 | Physical and environmental protection | Preventive | |
Separate network patch panels in different network cabinets according to security classification of data being carried over the cables. CC ID 08637 | Physical and environmental protection | Preventive | |
Assign access to network patch panels on a need to know basis. CC ID 08638 | Physical and environmental protection | Preventive | |
Encase network cabling in conduit or closed cable reticulation systems, as necessary. CC ID 08647 | Physical and environmental protection | Preventive | |
Install conduit on walls connecting to network cable outlet boxes, as necessary. CC ID 08646 | Physical and environmental protection | Preventive | |
Seal data conduit couplings and data conduit fitting bodies. CC ID 08629 | Physical and environmental protection | Preventive | |
Install cable reticulation systems as close to the network cabinets as possible. CC ID 08642 | Physical and environmental protection | Preventive | |
Partition cable bundles in cable reticulation systems by security classification of data being carried over the network cable. CC ID 08645 | Physical and environmental protection | Preventive | |
Protect clients' hosted environments. CC ID 11862 | Operational management | Preventive | |
Conduct environmental surveys. CC ID 00690 | Operational management | Preventive | |
Place printed records awaiting destruction into secure containers. CC ID 12464 | Records management | Preventive | |
Destroy printed records so they cannot be reconstructed. CC ID 11779 | Records management | Preventive | |
Sign a forfeiture statement acknowledging unapproved Personal Electronic Devices will be confiscated. CC ID 11667 | Acquisition or sale of facilities, technology, and services | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Assess the effectiveness of the communication methods used in the communication protocol. CC ID 12691 | Leadership and high level objectives | Detective | |
Evaluate organizational objectives to determine impact on other organizational objectives. CC ID 12814 | Leadership and high level objectives | Preventive | |
Identify events that may affect organizational objectives. CC ID 12961 [Review whether management has the following: Visibility to assess the likelihood of threats and potential damage to the institution. App A Objective 3.2.d] | Leadership and high level objectives | Preventive | |
Identify how opportunities, threats, and external requirements are trending. CC ID 12829 | Leadership and high level objectives | Preventive | |
Identify relationships between opportunities, threats, and external requirements. CC ID 12805 | Leadership and high level objectives | Preventive | |
Review and approve the use of continuous security management systems. CC ID 13181 [Determine whether management has effective threat monitoring processes, including the following: Appropriately reviewing and providing approval of the monitoring tools used. App A Objective 8.4.c Determine whether management has effective threat monitoring processes, including the following: Appropriately reviewing and providing approval of the monitoring tools used. App A Objective 8.4.c] | Monitoring and measurement | Preventive | |
Include the correlation and analysis of information obtained during testing in the continuous monitoring program. CC ID 14250 | Monitoring and measurement | Detective | |
Alert interested personnel and affected parties when an unauthorized modification to critical files is detected. CC ID 12045 | Monitoring and measurement | Preventive | |
Update or adjust fraud detection systems, as necessary. CC ID 13684 | Monitoring and measurement | Corrective | |
Align the enterprise architecture with the system security plan. CC ID 14255 | Monitoring and measurement | Preventive | |
Identify risk management measures when testing in scope systems. CC ID 14960 | Monitoring and measurement | Detective | |
Ensure protocols are free from injection flaws. CC ID 16401 | Monitoring and measurement | Preventive | |
Approve the vulnerability management program. CC ID 15722 | Monitoring and measurement | Preventive | |
Correct compliance violations. CC ID 13515 | Monitoring and measurement | Corrective | |
Refrain from approving changes to the audit terms absent reasonable justification. CC ID 13973 | Audits and risk management | Preventive | |
Determine the effect of fraud and non-compliance on the description of the system in the audit assertion, as necessary. CC ID 13977 | Audits and risk management | Detective | |
Determine the effect of fraud and non-compliance on the achievement of in scope controls in the audit assertion, as necessary. CC ID 13978 | Audits and risk management | Detective | |
Review documentation to determine the effectiveness of in scope controls. CC ID 16522 | Audits and risk management | Preventive | |
Coordinate the scheduling of interviews. CC ID 16293 | Audits and risk management | Preventive | |
Create a schedule for the interviews. CC ID 16292 | Audits and risk management | Preventive | |
Identify interviewees. CC ID 16290 | Audits and risk management | Preventive | |
Discuss unsolved questions with the interviewee. CC ID 16298 | Audits and risk management | Detective | |
Allow interviewee to respond to explanations. CC ID 16296 | Audits and risk management | Detective | |
Explain the requirements being discussed to the interviewee. CC ID 16294 | Audits and risk management | Detective | |
Explain the testing results to the interviewee. CC ID 16291 | Audits and risk management | Preventive | |
Withdraw from the audit, when defined conditions exist. CC ID 13885 | Audits and risk management | Corrective | |
Engage subject matter experts when the auditor requires additional expertise during an attestation engagement, as necessary. CC ID 13971 | Audits and risk management | Preventive | |
Determine the effect of fraud and non-compliance on the audit report, as necessary. CC ID 13979 | Audits and risk management | Detective | |
Establish, implement, and maintain Data Protection Impact Assessments. CC ID 14830 | Audits and risk management | Preventive | |
Analyze the effect of threats on organizational strategies and objectives. CC ID 12850 [{security incident} Determine whether management responsibilities are appropriate and include the following: Participation in assessing the effect of security threats or incidents on the institution and its business lines and processes. App A Objective 2.5.c] | Audits and risk management | Detective | |
Analyze the effect of opportunities on organizational strategies and objectives. CC ID 12849 | Audits and risk management | Detective | |
Analyze supply chain risk management procedures, as necessary. CC ID 13198 | Audits and risk management | Detective | |
Set access control for objects and users to "deny all" unless explicitly authorized. CC ID 06301 | Technical security | Preventive | |
Define the activation requirements for identification cards or badges. CC ID 06583 | Technical security | Preventive | |
Disallow self-enrollment of biometric information. CC ID 11834 | Technical security | Preventive | |
Enforce the network segmentation requirements. CC ID 16381 | Technical security | Preventive | |
Use a passive asset inventory discovery tool to identify assets when network mapping. CC ID 13735 | Technical security | Detective | |
Use an active asset inventory discovery tool to identify sensitive information for data flow diagrams. CC ID 13737 | Technical security | Detective | |
Include testing and approving all network connections through the firewall in the firewall and router configuration standard. CC ID 01270 | Technical security | Detective | |
Update application layer firewalls to the most current version. CC ID 12037 | Technical security | Preventive | |
Assign virtual escorting to authorized personnel. CC ID 16440 | Technical security | Preventive | |
Define the asymmetric signature field for the CHUID container on identification cards or badges. CC ID 06584 | Technical security | Preventive | |
Implement cryptographic operations and support functions on identification cards or badges. CC ID 06585 | Technical security | Preventive | |
Define the format of the biometric data on identification cards or badges. CC ID 06586 | Technical security | Preventive | |
Remove malware when malicious code is discovered. CC ID 13691 | Technical security | Corrective | |
Include all vulnerabilities in the application security review. CC ID 12036 | Technical security | Preventive | |
Implement physical identification processes. CC ID 13715 | Physical and environmental protection | Preventive | |
Refrain from using knowledge-based authentication for in-person identity verification. CC ID 13717 | Physical and environmental protection | Preventive | |
Record the assigned identification card or badge serial number when issuing an identification card or badge. CC ID 06714 | Physical and environmental protection | Preventive | |
Include identity proofing processes in the identification issuance procedures. CC ID 06597 | Physical and environmental protection | Preventive | |
Prohibit assets from being taken off-site absent prior authorization. CC ID 12027 | Physical and environmental protection | Preventive | |
Remote wipe any distributed asset reported lost or stolen. CC ID 12197 | Physical and environmental protection | Corrective | |
Remove dormant systems from the network, as necessary. CC ID 13727 | Physical and environmental protection | Corrective | |
Control physical access to network cables. CC ID 00723 | Physical and environmental protection | Preventive | |
Coordinate continuity planning with governmental entities, as necessary. CC ID 13258 | Operational and Systems Continuity | Preventive | |
Coordinate continuity planning with community organizations, as necessary. CC ID 13259 | Operational and Systems Continuity | Preventive | |
Include all residences in the criminal records check. CC ID 13306 | Human Resources management | Preventive | |
Establish, implement, and maintain a migration process and/or strategy to transfer systems from one asset to another. CC ID 16384 | Operational management | Preventive | |
Define and enforce the deployment requirements for applications and virtual network devices in a public cloud. CC ID 16383 | Operational management | Preventive | |
Evaluate the use of technology in supporting Governance, Risk, and Compliance capabilities. CC ID 12895 [Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3 Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3 Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3] | Operational management | Preventive | |
Evaluate information sharing partners, as necessary. CC ID 12749 | Operational management | Preventive | |
Review and approve access controls, as necessary. CC ID 13074 | Operational management | Detective | |
Provide management direction and support for the information security program. CC ID 11999 [Determine whether the board holds management accountable for the following: Support of the information security program. App A Objective 2.3.c Determine whether the institution's board and management understand and support information security and provide appropriate resources for the implementation of an effective security program. App A Objective 2.1.a {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2] | Operational management | Preventive | |
Approve the information security policy at the organization's management level or higher. CC ID 11737 [Determine whether the information security policy is annually reviewed and approved by the board. App A Objective 6.2] | Operational management | Preventive | |
Define thresholds for approving information security activities in the information security program. CC ID 15702 | Operational management | Preventive | |
Use systems in accordance with the standard operating procedures manual. CC ID 15049 | Operational management | Preventive | |
Provide support for information sharing activities. CC ID 15644 | Operational management | Preventive | |
Restrict unscheduled downtime in order to maintain high availability for critical systems. CC ID 12742 | Operational management | Preventive | |
Include interconnected systems and Software as a Service in the Information Technology inventory. CC ID 04885 | Operational management | Preventive | |
Contain the incident to prevent further loss. CC ID 01751 [Determine whether management has effective incident response processes, including the following: Containment strategies. App A Objective 8.6.h {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Operational management | Corrective | |
Revoke the written request to delay the notification. CC ID 16843 | Operational management | Preventive | |
Post the incident response notification on the organization's website. CC ID 16809 | Operational management | Preventive | |
Document the determination for providing a substitute incident response notification. CC ID 16841 | Operational management | Preventive | |
Perform emergency changes, as necessary. CC ID 12707 | Operational management | Preventive | |
Back up emergency changes after the change has been performed. CC ID 12734 | Operational management | Preventive | |
Conduct network certifications prior to approving change requests for networks. CC ID 13121 | Operational management | Detective | |
Establish, implement, and maintain a patch management program. CC ID 00896 [Review whether patch management processes include the following: An effective monitoring process that identifies the availability of software patches. App A Objective 6.15.a {system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c Determine whether management has a process to update and patch operating systems, network devices, and software applications, including internally developed software provided to customers, for newly discovered vulnerabilities. Review whether patch management processes include the following: App A Objective 6.15 Review whether applications in use provide the following capabilities: Allow administrators to review and install patches for applications in a timely manner. App A Objective 6.27.d Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Operational management | Preventive | |
Prohibit files from containing wild cards, as necessary. CC ID 16318 | System hardening through configuration management | Preventive | |
Change default accounts. CC ID 16468 | System hardening through configuration management | Preventive | |
Define the location requirements for network elements and network devices. CC ID 16379 | System hardening through configuration management | Preventive | |
Reset wireless access points, as necessary. CC ID 14317 | System hardening through configuration management | Corrective | |
Determine how long to keep records and logs before disposing them. CC ID 11661 | Records management | Preventive | |
Manage waste materials in accordance with the storage media disposition and destruction procedures. CC ID 16485 | Records management | Preventive | |
Define each system's disposition requirements for records and logs. CC ID 11651 | Records management | Preventive | |
Sanitize user input in accordance with organizational standards. CC ID 16856 | Records management | Preventive | |
Include system performance in the scope of system testing. CC ID 12624 | Systems design, build, and implementation | Preventive | |
Include security controls in the scope of system testing. CC ID 12623 | Systems design, build, and implementation | Preventive | |
Include business logic in the scope of system testing. CC ID 12622 | Systems design, build, and implementation | Preventive | |
Document attempts to obtain system documentation. CC ID 14284 | Acquisition or sale of facilities, technology, and services | Corrective | |
Authorize new assets prior to putting them into the production environment. CC ID 13530 | Acquisition or sale of facilities, technology, and services | Preventive | |
Search the Internet for evidence of data leakage. CC ID 10419 | Privacy protection for information and data | Detective | |
Alert appropriate personnel when data leakage is detected. CC ID 14715 | Privacy protection for information and data | Preventive | |
Take appropriate action when a data leakage is discovered. CC ID 14716 | Privacy protection for information and data | Corrective | |
Formalize client and third party relationships with contracts or nondisclosure agreements. CC ID 00794 | Third Party and supply chain oversight | Detective | |
Establish, implement, and maintain Service Level Agreements with the organization's supply chain. CC ID 00838 | Third Party and supply chain oversight | Preventive | |
Assess third parties' compliance environment during due diligence. CC ID 13134 | Third Party and supply chain oversight | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Retain penetration test results according to internal policy. CC ID 10049 | Monitoring and measurement | Preventive | |
Retain penetration test remediation action records according to internal policy. CC ID 11629 | Monitoring and measurement | Preventive | |
Maintain vulnerability scan reports as organizational records. CC ID 12092 | Monitoring and measurement | Preventive | |
Archive the engagement file and all work papers for the period prescribed by law or contract. CC ID 10038 | Audits and risk management | Preventive | |
Archive Public Key certificate records according to organizational Records Management rules. CC ID 07090 | Technical security | Preventive | |
Retain video events according to Records Management procedures. CC ID 06304 | Physical and environmental protection | Preventive | |
Control the transiting and internal distribution or external distribution of assets. CC ID 00963 [Review whether management does the following: Maintains the security of physical media, including backup tapes, containing sensitive information while in transit, including to off-site storage, or when shared with third parties. App A Objective 6.18.f {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Physical and environmental protection | Preventive | |
Obtain management authorization for restricted storage media transit or distribution from a controlled access area. CC ID 00964 | Physical and environmental protection | Preventive | |
Separate duplicate originals and backup media from the original electronic storage media. CC ID 00961 | Physical and environmental protection | Preventive | |
Treat archive media as evidence. CC ID 00960 | Physical and environmental protection | Preventive | |
Control the storage of restricted storage media. CC ID 00965 | Physical and environmental protection | Preventive | |
Inventory payment cards, as necessary. CC ID 13547 | Physical and environmental protection | Preventive | |
Include information sharing procedures in standard operating procedures. CC ID 12974 | Operational management | Preventive | |
Include source code in the asset inventory. CC ID 14858 | Operational management | Preventive | |
Establish, implement, and maintain incident management audit logs. CC ID 13514 | Operational management | Preventive | |
Retain collected evidence for potential future legal actions. CC ID 01235 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Operational management | Preventive | |
Establish, implement, and maintain secure storage and handling of evidence procedures. CC ID 08656 | Operational management | Preventive | |
Verify all device files are located in an appropriate directory. CC ID 05571 | System hardening through configuration management | Preventive | |
Retain records in accordance with applicable requirements. CC ID 00968 [{incident analysis} Review whether management has the following: Log retention policies that meet incident response and analysis needs. App A Objective 6.35.a] | Records management | Preventive | |
Degauss as a method of sanitizing electronic storage media. CC ID 00973 | Records management | Preventive | |
Manage the disposition status for all records. CC ID 00972 | Records management | Preventive | |
Remove and/or destroy records according to the records' retention event and retention period schedule. CC ID 06621 | Records management | Preventive | |
Compare each record's data input to its final form. CC ID 11813 | Records management | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Back up audit trails according to backup procedures. CC ID 11642 | Monitoring and measurement | Preventive | |
Include information security continuity in the scope of the continuity framework. CC ID 12009 [Determine whether management effectively manages the following information security considerations related to business continuity planning. Review management's ability to do the following: App A Objective 6.34 Review management's ability to do the following: Define information security needs for backup sites and alternate communication networks. App A Objective 6.34.b {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Operational and Systems Continuity | Preventive | |
Activate the continuity plan if the damage assessment report indicates the activation criterion has been met. CC ID 01373 | Operational and Systems Continuity | Corrective | |
Maintain normal security levels when an emergency occurs. CC ID 06377 | Operational and Systems Continuity | Preventive | |
Execute fail-safe procedures when an emergency occurs. CC ID 07108 | Operational and Systems Continuity | Preventive | |
Include the in scope system's location in the continuity plan. CC ID 16246 | Operational and Systems Continuity | Preventive | |
Include the system description in the continuity plan. CC ID 16241 | Operational and Systems Continuity | Preventive | |
Restore systems and environments to be operational. CC ID 13476 | Operational and Systems Continuity | Corrective | |
Approve the continuity plan requirements before documenting the continuity plan. CC ID 12778 | Operational and Systems Continuity | Preventive | |
Disseminate and communicate business functions across multiple facilities separated by geographic separation. CC ID 10662 | Operational and Systems Continuity | Preventive | |
Disseminate and communicate processing activities across multiple facilities using geographic separation. CC ID 10663 | Operational and Systems Continuity | Preventive | |
Disseminate and communicate electronic media storage devices across multiple facilities using geographic separation. CC ID 10664 | Operational and Systems Continuity | Preventive | |
Use out-of-band channels for the physical delivery or electronic transmission of information, as necessary. CC ID 10665 | Operational and Systems Continuity | Corrective | |
Include consumer protection procedures in the Incident Response program. CC ID 12755 | Operational management | Preventive | |
Verify the organization has Emergency Power Supplies available for the systems. CC ID 01912 | System hardening through configuration management | Preventive | |
Verify enough emergency power is available for a graceful shutdown if the primary power system fails. CC ID 01913 | System hardening through configuration management | Preventive | |
Verify emergency power continuity procedures are in place to transfer power to a secondary source if the primary power system fails. CC ID 01914 | System hardening through configuration management | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Implement gateways between security domains. CC ID 16493 | Technical security | Preventive | |
Apply security controls to each level of the information classification standard. CC ID 01903 [{supplement} With respect to developed software, determine whether institution management does the following: Implements minimum controls recommended by third-party service providers and considers supplemental controls as appropriate. App A Objective 6.28.d Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Operational management | Preventive | |
Include each Information System's system boundaries in the Information Technology inventory. CC ID 00695 | Operational management | Preventive | |
Validate the system before implementing approved changes. CC ID 01510 | Operational management | Preventive | |
Establish, implement, and maintain traceability documentation. CC ID 16388 | Operational management | Preventive | |
Implement only one application or primary function per network component or server. CC ID 00879 | System hardening through configuration management | Preventive | |
Reboot the system after initial systems hardening is complete and before certification. CC ID 01603 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain a System Development Life Cycle program. CC ID 11823 | Systems design, build, and implementation | Preventive | |
Include information security throughout the system development life cycle. CC ID 12042 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Systems design, build, and implementation | Preventive | |
Initiate the System Development Life Cycle planning phase. CC ID 06266 | Systems design, build, and implementation | Preventive | |
Initiate the System Development Life Cycle development phase or System Development Life Cycle build phase. CC ID 06267 | Systems design, build, and implementation | Preventive | |
Develop systems in accordance with the system design specifications and system design standards. CC ID 01094 | Systems design, build, and implementation | Preventive | |
Develop new products based on best practices. CC ID 01095 | Systems design, build, and implementation | Preventive | |
Implement security controls when developing systems. CC ID 06270 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Systems design, build, and implementation | Preventive | |
Analyze and minimize attack surfaces when developing systems. CC ID 06828 | Systems design, build, and implementation | Preventive | |
Implement a hardware security module, as necessary. CC ID 12222 | Systems design, build, and implementation | Preventive | |
Require dual authentication when switching out of PCI mode in the hardware security module. CC ID 12274 | Systems design, build, and implementation | Preventive | |
Include an indicator to designate when the hardware security module is in PCI mode. CC ID 12273 | Systems design, build, and implementation | Preventive | |
Design the random number generator to generate random numbers that are unpredictable. CC ID 12255 | Systems design, build, and implementation | Preventive | |
Design the hardware security module to enforce the separation between applications. CC ID 12254 | Systems design, build, and implementation | Preventive | |
Protect sensitive data when transiting sensitive services in the hardware security module. CC ID 12253 | Systems design, build, and implementation | Preventive | |
Design the hardware security module to automatically clear its internal buffers of sensitive information prior to reuse of the buffer. CC ID 12233 | Systems design, build, and implementation | Preventive | |
Design the hardware security module to automatically clear its internal buffers of sensitive information after it recovers from an error condition. CC ID 12252 | Systems design, build, and implementation | Preventive | |
Design the hardware security module to automatically clear its internal buffers of sensitive information when it has timed out. CC ID 12251 | Systems design, build, and implementation | Preventive | |
Design the hardware security module to erase sensitive data when compromised. CC ID 12275 | Systems design, build, and implementation | Preventive | |
Restrict key-usage information for cryptographic keys in the hardware security module. CC ID 12232 | Systems design, build, and implementation | Preventive | |
Prevent cryptographic keys in the hardware security module from making unauthorized changes to data. CC ID 12231 | Systems design, build, and implementation | Preventive | |
Protect sensitive information within the hardware security module from unauthorized changes. CC ID 12225 | Systems design, build, and implementation | Preventive | |
Prohibit sensitive functions from working outside of protected areas of the hardware security module. CC ID 12224 | Systems design, build, and implementation | Preventive | |
Install secret information into the hardware security module during manufacturing. CC ID 12249 | Systems design, build, and implementation | Preventive | |
Install secret information into the hardware security module so that it can only be verified by the initial-key-loading facility. CC ID 12272 | Systems design, build, and implementation | Preventive | |
Install secret information under dual control into the hardware security module. CC ID 12257 | Systems design, build, and implementation | Preventive | |
Implement software development version controls. CC ID 01098 [Determine whether management does the following: Maintains strict version control of all software updates. App A Objective 6.11.j] | Systems design, build, and implementation | Preventive | |
Develop new products based on secure coding techniques. CC ID 11733 | Systems design, build, and implementation | Preventive | |
Control the test data used in the development environment. CC ID 12013 | Systems design, build, and implementation | Preventive | |
Select the test data carefully. CC ID 12011 | Systems design, build, and implementation | Preventive | |
Initiate the System Development Life Cycle implementation phase. CC ID 06268 | Systems design, build, and implementation | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Subscribe to a threat intelligence service to receive notification of emerging threats. CC ID 12135 | Leadership and high level objectives | Detective | |
Determine if honeypots should be installed, and if so, where the honeypots should be placed. CC ID 00582 | Monitoring and measurement | Detective | |
Update the intrusion detection capabilities and the incident response capabilities regularly. CC ID 04653 | Monitoring and measurement | Preventive | |
Implement honeyclients to proactively seek for malicious websites and malicious code. CC ID 10658 | Monitoring and measurement | Preventive | |
Implement detonation chambers, where appropriate. CC ID 10670 | Monitoring and measurement | Preventive | |
Identify cybersecurity events in event logs and audit logs. CC ID 13206 | Monitoring and measurement | Detective | |
Erase payment applications when suspicious activity is confirmed. CC ID 12193 | Monitoring and measurement | Corrective | |
Identify unauthorized modifications during file integrity monitoring. CC ID 12096 | Monitoring and measurement | Detective | |
Allow expected changes during file integrity monitoring. CC ID 12090 | Monitoring and measurement | Preventive | |
Develop and maintain a usage profile for each user account. CC ID 07067 | Monitoring and measurement | Preventive | |
Conduct Red Team exercises, as necessary. CC ID 12131 | Monitoring and measurement | Detective | |
Test security systems and associated security procedures, as necessary. CC ID 11901 | Monitoring and measurement | Detective | |
Scan wireless networks for rogue devices. CC ID 11623 | Monitoring and measurement | Detective | |
Implement incident response procedures when rogue devices are discovered. CC ID 11880 | Monitoring and measurement | Corrective | |
Establish, implement, and maintain a port scan baseline for all in scope systems. CC ID 12134 | Monitoring and measurement | Detective | |
Perform internal penetration tests, as necessary. CC ID 12471 | Monitoring and measurement | Detective | |
Perform external penetration tests, as necessary. CC ID 12470 | Monitoring and measurement | Detective | |
Perform application-layer penetration testing on all systems, as necessary. CC ID 11630 | Monitoring and measurement | Detective | |
Perform penetration testing on segmentation controls, as necessary. CC ID 12498 | Monitoring and measurement | Detective | |
Estimate the maximum bandwidth of any covert channels. CC ID 10653 | Monitoring and measurement | Detective | |
Reduce the maximum bandwidth of covert channels. CC ID 10655 | Monitoring and measurement | Corrective | |
Perform vulnerability scans, as necessary. CC ID 11637 [Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3] | Monitoring and measurement | Detective | |
Identify and document security vulnerabilities. CC ID 11857 [Determine whether the institution's security operations activities include the following: Vulnerability cataloging and remediation tracking. App A Objective 8.1.d] | Monitoring and measurement | Detective | |
Use dedicated user accounts when conducting vulnerability scans. CC ID 12098 | Monitoring and measurement | Preventive | |
Assign vulnerability scanning to qualified personnel or external third parties. CC ID 11638 | Monitoring and measurement | Detective | |
Correlate vulnerability scan reports from the various systems. CC ID 10636 | Monitoring and measurement | Detective | |
Perform vulnerability scans prior to installing payment applications. CC ID 12192 | Monitoring and measurement | Detective | |
Implement scanning tools, as necessary. CC ID 14282 | Monitoring and measurement | Detective | |
Repeat vulnerability scanning after an approved change occurs. CC ID 12468 | Monitoring and measurement | Detective | |
Perform external vulnerability scans, as necessary. CC ID 11624 [{establish} Determine whether management has continuous, established routines to identify and assess vulnerabilities. Determine whether management has processes to receive vulnerability information disclosed by external individuals or groups, such as security or vulnerability researchers. App A Objective 4.4 {threat and vulnerability management process} Determine whether management has effective threat identification and assessment processes, including the following: Developing appropriate processes to evaluate and respond to vulnerability information from external groups or individuals. App A Objective 8.3.f] | Monitoring and measurement | Detective | |
Use automated mechanisms to compare new vulnerability scan reports with past vulnerability scan reports. CC ID 10635 | Monitoring and measurement | Detective | |
Perform vulnerability assessments, as necessary. CC ID 11828 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a] | Monitoring and measurement | Corrective | |
Review applications for security vulnerabilities after the application is updated. CC ID 11938 | Monitoring and measurement | Detective | |
Perform penetration tests and vulnerability scans in concert, as necessary. CC ID 12111 | Monitoring and measurement | Preventive | |
Test the system for insecure cryptographic storage. CC ID 11635 | Monitoring and measurement | Detective | |
Recommend mitigation techniques based on vulnerability scan reports. CC ID 11639 | Monitoring and measurement | Corrective | |
Correct or mitigate vulnerabilities. CC ID 12497 | Monitoring and measurement | Corrective | |
Establish, implement, and maintain an exception management process for vulnerabilities that cannot be remediated. CC ID 13859 | Monitoring and measurement | Corrective | |
Deploy log normalization tools, as necessary. CC ID 12141 | Monitoring and measurement | Preventive | |
Restrict access to audit trails to a need to know basis. CC ID 11641 | Monitoring and measurement | Preventive | |
Analyze the organization's information security environment. CC ID 13122 [Determine the complexity of the institution's information security environment. App A Objective 1.4] | Audits and risk management | Preventive | |
Include security threats and vulnerabilities in the threat and risk classification scheme. CC ID 00699 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Map threats and vulnerabilities App A Objective 5.1.a Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Map threats and vulnerabilities App A Objective 5.1.a Verify whether management ensures the following are done: Vulnerability assessments that define, identify, and classify the security holes found in the system. App A Objective 10.3.c] | Audits and risk management | Preventive | |
Identify external requirements for customer access. CC ID 12736 | Technical security | Detective | |
Address and remediate external requirements for customer access. CC ID 12737 | Technical security | Corrective | |
Establish the criticality of the network and systems. CC ID 00006 | Technical security | Preventive | |
Limit the use of resources by priority. CC ID 01448 | Technical security | Preventive | |
Implement safeguards to protect access credentials from unauthorized access. CC ID 16433 | Technical security | Preventive | |
Identify information system users. CC ID 12081 | Technical security | Detective | |
Review user accounts. CC ID 00525 | Technical security | Detective | |
Identify and authenticate processes running on information systems that act on behalf of users. CC ID 12082 | Technical security | Detective | |
Review shared accounts. CC ID 11840 | Technical security | Detective | |
Control access rights to organizational assets. CC ID 00004 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts and logs access to and activity on operating system parameters, system utilities (especially those with data-altering capabilities), and sensitive system resources (including files, programs, and processes), and supplements with additional security software, as necessary. App A Objective 6.21.b Determine whether management controls access to applications. Review whether management does the following: App A Objective 6.22 As part of management's process to secure the operating system and all system components, determine whether management does the following: Limits the number of employees with access to operating system and system utilities and grants only the minimum level of access required to perform job responsibilities. App A Objective 6.21.a {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical security | Preventive | |
Generate but refrain from storing authenticators or Personal Identification Numbers for systems involved in high risk activities. CC ID 06835 | Technical security | Preventive | |
Define access needs for each system component of an information system. CC ID 12456 | Technical security | Preventive | |
Define the level of privilege required for each system component of an information system. CC ID 12457 | Technical security | Preventive | |
Establish access rights based on least privilege. CC ID 01411 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Limits the number of employees with access to operating system and system utilities and grants only the minimum level of access required to perform job responsibilities. App A Objective 6.21.a Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts access and applies the rule of least privilege</span> in assigning authorizations. App A Objective 6.29] | Technical security | Preventive | |
Assign user permissions based on job responsibilities. CC ID 00538 [Review whether management does the following: Manages application access rights by using group profiles. App A Objective 6.22.b Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Technical security | Preventive | |
Assign user privileges after they have management sign off. CC ID 00542 | Technical security | Preventive | |
Establish, implement, and maintain lockout procedures or lockout mechanisms to be triggered after a predetermined number of consecutive logon attempts. CC ID 01412 | Technical security | Preventive | |
Disallow unlocking user accounts absent system administrator approval. CC ID 01413 | Technical security | Preventive | |
Establish session authenticity through Transport Layer Security. CC ID 01627 | Technical security | Preventive | |
Include all system components in the access control system. CC ID 11939 | Technical security | Preventive | |
Enable access control for objects and users to match restrictions set by the system's security classification. CC ID 04850 [Determine whether management does the following: Restricts changes to authorized users. App A Objective 6.11.c] | Technical security | Preventive | |
Enable attribute-based access control for objects and users on information systems. CC ID 16351 | Technical security | Preventive | |
Enable role-based access control for objects and users on information systems. CC ID 12458 | Technical security | Preventive | |
Enforce access restrictions for change control. CC ID 01428 | Technical security | Preventive | |
Permit a limited set of user actions absent identification and authentication. CC ID 04849 | Technical security | Preventive | |
Activate third party maintenance accounts and user identifiers, as necessary. CC ID 04262 | Technical security | Preventive | |
Display a logon banner and appropriate logon message before granting access to the system. CC ID 06770 | Technical security | Preventive | |
Use automatic equipment identification as a method of connection authentication absent an individual's identification and authentication. CC ID 06964 | Technical security | Preventive | |
Control user privileges. CC ID 11665 | Technical security | Preventive | |
Review all user privileges, as necessary. CC ID 06784 [Review whether management does the following: Periodically reviews and approves the application access assigned to users for appropriateness. App A Objective 6.22.c] | Technical security | Preventive | |
Review each user's access capabilities when their role changes. CC ID 00524 | Technical security | Preventive | |
Enable products restricted by Digital Rights Management to be used while offline. CC ID 07094 | Technical security | Preventive | |
Establish, implement, and maintain User Access Management procedures. CC ID 00514 [{physical access} Review whether management does the following: Establishes and appropriately administers a user access program for physical and logical access. App A Objective 6.8.c Review whether management has the following: An authorization process to add, delete, or modify authorized user access to operating systems, applications, directories, files, and specific types of information. App A Objective 6.20.b Review whether management implements the following as appropriate: An enrollment process to add new users to the system. App A Objective 6.20.a {default password} {default account} Review whether management has the following: A process to change or disable default user accounts and passwords. App A Objective 6.20.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Technical security | Preventive | |
Review and approve logical access to all assets based upon organizational policies. CC ID 06641 | Technical security | Preventive | |
Control the addition and modification of user identifiers, user credentials, or other authenticators. CC ID 00515 | Technical security | Preventive | |
Automate access control methods, as necessary. CC ID 11838 | Technical security | Preventive | |
Automate Access Control Systems, as necessary. CC ID 06854 | Technical security | Preventive | |
Refrain from storing logon credentials for third party applications. CC ID 13690 | Technical security | Preventive | |
Refrain from allowing user access to identifiers and authenticators used by applications. CC ID 10048 | Technical security | Preventive | |
Remove inactive user accounts, as necessary. CC ID 00517 | Technical security | Corrective | |
Remove temporary user accounts, as necessary. CC ID 11839 | Technical security | Corrective | |
Enforce the password policy. CC ID 16347 | Technical security | Preventive | |
Enforce usage restrictions for superuser accounts. CC ID 07064 | Technical security | Preventive | |
Establish, implement, and maintain user accounts in accordance with the organizational Governance, Risk, and Compliance framework. CC ID 00526 | Technical security | Preventive | |
Protect and manage biometric systems and biometric data. CC ID 01261 | Technical security | Preventive | |
Implement out-of-band authentication, as necessary. CC ID 10606 | Technical security | Corrective | |
Include digital identification procedures in the access control program. CC ID 11841 | Technical security | Preventive | |
Disallow the use of Personal Identification Numbers as user identifiers. CC ID 06785 | Technical security | Preventive | |
Require proper authentication for user identifiers. CC ID 11785 [{be consistent} Review whether management does the following: Implements a robust authentication method consistent with the criticality and sensitivity of the application. App A Objective 6.22.a {authentication control} Review whether applications in use provide the following capabilities: Integrate additional authentication and encryption controls, as necessary. App A Objective 6.27.f] | Technical security | Preventive | |
Refrain from allowing individuals to share authentication mechanisms. CC ID 11932 | Technical security | Preventive | |
Refrain from assigning authentication mechanisms for shared accounts. CC ID 11910 | Technical security | Preventive | |
Employ live scans to verify biometric authentication. CC ID 06847 | Technical security | Preventive | |
Identify and control all network access controls. CC ID 00529 [{wired network} Review whether management does the following: Implements appropriate controls over wired and wireless networks. App A Objective 6.10.c {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical security | Preventive | |
Place Intrusion Detection Systems and Intrusion Response Systems in network locations where they will be the most effective. CC ID 04589 | Technical security | Detective | |
Ensure the data plane, control plane, and management plane have been segregated according to organizational standards. CC ID 16385 | Technical security | Preventive | |
Manage all internal network connections. CC ID 06329 | Technical security | Preventive | |
Employ Dynamic Host Configuration Protocol server logging when assigning dynamic IP addresses using the Dynamic Host Configuration Protocol. CC ID 12109 | Technical security | Preventive | |
Establish, implement, and maintain separate virtual private networks to transport sensitive information. CC ID 12124 | Technical security | Preventive | |
Establish, implement, and maintain separate virtual local area networks for untrusted devices. CC ID 12095 | Technical security | Preventive | |
Plan for and approve all network changes. CC ID 00534 | Technical security | Preventive | |
Manage all external network connections. CC ID 11842 | Technical security | Preventive | |
Route outbound Internet traffic through a proxy server that supports decrypting network traffic. CC ID 12116 | Technical security | Preventive | |
Prohibit systems from connecting directly to internal networks outside the demilitarized zone (DMZ). CC ID 16360 | Technical security | Preventive | |
Implement a fault-tolerant architecture. CC ID 01626 | Technical security | Preventive | |
Implement segregation of duties. CC ID 11843 | Technical security | Preventive | |
Refrain from disclosing private Internet Protocol addresses and routing information, unless necessary. CC ID 11891 | Technical security | Preventive | |
Segregate systems in accordance with organizational standards. CC ID 12546 | Technical security | Preventive | |
Implement resource-isolation mechanisms in organizational networks. CC ID 16438 | Technical security | Preventive | |
Segregate servers that contain restricted data or restricted information from direct public access. CC ID 00533 | Technical security | Preventive | |
Prevent logical access to dedicated networks from outside the secure areas. CC ID 12310 | Technical security | Preventive | |
Design Demilitarized Zones with proper isolation rules. CC ID 00532 | Technical security | Preventive | |
Restrict inbound network traffic into the Demilitarized Zone to Internet Protocol addresses within the Demilitarized Zone. CC ID 11998 | Technical security | Preventive | |
Restrict inbound Internet traffic within the Demilitarized Zone to system components that provide publicly accessible services, protocols, and ports. CC ID 11993 | Technical security | Preventive | |
Employ firewalls to secure network connections between networks of different security categorizations. CC ID 16373 | Technical security | Preventive | |
Employ firewalls to secure network connections between trusted networks and untrusted networks, as necessary. CC ID 11821 | Technical security | Preventive | |
Separate the wireless access points and wireless bridges from the wired network via a firewall. CC ID 04588 | Technical security | Preventive | |
Employ centralized management systems to configure and control networks, as necessary. CC ID 12540 | Technical security | Preventive | |
Include reviewing the rulesets for firewalls and routers in the firewall and router configuration standard, as necessary. CC ID 11903 | Technical security | Corrective | |
Lock personal firewall configurations to prevent them from being disabled or changed by end users. CC ID 06420 | Technical security | Preventive | |
Protect the firewall's network connection interfaces. CC ID 01955 | Technical security | Preventive | |
Establish, implement, and maintain packet filtering requirements. CC ID 16362 | Technical security | Preventive | |
Configure firewall filtering to only permit established connections into the network. CC ID 12482 | Technical security | Preventive | |
Distrust relying solely on Wired Equivalent Privacy encryption for Wireless Local Area Networks. CC ID 01647 | Technical security | Preventive | |
Conduct a Wireless Local Area Network site survey to determine the proper location for wireless access points. CC ID 00605 | Technical security | Preventive | |
Restrict traffic or information flow based on the node type. CC ID 16396 | Technical security | Preventive | |
Restrict traffic or information flow based on the destination address. CC ID 16378 | Technical security | Preventive | |
Restrict traffic or information flow based on the origination address. CC ID 16484 | Technical security | Preventive | |
Use content filtering scans to identify information flows by data type specification. CC ID 06762 | Technical security | Preventive | |
Use content filtering scans to identify information flows by data type usage. CC ID 11818 | Technical security | Preventive | |
Prevent encrypted data from bypassing content filtering mechanisms. CC ID 06758 | Technical security | Preventive | |
Establish, implement, and maintain a data loss prevention solution to protect Access Control Lists. CC ID 12128 | Technical security | Preventive | |
Review and approve information exchange system connections. CC ID 07143 | Technical security | Preventive | |
Establish, implement, and maintain measures to detect and prevent the use of unsafe internet services. CC ID 13104 | Technical security | Preventive | |
Refrain from storing restricted data at unsafe Internet services or virtual servers. CC ID 13107 | Technical security | Preventive | |
Block uncategorized sites using URL filtering. CC ID 12140 | Technical security | Preventive | |
Subscribe to a URL categorization service to maintain website category definitions in the URL filter list. CC ID 12139 | Technical security | Detective | |
Enforce privileged accounts and non-privileged accounts for system access. CC ID 00558 | Technical security | Preventive | |
Separate user functionality from system management functionality. CC ID 11858 | Technical security | Preventive | |
Control all methods of remote access and teleworking. CC ID 00559 [Determine whether management effectively controls employees' use of remote devices. Review whether management does the following: App A Objective 6.24 Review whether management does the following: Implements controls over remote devices provided by the institution (e.g., securely configures remote access devices, protects devices against malware, patches and updates software, encrypts sensitive data, implements secure containers, audits device access, uses remote disable and wipe capabilities, and uses geolocation). App A Objective 6.24.b Review whether management does the following: Provides remote access in a safe and sound manner. App A Objective 6.23.a {access controls} Review whether management does the following: Implements the controls necessary to offer remote access securely (e.g., disables unnecessary remote access, obtains approvals for and performs audits of remote access, maintains robust configurations, enables logging and monitoring, secures devices, restricts remote access during specific times, controls applications, enables strong authentication, and uses encryption). App A Objective 6.23.b] | Technical security | Preventive | |
Refrain from allowing remote users to copy files to remote devices. CC ID 06792 | Technical security | Preventive | |
Control remote access through a network access control. CC ID 01421 | Technical security | Preventive | |
Prohibit remote access to systems processing cleartext restricted data or restricted information. CC ID 12324 | Technical security | Preventive | |
Employ multifactor authentication for remote access to the organization's network. CC ID 12505 | Technical security | Preventive | |
Implement phishing-resistant multifactor authentication techniques. CC ID 16541 | Technical security | Preventive | |
Limit the source addresses from which remote administration is performed. CC ID 16393 | Technical security | Preventive | |
Manage the use of encryption controls and cryptographic controls. CC ID 00570 [{authentication control} Review whether applications in use provide the following capabilities: Integrate additional authentication and encryption controls, as necessary. App A Objective 6.27.f] | Technical security | Preventive | |
Employ cryptographic controls that comply with applicable requirements. CC ID 12491 | Technical security | Preventive | |
Make key usage for data fields unique for each device. CC ID 04828 | Technical security | Preventive | |
Accept only trusted keys and/or certificates. CC ID 11988 | Technical security | Preventive | |
Bind keys to each identity. CC ID 12337 | Technical security | Preventive | |
Generate unique cryptographic keys for each user. CC ID 12169 | Technical security | Preventive | |
Implement decryption keys so that they are not linked to user accounts. CC ID 06851 | Technical security | Preventive | |
Store key-encrypting keys and data-encrypting keys in different locations. CC ID 06085 | Technical security | Preventive | |
Manage outdated cryptographic keys, compromised cryptographic keys, or revoked cryptographic keys. CC ID 06852 | Technical security | Preventive | |
Issue authentication mechanisms that support the Public Key Infrastructure. CC ID 07092 | Technical security | Preventive | |
Establish a Root Certification Authority to support the Public Key Infrastructure. CC ID 07084 | Technical security | Preventive | |
Connect the Public Key Infrastructure to the organization's identity and access management system. CC ID 07091 | Technical security | Preventive | |
Refrain from storing encryption keys with cloud service providers when cryptographic key management services are in place locally. CC ID 13153 | Technical security | Preventive | |
Refrain from permitting cloud service providers to manage encryption keys when cryptographic key management services are in place locally. CC ID 13154 | Technical security | Preventive | |
Use strong data encryption to transmit in scope data or in scope information, as necessary. CC ID 00564 | Technical security | Preventive | |
Configure the encryption strength to be appropriate for the encryption methodology of the cryptographic controls. CC ID 12492 | Technical security | Preventive | |
Encrypt traffic over networks with trusted cryptographic keys. CC ID 12490 | Technical security | Preventive | |
Treat data messages that do not receive an acknowledgment as never been sent. CC ID 14416 | Technical security | Preventive | |
Establish trusted paths to transmit restricted data or restricted information over public networks or wireless networks. CC ID 00568 | Technical security | Preventive | |
Protect application services information transmitted over a public network from unauthorized modification. CC ID 12021 | Technical security | Preventive | |
Protect application services information transmitted over a public network from unauthorized disclosure. CC ID 12020 | Technical security | Preventive | |
Protect application services information transmitted over a public network from contract disputes. CC ID 12019 | Technical security | Preventive | |
Protect application services information transmitted over a public network from fraudulent activity. CC ID 12018 | Technical security | Preventive | |
Install and maintain container security solutions. CC ID 16178 | Technical security | Preventive | |
Protect the system against replay attacks. CC ID 04552 | Technical security | Preventive | |
Analyze the behavior and characteristics of the malicious code. CC ID 10672 | Technical security | Detective | |
Incorporate the malicious code analysis into the patch management program. CC ID 10673 | Technical security | Corrective | |
Correct all found deficiencies according to organizational standards after a web application policy compliance review. CC ID 06299 | Technical security | Corrective | |
Re-evaluate the web application after deficiencies have been corrected. CC ID 06300 | Technical security | Corrective | |
Implement audio protection controls on telephone systems in controlled areas. CC ID 16455 | Physical and environmental protection | Preventive | |
Secure unissued access mechanisms. CC ID 06713 | Physical and environmental protection | Preventive | |
Change cipher lock codes, as necessary. CC ID 06651 | Physical and environmental protection | Preventive | |
Encrypt digital media containing sensitive information during transport outside controlled areas. CC ID 14258 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain on-site logical controls for all distributed assets. CC ID 11682 | Physical and environmental protection | Preventive | |
Establish, implement, and maintain off-site logical controls for all distributed assets. CC ID 11683 | Physical and environmental protection | Preventive | |
Remote lock any distributed assets reported lost or stolen. CC ID 14008 | Physical and environmental protection | Corrective | |
Establish, implement, and maintain a clear screen policy. CC ID 12436 | Physical and environmental protection | Preventive | |
Prohibit the unauthorized remote activation of collaborative computing devices. CC ID 06768 | Physical and environmental protection | Preventive | |
Indicate the active use of collaborative computing devices to users physically present at the device. CC ID 10647 | Physical and environmental protection | Preventive | |
Implement alternate security mechanisms when the means of implementing the security function is unavailable. CC ID 10605 [{supplement} With respect to developed software, determine whether institution management does the following: Implements minimum controls recommended by third-party service providers and considers supplemental controls as appropriate. App A Objective 6.28.d] | Operational and Systems Continuity | Preventive | |
Establish, implement, and maintain segregation of duties compensating controls if segregation of duties is not practical. CC ID 06960 | Human Resources management | Preventive | |
Refrain from implementing network elements in a public cloud. CC ID 16382 | Operational management | Preventive | |
Establish, implement, and maintain cloud management procedures. CC ID 13149 | Operational management | Preventive | |
Use strong data encryption when storing information within a cloud service. CC ID 16411 | Operational management | Preventive | |
Include temporary activation of remote access technologies for third parties in the Acceptable Use Policy. CC ID 11892 | Operational management | Preventive | |
Use automated tools to collect Information Technology inventory information, as necessary. CC ID 07054 | Operational management | Preventive | |
Link the authentication system to the asset inventory. CC ID 13718 | Operational management | Preventive | |
Employ Dynamic Host Configuration Protocol server logging to detect systems not in the asset inventory. CC ID 12110 | Operational management | Detective | |
Categorize the incident following an incident response. CC ID 13208 | Operational management | Preventive | |
Wipe data and memory after an incident has been detected. CC ID 16850 | Operational management | Corrective | |
Refrain from accessing compromised systems. CC ID 01752 | Operational management | Corrective | |
Isolate compromised systems from the network. CC ID 01753 | Operational management | Corrective | |
Change authenticators after a security incident has been detected. CC ID 06789 | Operational management | Corrective | |
Change wireless access variables after a data loss event has been detected. CC ID 01756 | Operational management | Corrective | |
Re-image compromised systems with secure builds. CC ID 12086 | Operational management | Corrective | |
Respond when an integrity violation is detected, as necessary. CC ID 10678 | Operational management | Corrective | |
Shut down systems when an integrity violation is detected, as necessary. CC ID 10679 | Operational management | Corrective | |
Restart systems when an integrity violation is detected, as necessary. CC ID 10680 | Operational management | Corrective | |
Integrate configuration management procedures into the change control program. CC ID 13646 | Operational management | Preventive | |
Implement patch management software, as necessary. CC ID 12094 [Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d] | Operational management | Preventive | |
Include updates and exceptions to hardened images as a part of the patch management program. CC ID 12087 [{patch exception process} Review whether patch management processes include the following: An exception process, with appropriate documentation, for patches that an institution decides to delay or not apply. App A Objective 6.15.e] | Operational management | Preventive | |
Review the patch log for missing patches. CC ID 13186 | Operational management | Detective | |
Patch software. CC ID 11825 | Operational management | Corrective | |
Patch the operating system, as necessary. CC ID 11824 | Operational management | Corrective | |
Implement cryptographic mechanisms to authenticate software and computer firmware before installation. CC ID 10682 | Operational management | Detective | |
Configure session timeout and reauthentication settings according to organizational standards. CC ID 12460 | System hardening through configuration management | Preventive | |
Invalidate session identifiers upon session termination. CC ID 10649 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain container orchestration. CC ID 16350 | System hardening through configuration management | Preventive | |
Use the latest approved version of all software. CC ID 00897 | System hardening through configuration management | Preventive | |
Verify users are listed in the ASET userlist file. CC ID 04907 | System hardening through configuration management | Preventive | |
Implement hardware-based write-protect for system firmware components. CC ID 10659 | System hardening through configuration management | Preventive | |
Implement procedures to manually disable hardware-based write-protect to change computer firmware. CC ID 10660 | System hardening through configuration management | Preventive | |
Refrain from using assertion lifetimes to limit each session. CC ID 13871 | System hardening through configuration management | Preventive | |
Establish access requirements for SNMP community strings. CC ID 16357 | System hardening through configuration management | Preventive | |
Restrict and control the use of privileged utility programs. CC ID 12030 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain service accounts. CC ID 13861 | System hardening through configuration management | Preventive | |
Review the ownership of service accounts, as necessary. CC ID 13863 | System hardening through configuration management | Detective | |
Manage access credentials for service accounts. CC ID 13862 | System hardening through configuration management | Preventive | |
Restrict logons by specified source addresses. CC ID 16394 | System hardening through configuration management | Preventive | |
Establish, implement, and maintain authenticators. CC ID 15305 | System hardening through configuration management | Preventive | |
Disallow personal data in authenticators. CC ID 13864 | System hardening through configuration management | Preventive | |
Restrict access to authentication files to authorized personnel, as necessary. CC ID 12127 | System hardening through configuration management | Preventive | |
Protect authenticators or authentication factors from unauthorized modification and disclosure. CC ID 15317 | System hardening through configuration management | Preventive | |
Implement safeguards to protect authenticators from unauthorized access. CC ID 15310 | System hardening through configuration management | Preventive | |
Configure each system's security alerts to organizational standards. CC ID 12113 | System hardening through configuration management | Preventive | |
Verify system files are not world-writable. CC ID 01546 | System hardening through configuration management | Preventive | |
Verify backup directories containing patches are not accessible. CC ID 01547 | System hardening through configuration management | Preventive | |
Find files and directories with extended attributes. CC ID 01552 | System hardening through configuration management | Detective | |
Digitally sign and encrypt e-mail, as necessary. CC ID 04493 | System hardening through configuration management | Preventive | |
Manage temporary files, as necessary. CC ID 04847 | System hardening through configuration management | Preventive | |
Restrict the exporting of files and directories, as necessary. CC ID 16315 | System hardening through configuration management | Preventive | |
Verify the /usr/lib/sendmail file is owned by an appropriate user or group. CC ID 05324 | System hardening through configuration management | Preventive | |
Remove unnecessary accounts. CC ID 16476 | System hardening through configuration management | Corrective | |
Employ multifactor authentication for accounts with administrative privilege. CC ID 12496 | System hardening through configuration management | Preventive | |
Invoke a strong encryption method before requesting an authenticator. CC ID 11986 | System hardening through configuration management | Preventive | |
Establish and verify the file permissions for the passwd files, the shadow files, and the group files. CC ID 01537 | System hardening through configuration management | Preventive | |
Verify iPrint/NDPS are not on the system volume (sys). CC ID 04468 | System hardening through configuration management | Preventive | |
Purge files immediately after deletion. CC ID 04469 | System hardening through configuration management | Preventive | |
Refrain from accepting routes from unauthorized parties. CC ID 16397 | System hardening through configuration management | Preventive | |
Configure wireless access to be restricted to authorized wireless networks. CC ID 12099 | System hardening through configuration management | Preventive | |
Keep current the time synchronization technology. CC ID 12548 | System hardening through configuration management | Preventive | |
Verify only BlackBerry Enterprise Server e-mail software and e-mail hardware is being used. CC ID 04601 | System hardening through configuration management | Preventive | |
Verify metamessage software is not installed on BlackBerry handheld devices. CC ID 04604 | System hardening through configuration management | Preventive | |
Configure the log to capture all URL requests. CC ID 12138 | System hardening through configuration management | Detective | |
Configure security and protection software to check for phishing attacks. CC ID 04569 | System hardening through configuration management | Detective | |
Include restricted data encryption and restricted information encryption in the security controls. CC ID 01083 | Systems design, build, and implementation | Preventive | |
Require successful authentication before granting access to system functionality via network interfaces. CC ID 14926 | Systems design, build, and implementation | Preventive | |
Control user account management through secure coding techniques in source code. CC ID 11909 | Systems design, build, and implementation | Preventive | |
Restrict direct access of databases to the database administrator through secure coding techniques in source code. CC ID 11933 [Management should implement effective controls for databases and restrict access appropriately. II.C.18 Database Security Management should implement effective controls for databases and restrict access appropriately. II.C.18 Database Security {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the yle="background-color:#F0BBBC;" class="term_primary-noun">sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts access and applies the rule of least privilege in assigning authorizations. App A Objective 6.29 {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts und-color:#F0BBBC;" class="term_primary-noun">access and applies the rule of least privilege in assigning authorizations. App A Objective 6.29] | Systems design, build, and implementation | Preventive | |
Protect test data in the development environment. CC ID 12014 [{test data} Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality of test plans and data. App A Objective 10.2.e] | Systems design, build, and implementation | Preventive | |
Integrate additional security controls for newly implemented systems into interconnected systems, as necessary. CC ID 06272 [{integrate} Determine whether management responsibilities are appropriate and include the following: Integration of security controls throughout the institution. App A Objective 2.5.i] | Systems design, build, and implementation | Preventive | |
Establish, implement, and maintain payment transaction security measures. CC ID 13088 [Review whether management does the following: Develops and maintains policies and procedures to securely offer and ensure the resilience of remote financial services (e.g., using appropriate authentication, layered security controls, and fraud detection monitoring). (For additional questions, refer to the "Mobile Financial Services" examination procedures.) App A Objective 6.25.a Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Acquisition or sale of facilities, technology, and services | Preventive | |
Include the cost effectiveness of security controls in system acquisition contracts. CC ID 11653 | Acquisition or sale of facilities, technology, and services | Detective | |
Approve the risk assessment report of operational risks as a part of the acquisition feasibility study. CC ID 11666 | Acquisition or sale of facilities, technology, and services | Preventive | |
Install software that originates from approved third parties. CC ID 12184 | Acquisition or sale of facilities, technology, and services | Preventive | |
Protect electronic messaging information. CC ID 12022 | Privacy protection for information and data | Preventive | |
Render unrecoverable sensitive authentication data after authorization is approved. CC ID 11952 | Privacy protection for information and data | Preventive | |
Encrypt, truncate, or tokenize data fields, as necessary. CC ID 06850 | Privacy protection for information and data | Preventive | |
Implement security measures to protect personal data. CC ID 13606 | Privacy protection for information and data | Preventive |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Supply each in scope asset with audit reduction tool and report generation capabilities to support after-the-fact investigations without altering the event logs. CC ID 01427 | Monitoring and measurement | Preventive | |
Assess customer satisfaction. CC ID 00652 | Monitoring and measurement | Detective | |
Establish, implement, and maintain a self-assessment approach as part of the compliance testing strategy. CC ID 12833 [Periodic self-assessments performed by the organizational unit being assessed. App A Objective 10.3.a] | Monitoring and measurement | Preventive | |
Test compliance controls for proper functionality. CC ID 00660 | Monitoring and measurement | Detective | |
Establish, implement, and maintain a system security plan. CC ID 01922 | Monitoring and measurement | Preventive | |
Adhere to the system security plan. CC ID 11640 | Monitoring and measurement | Detective | |
Validate all testing assumptions in the test plans. CC ID 00663 | Monitoring and measurement | Detective | |
Require testing procedures to be complete. CC ID 00664 | Monitoring and measurement | Detective | |
Determine the appropriate assessment method for each testing process in the test plan. CC ID 00665 | Monitoring and measurement | Preventive | |
Analyze system audit reports and determine the need to perform more tests. CC ID 00666 | Monitoring and measurement | Detective | |
Test in scope systems for segregation of duties, as necessary. CC ID 13906 | Monitoring and measurement | Detective | |
Include test requirements for the use of human subjects in the testing program. CC ID 16222 | Monitoring and measurement | Preventive | |
Test the in scope system in accordance with its intended purpose. CC ID 14961 | Monitoring and measurement | Preventive | |
Perform network testing in accordance with organizational standards. CC ID 16448 | Monitoring and measurement | Preventive | |
Test user accounts in accordance with organizational standards. CC ID 16421 | Monitoring and measurement | Preventive | |
Scan organizational networks for rogue devices. CC ID 00536 | Monitoring and measurement | Detective | |
Scan the network for wireless access points. CC ID 00370 | Monitoring and measurement | Detective | |
Test the wireless device scanner's ability to detect rogue devices. CC ID 06859 | Monitoring and measurement | Detective | |
Opt out of third party conformity assessments when the system meets harmonized standards. CC ID 15096 | Monitoring and measurement | Preventive | |
Perform conformity assessments, as necessary. CC ID 15095 | Monitoring and measurement | Detective | |
Establish, implement, and maintain a penetration testing methodology that validates scope-reduction controls through network segmentation. CC ID 11958 | Monitoring and measurement | Preventive | |
Use dedicated user accounts when conducting penetration testing. CC ID 13728 | Monitoring and measurement | Detective | |
Remove dedicated user accounts after penetration testing is concluded. CC ID 13729 | Monitoring and measurement | Corrective | |
Perform penetration tests, as necessary. CC ID 00655 | Monitoring and measurement | Detective | |
Include coverage of all in scope systems during penetration testing. CC ID 11957 | Monitoring and measurement | Detective | |
Test the system for broken access controls. CC ID 01319 | Monitoring and measurement | Detective | |
Test the system for broken authentication and session management. CC ID 01320 | Monitoring and measurement | Detective | |
Test the system for insecure communications. CC ID 00535 | Monitoring and measurement | Detective | |
Test the system for cross-site scripting attacks. CC ID 01321 | Monitoring and measurement | Detective | |
Test the system for buffer overflows. CC ID 01322 | Monitoring and measurement | Detective | |
Test the system for injection flaws. CC ID 01323 | Monitoring and measurement | Detective | |
Test the system for Denial of Service. CC ID 01326 | Monitoring and measurement | Detective | |
Test the system for insecure configuration management. CC ID 01327 | Monitoring and measurement | Detective | |
Perform network-layer penetration testing on all systems, as necessary. CC ID 01277 | Monitoring and measurement | Detective | |
Test the system for cross-site request forgery. CC ID 06296 | Monitoring and measurement | Detective | |
Repeat penetration testing, as necessary. CC ID 06860 | Monitoring and measurement | Detective | |
Test the system for covert channels. CC ID 10652 | Monitoring and measurement | Detective | |
Test systems to determine which covert channels might be exploited. CC ID 10654 | Monitoring and measurement | Detective | |
Repeat vulnerability scanning, as necessary. CC ID 11646 [With respect to developed software, determine whether institution management does the following: Obtains attestation or evidence from third-party developers that the applications acquired by the institution meet the necessary security requirements and that noted vulnerabilities or flaws are remediated in a timely manner. App A Objective 6.28.b] | Monitoring and measurement | Detective | |
Perform internal vulnerability scans, as necessary. CC ID 00656 | Monitoring and measurement | Detective | |
Meet the requirements for a passing score during an external vulnerability scan or rescan. CC ID 12039 | Monitoring and measurement | Preventive | |
Test the system for unvalidated input. CC ID 01318 | Monitoring and measurement | Detective | |
Test the system for proper error handling. CC ID 01324 | Monitoring and measurement | Detective | |
Test the system for insecure data storage. CC ID 01325 | Monitoring and measurement | Detective | |
Test the system for access control enforcement in all Uniform Resource Locators. CC ID 06297 | Monitoring and measurement | Detective | |
Perform self-tests on cryptographic modules within the system. CC ID 06537 | Monitoring and measurement | Detective | |
Perform power-up tests on cryptographic modules within the system. CC ID 06538 | Monitoring and measurement | Detective | |
Perform conditional tests on cryptographic modules within the system. CC ID 06539 | Monitoring and measurement | Detective | |
Review the risk assessments as compared to the in scope controls. CC ID 06978 [{compare} Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Allow comparisons among different threats, events, and potential mitigating controls. App A Objective 5.1.e] | Audits and risk management | Detective | |
Conduct onsite inspections, as necessary. CC ID 16199 | Audits and risk management | Preventive | |
Determine the accurateness of the audit assertion's in scope system description. CC ID 06979 | Audits and risk management | Detective | |
Determine if the in scope system has been implemented as described in the audit assertion. CC ID 06983 | Audits and risk management | Detective | |
Determine if the audit assertion's in scope controls are reasonable. CC ID 06980 | Audits and risk management | Detective | |
Document test plans for auditing in scope controls. CC ID 06985 [{test scope} Determine whether management considers the following key testing factors when developing and implementing independent tests: Scope. App A Objective 10.2.a] | Audits and risk management | Detective | |
Determine the implementation status of the audit assertion's in scope controls. CC ID 06981 | Audits and risk management | Detective | |
Determine the effectiveness of in scope controls. CC ID 06984 [Review whether management does the following: Verifies that compensating controls are used appropriately to compensate for weaknesses with the system or process. App A Objective 6.4.c] | Audits and risk management | Detective | |
Determine any errors or material omissions in the audit assertion that affect in scope control implementations. CC ID 06990 | Audits and risk management | Detective | |
Audit the in scope system according to the test plan using relevant evidence. CC ID 07112 | Audits and risk management | Preventive | |
Provide transactional walkthrough procedures for external auditors. CC ID 00672 | Audits and risk management | Preventive | |
Conduct interviews, as necessary. CC ID 07188 | Audits and risk management | Detective | |
Include if in scope control deviations allow in scope controls to be performed acceptably in the work papers. CC ID 06987 | Audits and risk management | Detective | |
Investigate the nature and causes of identified in scope control deviations. CC ID 06986 | Audits and risk management | Detective | |
Submit an audit report that is complete. CC ID 01145 | Audits and risk management | Detective | |
Assess the quality of the audit program in regards to the staff and their qualifications. CC ID 01150 | Audits and risk management | Detective | |
Establish, implement, and maintain the audit plan. CC ID 01156 | Audits and risk management | Detective | |
Perform risk assessments for all target environments, as necessary. CC ID 06452 [{application control} With respect to developed software, determine whether institution management does the following: Performs ongoing risk assessments to consider the adequacy of application-level controls in light of changing threat, network, and host environments. App A Objective 6.28.c Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Audits and risk management | Preventive | |
Determine the effectiveness of risk control measures. CC ID 06601 | Audits and risk management | Detective | |
Perform a risk assessment prior to activating third party access to the organization's critical systems. CC ID 06455 | Technical security | Detective | |
Employ unique identifiers. CC ID 01273 | Technical security | Detective | |
Authenticate user identities before unlocking an account. CC ID 11837 | Technical security | Detective | |
Authenticate user identities before manually resetting an authenticator. CC ID 04567 | Technical security | Detective | |
Identify the user when enrolling them in the biometric system. CC ID 06882 | Technical security | Detective | |
Register all Domain Names associated with the organization to the organization and not an individual. CC ID 07210 | Technical security | Detective | |
Configure firewalls to perform dynamic packet filtering. CC ID 01288 | Technical security | Detective | |
Require the system to identify and authenticate approved devices before establishing a connection. CC ID 01429 [{time of day access} Review whether management does the following: Sets time-of-day or terminal limitations for some applications or for more sensitive functions within an application. App A Objective 6.22.e] | Technical security | Preventive | |
Scan the system to verify modems are disabled or removed, except the modems that are explicitly approved. CC ID 00560 | Technical security | Detective | |
Test cryptographic key management applications, as necessary. CC ID 04829 | Technical security | Detective | |
Implement non-repudiation for transactions. CC ID 00567 | Technical security | Detective | |
Test all removable storage media for viruses and malicious code. CC ID 11861 | Technical security | Detective | |
Test all untrusted files or unverified files for viruses and malicious code. CC ID 01311 | Technical security | Detective | |
Conduct application security reviews, as necessary. CC ID 06298 [With respect to developed software, determine whether institution management does the following: Reviews mitigation of potential flaws in applications. App A Objective 6.28.a Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Technical security | Detective | |
Authorize visitors before granting entry to physical areas containing restricted data or restricted information. CC ID 01330 | Physical and environmental protection | Preventive | |
Implement operational requirements for card readers. CC ID 02225 | Physical and environmental protection | Preventive | |
Test locks for physical security vulnerabilities. CC ID 04880 | Physical and environmental protection | Detective | |
Establish, implement, and maintain the organization's call tree. CC ID 01167 | Operational and Systems Continuity | Detective | |
Test the recovery plan, as necessary. CC ID 13290 | Operational and Systems Continuity | Detective | |
Test the backup information, as necessary. CC ID 13303 | Operational and Systems Continuity | Detective | |
Establish, implement, and maintain a business continuity plan testing program. CC ID 14829 | Operational and Systems Continuity | Preventive | |
Test the continuity plan, as necessary. CC ID 00755 | Operational and Systems Continuity | Detective | |
Include the coordination and interfaces among third parties in the coverage of the scope of testing the continuity plan. CC ID 12769 [{incident response plan} Review whether management does the following: Develops and tests a response plan in conjunction with the institution's ISPs and third-party service providers to mitigate the interruption of mobile or remote financial services. App A Objective 6.25.c Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Operational and Systems Continuity | Preventive | |
Employ individuals who have the appropriate staff qualifications, staff clearances, and staff competencies. CC ID 00782 [{staff qualifications} Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Personnel with knowledge of technology standards, practices, and risk methodologies. App A Objective 2.9.b Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Appropriate staff with the necessary skills to meet the institution's technical and managerial needs. App A Objective 2.9.a] | Human Resources management | Detective | |
Perform a drug test during personnel screening. CC ID 06648 | Human Resources management | Preventive | |
Assign and staff all roles appropriately. CC ID 00784 [Determine whether management has designated one or more individuals as an information security officer and determine appropriateness of the reporting line. App A Objective 2.6] | Human Resources management | Detective | |
Implement segregation of duties in roles and responsibilities. CC ID 00774 [{establish} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate segregation of duties. App A Objective 2.5.g Review whether management does the following: Employs appropriate segregation of duties. App A Objective 6.8.d {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Detective | |
Conduct tests and evaluate training. CC ID 06672 [Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b] | Human Resources management | Detective | |
Test systems for malicious code prior to when the system will be redeployed. CC ID 06339 | Operational management | Detective | |
Open a priority incident request after a security breach is detected. CC ID 04838 | Operational management | Corrective | |
Activate the incident response notification procedures after a security breach is detected. CC ID 04839 | Operational management | Corrective | |
Establish trust between the incident response team and the end user community during an incident. CC ID 01217 | Operational management | Detective | |
Test the operation of the digital forensic equipment prior to use. CC ID 08694 | Operational management | Detective | |
Test the incident response procedures. CC ID 01216 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {incident response plan} Review whether management does the following: Develops and tests a response plan in conjunction with the institution's ISPs and third-party service providers to mitigate the interruption of mobile or remote financial services. App A Objective 6.25.c Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Operational management | Detective | |
Test proposed changes prior to their approval. CC ID 00548 | Operational management | Detective | |
Perform risk assessments prior to approving change requests. CC ID 00888 | Operational management | Preventive | |
Perform a patch test prior to deploying a patch. CC ID 00898 [Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d Review whether patch management processes include the following: A process to evaluate the patches against the threat and network environment. App A Objective 6.15.b Review whether patch management processes include the following: A process to evaluate the patches against the threat and network environment. App A Objective 6.15.b] | Operational management | Detective | |
Test software patches for any potential compromise of the system's security. CC ID 13175 [Review whether patch management processes include the following: Actions to ensure that patches do not compromise the security of the institution's systems. App A Objective 6.15.h] | Operational management | Detective | |
Review changes to computer firmware. CC ID 12226 | Operational management | Detective | |
Certify changes to computer firmware are free of malicious logic. CC ID 12227 | Operational management | Detective | |
Test the system's operational functionality after implementing approved changes. CC ID 06294 | Operational management | Detective | |
Perform and pass acceptance testing before moving a system back into operation after an approved change has occurred. CC ID 04541 | Operational management | Detective | |
Test network access controls for proper Configuration Management settings. CC ID 01281 | System hardening through configuration management | Detective | |
Verify Automated Security Enhancement Tool checks the NIS+ tables, as appropriate. CC ID 04908 | System hardening through configuration management | Preventive | |
Verify wireless peripherals meet organizational security requirements. CC ID 00657 | System hardening through configuration management | Detective | |
Verify only necessary system files are located on the server's system volume (sys) or boot volume. CC ID 04472 | System hardening through configuration management | Preventive | |
Use Wireless Local Area Network Network Interface Cards that turn off or disable Peer-To-Peer Wireless Local Area Network communications. CC ID 04594 | System hardening through configuration management | Detective | |
Verify wired network interface cards and Wireless Network Interface Cards are not simultaneously active for network devices other than a Wireless Access Point. CC ID 04596 | System hardening through configuration management | Detective | |
Configure security and protection software to check for up-to-date signature files. CC ID 00576 | System hardening through configuration management | Detective | |
Configure security and protection software to check e-mail messages. CC ID 00578 | System hardening through configuration management | Preventive | |
Perform vulnerability testing before final installation. CC ID 00884 | System hardening through configuration management | Detective | |
Destroy electronic storage media following the storage media disposition and destruction procedures. CC ID 00970 | Records management | Detective | |
Maintain media sanitization equipment in operational condition. CC ID 00721 | Records management | Detective | |
Conduct a post implementation review when the system design project ends. CC ID 01003 [Review whether management implements the following as appropriate: Reliability of the items purchased is regularly reviewed post-implementation. App A Objective 6.19.e] | Systems design, build, and implementation | Detective | |
Audit all modifications to the application being developed. CC ID 01614 | Systems design, build, and implementation | Detective | |
Perform Quality Management on all newly developed or modified systems. CC ID 01100 | Systems design, build, and implementation | Detective | |
Restrict production data from being used in the test environment. CC ID 01103 | Systems design, build, and implementation | Detective | |
Test all software changes before promoting the system to a production environment. CC ID 01106 | Systems design, build, and implementation | Detective | |
Test security functionality during the development process. CC ID 12015 | Systems design, build, and implementation | Preventive | |
Review and test custom code to identify potential coding vulnerabilities. CC ID 01316 | Systems design, build, and implementation | Detective | |
Review and test source code. CC ID 01086 | Systems design, build, and implementation | Detective | |
Correct code anomalies and code deficiencies in custom code and retest before release. CC ID 06292 | Systems design, build, and implementation | Corrective | |
Approve all custom code test results before code is released. CC ID 06293 | Systems design, build, and implementation | Detective | |
Perform Quality Management on all newly developed or modified software. CC ID 11798 [{conduct} Review whether management implements the following as appropriate: Software is reviewed through both automated software testing and code reviews. App A Objective 6.19.d] | Systems design, build, and implementation | Detective | |
Perform a final system test prior to implementing a new system. CC ID 01108 | Systems design, build, and implementation | Detective | |
Conduct a final security audit prior to implementing a new system. CC ID 06833 | Systems design, build, and implementation | Detective | |
Provide a Configuration Management plan by the Information System developer for all newly acquired assets. CC ID 01446 | Acquisition or sale of facilities, technology, and services | Detective | |
Require the Information System developer to create a Security Testing and Evaluation plan, implement the test, and provide the test results for all newly acquired assets. CC ID 01447 | Acquisition or sale of facilities, technology, and services | Detective | |
Conduct a risk assessment to determine operational risks as a part of the acquisition feasibility study. CC ID 01135 | Acquisition or sale of facilities, technology, and services | Detective | |
Establish test environments separate from the production environment to support integration testing before product acquisition. CC ID 11668 | Acquisition or sale of facilities, technology, and services | Detective | |
Store source code documentation in escrow by an independent third party. CC ID 01139 | Acquisition or sale of facilities, technology, and services | Detective | |
Test new hardware or upgraded hardware and software against predefined performance requirements. CC ID 06740 | Acquisition or sale of facilities, technology, and services | Detective | |
Test new hardware or upgraded hardware and software for error recovery and restart procedures. CC ID 06741 | Acquisition or sale of facilities, technology, and services | Detective | |
Follow the system's operating procedures when testing new hardware or upgraded hardware and software. CC ID 06742 | Acquisition or sale of facilities, technology, and services | Detective | |
Test new hardware or upgraded hardware and software for implementation of security controls. CC ID 06743 | Acquisition or sale of facilities, technology, and services | Detective | |
Test new software or upgraded software for security vulnerabilities. CC ID 01898 | Acquisition or sale of facilities, technology, and services | Detective | |
Test new software or upgraded software for compatibility with the current system. CC ID 11654 | Acquisition or sale of facilities, technology, and services | Detective | |
Test new hardware or upgraded hardware for compatibility with the current system. CC ID 11655 | Acquisition or sale of facilities, technology, and services | Detective | |
Test new hardware or upgraded hardware for security vulnerabilities. CC ID 01899 | Acquisition or sale of facilities, technology, and services | Detective | |
Test new hardware or upgraded hardware and software for implementation of predefined continuity arrangements. CC ID 06744 | Acquisition or sale of facilities, technology, and services | Detective | |
Refrain from storing data elements containing payment card full magnetic stripe data. CC ID 04757 | Privacy protection for information and data | Detective | |
Implement physical controls to protect personal data. CC ID 00355 | Privacy protection for information and data | Preventive | |
Conduct personal data risk assessments. CC ID 00357 | Privacy protection for information and data | Detective | |
Include third party acknowledgment of their data protection responsibilities in third party contracts. CC ID 01364 | Third Party and supply chain oversight | Detective | |
Establish the third party's service continuity. CC ID 00797 [Review whether management does the following: Plans and coordinates with ISPs and third parties to minimize exposure to incidents and continue services when faced with an incident (e.g., monitors threat alerts, service availability, applications, and network traffic for indicators of nefarious activity, and ensures traffic filtering). App A Objective 6.25.b] | Third Party and supply chain oversight | Detective | |
Determine the adequacy of a third party's alternate site preparations. CC ID 06879 | Third Party and supply chain oversight | Detective | |
Perform risk assessments of third parties, as necessary. CC ID 06454 | Third Party and supply chain oversight | Detective | |
Include a provision in outsourcing contracts that requires supply chain members' security requirements comply with organizational security requirements. CC ID 00359 [Review the institution's policies, standards, and procedures related to the use of the following: Third-party service providers that facilitate operational activities (e.g., core processing, mobile financial services, cloud storage and computing, and managed security services). App A Objective 6.31.a {outsourced process} If the institution outsources activities to a third-party service provider, determine whether management integrates those activities with the information security program. Verify that the third-party management program evidences expectations that align with the institution's information security program. App A Objective 3.3 {third party security} Determine whether the institution's security operations activities include the following: Third-party integration (e.g., managed security services and incident detection services). App A Objective 8.1.g Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Third Party and supply chain oversight | Detective |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | CLASS | |
---|---|---|---|
Submit applications for professional certification. CC ID 16192 | Human Resources management | Preventive | |
Train personnel to recognize conditions of diseases or sicknesses, as necessary. CC ID 14383 | Human Resources management | Detective | |
Include prevention techniques in training regarding diseases or sicknesses. CC ID 14387 | Human Resources management | Preventive | |
Include the concept of disease clusters when training to recognize conditions of diseases or sicknesses. CC ID 14386 | Human Resources management | Preventive | |
Train personnel to identify and communicate symptoms of exposure to disease or sickness. CC ID 14385 | Human Resources management | Detective | |
Develop or acquire content to update the training plans. CC ID 12867 | Human Resources management | Preventive | |
Designate training facilities in the training plan. CC ID 16200 | Human Resources management | Preventive | |
Include in scope external requirements in the training plan, as necessary. CC ID 13041 [{security awareness training} {compliance training} Review whether management does the following: Provides training to support awareness and policy compliance. App A Objective 6.8.f {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Preventive | |
Conduct bespoke roles and responsibilities training, as necessary. CC ID 13192 | Human Resources management | Preventive | |
Include risk management in the training plan, as necessary. CC ID 13040 | Human Resources management | Preventive | |
Conduct personal data processing training. CC ID 13757 | Human Resources management | Preventive | |
Include in personal data processing training how to provide the contact information for the categories of personal data the organization may disclose. CC ID 13758 | Human Resources management | Preventive | |
Include the cloud service usage standard in the training plan. CC ID 13039 | Human Resources management | Preventive | |
Include media protection in the security awareness program. CC ID 16368 | Human Resources management | Preventive | |
Include physical security in the security awareness program. CC ID 16369 | Human Resources management | Preventive | |
Include updates on emerging issues in the security awareness program. CC ID 13184 | Human Resources management | Preventive | |
Include cybersecurity in the security awareness program. CC ID 13183 | Human Resources management | Preventive | |
Include implications of non-compliance in the security awareness program. CC ID 16425 | Human Resources management | Preventive | |
Include the acceptable use policy in the security awareness program. CC ID 15487 | Human Resources management | Preventive | |
Train all personnel and third parties on how to recognize and report system failures. CC ID 13475 | Human Resources management | Preventive | |
Conduct tampering prevention training. CC ID 11875 | Human Resources management | Preventive | |
Include the mandate to refrain from installing, refrain from replacing, and refrain from returning any asset absent verification in the tampering prevention training. CC ID 11877 | Human Resources management | Preventive | |
Include how to identify and authenticate third parties claiming to be maintenance personnel in the tampering prevention training. CC ID 11876 | Human Resources management | Preventive | |
Include how to report tampering and unauthorized substitution in the tampering prevention training. CC ID 11879 | Human Resources management | Preventive | |
Include how to prevent physical tampering in the tampering prevention training. CC ID 11878 | Human Resources management | Preventive | |
Include procedures on how to inspect devices in the tampering prevention training. CC ID 11990 | Human Resources management | Preventive | |
Train interested personnel and affected parties to collect digital forensic evidence. CC ID 08658 | Human Resources management | Preventive | |
Conduct incident response training. CC ID 11889 [{assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g] | Operational management | Preventive |
There are three types of Common Control classifications; corrective, detective, and preventive. Common Controls at the top level have the default assignment of Impact Zone.
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | TYPE | |
---|---|---|---|
Disseminate and communicate updated guidance documentation to interested personnel and affected parties upon discovery of a new threat. CC ID 12191 | Leadership and high level objectives | Communicate | |
Include management's assertions on the effectiveness of internal control in the Statement on Internal Control. CC ID 14771 | Leadership and high level objectives | Establish/Maintain Documentation | |
Provide predefined suspicious activity reports for suspicious activity discovered in the event log. CC ID 06774 | Monitoring and measurement | Establish/Maintain Documentation | |
Eliminate false positives in event logs and audit logs. CC ID 07047 | Monitoring and measurement | Log Management | |
Follow up exceptions and anomalies identified when reviewing logs. CC ID 11925 | Monitoring and measurement | Investigate | |
Erase payment applications when suspicious activity is confirmed. CC ID 12193 | Monitoring and measurement | Technical Security | |
Report a data loss event when non-truncated payment card numbers are outputted. CC ID 04741 | Monitoring and measurement | Establish/Maintain Documentation | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has control of electronic information. CC ID 04727 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has control of printed records. CC ID 04728 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Report a data loss event after a security incident is detected and there are indications that the unauthorized person has accessed information in either paper or electronic form. CC ID 04740 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Report a data loss event after a security incident is detected and there are indications that the information has been or will likely be used in an unauthorized manner. CC ID 04729 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Report a data loss event after a security incident is detected and there are indications that the information has been or will likely be used in an unauthorized manner that could cause substantial economic impact. CC ID 04742 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Update or adjust fraud detection systems, as necessary. CC ID 13684 | Monitoring and measurement | Process or Activity | |
Implement incident response procedures when rogue devices are discovered. CC ID 11880 | Monitoring and measurement | Technical Security | |
Alert appropriate personnel when rogue devices are discovered on the network. CC ID 06428 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Isolate rogue devices after a rogue device has been detected. CC ID 07061 | Monitoring and measurement | Configuration | |
Remove dedicated user accounts after penetration testing is concluded. CC ID 13729 | Monitoring and measurement | Testing | |
Reduce the maximum bandwidth of covert channels. CC ID 10655 | Monitoring and measurement | Technical Security | |
Update the vulnerability scanners' vulnerability list. CC ID 10634 | Monitoring and measurement | Configuration | |
Notify the interested personnel and affected parties after the failure of an automated security test. CC ID 06748 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Notifications. App A Objective 10.2.c] | Monitoring and measurement | Behavior | |
Perform vulnerability assessments, as necessary. CC ID 11828 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a] | Monitoring and measurement | Technical Security | |
Recommend mitigation techniques based on vulnerability scan reports. CC ID 11639 | Monitoring and measurement | Technical Security | |
Disallow the use of payment applications when a vulnerability scan report indicates vulnerabilities are present. CC ID 12188 | Monitoring and measurement | Configuration | |
Recommend mitigation techniques based on penetration test results. CC ID 04881 | Monitoring and measurement | Establish/Maintain Documentation | |
Correct or mitigate vulnerabilities. CC ID 12497 | Monitoring and measurement | Technical Security | |
Establish, implement, and maintain an exception management process for vulnerabilities that cannot be remediated. CC ID 13859 | Monitoring and measurement | Technical Security | |
Determine the causes of compliance violations. CC ID 12401 | Monitoring and measurement | Investigate | |
Correct compliance violations. CC ID 13515 | Monitoring and measurement | Process or Activity | |
Carry out disciplinary actions when a compliance violation is detected. CC ID 06675 | Monitoring and measurement | Behavior | |
Refrain from changing the date of the practitioner's report on agreed-upon procedures when reissuing it. CC ID 13896 | Audits and risk management | Establish/Maintain Documentation | |
Withdraw from the audit, when defined conditions exist. CC ID 13885 | Audits and risk management | Process or Activity | |
Solve any access problems auditors encounter during the audit. CC ID 08959 | Audits and risk management | Audits and Risk Management | |
Include deficiencies and non-compliance in the audit report. CC ID 14879 | Audits and risk management | Establish/Maintain Documentation | |
Include a description of the reasons for modifying the audit opinion in the audit report. CC ID 13898 | Audits and risk management | Establish/Maintain Documentation | |
Disclaim the audit opinion in the audit report, as necessary. CC ID 13901 | Audits and risk management | Business Processes | |
Modify the audit opinion in the audit report under defined conditions. CC ID 13937 | Audits and risk management | Establish/Maintain Documentation | |
Implement a corrective action plan in response to the audit report. CC ID 06777 | Audits and risk management | Establish/Maintain Documentation | |
Monitor and report on the status of mitigation actions in the corrective action plan. CC ID 15250 | Audits and risk management | Actionable Reports or Measurements | |
Purchase insurance on behalf of interested personnel and affected parties. CC ID 16571 | Audits and risk management | Acquisition/Sale of Assets or Services | |
Revise the risk treatment strategies in the risk treatment plan, as necessary. CC ID 12552 | Audits and risk management | Establish/Maintain Documentation | |
Document and communicate a corrective action plan based on the risk assessment findings. CC ID 00705 [Discuss corrective action and communicate findings. App A Objective 11 Discuss corrective action and communicate findings. App A Objective 11 Discuss findings with management and obtain proposed corrective action for significant deficiencies. App A Objective 11.2] | Audits and risk management | Establish/Maintain Documentation | |
Document residual risk in a residual risk report. CC ID 13664 | Audits and risk management | Establish/Maintain Documentation | |
Address and remediate external requirements for customer access. CC ID 12737 | Technical security | Technical Security | |
Notify the user when an authentication is attempted using an expired authenticator. CC ID 13818 | Technical security | Communicate | |
Revoke asset access when a personnel status change occurs or an individual is terminated. CC ID 00516 | Technical security | Behavior | |
Review and update accounts and access rights when notified of personnel status changes. CC ID 00788 | Technical security | Behavior | |
Remove inactive user accounts, as necessary. CC ID 00517 | Technical security | Technical Security | |
Remove temporary user accounts, as necessary. CC ID 11839 | Technical security | Technical Security | |
Implement out-of-band authentication, as necessary. CC ID 10606 | Technical security | Technical Security | |
Disseminate and communicate the access control procedures to all interested personnel and affected parties. CC ID 14123 | Technical security | Communicate | |
Tune the biometric identification equipment, as necessary. CC ID 07077 | Technical security | Configuration | |
Include reviewing the rulesets for firewalls and routers in the firewall and router configuration standard, as necessary. CC ID 11903 | Technical security | Technical Security | |
Take appropriate action to address information flow anomalies. CC ID 12164 | Technical security | Investigate | |
Quarantine data that fails security tests. CC ID 16500 | Technical security | Data and Information Management | |
Revoke membership in the whitelist, as necessary. CC ID 13827 | Technical security | Establish/Maintain Documentation | |
Revoke old cryptographic keys or invalid cryptographic keys immediately. CC ID 01307 | Technical security | Data and Information Management | |
Replace known or suspected compromised cryptographic keys immediately. CC ID 01306 | Technical security | Data and Information Management | |
Remove malware when malicious code is discovered. CC ID 13691 | Technical security | Process or Activity | |
Notify interested personnel and affected parties when malware is detected. CC ID 13689 | Technical security | Communicate | |
Establish, implement, and maintain a malicious code outbreak recovery plan. CC ID 01310 | Technical security | Establish/Maintain Documentation | |
Incorporate the malicious code analysis into the patch management program. CC ID 10673 | Technical security | Technical Security | |
Correct all found deficiencies according to organizational standards after a web application policy compliance review. CC ID 06299 | Technical security | Technical Security | |
Re-evaluate the web application after deficiencies have been corrected. CC ID 06300 | Technical security | Technical Security | |
Report damaged property to interested personnel and affected parties. CC ID 13702 | Physical and environmental protection | Communicate | |
Change access requirements to organizational assets for personnel and visitors, as necessary. CC ID 12463 | Physical and environmental protection | Physical and Environmental Protection | |
Document all lost badges in a lost badge list. CC ID 12448 | Physical and environmental protection | Establish/Maintain Documentation | |
Remote lock any distributed assets reported lost or stolen. CC ID 14008 | Physical and environmental protection | Technical Security | |
Remote wipe any distributed asset reported lost or stolen. CC ID 12197 | Physical and environmental protection | Process or Activity | |
Unpair missing Bluetooth devices. CC ID 12428 | Physical and environmental protection | Physical and Environmental Protection | |
Remove dormant systems from the network, as necessary. CC ID 13727 | Physical and environmental protection | Process or Activity | |
Log an incident if unauthorized restricted data or unauthorized restricted information is discovered on a mobile device. CC ID 08708 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Activate the continuity plan if the damage assessment report indicates the activation criterion has been met. CC ID 01373 | Operational and Systems Continuity | Systems Continuity | |
Report changes in the continuity plan to senior management. CC ID 12757 | Operational and Systems Continuity | Communicate | |
Restore systems and environments to be operational. CC ID 13476 | Operational and Systems Continuity | Systems Continuity | |
Establish, implement, and maintain the continuity procedures. CC ID 14236 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Use out-of-band channels for the physical delivery or electronic transmission of information, as necessary. CC ID 10665 | Operational and Systems Continuity | Systems Continuity | |
Rotate members of the board of directors, as necessary. CC ID 14803 | Human Resources management | Human Resources Management | |
Conduct secure coding and development training for developers. CC ID 06822 | Human Resources management | Behavior | |
Measure policy compliance when reviewing the internal control framework. CC ID 06442 [Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Operational management | Actionable Reports or Measurements | |
Update operating procedures that contribute to user errors. CC ID 06935 | Operational management | Establish/Maintain Documentation | |
Include disciplinary actions in the Acceptable Use Policy. CC ID 00296 | Operational management | Establish/Maintain Documentation | |
Identify discrepancies between the asset register database and the Information Technology inventory, as necessary. CC ID 07052 | Operational management | Monitor and Evaluate Occurrences | |
Investigate and resolve discrepancies between the asset register database and the Information Technology inventory. CC ID 07053 | Operational management | Monitor and Evaluate Occurrences | |
Determine the incident severity level when assessing the security incidents. CC ID 01650 [Determine whether management has effective incident identification and assessment processes to do the following: Classify the event. App A Objective 8.5.c {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Operational management | Monitor and Evaluate Occurrences | |
Contain the incident to prevent further loss. CC ID 01751 [Determine whether management has effective incident response processes, including the following: Containment strategies. App A Objective 8.6.h {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b {preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Operational management | Process or Activity | |
Wipe data and memory after an incident has been detected. CC ID 16850 | Operational management | Technical Security | |
Refrain from accessing compromised systems. CC ID 01752 | Operational management | Technical Security | |
Isolate compromised systems from the network. CC ID 01753 | Operational management | Technical Security | |
Store system logs for in scope systems as digital forensic evidence after a security incident has been detected. CC ID 01754 | Operational management | Log Management | |
Change authenticators after a security incident has been detected. CC ID 06789 | Operational management | Technical Security | |
Notify interested personnel and affected parties of the privacy breach that affects their personal data. CC ID 00365 [{preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Operational management | Behavior | |
Delay sending incident response notifications under predetermined conditions. CC ID 00804 | Operational management | Behavior | |
Establish, implement, and maintain incident response notifications. CC ID 12975 | Operational management | Establish/Maintain Documentation | |
Provide enrollment information for identity theft prevention services or identity theft mitigation services. CC ID 13767 | Operational management | Communicate | |
Offer identity theft prevention services or identity theft mitigation services at no cost to the affected parties. CC ID 13766 | Operational management | Business Processes | |
Send paper incident response notifications to affected parties, as necessary. CC ID 00366 | Operational management | Behavior | |
Determine if a substitute incident response notification is permitted if notifying affected parties. CC ID 00803 | Operational management | Behavior | |
Use a substitute incident response notification to notify interested personnel and affected parties of the privacy breach that affects their personal data. CC ID 00368 | Operational management | Behavior | |
Telephone incident response notifications to affected parties, as necessary. CC ID 04650 | Operational management | Behavior | |
Publish the incident response notification in a general circulation periodical. CC ID 04651 | Operational management | Behavior | |
Send electronic incident response notifications to affected parties, as necessary. CC ID 00367 | Operational management | Behavior | |
Notify interested personnel and affected parties of the privacy breach about any recovered restricted data. CC ID 13347 | Operational management | Communicate | |
Include incident recovery procedures in the Incident Management program. CC ID 01758 [{preservation of evidence} Determine whether management has effective incident response processes, including the following: Procedures to minimize damage through the containment of the incident, restoration of systems, preservation of data and evidence, and notification, as appropriate, to customers and others as needed. App A Objective 8.6.b] | Operational management | Establish/Maintain Documentation | |
Change wireless access variables after a data loss event has been detected. CC ID 01756 | Operational management | Technical Security | |
Eradicate the cause of the incident after the incident has been contained. CC ID 01757 | Operational management | Business Processes | |
Implement security controls for personnel that have accessed information absent authorization. CC ID 10611 | Operational management | Human Resources Management | |
Re-image compromised systems with secure builds. CC ID 12086 | Operational management | Technical Security | |
Establish, implement, and maintain temporary and emergency access authorization procedures. CC ID 00858 | Operational management | Establish/Maintain Documentation | |
Include the organizational functions affected by disruption in the Incident Management audit log. CC ID 12238 | Operational management | Log Management | |
Open a priority incident request after a security breach is detected. CC ID 04838 | Operational management | Testing | |
Activate the incident response notification procedures after a security breach is detected. CC ID 04839 | Operational management | Testing | |
Notify interested personnel and affected parties that a security breach was detected. CC ID 11788 | Operational management | Communicate | |
Respond when an integrity violation is detected, as necessary. CC ID 10678 | Operational management | Technical Security | |
Shut down systems when an integrity violation is detected, as necessary. CC ID 10679 | Operational management | Technical Security | |
Restart systems when an integrity violation is detected, as necessary. CC ID 10680 | Operational management | Technical Security | |
Conduct forensic investigations in the event of a security compromise. CC ID 11951 | Operational management | Investigate | |
Collect evidence from the incident scene. CC ID 02236 | Operational management | Business Processes | |
Approve back-out plans, as necessary. CC ID 13627 | Operational management | Establish/Maintain Documentation | |
Deploy software patches in accordance with organizational standards. CC ID 07032 | Operational management | Configuration | |
Patch software. CC ID 11825 | Operational management | Technical Security | |
Patch the operating system, as necessary. CC ID 11824 | Operational management | Technical Security | |
Deploy software patches in the disaster recovery environment to mirror those in the production environment. CC ID 13174 [Review whether patch management processes include the following: A process to ensure that all patches installed in the production environment are also installed in the disaster recovery environment. App A Objective 6.15.f] | Operational management | Configuration | |
Remove outdated software after software has been updated. CC ID 11792 | Operational management | Configuration | |
Update computer firmware, as necessary. CC ID 11755 | Operational management | Configuration | |
Remove outdated computer firmware after the computer firmware has been updated. CC ID 10671 | Operational management | Configuration | |
Mitigate the adverse effects of unauthorized changes. CC ID 12244 | Operational management | Business Processes | |
Establish, implement, and maintain a change acceptance testing log. CC ID 06392 | Operational management | Establish/Maintain Documentation | |
Document approved configuration deviations. CC ID 08711 | Operational management | Establish/Maintain Documentation | |
Change the authenticator for shared accounts when the group membership changes. CC ID 14249 | System hardening through configuration management | Business Processes | |
Configure the look-up secret authenticator to dispose of memorized secrets after their use. CC ID 13817 | System hardening through configuration management | Configuration | |
Remove unnecessary accounts. CC ID 16476 | System hardening through configuration management | Technical Security | |
Change default usernames, as necessary. CC ID 14661 | System hardening through configuration management | Configuration | |
Disable or delete shared User IDs. CC ID 12478 | System hardening through configuration management | Configuration | |
Disable or delete generic user IDs. CC ID 12479 | System hardening through configuration management | Configuration | |
Reset wireless access points, as necessary. CC ID 14317 | System hardening through configuration management | Process or Activity | |
Configure payment applications to become disabled when suspicious activity is detected. CC ID 12221 | System hardening through configuration management | Configuration | |
Correct code anomalies and code deficiencies in custom code and retest before release. CC ID 06292 | Systems design, build, and implementation | Testing | |
Approve implementation plans, as necessary. CC ID 13628 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Document attempts to obtain system documentation. CC ID 14284 | Acquisition or sale of facilities, technology, and services | Process or Activity | |
Review and update the acquisition contracts, as necessary. CC ID 14279 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Correct defective acquired goods or services. CC ID 06911 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Report fraudulent account activity, unauthorized transactions, or discrepancies with current accounts. CC ID 04875 | Privacy protection for information and data | Monitor and Evaluate Occurrences | |
Take appropriate action when a data leakage is discovered. CC ID 14716 | Privacy protection for information and data | Process or Activity |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | TYPE | |
---|---|---|---|
Assess the effectiveness of the communication methods used in the communication protocol. CC ID 12691 | Leadership and high level objectives | Process or Activity | |
Monitor regulatory trends to maintain compliance. CC ID 00604 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5 Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5 Review whether management has processes to do the following: Maintain awareness of new legal and regulatory requirements or changes to industry practices. App A Objective 4.5.a] | Leadership and high level objectives | Monitor and Evaluate Occurrences | |
Monitor for new Information Security solutions. CC ID 07078 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Leadership and high level objectives | Monitor and Evaluate Occurrences | |
Subscribe to a threat intelligence service to receive notification of emerging threats. CC ID 12135 | Leadership and high level objectives | Technical Security | |
Map in scope assets and in scope records to external requirements. CC ID 12189 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include the counterterror protective security plan test results in the Statement on Internal Control. CC ID 06867 | Leadership and high level objectives | Establish/Maintain Documentation | |
Establish and maintain a compliance oversight committee. CC ID 00765 | Leadership and high level objectives | Establish Roles | |
Review and document the meetings and actions of the Board of Directors or audit committee in the Board Report. CC ID 01151 [{audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8 {audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8] | Leadership and high level objectives | Establish/Maintain Documentation | |
Provide critical project reports to the compliance oversight committee in a timely manner. CC ID 01183 | Leadership and high level objectives | Establish/Maintain Documentation | |
Monitor and evaluate the implementation and effectiveness of Information Technology Plans. CC ID 00634 | Leadership and high level objectives | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain logging and monitoring operations. CC ID 00637 [Determine whether the institution's security operations activities include the following: Monitoring of network, host, and application activity. App A Objective 8.1.h {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f] | Monitoring and measurement | Log Management | |
Monitor and evaluate system telemetry data. CC ID 14929 | Monitoring and measurement | Actionable Reports or Measurements | |
Determine if honeypots should be installed, and if so, where the honeypots should be placed. CC ID 00582 | Monitoring and measurement | Technical Security | |
Monitor systems for inappropriate usage and other security violations. CC ID 00585 [{cyber threat indicator} Determine whether management has effective threat monitoring processes, including the following: Monitoring of indicators, including vulnerabilities, attacks, compromised systems, and suspicious users. App A Objective 8.4.d {incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Monitor systems for blended attacks and multiple component incidents. CC ID 01225 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Monitor systems for Denial of Service attacks. CC ID 01222 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Monitor systems for access to restricted data or restricted information. CC ID 04721 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Assign roles and responsibilities for overseeing access to restricted data or restricted information. CC ID 11950 | Monitoring and measurement | Human Resources Management | |
Detect unauthorized access to systems. CC ID 06798 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Incorporate potential red flags into the organization's incident management system. CC ID 04652 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Alert interested personnel when suspicious activity is detected by an Intrusion Detection System or Intrusion Prevention System. CC ID 06430 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Alert interested personnel and affected parties when an incident causes an outage. CC ID 06808 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Operationalize key monitoring and logging concepts to ensure the audit trails capture sufficient information. CC ID 00638 | Monitoring and measurement | Log Management | |
Establish, implement, and maintain event logging procedures. CC ID 01335 | Monitoring and measurement | Log Management | |
Review and update event logs and audit logs, as necessary. CC ID 00596 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Filters and reviews logs for potential security events and provides adequate reports and alerts. App A Objective 6.21.f Review whether management has the following: Processes to effectively collect, aggregate, analyze, and correlate security event information from discrete systems and applications. App A Objective 6.35.d Review whether management has the following: Independent review of logging practices. App A Objective 6.35.c] | Monitoring and measurement | Log Management | |
Correlate log entries to security controls to verify the security control's effectiveness. CC ID 13207 | Monitoring and measurement | Log Management | |
Identify cybersecurity events in event logs and audit logs. CC ID 13206 | Monitoring and measurement | Technical Security | |
Enable logging for all systems that meet a traceability criteria. CC ID 00640 | Monitoring and measurement | Log Management | |
Analyze firewall logs for the correct capturing of data. CC ID 00549 | Monitoring and measurement | Log Management | |
Monitor and evaluate system performance. CC ID 00651 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Monitor for and react to when suspicious activities are detected. CC ID 00586 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Monitor and evaluate the effectiveness of detection tools. CC ID 13505 | Monitoring and measurement | Investigate | |
Monitor and review retail payment activities, as necessary. CC ID 13541 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Determine if high rates of retail payment activities are from Originating Depository Financial Institutions. CC ID 13546 | Monitoring and measurement | Investigate | |
Review retail payment service reports, as necessary. CC ID 13545 | Monitoring and measurement | Investigate | |
Assess customer satisfaction. CC ID 00652 | Monitoring and measurement | Testing | |
Establish, implement, and maintain a continuous monitoring program for configuration management. CC ID 06757 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the correlation and analysis of information obtained during testing in the continuous monitoring program. CC ID 14250 | Monitoring and measurement | Process or Activity | |
Establish, implement, and maintain an automated configuration monitoring system. CC ID 07058 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Monitor for and report when a software configuration is updated. CC ID 06746 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Notify the appropriate personnel when the software configuration is updated absent authorization. CC ID 04886 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Monitor for firmware updates absent authorization. CC ID 10675 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Implement file integrity monitoring. CC ID 01205 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Identify unauthorized modifications during file integrity monitoring. CC ID 12096 | Monitoring and measurement | Technical Security | |
Monitor and evaluate user account activity. CC ID 07066 [Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Log account usage to determine dormant accounts. CC ID 12118 | Monitoring and measurement | Log Management | |
Log account usage times. CC ID 07099 | Monitoring and measurement | Log Management | |
Generate daily reports of user logons during hours outside of their usage profile. CC ID 07068 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Generate daily reports of users who have grossly exceeded their usage profile logon duration. CC ID 07069 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Log account usage durations. CC ID 12117 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Notify the appropriate personnel after identifying dormant accounts. CC ID 12125 | Monitoring and measurement | Communicate | |
Log Internet Protocol addresses used during logon. CC ID 07100 | Monitoring and measurement | Log Management | |
Report red flags when logon credentials are used on a computer different from the one in the usage profile. CC ID 07070 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Report inappropriate usage of user accounts to the appropriate personnel. CC ID 14243 | Monitoring and measurement | Communicate | |
Monitor and evaluate environmental threats. CC ID 13481 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Test compliance controls for proper functionality. CC ID 00660 | Monitoring and measurement | Testing | |
Adhere to the system security plan. CC ID 11640 | Monitoring and measurement | Testing | |
Validate all testing assumptions in the test plans. CC ID 00663 | Monitoring and measurement | Testing | |
Require testing procedures to be complete. CC ID 00664 | Monitoring and measurement | Testing | |
Analyze system audit reports and determine the need to perform more tests. CC ID 00666 | Monitoring and measurement | Testing | |
Monitor devices continuously for conformance with production specifications. CC ID 06201 [Review whether management implements the following as appropriate: Hardware is reviewed for anomalies. App A Objective 6.19.c] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Conduct Red Team exercises, as necessary. CC ID 12131 | Monitoring and measurement | Technical Security | |
Test security systems and associated security procedures, as necessary. CC ID 11901 | Monitoring and measurement | Technical Security | |
Test in scope systems for segregation of duties, as necessary. CC ID 13906 | Monitoring and measurement | Testing | |
Identify risk management measures when testing in scope systems. CC ID 14960 | Monitoring and measurement | Process or Activity | |
Scan organizational networks for rogue devices. CC ID 00536 | Monitoring and measurement | Testing | |
Scan the network for wireless access points. CC ID 00370 | Monitoring and measurement | Testing | |
Scan wireless networks for rogue devices. CC ID 11623 | Monitoring and measurement | Technical Security | |
Test the wireless device scanner's ability to detect rogue devices. CC ID 06859 | Monitoring and measurement | Testing | |
Perform conformity assessments, as necessary. CC ID 15095 | Monitoring and measurement | Testing | |
Establish, implement, and maintain a port scan baseline for all in scope systems. CC ID 12134 | Monitoring and measurement | Technical Security | |
Compare port scan reports for in scope systems against their port scan baseline. CC ID 12162 | Monitoring and measurement | Establish/Maintain Documentation | |
Use dedicated user accounts when conducting penetration testing. CC ID 13728 | Monitoring and measurement | Testing | |
Perform penetration tests, as necessary. CC ID 00655 | Monitoring and measurement | Testing | |
Perform internal penetration tests, as necessary. CC ID 12471 | Monitoring and measurement | Technical Security | |
Perform external penetration tests, as necessary. CC ID 12470 | Monitoring and measurement | Technical Security | |
Include coverage of all in scope systems during penetration testing. CC ID 11957 | Monitoring and measurement | Testing | |
Test the system for broken access controls. CC ID 01319 | Monitoring and measurement | Testing | |
Test the system for broken authentication and session management. CC ID 01320 | Monitoring and measurement | Testing | |
Test the system for insecure communications. CC ID 00535 | Monitoring and measurement | Testing | |
Test the system for cross-site scripting attacks. CC ID 01321 | Monitoring and measurement | Testing | |
Test the system for buffer overflows. CC ID 01322 | Monitoring and measurement | Testing | |
Test the system for injection flaws. CC ID 01323 | Monitoring and measurement | Testing | |
Test the system for Denial of Service. CC ID 01326 | Monitoring and measurement | Testing | |
Test the system for insecure configuration management. CC ID 01327 | Monitoring and measurement | Testing | |
Perform network-layer penetration testing on all systems, as necessary. CC ID 01277 | Monitoring and measurement | Testing | |
Test the system for cross-site request forgery. CC ID 06296 | Monitoring and measurement | Testing | |
Perform application-layer penetration testing on all systems, as necessary. CC ID 11630 | Monitoring and measurement | Technical Security | |
Perform penetration testing on segmentation controls, as necessary. CC ID 12498 | Monitoring and measurement | Technical Security | |
Verify segmentation controls are operational and effective. CC ID 12545 | Monitoring and measurement | Audits and Risk Management | |
Repeat penetration testing, as necessary. CC ID 06860 | Monitoring and measurement | Testing | |
Test the system for covert channels. CC ID 10652 | Monitoring and measurement | Testing | |
Estimate the maximum bandwidth of any covert channels. CC ID 10653 | Monitoring and measurement | Technical Security | |
Test systems to determine which covert channels might be exploited. CC ID 10654 | Monitoring and measurement | Testing | |
Perform vulnerability scans, as necessary. CC ID 11637 [Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3] | Monitoring and measurement | Technical Security | |
Repeat vulnerability scanning, as necessary. CC ID 11646 [With respect to developed software, determine whether institution management does the following: Obtains attestation or evidence from third-party developers that the applications acquired by the institution meet the necessary security requirements and that noted vulnerabilities or flaws are remediated in a timely manner. App A Objective 6.28.b] | Monitoring and measurement | Testing | |
Identify and document security vulnerabilities. CC ID 11857 [Determine whether the institution's security operations activities include the following: Vulnerability cataloging and remediation tracking. App A Objective 8.1.d] | Monitoring and measurement | Technical Security | |
Rank discovered vulnerabilities. CC ID 11940 | Monitoring and measurement | Investigate | |
Assign vulnerability scanning to qualified personnel or external third parties. CC ID 11638 | Monitoring and measurement | Technical Security | |
Correlate vulnerability scan reports from the various systems. CC ID 10636 | Monitoring and measurement | Technical Security | |
Perform internal vulnerability scans, as necessary. CC ID 00656 | Monitoring and measurement | Testing | |
Perform vulnerability scans prior to installing payment applications. CC ID 12192 | Monitoring and measurement | Technical Security | |
Implement scanning tools, as necessary. CC ID 14282 | Monitoring and measurement | Technical Security | |
Repeat vulnerability scanning after an approved change occurs. CC ID 12468 | Monitoring and measurement | Technical Security | |
Perform external vulnerability scans, as necessary. CC ID 11624 [{establish} Determine whether management has continuous, established routines to identify and assess vulnerabilities. Determine whether management has processes to receive vulnerability information disclosed by external individuals or groups, such as security or vulnerability researchers. App A Objective 4.4 {threat and vulnerability management process} Determine whether management has effective threat identification and assessment processes, including the following: Developing appropriate processes to evaluate and respond to vulnerability information from external groups or individuals. App A Objective 8.3.f] | Monitoring and measurement | Technical Security | |
Use automated mechanisms to compare new vulnerability scan reports with past vulnerability scan reports. CC ID 10635 | Monitoring and measurement | Technical Security | |
Review applications for security vulnerabilities after the application is updated. CC ID 11938 | Monitoring and measurement | Technical Security | |
Test the system for unvalidated input. CC ID 01318 | Monitoring and measurement | Testing | |
Test the system for proper error handling. CC ID 01324 | Monitoring and measurement | Testing | |
Test the system for insecure data storage. CC ID 01325 | Monitoring and measurement | Testing | |
Test the system for access control enforcement in all Uniform Resource Locators. CC ID 06297 | Monitoring and measurement | Testing | |
Test the system for insecure cryptographic storage. CC ID 11635 | Monitoring and measurement | Technical Security | |
Perform self-tests on cryptographic modules within the system. CC ID 06537 | Monitoring and measurement | Testing | |
Perform power-up tests on cryptographic modules within the system. CC ID 06538 | Monitoring and measurement | Testing | |
Perform conditional tests on cryptographic modules within the system. CC ID 06539 | Monitoring and measurement | Testing | |
Test in scope systems for compliance with the Configuration Baseline Documentation Record. CC ID 12130 | Monitoring and measurement | Configuration | |
Report on the percentage of critical assets for which an assurance strategy is implemented. CC ID 01657 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of key organizational functions for which an assurance strategy is implemented. CC ID 01658 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of key compliance requirements for which an assurance strategy has been implemented. CC ID 01659 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of the Information System budget allocated to Information Security. CC ID 04571 | Monitoring and measurement | Actionable Reports or Measurements | |
Monitor personnel and third parties for compliance to the organizational compliance framework. CC ID 04726 [{regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d {regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Align enforcement reviews for non-compliance with organizational risk tolerance. CC ID 13063 | Monitoring and measurement | Business Processes | |
Determine if multiple compliance violations of the same type could occur. CC ID 12402 | Monitoring and measurement | Investigate | |
Review the effectiveness of disciplinary actions carried out for compliance violations. CC ID 12403 | Monitoring and measurement | Investigate | |
Report on the policies and controls that have been implemented by management. CC ID 01670 [Determine whether management implements an integrated control system characterized by the use of different control types that mitigates identified risks. Review whether management does the following: App A Objective 6.4] | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of known Information Security risks that are related to supply chain relationships. CC ID 02044 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of critical information assets or critical functions for which access by supply chain personnel is disallowed. CC ID 02045 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of supply chain personnel who have current information asset user privileges. CC ID 02046 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of systems with critical information assets or functions for which electronic connection by supply chain assets is disallowed. CC ID 02047 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of security incidents that involved supply chain personnel. CC ID 02048 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of third party contracts that include a requirement to externally verify policies and procedures. CC ID 02049 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of supply chain relationships that have been reviewed for compliance with information security requirements. CC ID 02050 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the estimated damage or loss resulting from all security incidents. CC ID 01674 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of security incidents that did not cause confidentiality, integrity, or availability losses beyond the Service Level Agreement thresholds. CC ID 01673 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of operational time that critical services were unavailable due to security incidents. CC ID 02124 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of security incidents that exploited existing security vulnerabilities with known solutions, patches, or workarounds. CC ID 02125 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of systems affected by security incidents that exploited existing security vulnerabilities with known solutions, patches, or workarounds. CC ID 02126 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of security incidents that were managed according to established policies, procedures, and processes. CC ID 02127 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the number of security incidents reported to FedCIRC, NIPC, the Payment Card Industry, or local law enforcement. CC ID 02154 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of systems with critical information assets or critical functions that have been assessed for security vulnerabilities. CC ID 02128 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of vulnerability assessment findings that have been addressed since the last reporting period. CC ID 02129 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the average elapsed time between the discovery of a new vulnerability and implementing corrective action. CC ID 02140 | Monitoring and measurement | Actionable Reports or Measurements | |
Report on the percentage of physical security incidents that involved entry into a facility containing Information Systems. CC ID 04564 | Monitoring and measurement | Actionable Reports or Measurements | |
Review the risk assessments as compared to the in scope controls. CC ID 06978 [{compare} Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Allow comparisons among different threats, events, and potential mitigating controls. App A Objective 5.1.e] | Audits and risk management | Testing | |
Determine if requested services create a threat to independence. CC ID 16823 | Audits and risk management | Audits and Risk Management | |
Determine the presentation method of the audit assertion's in scope system description. CC ID 14885 | Audits and risk management | Establish/Maintain Documentation | |
Determine the appropriateness of the audit assertion's in scope system description. CC ID 16449 | Audits and risk management | Audits and Risk Management | |
Confirm audit requirements during the opening meeting. CC ID 15255 | Audits and risk management | Audits and Risk Management | |
Establish and maintain audit assertions, as necessary. CC ID 14871 | Audits and risk management | Establish/Maintain Documentation | |
Refrain from performing an attestation engagement under defined conditions. CC ID 13952 | Audits and risk management | Audits and Risk Management | |
Identify hypothetical assumptions in forecasts and projections during an audit. CC ID 13946 | Audits and risk management | Audits and Risk Management | |
Refrain from examining forecasts and projections which refrain from disclosing assumptions during an audit. CC ID 13932 | Audits and risk management | Audits and Risk Management | |
Audit cybersecurity risk management within the policies, standards, and procedures of the organization. CC ID 13011 | Audits and risk management | Investigate | |
Audit information systems, as necessary. CC ID 13010 | Audits and risk management | Investigate | |
Audit the potential costs of compromise to information systems. CC ID 13012 | Audits and risk management | Investigate | |
Determine the accurateness of the audit assertion's in scope system description. CC ID 06979 | Audits and risk management | Testing | |
Determine if the in scope system has been implemented as described in the audit assertion. CC ID 06983 | Audits and risk management | Testing | |
Investigate the nature and causes of misstatements in the audit assertion's in scope system description. CC ID 16557 | Audits and risk management | Audits and Risk Management | |
Determine the effect of fraud and non-compliance on the description of the system in the audit assertion, as necessary. CC ID 13977 | Audits and risk management | Process or Activity | |
Determine if the audit assertion's in scope controls are reasonable. CC ID 06980 | Audits and risk management | Testing | |
Determine the effect of fraud and non-compliance on the achievement of in scope controls in the audit assertion, as necessary. CC ID 13978 | Audits and risk management | Process or Activity | |
Document test plans for auditing in scope controls. CC ID 06985 [{test scope} Determine whether management considers the following key testing factors when developing and implementing independent tests: Scope. App A Objective 10.2.a] | Audits and risk management | Testing | |
Determine the implementation status of the audit assertion's in scope controls. CC ID 06981 | Audits and risk management | Testing | |
Determine the effectiveness of in scope controls. CC ID 06984 [Review whether management does the following: Verifies that compensating controls are used appropriately to compensate for weaknesses with the system or process. App A Objective 6.4.c] | Audits and risk management | Testing | |
Review incident management audit logs to determine the effectiveness of in scope controls. CC ID 12157 | Audits and risk management | Audits and Risk Management | |
Review audit reports to determine the effectiveness of in scope controls. CC ID 12156 | Audits and risk management | Audits and Risk Management | |
Observe processes to determine the effectiveness of in scope controls. CC ID 12155 | Audits and risk management | Audits and Risk Management | |
Interview stakeholders to determine the effectiveness of in scope controls. CC ID 12154 | Audits and risk management | Audits and Risk Management | |
Review policies and procedures to determine the effectiveness of in scope controls. CC ID 12144 | Audits and risk management | Audits and Risk Management | |
Evaluate personnel status changes to determine the effectiveness of in scope controls. CC ID 16556 | Audits and risk management | Audits and Risk Management | |
Determine whether individuals performing a control have the appropriate staff qualifications, staff clearances, and staff competencies. CC ID 16555 | Audits and risk management | Audits and Risk Management | |
Determine any errors or material omissions in the audit assertion that affect in scope control implementations. CC ID 06990 | Audits and risk management | Testing | |
Conduct interviews, as necessary. CC ID 07188 | Audits and risk management | Testing | |
Verify statements made by interviewees are correct. CC ID 16299 | Audits and risk management | Behavior | |
Discuss unsolved questions with the interviewee. CC ID 16298 | Audits and risk management | Process or Activity | |
Allow interviewee to respond to explanations. CC ID 16296 | Audits and risk management | Process or Activity | |
Explain the requirements being discussed to the interviewee. CC ID 16294 | Audits and risk management | Process or Activity | |
Explain the goals of the interview to the interviewee. CC ID 07189 | Audits and risk management | Behavior | |
Include if the audit evidence has identified in scope control deficiencies in the work papers. CC ID 07152 | Audits and risk management | Audits and Risk Management | |
Include if in scope control deviations allow in scope controls to be performed acceptably in the work papers. CC ID 06987 | Audits and risk management | Testing | |
Investigate the nature and causes of identified in scope control deviations. CC ID 06986 | Audits and risk management | Testing | |
Review the subject matter expert's findings. CC ID 16559 | Audits and risk management | Audits and Risk Management | |
Permit assessment teams to conduct audits, as necessary. CC ID 16430 | Audits and risk management | Investigate | |
Determine what disclosures are required in the audit report. CC ID 14888 | Audits and risk management | Establish/Maintain Documentation | |
Identify the audit team members in the audit report. CC ID 15259 | Audits and risk management | Human Resources Management | |
Identify the participants from the organization being audited in the audit report. CC ID 15258 | Audits and risk management | Audits and Risk Management | |
Review the adequacy of the internal auditor's work papers. CC ID 01146 | Audits and risk management | Audits and Risk Management | |
Compare the evaluations completed by the internal auditors and the external auditors in past audit reports. CC ID 01158 | Audits and risk management | Establish/Maintain Documentation | |
Review the adequacy of the internal auditor's audit reports. CC ID 11620 | Audits and risk management | Audits and Risk Management | |
Review past audit reports. CC ID 01155 [{audit reporting} {board minutes} Determine the adequacy of audit coverage and reporting of the information security program by reviewing appropriate audit reports and board or audit committee minutes. App A Objective 2.8 With respect to developed software, determine whether institution management does the following: Reviews available audit reports, and considers and implements appropriate control recommendations. App A Objective 6.28.e Review past reports for outstanding issues or previous problems. Consider the following: Internal and external audit reports. App A Objective 1.1.b] | Audits and risk management | Establish/Maintain Documentation | |
Review past audit reports for specific process steps and calculations that were stated to support the audit report's conclusions. CC ID 01160 | Audits and risk management | Establish/Maintain Documentation | |
Review the reporting of material weaknesses and risks in past audit reports. CC ID 01161 [Review past reports for outstanding issues or previous problems. Consider the following: Regulatory reports of examination. App A Objective 1.1.a Review past reports for outstanding issues or previous problems. Consider the following: Independent security tests. App A Objective 1.1.c Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk management and control decisions. App A Objective 2.4.b Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk management and control decisions. App A Objective 2.4.b {risk monitoring process}{risk reporting process}{be operational and effective} Determine whether the risk monitoring and reporting process is regular and prompts action, when necessary, in a timely manner. App A Objective 7.2] | Audits and risk management | Establish/Maintain Documentation | |
Determine the effect of deficiencies on the audit report, as necessary. CC ID 14886 | Audits and risk management | Investigate | |
Determine the effect of fraud and non-compliance on the audit report, as necessary. CC ID 13979 | Audits and risk management | Process or Activity | |
Disseminate and communicate the reviews of audit reports to organizational management. CC ID 00653 | Audits and risk management | Log Management | |
Review the issues of non-compliance from past audit reports. CC ID 01148 [Review past reports for outstanding issues or previous problems. Consider the following: App A Objective 1.1 {regulatory report}{audit report}{security report} Review past reports for outstanding issues or previous problems. Consider the following: Regulatory, audit, and security reports on service providers. App A Objective 1.1.d Review preliminary conclusions with the examiner-in-charge regarding the following: Violations of laws or regulations. App A Objective 11.1.a {include} Review preliminary conclusions with the examiner-in-charge regarding the following: Significant issues warranting inclusion as matters requiring attention or recommendations in the report of examination. App A Objective 11.1.b] | Audits and risk management | Establish/Maintain Documentation | |
Submit an audit report that is complete. CC ID 01145 | Audits and risk management | Testing | |
Review management's response to issues raised in past audit reports. CC ID 01149 [Review management's response to issues raised at, or since, the last examination. Consider the following: App A Objective 1.2 Review management's response to issues raised at, or since, the last examination. Consider the following: Adequacy and timing of corrective action. App A Objective 1.2.a Review management's response to issues raised at, or since, the last examination. Consider the following: Adequacy and timing of corrective action. App A Objective 1.2.a Review management's response to issues raised at, or since, the last examination. Consider the following: Existence of any outstanding issues. App A Objective 1.2.c With respect to developed software, determine whether institution management does the following: Reviews available audit reports, and considers and implements appropriate control recommendations. App A Objective 6.28.e] | Audits and risk management | Audits and Risk Management | |
Assess the quality of the audit program in regards to the staff and their qualifications. CC ID 01150 | Audits and risk management | Testing | |
Evaluate the competency of auditors. CC ID 15253 | Audits and risk management | Human Resources Management | |
Review the audit program scope as it relates to the organization's profile. CC ID 01159 | Audits and risk management | Audits and Risk Management | |
Establish, implement, and maintain the audit plan. CC ID 01156 | Audits and risk management | Testing | |
Document and justify any exclusions from the scope of the risk management activities in the risk management program. CC ID 15336 | Audits and risk management | Business Processes | |
Analyze the risk management strategy for addressing requirements. CC ID 12926 | Audits and risk management | Audits and Risk Management | |
Analyze the risk management strategy for addressing threats. CC ID 12925 [Determine whether management effectively identifies threats and vulnerabilities continuously. App A Objective 4.1] | Audits and risk management | Audits and Risk Management | |
Analyze the risk management strategy for addressing opportunities. CC ID 12924 | Audits and risk management | Audits and Risk Management | |
Employ third parties when implementing a risk assessment, as necessary. CC ID 16306 | Audits and risk management | Human Resources Management | |
Include an analysis of system interdependencies in the threat and risk classification scheme. CC ID 13056 | Audits and risk management | Investigate | |
Review the risk profiles, as necessary. CC ID 16561 | Audits and risk management | Audits and Risk Management | |
Update the risk assessment upon discovery of a new threat. CC ID 00708 | Audits and risk management | Establish/Maintain Documentation | |
Update the risk assessment upon changes to the risk profile. CC ID 11627 | Audits and risk management | Establish/Maintain Documentation | |
Conduct external audits of risk assessments, as necessary. CC ID 13308 | Audits and risk management | Audits and Risk Management | |
Evaluate the effectiveness of threat and vulnerability management procedures. CC ID 13491 | Audits and risk management | Investigate | |
Conduct a Business Impact Analysis, as necessary. CC ID 01147 | Audits and risk management | Audits and Risk Management | |
Assess the potential level of business impact risk associated with each business process. CC ID 06463 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Changes to internal business processes. App A Objective 1.3.h Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Internal reorganizations. App A Objective 1.3.i] | Audits and risk management | Audits and Risk Management | |
Assess the potential level of business impact risk associated with the business environment. CC ID 06464 | Audits and risk management | Audits and Risk Management | |
Assess the potential level of business impact risk associated with business information of in scope systems. CC ID 06465 | Audits and risk management | Audits and Risk Management | |
Identify changes to in scope systems that could threaten communication between business units. CC ID 13173 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Communication lines with other business units (e.g., loan review, credit risk management, line of business quality assurance, and internal audit). App A Objective 1.3.f] | Audits and risk management | Investigate | |
Assess the potential business impact risk of in scope systems caused by deliberate threats to their confidentiality, integrity, and availability. CC ID 06466 | Audits and risk management | Audits and Risk Management | |
Assess the potential level of business impact risk caused by accidental threats to the confidentiality, integrity and availability of critical systems. CC ID 06467 | Audits and risk management | Audits and Risk Management | |
Assess the potential level of business impact risk associated with reputational damage. CC ID 15335 | Audits and risk management | Audits and Risk Management | |
Assess the potential level of business impact risk associated with insider threats. CC ID 06468 | Audits and risk management | Audits and Risk Management | |
Assess the potential level of business impact risk associated with external entities. CC ID 06469 | Audits and risk management | Audits and Risk Management | |
Assess the potential level of business impact risk associated with natural disasters. CC ID 06470 | Audits and risk management | Actionable Reports or Measurements | |
Assess the potential level of business impact risk associated with control weaknesses. CC ID 06471 | Audits and risk management | Audits and Risk Management | |
Perform a gap analysis to review in scope controls for identified risks and implement new controls, as necessary. CC ID 00704 | Audits and risk management | Establish/Maintain Documentation | |
Analyze the effect of threats on organizational strategies and objectives. CC ID 12850 [{security incident} Determine whether management responsibilities are appropriate and include the following: Participation in assessing the effect of security threats or incidents on the institution and its business lines and processes. App A Objective 2.5.c] | Audits and risk management | Process or Activity | |
Analyze the effect of opportunities on organizational strategies and objectives. CC ID 12849 | Audits and risk management | Process or Activity | |
Determine the effectiveness of risk control measures. CC ID 06601 | Audits and risk management | Testing | |
Analyze the impact of artificial intelligence systems on society. CC ID 16317 | Audits and risk management | Audits and Risk Management | |
Analyze the impact of artificial intelligence systems on individuals. CC ID 16316 | Audits and risk management | Audits and Risk Management | |
Analyze supply chain risk management procedures, as necessary. CC ID 13198 | Audits and risk management | Process or Activity | |
Identify external requirements for customer access. CC ID 12736 | Technical security | Technical Security | |
Review connection requirements for all systems. CC ID 06411 | Technical security | Establish/Maintain Documentation | |
Identify information system users. CC ID 12081 | Technical security | Technical Security | |
Review user accounts. CC ID 00525 | Technical security | Technical Security | |
Match user accounts to authorized parties. CC ID 12126 | Technical security | Configuration | |
Identify and authenticate processes running on information systems that act on behalf of users. CC ID 12082 | Technical security | Technical Security | |
Review shared accounts. CC ID 11840 | Technical security | Technical Security | |
Disallow application IDs from running as privileged users. CC ID 10050 | Technical security | Configuration | |
Perform a risk assessment prior to activating third party access to the organization's critical systems. CC ID 06455 | Technical security | Testing | |
Notify interested personnel when user accounts are added or deleted. CC ID 14327 | Technical security | Communicate | |
Employ unique identifiers. CC ID 01273 | Technical security | Testing | |
Authenticate user identities before unlocking an account. CC ID 11837 | Technical security | Testing | |
Authenticate user identities before manually resetting an authenticator. CC ID 04567 | Technical security | Testing | |
Identify the user when enrolling them in the biometric system. CC ID 06882 | Technical security | Testing | |
Place Intrusion Detection Systems and Intrusion Response Systems in network locations where they will be the most effective. CC ID 04589 | Technical security | Technical Security | |
Use a passive asset inventory discovery tool to identify assets when network mapping. CC ID 13735 | Technical security | Process or Activity | |
Use an active asset inventory discovery tool to identify sensitive information for data flow diagrams. CC ID 13737 | Technical security | Process or Activity | |
Establish, implement, and maintain a sensitive information inventory. CC ID 13736 | Technical security | Establish/Maintain Documentation | |
Register all Domain Names associated with the organization to the organization and not an individual. CC ID 07210 | Technical security | Testing | |
Include testing and approving all network connections through the firewall in the firewall and router configuration standard. CC ID 01270 | Technical security | Process or Activity | |
Configure security alerts in firewalls to include the source Internet protocol address and destination Internet protocol address associated with long sessions. CC ID 12174 | Technical security | Configuration | |
Configure firewalls to perform dynamic packet filtering. CC ID 01288 | Technical security | Testing | |
Configure network access and control points to organizational standards. CC ID 12442 | Technical security | Configuration | |
Monitor and report on the organization's interconnectivity risk. CC ID 13172 [Review whether management does the following: Monitors and reports on the institution's interconnectivity risk. App A Objective 6.7.f {network infrastructure} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Network topology or diagram including changes to configuration or components and all internal and external connections. App A Objective 1.3.b] | Technical security | Monitor and Evaluate Occurrences | |
Perform content filtering scans on network traffic. CC ID 06761 | Technical security | Monitor and Evaluate Occurrences | |
Document information flow anomalies that do not fit normal traffic patterns. CC ID 12163 | Technical security | Investigate | |
Perform content filtering scans on incoming and outgoing e-mail. CC ID 06733 | Technical security | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain an automated information flow approval process or semi-automated information flow approval process for transmitting or receiving restricted data or restricted information. CC ID 06734 | Technical security | Data and Information Management | |
Subscribe to a URL categorization service to maintain website category definitions in the URL filter list. CC ID 12139 | Technical security | Technical Security | |
Create a full text analysis on executed privileged functions. CC ID 06778 | Technical security | Monitor and Evaluate Occurrences | |
Scan the system to verify modems are disabled or removed, except the modems that are explicitly approved. CC ID 00560 | Technical security | Testing | |
Monitor and evaluate all remote access usage. CC ID 00563 [Review whether management does the following: Measures the risk associated with connections with third parties with remote access. App A Objective 6.7.d As part of management's process to secure the operating system and all system components, determine whether management does the following: Prohibits remote access to operating system and system utilities, where feasible, and, at a minimum, requires strong authentication and encrypted sessions before allowing such remote access. App A Objective 6.21.e] | Technical security | Monitor and Evaluate Occurrences | |
Test cryptographic key management applications, as necessary. CC ID 04829 | Technical security | Testing | |
Implement non-repudiation for transactions. CC ID 00567 | Technical security | Testing | |
Scan for malicious code, as necessary. CC ID 11941 | Technical security | Investigate | |
Test all removable storage media for viruses and malicious code. CC ID 11861 | Technical security | Testing | |
Test all untrusted files or unverified files for viruses and malicious code. CC ID 01311 | Technical security | Testing | |
Log and react to all malicious code activity. CC ID 07072 | Technical security | Monitor and Evaluate Occurrences | |
Analyze the behavior and characteristics of the malicious code. CC ID 10672 | Technical security | Technical Security | |
Conduct application security reviews, as necessary. CC ID 06298 [With respect to developed software, determine whether institution management does the following: Reviews mitigation of potential flaws in applications. App A Objective 6.28.a Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Technical security | Testing | |
Conduct external audits of the physical security plan. CC ID 13314 | Physical and environmental protection | Audits and Risk Management | |
Establish, implement, and maintain an anti-tamper protection program. CC ID 10638 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Monitor for evidence of when tampering indicators are being identified. CC ID 11905 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Inspect device surfaces to detect tampering. CC ID 11868 | Physical and environmental protection | Investigate | |
Inspect device surfaces to detect unauthorized substitution. CC ID 11869 | Physical and environmental protection | Investigate | |
Inspect for tampering, as necessary. CC ID 10640 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Inspect telephones for eavesdropping devices. CC ID 02223 | Physical and environmental protection | Physical and Environmental Protection | |
Detect anomalies in physical barriers. CC ID 13533 | Physical and environmental protection | Investigate | |
Secure physical entry points with physical access controls or security guards. CC ID 01640 | Physical and environmental protection | Physical and Environmental Protection | |
Test locks for physical security vulnerabilities. CC ID 04880 | Physical and environmental protection | Testing | |
Lock all lockable equipment cabinets. CC ID 11673 | Physical and environmental protection | Physical and Environmental Protection | |
Monitor for unauthorized physical access at physical entry points and physical exit points. CC ID 01638 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Report anomalies in the visitor log to appropriate personnel. CC ID 14755 | Physical and environmental protection | Investigate | |
Log when the vault is accessed. CC ID 06725 | Physical and environmental protection | Log Management | |
Log when the cabinet is accessed. CC ID 11674 | Physical and environmental protection | Log Management | |
Observe restricted areas with motion detectors or closed-circuit television systems. CC ID 01328 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Review and correlate all data collected from video cameras and/or access control mechanisms with other entries. CC ID 11609 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Monitor physical entry point alarms. CC ID 01639 | Physical and environmental protection | Physical and Environmental Protection | |
Evaluate and react to when unauthorized access is detected by physical entry point alarms. CC ID 11677 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Monitor for alarmed security doors being propped open. CC ID 06684 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Track restricted storage media while it is in transit. CC ID 00967 | Physical and environmental protection | Data and Information Management | |
Attach asset location technologies to distributed assets. CC ID 10626 | Physical and environmental protection | Physical and Environmental Protection | |
Monitor the location of distributed assets. CC ID 11684 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Inspect mobile devices for the storage of restricted data or restricted information. CC ID 08707 | Physical and environmental protection | Investigate | |
Inspect the physical integrity of all containers before loading the containers. CC ID 02209 | Physical and environmental protection | Physical and Environmental Protection | |
Restrict the length of fiber optic flying leads to 5 meters. CC ID 08639 | Physical and environmental protection | Physical and Environmental Protection | |
Inspect network cabling at distances determined by security classification. CC ID 08644 | Physical and environmental protection | Physical and Environmental Protection | |
Monitor and evaluate business continuity management system performance. CC ID 12410 | Operational and Systems Continuity | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain the organization's call tree. CC ID 01167 | Operational and Systems Continuity | Testing | |
Determine the cause for the activation of the recovery plan. CC ID 13291 | Operational and Systems Continuity | Investigate | |
Test the recovery plan, as necessary. CC ID 13290 | Operational and Systems Continuity | Testing | |
Test the backup information, as necessary. CC ID 13303 | Operational and Systems Continuity | Testing | |
Document lessons learned from testing the recovery plan or an actual event. CC ID 13301 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Test the continuity plan, as necessary. CC ID 00755 | Operational and Systems Continuity | Testing | |
Employ individuals who have the appropriate staff qualifications, staff clearances, and staff competencies. CC ID 00782 [{staff qualifications} Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Personnel with knowledge of technology standards, practices, and risk methodologies. App A Objective 2.9.b Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Appropriate staff with the necessary skills to meet the institution's technical and managerial needs. App A Objective 2.9.a] | Human Resources management | Testing | |
Perform security skills assessments for all critical employees. CC ID 12102 | Human Resources management | Human Resources Management | |
Perform a background check during personnel screening. CC ID 11758 | Human Resources management | Human Resources Management | |
Document the personnel risk assessment results. CC ID 11764 | Human Resources management | Establish/Maintain Documentation | |
Perform periodic background checks on designated roles, as necessary. CC ID 11759 | Human Resources management | Human Resources Management | |
Document the security clearance procedure results. CC ID 01635 | Human Resources management | Establish/Maintain Documentation | |
Identify and watch individuals that pose a risk to the organization. CC ID 10674 [Determine whether management effectively mitigates risks posed by users. Review whether management does the following: App A Objective 6.8 {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Monitor and Evaluate Occurrences | |
Assign and staff all roles appropriately. CC ID 00784 [Determine whether management has designated one or more individuals as an information security officer and determine appropriateness of the reporting line. App A Objective 2.6] | Human Resources management | Testing | |
Implement segregation of duties in roles and responsibilities. CC ID 00774 [{establish} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate segregation of duties. App A Objective 2.5.g Review whether management does the following: Employs appropriate segregation of duties. App A Objective 6.8.d {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Testing | |
Document all training in a training record. CC ID 01423 | Human Resources management | Establish/Maintain Documentation | |
Conduct tests and evaluate training. CC ID 06672 [Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b] | Human Resources management | Testing | |
Train personnel to recognize conditions of diseases or sicknesses, as necessary. CC ID 14383 | Human Resources management | Training | |
Train personnel to identify and communicate symptoms of exposure to disease or sickness. CC ID 14385 | Human Resources management | Training | |
Monitor and measure the effectiveness of security awareness. CC ID 06262 | Human Resources management | Monitor and Evaluate Occurrences | |
Analyze and evaluate training records to improve the training program. CC ID 06380 | Human Resources management | Monitor and Evaluate Occurrences | |
Monitor managing cloud services. CC ID 13150 | Operational management | Monitor and Evaluate Occurrences | |
Review the relevance of information supporting internal controls. CC ID 12420 | Operational management | Business Processes | |
Include emergency response procedures in the internal control framework. CC ID 06779 | Operational management | Establish/Maintain Documentation | |
Review and approve access controls, as necessary. CC ID 13074 | Operational management | Process or Activity | |
Perform social network analysis, as necessary. CC ID 14864 | Operational management | Investigate | |
Include all electronic storage media containing restricted data or restricted information in the storage media inventory. CC ID 00962 | Operational management | Establish/Maintain Documentation | |
Employ Dynamic Host Configuration Protocol server logging to detect systems not in the asset inventory. CC ID 12110 | Operational management | Technical Security | |
Test systems for malicious code prior to when the system will be redeployed. CC ID 06339 | Operational management | Testing | |
Refrain from turning on any in scope devices that are turned off when a security incident is detected. CC ID 08677 | Operational management | Investigate | |
Include where the digital forensic evidence was found in the forensic investigation report. CC ID 08674 | Operational management | Establish/Maintain Documentation | |
Include the condition of the digital forensic evidence in the forensic investigation report. CC ID 08678 | Operational management | Establish/Maintain Documentation | |
Analyze the incident response process following an incident response. CC ID 13179 [Determine whether management has effective incident response processes, including the following: Appropriate balance of adequate people and technologies in the response. App A Objective 8.6.c] | Operational management | Investigate | |
Determine whether or not incident response notifications are necessary during the privacy breach investigation. CC ID 00801 | Operational management | Behavior | |
Avoid false positive incident response notifications. CC ID 04732 | Operational management | Behavior | |
Include information required by law in incident response notifications. CC ID 00802 | Operational management | Establish/Maintain Documentation | |
Include how the affected parties can protect themselves from identity theft in incident response notifications. CC ID 04738 | Operational management | Establish/Maintain Documentation | |
Detect any potentially undiscovered security vulnerabilities on previously compromised systems. CC ID 06265 | Operational management | Monitor and Evaluate Occurrences | |
Analyze and respond to security alerts. CC ID 12504 | Operational management | Business Processes | |
Assign monitoring and analyzing the security alert when a security alert is received to the appropriate role in the incident response program. CC ID 11886 | Operational management | Investigate | |
Establish, implement, and maintain incident response procedures. CC ID 01206 [Determine whether management has effective incident identification and assessment processes to do the following: Enable the use of response teams and responses depending on the type of event. App A Objective 8.5.d {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f Determine whether management has effective incident response processes, including the following: App A Objective 8.6 {restoration strategy} {follow-up strategy} Determine whether management has effective incident response processes, including the following: Restoration and follow-up strategies. App A Objective 8.6.i {incident response procedures} Determine whether management has effective incident response processes, including the following: Protocols defined in the incident response policy to declare and respond to an incident once identified. App A Objective 8.6.a {incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Operational management | Establish/Maintain Documentation | |
Establish trust between the incident response team and the end user community during an incident. CC ID 01217 | Operational management | Testing | |
Protect devices containing digital forensic evidence during transport. CC ID 08687 | Operational management | Investigate | |
Protect devices containing digital forensic evidence in sealed containers. CC ID 08685 | Operational management | Investigate | |
Establish, implement, and maintain a chain of custody for all devices containing digital forensic evidence. CC ID 08686 | Operational management | Establish/Maintain Documentation | |
Contact affected parties to participate in forensic investigations, as necessary. CC ID 12343 | Operational management | Communicate | |
Prepare digital forensic equipment. CC ID 08688 | Operational management | Investigate | |
Use digital forensic equipment suitable to the circumstances. CC ID 08690 | Operational management | Investigate | |
Provide relevant user manuals for digital forensic equipment during use. CC ID 08691 | Operational management | Investigate | |
Include the hardware configuration and software configuration of the digital forensic equipment in the forensic investigation report. CC ID 08693 | Operational management | Establish/Maintain Documentation | |
Test the operation of the digital forensic equipment prior to use. CC ID 08694 | Operational management | Testing | |
Maintain digital forensic equipment for proper performance. CC ID 08689 | Operational management | Investigate | |
Include documentation of the system containing and surrounding digital forensic evidence in the forensic investigation report. CC ID 08679 | Operational management | Establish/Maintain Documentation | |
Include the configuration settings of devices associated with digital forensic evidence in the forensic investigation report. CC ID 08676 | Operational management | Establish/Maintain Documentation | |
Include the external connections to systems containing digital forensic evidence in the forensic investigation report. CC ID 08680 | Operational management | Establish/Maintain Documentation | |
Include the electronic media storage devices containing digital forensic evidence in the forensic investigation report. CC ID 08695 | Operational management | Establish/Maintain Documentation | |
Include all system components of systems containing digital forensic evidence in the forensic investigation report. CC ID 08696 | Operational management | Establish/Maintain Documentation | |
Refrain from altering the state of compromised systems when collecting digital forensic evidence. CC ID 08671 | Operational management | Investigate | |
Follow all applicable laws and principles when collecting digital forensic evidence. CC ID 08672 | Operational management | Investigate | |
Remove everyone except interested personnel and affected parties from the proximity of digital forensic evidence. CC ID 08675 | Operational management | Investigate | |
Secure devices containing digital forensic evidence. CC ID 08681 | Operational management | Investigate | |
Use a write blocker to prevent digital forensic evidence from being modified. CC ID 08692 | Operational management | Investigate | |
Capture volatile information from devices containing digital forensic evidence prior to shutdown. CC ID 08684 | Operational management | Investigate | |
Create a system image of the device before collecting digital forensic evidence. CC ID 08673 | Operational management | Investigate | |
Shut down stand alone devices containing digital forensic evidence. CC ID 08682 | Operational management | Investigate | |
Disconnect electronic media storage devices of systems containing digital forensic evidence. CC ID 08697 | Operational management | Investigate | |
Place evidence tape over devices containing digital forensic evidence. CC ID 08683 | Operational management | Investigate | |
Test the incident response procedures. CC ID 01216 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {testing procedure} {incident response}{incident reporting }Determine whether management has effective incident identification and assessment processes to do the following: Develop procedures to test the incident escalation, response, and reporting processes. App A Objective 8.5.h {incident response plan} Review whether management does the following: Develops and tests a response plan in conjunction with the institution's ISPs and third-party service providers to mitigate the interruption of mobile or remote financial services. App A Objective 6.25.c Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Operational management | Testing | |
Test proposed changes prior to their approval. CC ID 00548 | Operational management | Testing | |
Examine all changes to ensure they correspond with the change request. CC ID 12345 | Operational management | Business Processes | |
Conduct network certifications prior to approving change requests for networks. CC ID 13121 | Operational management | Process or Activity | |
Analyze mitigating controls for vulnerabilities in the network when certifying the network. CC ID 13126 | Operational management | Investigate | |
Collect data about the network environment when certifying the network. CC ID 13125 | Operational management | Investigate | |
Review the patch log for missing patches. CC ID 13186 | Operational management | Technical Security | |
Perform a patch test prior to deploying a patch. CC ID 00898 [Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d Review whether patch management processes include the following: A process to evaluate the patches against the threat and network environment. App A Objective 6.15.b Review whether patch management processes include the following: A process to evaluate the patches against the threat and network environment. App A Objective 6.15.b] | Operational management | Testing | |
Test software patches for any potential compromise of the system's security. CC ID 13175 [Review whether patch management processes include the following: Actions to ensure that patches do not compromise the security of the institution's systems. App A Objective 6.15.h] | Operational management | Testing | |
Review changes to computer firmware. CC ID 12226 | Operational management | Testing | |
Certify changes to computer firmware are free of malicious logic. CC ID 12227 | Operational management | Testing | |
Implement cryptographic mechanisms to authenticate software and computer firmware before installation. CC ID 10682 | Operational management | Technical Security | |
Establish, implement, and maintain approved change acceptance testing procedures. CC ID 06391 [{system test} Determine whether management does the following: Performs necessary tests of all changes to the environment (e.g., systems testing, integration testing, functional testing, user acceptance testing, and security testing). App A Objective 6.11.g] | Operational management | Establish/Maintain Documentation | |
Test the system's operational functionality after implementing approved changes. CC ID 06294 | Operational management | Testing | |
Perform and pass acceptance testing before moving a system back into operation after an approved change has occurred. CC ID 04541 | Operational management | Testing | |
Establish, implement, and maintain a configuration change log. CC ID 08710 [{system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Operational management | Configuration | |
Test network access controls for proper Configuration Management settings. CC ID 01281 | System hardening through configuration management | Testing | |
Configure the "HEALTHCHECK" to organizational standards. CC ID 14511 | System hardening through configuration management | Configuration | |
Configure the "audit-log-maxsize" argument to organizational standards. CC ID 14624 | System hardening through configuration management | Configuration | |
Configure the "audit-log-path" argument to organizational standards. CC ID 14622 | System hardening through configuration management | Configuration | |
Configure the "audit-log-maxbackup" argument to organizational standards. CC ID 14613 | System hardening through configuration management | Configuration | |
Configure the "audit-log-maxage" argument to organizational standards. CC ID 14605 | System hardening through configuration management | Configuration | |
Verify wireless peripherals meet organizational security requirements. CC ID 00657 | System hardening through configuration management | Testing | |
Review the ownership of service accounts, as necessary. CC ID 13863 | System hardening through configuration management | Technical Security | |
Ensure the root account is the first entry in password files. CC ID 16323 | System hardening through configuration management | Data and Information Management | |
Find files and directories with extended attributes. CC ID 01552 | System hardening through configuration management | Technical Security | |
Verify that no UID 0 accounts exist other than root. CC ID 01585 | System hardening through configuration management | Configuration | |
Configure symbolic permissions for the passwd file, shadow file, and group files to organizational standards. CC ID 01584 | System hardening through configuration management | Configuration | |
Review the use of utility and device driver software, as necessary. CC ID 13145 | System hardening through configuration management | Business Processes | |
Use Wireless Local Area Network Network Interface Cards that turn off or disable Peer-To-Peer Wireless Local Area Network communications. CC ID 04594 | System hardening through configuration management | Testing | |
Verify wired network interface cards and Wireless Network Interface Cards are not simultaneously active for network devices other than a Wireless Access Point. CC ID 04596 | System hardening through configuration management | Testing | |
Configure the "/etc/docker/daemon.json" files and directories auditing to organizational standards. CC ID 14467 | System hardening through configuration management | Configuration | |
Configure the "/etc/docker" files and directories auditing to organizational standards. CC ID 14459 | System hardening through configuration management | Configuration | |
Configure the "docker.socket" files and directories auditing to organizational standards. CC ID 14458 | System hardening through configuration management | Configuration | |
Configure the "docker.service" files and directories auditing to organizational standards. CC ID 14454 | System hardening through configuration management | Configuration | |
Configure the "/var/lib/docker" files and directories auditing to organizational standards. CC ID 14453 | System hardening through configuration management | Configuration | |
Configure the "/usr/sbin/runc" files and directories auditing to organizational standards. CC ID 14452 | System hardening through configuration management | Configuration | |
Configure the "/usr/bin/containerd" files and directories auditing to organizational standards. CC ID 14451 | System hardening through configuration management | Configuration | |
Configure the "/etc/default/docker" files and directories auditing to organizational standards. CC ID 14450 | System hardening through configuration management | Configuration | |
Configure the "/etc/sysconfig/docker" files and directories auditing to organizational standards. CC ID 14449 | System hardening through configuration management | Configuration | |
Configure the log to capture audit log initialization, along with auditable event selection. CC ID 00649 | System hardening through configuration management | Log Management | |
Configure the log to capture creates, reads, updates, or deletes of records containing personal data. CC ID 11890 | System hardening through configuration management | Log Management | |
Configure the log to capture the information referent when personal data is being accessed. CC ID 11968 | System hardening through configuration management | Log Management | |
Configure the log to capture each auditable event's origination. CC ID 01338 | System hardening through configuration management | Log Management | |
Configure the log to capture remote access information. CC ID 05596 | System hardening through configuration management | Configuration | |
Configure the log to capture all malicious code that has been discovered, quarantined, and/or eradicated. CC ID 00577 | System hardening through configuration management | Log Management | |
Configure the "logging level" to organizational standards. CC ID 14456 | System hardening through configuration management | Configuration | |
Capture successful operating system access and successful software access. CC ID 00527 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Independently monitors operating system access by user, terminal, date, and time of access. App A Objective 6.21.g] | System hardening through configuration management | Log Management | |
Configure the log to capture hardware and software access attempts. CC ID 01220 | System hardening through configuration management | Log Management | |
Configure the log to capture all URL requests. CC ID 12138 | System hardening through configuration management | Technical Security | |
Configure the log to capture logons, logouts, logon attempts, and logout attempts. CC ID 01915 | System hardening through configuration management | Log Management | |
Configure the log to capture access to restricted data or restricted information. CC ID 00644 | System hardening through configuration management | Log Management | |
Configure the log to capture actions taken by individuals with root privileges or administrative privileges and add logging option to the root file system. CC ID 00645 [{privileged users} Determine whether management has effective threat monitoring processes, including the following: Establishing and documenting a process to independently monitor administrators and other users with higher privileges. App A Objective 8.4.f] | System hardening through configuration management | Log Management | |
Configure the log to capture identification and authentication mechanism use. CC ID 00648 | System hardening through configuration management | Log Management | |
Configure the log to capture all access to the audit trail. CC ID 00646 | System hardening through configuration management | Log Management | |
Configure the log to capture Object access to key directories or key files. CC ID 01697 | System hardening through configuration management | Log Management | |
Configure the log to capture both access and access attempts to security-relevant objects and security-relevant directories. CC ID 01916 | System hardening through configuration management | Log Management | |
Configure the log to capture system level object creation and deletion. CC ID 00650 | System hardening through configuration management | Log Management | |
Configure the log to capture changes to User privileges, audit policies, and trust policies by enabling audit policy changes. CC ID 01698 | System hardening through configuration management | Log Management | |
Configure the log to capture user authenticator changes. CC ID 01917 | System hardening through configuration management | Log Management | |
Enable or disable NFS server logging, as appropriate. CC ID 05593 | System hardening through configuration management | Log Management | |
Log Pluggable Authentication Modules access at an appropriate level. CC ID 05599 | System hardening through configuration management | Log Management | |
Enable or disable the logging of "martian" packets (impossible addresses), as appropriate. CC ID 05601 | System hardening through configuration management | Log Management | |
Enable or disable dhcpd logging, as appropriate. CC ID 05602 | System hardening through configuration management | Log Management | |
Enable or disable attempted stack exploit logging, as appropriate. CC ID 05614 | System hardening through configuration management | Log Management | |
Enable or disable the debug logging option, as appropriate. CC ID 05617 | System hardening through configuration management | Log Management | |
Enable or disable the logging of vsftpd transactions, as appropriate. CC ID 06032 | System hardening through configuration management | Log Management | |
Verify auditing is logged to an appropriate directory. CC ID 05603 | System hardening through configuration management | Log Management | |
Enable or disable the /var/log/authlog log, as appropriate. CC ID 05606 | System hardening through configuration management | Log Management | |
Enable or disable the /var/log/syslog log, as appropriate. CC ID 05607 | System hardening through configuration management | Log Management | |
Enable or disable the /var/adm/messages log, as appropriate. CC ID 05608 | System hardening through configuration management | Log Management | |
Enable or disable the /var/adm/sulog log, as appropriate. CC ID 05609 | System hardening through configuration management | Log Management | |
Enable or disable the /var/adm/utmp(x) log, as appropriate. CC ID 05610 | System hardening through configuration management | Log Management | |
Enable or disable the /var/adm/wtmp(x) log, as appropriate. CC ID 05611 | System hardening through configuration management | Log Management | |
Enable or disable the /var/adm/sshlog log, as appropriate. CC ID 05612 | System hardening through configuration management | Log Management | |
Enable or disable the /var/log/pamlog log, as appropriate. CC ID 05613 | System hardening through configuration management | Log Management | |
Perform filesystem logging and filesystem journaling. CC ID 05615 | System hardening through configuration management | Log Management | |
Configure security and protection software to check for up-to-date signature files. CC ID 00576 | System hardening through configuration management | Testing | |
Configure security and protection software to check for phishing attacks. CC ID 04569 | System hardening through configuration management | Technical Security | |
Perform vulnerability testing before final installation. CC ID 00884 | System hardening through configuration management | Testing | |
Define each system's preservation requirements for records and logs. CC ID 00904 | Records management | Establish/Maintain Documentation | |
Destroy electronic storage media following the storage media disposition and destruction procedures. CC ID 00970 | Records management | Testing | |
Maintain media sanitization equipment in operational condition. CC ID 00721 | Records management | Testing | |
Compare each record's data input to its final form. CC ID 11813 | Records management | Records Management | |
Conduct a post implementation review when the system design project ends. CC ID 01003 [Review whether management implements the following as appropriate: Reliability of the items purchased is regularly reviewed post-implementation. App A Objective 6.19.e] | Systems design, build, and implementation | Testing | |
Audit all modifications to the application being developed. CC ID 01614 | Systems design, build, and implementation | Testing | |
Perform Quality Management on all newly developed or modified systems. CC ID 01100 | Systems design, build, and implementation | Testing | |
Restrict production data from being used in the test environment. CC ID 01103 | Systems design, build, and implementation | Testing | |
Test all software changes before promoting the system to a production environment. CC ID 01106 | Systems design, build, and implementation | Testing | |
Review and test custom code to identify potential coding vulnerabilities. CC ID 01316 | Systems design, build, and implementation | Testing | |
Review and test source code. CC ID 01086 | Systems design, build, and implementation | Testing | |
Approve all custom code test results before code is released. CC ID 06293 | Systems design, build, and implementation | Testing | |
Perform Quality Management on all newly developed or modified software. CC ID 11798 [{conduct} Review whether management implements the following as appropriate: Software is reviewed through both automated software testing and code reviews. App A Objective 6.19.d] | Systems design, build, and implementation | Testing | |
Perform a final system test prior to implementing a new system. CC ID 01108 | Systems design, build, and implementation | Testing | |
Conduct a final security audit prior to implementing a new system. CC ID 06833 | Systems design, build, and implementation | Testing | |
Include the cost effectiveness of security controls in system acquisition contracts. CC ID 11653 | Acquisition or sale of facilities, technology, and services | Technical Security | |
Provide a Configuration Management plan by the Information System developer for all newly acquired assets. CC ID 01446 | Acquisition or sale of facilities, technology, and services | Testing | |
Require the Information System developer to create a Security Testing and Evaluation plan, implement the test, and provide the test results for all newly acquired assets. CC ID 01447 | Acquisition or sale of facilities, technology, and services | Testing | |
Identify and include alternatives to meeting the security requirements when acquiring assets. CC ID 01128 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Conduct an acquisition feasibility study prior to acquiring assets. CC ID 01129 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Conduct a risk assessment to determine operational risks as a part of the acquisition feasibility study. CC ID 01135 | Acquisition or sale of facilities, technology, and services | Testing | |
Establish test environments separate from the production environment to support integration testing before product acquisition. CC ID 11668 | Acquisition or sale of facilities, technology, and services | Testing | |
Analyze the proposed Information Architecture as it pertains to acquisition feasibility. CC ID 01132 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Prohibit the use of Personal Electronic Devices, absent approval. CC ID 04599 | Acquisition or sale of facilities, technology, and services | Behavior | |
Store source code documentation in escrow by an independent third party. CC ID 01139 | Acquisition or sale of facilities, technology, and services | Testing | |
Review software licensing agreements to ensure compliance. CC ID 01140 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Test new hardware or upgraded hardware and software against predefined performance requirements. CC ID 06740 | Acquisition or sale of facilities, technology, and services | Testing | |
Test new hardware or upgraded hardware and software for error recovery and restart procedures. CC ID 06741 | Acquisition or sale of facilities, technology, and services | Testing | |
Follow the system's operating procedures when testing new hardware or upgraded hardware and software. CC ID 06742 | Acquisition or sale of facilities, technology, and services | Testing | |
Test new hardware or upgraded hardware and software for implementation of security controls. CC ID 06743 | Acquisition or sale of facilities, technology, and services | Testing | |
Test new software or upgraded software for security vulnerabilities. CC ID 01898 | Acquisition or sale of facilities, technology, and services | Testing | |
Test new software or upgraded software for compatibility with the current system. CC ID 11654 | Acquisition or sale of facilities, technology, and services | Testing | |
Test new hardware or upgraded hardware for compatibility with the current system. CC ID 11655 | Acquisition or sale of facilities, technology, and services | Testing | |
Test new hardware or upgraded hardware for security vulnerabilities. CC ID 01899 | Acquisition or sale of facilities, technology, and services | Testing | |
Test new hardware or upgraded hardware and software for implementation of predefined continuity arrangements. CC ID 06744 | Acquisition or sale of facilities, technology, and services | Testing | |
Refrain from storing data elements containing payment card full magnetic stripe data. CC ID 04757 | Privacy protection for information and data | Testing | |
Conduct personal data risk assessments. CC ID 00357 | Privacy protection for information and data | Testing | |
Establish, implement, and maintain suspicious document procedures. CC ID 04852 | Privacy protection for information and data | Establish/Maintain Documentation | |
Establish, implement, and maintain suspicious personal data procedures. CC ID 04853 | Privacy protection for information and data | Data and Information Management | |
Compare certain personal data such as name, date of birth, address, driver's license, or other identification against personal data on file for the applicant. CC ID 04855 | Privacy protection for information and data | Data and Information Management | |
Establish, implement, and maintain suspicious user account activity procedures. CC ID 04854 | Privacy protection for information and data | Monitor and Evaluate Occurrences | |
Perform an identity check prior to approving an account change request. CC ID 13670 | Privacy protection for information and data | Investigate | |
Use the contact information on file to contact the individual identified in an account change request. CC ID 04857 | Privacy protection for information and data | Behavior | |
Match consumer reports with current accounts on file to ensure account misuse or information misuse has not occurred. CC ID 04873 | Privacy protection for information and data | Data and Information Management | |
Log account access dates and report when dormant accounts suddenly exhibit unusual activity. CC ID 04874 | Privacy protection for information and data | Log Management | |
Log dates for account name changes or address changes. CC ID 04876 | Privacy protection for information and data | Log Management | |
Review accounts that are changed for additional user requests. CC ID 11846 | Privacy protection for information and data | Monitor and Evaluate Occurrences | |
Send change notices for change of address requests to the old address and the new address. CC ID 04877 | Privacy protection for information and data | Data and Information Management | |
Search the Internet for evidence of data leakage. CC ID 10419 | Privacy protection for information and data | Process or Activity | |
Review monitored websites for data leakage. CC ID 10593 | Privacy protection for information and data | Monitor and Evaluate Occurrences | |
Formalize client and third party relationships with contracts or nondisclosure agreements. CC ID 00794 | Third Party and supply chain oversight | Process or Activity | |
Include third party acknowledgment of their data protection responsibilities in third party contracts. CC ID 01364 | Third Party and supply chain oversight | Testing | |
Establish the third party's service continuity. CC ID 00797 [Review whether management does the following: Plans and coordinates with ISPs and third parties to minimize exposure to incidents and continue services when faced with an incident (e.g., monitors threat alerts, service availability, applications, and network traffic for indicators of nefarious activity, and ensures traffic filtering). App A Objective 6.25.b] | Third Party and supply chain oversight | Testing | |
Determine the adequacy of a third party's alternate site preparations. CC ID 06879 | Third Party and supply chain oversight | Testing | |
Approve all Service Level Agreements. CC ID 00843 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Service provider arrangements. App A Objective 2.4.c] | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Perform risk assessments of third parties, as necessary. CC ID 06454 | Third Party and supply chain oversight | Testing | |
Re-evaluate risk assessments of third parties, as necessary. CC ID 12158 | Third Party and supply chain oversight | Audits and Risk Management | |
Include a provision in outsourcing contracts that requires supply chain members' security requirements comply with organizational security requirements. CC ID 00359 [Review the institution's policies, standards, and procedures related to the use of the following: Third-party service providers that facilitate operational activities (e.g., core processing, mobile financial services, cloud storage and computing, and managed security services). App A Objective 6.31.a {outsourced process} If the institution outsources activities to a third-party service provider, determine whether management integrates those activities with the information security program. Verify that the third-party management program evidences expectations that align with the institution's information security program. App A Objective 3.3 {third party security} Determine whether the institution's security operations activities include the following: Third-party integration (e.g., managed security services and incident detection services). App A Objective 8.1.g Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Third Party and supply chain oversight | Testing | |
Assess third parties' compliance environment during due diligence. CC ID 13134 | Third Party and supply chain oversight | Process or Activity | |
Request attestation of compliance from third parties. CC ID 12067 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Assess third parties' compliance with the organization's third party security policies during due diligence. CC ID 12075 [Review the institution's policies, standards, and procedures related to the use of the following: Independent review of the third-party service provider's security through appropriate reports from audits and tests. App A Objective 6.31.e Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Third Party and supply chain oversight | Business Processes | |
Assess the effectiveness of third party services provided to the organization. CC ID 13142 | Third Party and supply chain oversight | Business Processes | |
Monitor third parties for performance and effectiveness, as necessary. CC ID 00799 [{technical capability} Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: Oversight of third parties when they supplement an institution's technical and managerial capabilities. App A Objective 2.9.d Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Third Party and supply chain oversight | Monitor and Evaluate Occurrences | |
Monitor third parties' financial conditions. CC ID 13170 | Third Party and supply chain oversight | Monitor and Evaluate Occurrences |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | TYPE | |
---|---|---|---|
Leadership and high level objectives CC ID 00597 | Leadership and high level objectives | IT Impact Zone | |
Monitoring and measurement CC ID 00636 | Monitoring and measurement | IT Impact Zone | |
Audits and risk management CC ID 00677 | Audits and risk management | IT Impact Zone | |
Technical security CC ID 00508 | Technical security | IT Impact Zone | |
Physical and environmental protection CC ID 00709 | Physical and environmental protection | IT Impact Zone | |
Operational and Systems Continuity CC ID 00731 | Operational and Systems Continuity | IT Impact Zone | |
Human Resources management CC ID 00763 | Human Resources management | IT Impact Zone | |
Operational management CC ID 00805 | Operational management | IT Impact Zone | |
System hardening through configuration management CC ID 00860 | System hardening through configuration management | IT Impact Zone | |
Records management CC ID 00902 | Records management | IT Impact Zone | |
Systems design, build, and implementation CC ID 00989 | Systems design, build, and implementation | IT Impact Zone | |
Acquisition or sale of facilities, technology, and services CC ID 01123 | Acquisition or sale of facilities, technology, and services | IT Impact Zone | |
Privacy protection for information and data CC ID 00008 | Privacy protection for information and data | IT Impact Zone | |
Third Party and supply chain oversight CC ID 08807 | Third Party and supply chain oversight | IT Impact Zone |
KEY: Primary Verb Primary Noun Secondary Verb Secondary Noun Limiting Term | |||
Mandated - bold Implied - italic Implementation - regular | IMPACT ZONE | TYPE | |
---|---|---|---|
Establish, implement, and maintain a reporting methodology program. CC ID 02072 | Leadership and high level objectives | Business Processes | |
Establish, implement, and maintain communication protocols. CC ID 12245 | Leadership and high level objectives | Establish/Maintain Documentation | |
Align the information being disseminated and communicated with the communication requirements according to the organization's communication protocol. CC ID 12419 [{clear and conspicuous language} Review whether policies, standards, and procedures have the following characteristics: Are communicated in a clear and understandable manner. App A Objective 6.1.c] | Leadership and high level objectives | Establish/Maintain Documentation | |
Report to management and stakeholders on the findings and information gathered from all types of inquiries. CC ID 12797 [Discuss findings with management and obtain proposed corrective action for significant deficiencies. App A Objective 11.2] | Leadership and high level objectives | Actionable Reports or Measurements | |
Analyze organizational objectives, functions, and activities. CC ID 00598 | Leadership and high level objectives | Monitor and Evaluate Occurrences | |
Analyze the business environment in which the organization operates. CC ID 12798 | Leadership and high level objectives | Business Processes | |
Monitor for changes which affect organizational objectives in the internal business environment. CC ID 12862 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Leadership and high level objectives | Monitor and Evaluate Occurrences | |
Analyze the external environment in which the organization operates. CC ID 12799 | Leadership and high level objectives | Business Processes | |
Include industry forces in the analysis of the external environment. CC ID 12904 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Leadership and high level objectives | Business Processes | |
Include legal requirements in the analysis of the external environment. CC ID 12896 [Determine whether management adjusts the information security program for institutional changes and changes in legislation, regulation, regulatory policy, guidance, and industry practices. Review whether management has processes to do the following: App A Objective 4.5] | Leadership and high level objectives | Business Processes | |
Establish, implement, and maintain organizational objectives. CC ID 09959 | Leadership and high level objectives | Establish/Maintain Documentation | |
Evaluate organizational objectives to determine impact on other organizational objectives. CC ID 12814 | Leadership and high level objectives | Process or Activity | |
Identify events that may affect organizational objectives. CC ID 12961 [Review whether management has the following: Visibility to assess the likelihood of threats and potential damage to the institution. App A Objective 3.2.d] | Leadership and high level objectives | Process or Activity | |
Document and communicate the linkage between organizational objectives, functions, activities, and general controls. CC ID 12398 [Determine whether management implements controls that appropriately align security with the nature of the institution's operations and strategic direction. Specifically, review whether management does the following: App A Objective 6.5 Determine whether management appropriately integrates the information security program across the institution's lines of business and support functions. Review whether management has the following: App A Objective 3.2] | Leadership and high level objectives | Establish/Maintain Documentation | |
Identify threats that could affect achieving organizational objectives. CC ID 12827 [Review whether management has the following: Visibility to assess the likelihood of threats and potential damage to the institution. App A Objective 3.2.d {threat identification process}{threat assessment process} Determine whether management has effective threat identification and assessment processes, including the following: App A Objective 8.3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Leadership and high level objectives | Business Processes | |
Identify how opportunities, threats, and external requirements are trending. CC ID 12829 | Leadership and high level objectives | Process or Activity | |
Identify relationships between opportunities, threats, and external requirements. CC ID 12805 | Leadership and high level objectives | Process or Activity | |
Review the organization's approach to managing information security, as necessary. CC ID 12005 [Review for indicators of an effective information security culture (e.g., method of introducing new business initiatives and manner in which the institution holds lines of business and employees accountable for promoting information security). App A Objective 2.1.c Review whether management does the following: Implements and assesses the adequacy of appropriate controls to ensure the security of connections. App A Objective 6.7.e {information security culture} Determine whether the institution has a culture that contributes to the effectiveness of the information security program. App A Objective 2.1 Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Leadership and high level objectives | Business Processes | |
Disseminate and communicate emerging threats to all interested personnel and affected parties. CC ID 12185 | Leadership and high level objectives | Communicate | |
Establish and maintain the scope of the organizational compliance framework and Information Assurance controls. CC ID 01241 | Leadership and high level objectives | Establish/Maintain Documentation | |
Establish, implement, and maintain a policy and procedure management program. CC ID 06285 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include threats in the organization’s policies, standards, and procedures. CC ID 12953 [{risk identification} Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Identification of threats and risks. App A Objective 3.1.a] | Leadership and high level objectives | Establish/Maintain Documentation | |
Establish and maintain an Authority Document list. CC ID 07113 [Determine whether the institution's security operations activities include the following: Law enforcement interface (e.g., data retention and lawful intercepts). App A Objective 8.1.f] | Leadership and high level objectives | Establish/Maintain Documentation | |
Document organizational procedures that harmonize external requirements, including all legal requirements. CC ID 00623 | Leadership and high level objectives | Establish/Maintain Documentation | |
Establish, implement, and maintain full documentation of all policies, standards, and procedures that support the organization's compliance framework. CC ID 01636 | Leadership and high level objectives | Establish/Maintain Documentation | |
Disseminate and communicate the organization’s policies, standards, and procedures to all interested personnel and affected parties. CC ID 12901 | Leadership and high level objectives | Communicate | |
Disseminate and communicate the list of Authority Documents that support the organization's compliance framework to interested personnel and affected parties. CC ID 01312 | Leadership and high level objectives | Establish/Maintain Documentation | |
Classify controls according to their preventive, detective, or corrective status. CC ID 06436 [Review whether management does the following: Uses controls of different classifications, including preventive, detective, and corrective. App A Objective 6.4.b {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security {preventive controls}{detective controls} Management should implement appropriate preventive, detective, and corrective controls for physical security. II.C.8 Physical Security] | Leadership and high level objectives | Establish/Maintain Documentation | |
Publish, disseminate, and communicate a Statement on Internal Control, as necessary. CC ID 06727 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include signatures of c-level executives in the Statement on Internal Control. CC ID 14778 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include confirmation of any significant weaknesses in the Statement on Internal Control. CC ID 06861 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include roles and responsibilities in the Statement on Internal Control. CC ID 14774 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include an assurance statement regarding the counterterror protective security plan in the Statement on Internal Control. CC ID 06866 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include limitations of internal control systems in the Statement on Internal Control. CC ID 14773 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include a description of the methodology used to evaluate internal controls in the Statement on Internal Control. CC ID 14772 | Leadership and high level objectives | Establish/Maintain Documentation | |
Assign legislative body jurisdiction to the organization's assets, as necessary. CC ID 06956 | Leadership and high level objectives | Establish Roles | |
Define the Information Assurance strategic roles and responsibilities. CC ID 00608 [{delineate}{communicate} Determine whether management responsibilities are appropriate and include the following: Delineation of clear lines of responsibility and communication of accountability for information security. App A Objective 2.5.d] | Leadership and high level objectives | Establish Roles | |
Include recommendations for changes or updates to the information security program in the Board Report. CC ID 13180 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Recommendations for changes or updates to the information security program. App A Objective 2.4.f] | Leadership and high level objectives | Establish/Maintain Documentation | |
Assign the review of project plans for critical projects to the compliance oversight committee. CC ID 01182 | Leadership and high level objectives | Establish Roles | |
Assign the corporate governance of Information Technology to the compliance oversight committee. CC ID 01178 | Leadership and high level objectives | Establish Roles | |
Assign the review of Information Technology policies and procedures to the compliance oversight committee. CC ID 01179 [Review whether management has processes to do the following: Report changes of the information security program to the board. App A Objective 4.5.c] | Leadership and high level objectives | Establish Roles | |
Involve the Board of Directors or senior management in Information Governance. CC ID 00609 | Leadership and high level objectives | Establish Roles | |
Assign responsibility for enforcing the requirements of the Information Governance Plan to senior management. CC ID 12058 | Leadership and high level objectives | Human Resources Management | |
Address Information Security during the business planning processes. CC ID 06495 | Leadership and high level objectives | Data and Information Management | |
Document the requirements of stakeholders during the business planning process regarding Information Security. CC ID 06498 | Leadership and high level objectives | Establish/Maintain Documentation | |
Assign reviewing and approving Quality Management standards to the appropriate oversight committee. CC ID 07192 | Leadership and high level objectives | Establish Roles | |
Define and assign the Chief Executive's Information Assurance roles and responsibilities. CC ID 06089 | Leadership and high level objectives | Establish Roles | |
Define and assign the Chief Financial Officer's Information Assurance roles and responsibilities. CC ID 06090 | Leadership and high level objectives | Establish Roles | |
Define and assign the Chief of Risk's Information Assurance roles and responsibilities. CC ID 06092 | Leadership and high level objectives | Establish Roles | |
Establish, implement, and maintain a strategic plan. CC ID 12784 | Leadership and high level objectives | Establish/Maintain Documentation | |
Establish, implement, and maintain a decision management strategy. CC ID 06913 | Leadership and high level objectives | Establish/Maintain Documentation | |
Include criteria for risk tolerance in the decision-making criteria. CC ID 12950 [{validate} {threat identification} Review whether management has the following: A validation though audits, self-assessments, penetration tests, and vulnerability assessments that risk decisions are informed by appropriate identification and analysis of threats and other potential causes of loss. App A Objective 4.2.e {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5 {self-assessment test result} {penetration test result} {vulnerability assessment result} {audit result} Determine whether management uses reporting of the results of self-assessments, penetration tests, vulnerability assessments, and audits to support management decision making. App A Objective 10.5] | Leadership and high level objectives | Establish/Maintain Documentation | |
Establish, implement, and maintain a Strategic Information Technology Plan. CC ID 00628 | Leadership and high level objectives | Establish/Maintain Documentation | |
Establish and maintain an Information Technology plan status report that covers both Strategic Information Technology Plans and tactical Information Technology plans. CC ID 06839 | Leadership and high level objectives | Actionable Reports or Measurements | |
Include key personnel status changes in the Information Technology Plan status reports. CC ID 06840 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Loss, addition, or change in duties of key personnel. App A Objective 1.3.d] | Leadership and high level objectives | Actionable Reports or Measurements | |
Establish, implement, and maintain a Governance, Risk, and Compliance awareness and training program. CC ID 06492 [Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Leadership and high level objectives | Business Processes | |
Establish and maintain a rapport with business and technical communities throughout the organization to promote the value and importance of Information Security. CC ID 06493 [Determine whether management promotes effective governance of the information security program through a strong information security culture, defined information security responsibilities and accountability, and adequate resources to support the program. App A Objective 2] | Leadership and high level objectives | Behavior | |
Establish, implement, and maintain Responding to Failures in Security Controls procedures. CC ID 12514 [Determine whether the institution's security operations activities include the following: Vulnerability cataloging and remediation tracking. App A Objective 8.1.d {credit loss} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Credit or operating losses primarily attributable (or thought to be attributable) to IT (e.g., system problems, fraud occurring due to poor controls, and improperly implemented changes to systems). App A Objective 1.3.g {credit loss} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Credit or operating losses primarily attributable (or thought to be attributable) to IT (e.g., system problems, fraud occurring due to poor controls, and improperly implemented changes to systems). App A Objective 1.3.g] | Monitoring and measurement | Establish/Maintain Documentation | |
Include resuming security system monitoring and logging operations in the Responding to Failures in Security Controls procedure. CC ID 12521 | Monitoring and measurement | Establish/Maintain Documentation | |
Include implementing mitigating controls to prevent the root cause of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12520 [Review whether management has the following: The ability to identify and implement controls over the root causes of an incident. App A Objective 3.2.e Review whether management has the following: The ability to identify and implement controls over the root causes of an incident. App A Objective 3.2.e] | Monitoring and measurement | Establish/Maintain Documentation | |
Include performing a risk assessment to determine whether further actions are required because of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12519 | Monitoring and measurement | Establish/Maintain Documentation | |
Include identification of the root cause of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 15481 | Monitoring and measurement | Establish/Maintain Documentation | |
Include correcting security issues caused by the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12518 | Monitoring and measurement | Establish/Maintain Documentation | |
Include documenting the duration of the failure of a security control in the Responding to Failures in Security Controls procedure. CC ID 12517 | Monitoring and measurement | Establish/Maintain Documentation | |
Include restoring security functions in the Responding to Failures in Security Controls procedure. CC ID 12515 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain an audit and accountability policy. CC ID 14035 | Monitoring and measurement | Establish/Maintain Documentation | |
Include compliance requirements in the audit and accountability policy. CC ID 14103 | Monitoring and measurement | Establish/Maintain Documentation | |
Include coordination amongst entities in the audit and accountability policy. CC ID 14102 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the purpose in the audit and accountability policy. CC ID 14100 | Monitoring and measurement | Establish/Maintain Documentation | |
Include roles and responsibilities in the audit and accountability policy. CC ID 14098 | Monitoring and measurement | Establish/Maintain Documentation | |
Include management commitment in the audit and accountability policy. CC ID 14097 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the scope in the audit and accountability policy. CC ID 14096 | Monitoring and measurement | Establish/Maintain Documentation | |
Disseminate and communicate the audit and accountability policy to interested personnel and affected parties. CC ID 14095 | Monitoring and measurement | Communicate | |
Establish, implement, and maintain audit and accountability procedures. CC ID 14057 | Monitoring and measurement | Establish/Maintain Documentation | |
Disseminate and communicate the audit and accountability procedures to interested personnel and affected parties. CC ID 14137 | Monitoring and measurement | Communicate | |
Enable monitoring and logging operations on all assets that meet the organizational criteria to maintain event logs. CC ID 06312 | Monitoring and measurement | Log Management | |
Review and approve the use of continuous security management systems. CC ID 13181 [Determine whether management has effective threat monitoring processes, including the following: Appropriately reviewing and providing approval of the monitoring tools used. App A Objective 8.4.c Determine whether management has effective threat monitoring processes, including the following: Appropriately reviewing and providing approval of the monitoring tools used. App A Objective 8.4.c] | Monitoring and measurement | Process or Activity | |
Protect continuous security management systems from unauthorized use. CC ID 13097 | Monitoring and measurement | Configuration | |
Establish, implement, and maintain an intrusion detection and prevention program. CC ID 15211 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain intrusion management operations. CC ID 00580 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain an intrusion detection and prevention policy. CC ID 15169 | Monitoring and measurement | Establish/Maintain Documentation | |
Install and maintain an Intrusion Detection System and/or Intrusion Prevention System. CC ID 00581 | Monitoring and measurement | Configuration | |
Protect each person's right to privacy and civil liberties during intrusion management operations. CC ID 10035 | Monitoring and measurement | Behavior | |
Do not intercept communications of any kind when providing a service to clients. CC ID 09985 | Monitoring and measurement | Behavior | |
Monitor systems for unauthorized data transfers. CC ID 12971 [Determine whether management has effective threat monitoring processes, including the following: Monitoring both incoming and outgoing network traffic to identify malicious activity and data exfiltration. App A Objective 8.4.e] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Address operational anomalies within the incident management system. CC ID 11633 | Monitoring and measurement | Audits and Risk Management | |
Incorporate an Identity Theft Prevention Program into the organization's incident management system. CC ID 11634 | Monitoring and measurement | Audits and Risk Management | |
Monitor systems for unauthorized mobile code. CC ID 10034 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Update the intrusion detection capabilities and the incident response capabilities regularly. CC ID 04653 | Monitoring and measurement | Technical Security | |
Implement honeyclients to proactively seek for malicious websites and malicious code. CC ID 10658 | Monitoring and measurement | Technical Security | |
Implement detonation chambers, where appropriate. CC ID 10670 | Monitoring and measurement | Technical Security | |
Define and assign log management roles and responsibilities. CC ID 06311 | Monitoring and measurement | Establish Roles | |
Document and communicate the log locations to the owning entity. CC ID 12047 | Monitoring and measurement | Log Management | |
Make logs available for review by the owning entity. CC ID 12046 | Monitoring and measurement | Log Management | |
Establish, implement, and maintain an event logging policy. CC ID 15217 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the system components that generate audit records in the event logging procedures. CC ID 16426 | Monitoring and measurement | Data and Information Management | |
Include a standard to collect and interpret event logs in the event logging procedures. CC ID 00643 | Monitoring and measurement | Log Management | |
Protect the event logs from failure. CC ID 06290 | Monitoring and measurement | Log Management | |
Overwrite the oldest records when audit logging fails. CC ID 14308 | Monitoring and measurement | Data and Information Management | |
Supply each in scope asset with audit reduction tool and report generation capabilities to support after-the-fact investigations without altering the event logs. CC ID 01427 | Monitoring and measurement | Testing | |
Include identity information of suspects in the suspicious activity report. CC ID 16648 | Monitoring and measurement | Establish/Maintain Documentation | |
Compile the event logs of multiple components into a system-wide time-correlated audit trail. CC ID 01424 [Review whether management has the following: Processes to effectively collect, aggregate, analyze, and correlate security event information from discrete systems and applications. App A Objective 6.35.d] | Monitoring and measurement | Audits and Risk Management | |
Reproduce the event log if a log failure is captured. CC ID 01426 | Monitoring and measurement | Log Management | |
Document the event information to be logged in the event information log specification. CC ID 00639 | Monitoring and measurement | Configuration | |
Enable the logging capability to capture enough information to ensure the system is functioning according to its intended purpose throughout its life cycle. CC ID 15001 | Monitoring and measurement | Configuration | |
Enable and configure logging on all network access controls. CC ID 01963 | Monitoring and measurement | Configuration | |
Synchronize system clocks to an accurate and universal time source on all devices. CC ID 01340 | Monitoring and measurement | Configuration | |
Centralize network time servers to as few as practical. CC ID 06308 | Monitoring and measurement | Configuration | |
Disseminate and communicate information to customers about clock synchronization methods used by the organization. CC ID 13044 | Monitoring and measurement | Communicate | |
Define the frequency to capture and log events. CC ID 06313 | Monitoring and measurement | Log Management | |
Include logging frequencies in the event logging procedures. CC ID 00642 | Monitoring and measurement | Log Management | |
Review and update the list of auditable events in the event logging procedures. CC ID 10097 | Monitoring and measurement | Establish/Maintain Documentation | |
Disseminate and communicate monitoring capabilities with interested personnel and affected parties. CC ID 13156 | Monitoring and measurement | Communicate | |
Disseminate and communicate statistics on resource usage with interested personnel and affected parties. CC ID 13155 | Monitoring and measurement | Communicate | |
Establish, implement, and maintain network monitoring operations. CC ID 16444 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Monitor for software configurations updates absent authorization. CC ID 10676 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Allow expected changes during file integrity monitoring. CC ID 12090 | Monitoring and measurement | Technical Security | |
Monitor for when documents are being updated absent authorization. CC ID 10677 | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Include a change history and identify who made the changes in the file integrity monitoring report. CC ID 12091 | Monitoring and measurement | Establish/Maintain Documentation | |
Alert interested personnel and affected parties when an unauthorized modification to critical files is detected. CC ID 12045 | Monitoring and measurement | Process or Activity | |
Develop and maintain a usage profile for each user account. CC ID 07067 | Monitoring and measurement | Technical Security | |
Establish, implement, and maintain a risk monitoring program. CC ID 00658 [Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Monitoring and reporting of risks. App A Objective 3.1.d {risk monitoring process}{risk reporting process} Determine whether management has effective risk monitoring and reporting processes. App A Objective 7 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g Determine whether program monitoring and reporting instigate appropriate changes that are effective in maintaining an acceptable level of risk. App A Objective 7.3 Determine whether management has effective threat monitoring processes, including the following: App A Objective 8.4 {risk monitoring process}{risk reporting process}{be operational and effective} Determine whether the risk monitoring and reporting process is regular and prompts action, when necessary, in a timely manner. App A Objective 7.2 {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Monitoring and measurement | Establish/Maintain Documentation | |
Monitor the organization's exposure to threats, as necessary. CC ID 06494 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Implement a fraud detection system. CC ID 13081 | Monitoring and measurement | Business Processes | |
Monitor for new vulnerabilities. CC ID 06843 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain a compliance testing strategy. CC ID 00659 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain a self-assessment approach as part of the compliance testing strategy. CC ID 12833 [Periodic self-assessments performed by the organizational unit being assessed. App A Objective 10.3.a] | Monitoring and measurement | Testing | |
Establish, implement, and maintain a system security plan. CC ID 01922 | Monitoring and measurement | Testing | |
Include a system description in the system security plan. CC ID 16467 | Monitoring and measurement | Establish/Maintain Documentation | |
Include a description of the operational context in the system security plan. CC ID 14301 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the results of the security categorization in the system security plan. CC ID 14281 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the information types in the system security plan. CC ID 14696 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the security requirements in the system security plan. CC ID 14274 | Monitoring and measurement | Establish/Maintain Documentation | |
Include threats in the system security plan. CC ID 14693 | Monitoring and measurement | Establish/Maintain Documentation | |
Include network diagrams in the system security plan. CC ID 14273 | Monitoring and measurement | Establish/Maintain Documentation | |
Include roles and responsibilities in the system security plan. CC ID 14682 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the results of the privacy risk assessment in the system security plan. CC ID 14676 | Monitoring and measurement | Establish/Maintain Documentation | |
Include remote access methods in the system security plan. CC ID 16441 | Monitoring and measurement | Establish/Maintain Documentation | |
Disseminate and communicate the system security plan to interested personnel and affected parties. CC ID 14275 | Monitoring and measurement | Communicate | |
Include a description of the operational environment in the system security plan. CC ID 14272 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the security categorizations and rationale in the system security plan. CC ID 14270 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the authorization boundary in the system security plan. CC ID 14257 | Monitoring and measurement | Establish/Maintain Documentation | |
Align the enterprise architecture with the system security plan. CC ID 14255 | Monitoring and measurement | Process or Activity | |
Include security controls in the system security plan. CC ID 14239 | Monitoring and measurement | Establish/Maintain Documentation | |
Create specific test plans to test each system component. CC ID 00661 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the roles and responsibilities in the test plan. CC ID 14299 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the assessment team in the test plan. CC ID 14297 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the scope in the test plans. CC ID 14293 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the assessment environment in the test plan. CC ID 14271 | Monitoring and measurement | Establish/Maintain Documentation | |
Approve the system security plan. CC ID 14241 | Monitoring and measurement | Business Processes | |
Review the test plans for each system component. CC ID 00662 | Monitoring and measurement | Establish/Maintain Documentation | |
Document validated testing processes in the testing procedures. CC ID 06200 | Monitoring and measurement | Establish/Maintain Documentation | |
Include error details, identifying the root causes, and mitigation actions in the testing procedures. CC ID 11827 | Monitoring and measurement | Establish/Maintain Documentation | |
Determine the appropriate assessment method for each testing process in the test plan. CC ID 00665 | Monitoring and measurement | Testing | |
Implement automated audit tools. CC ID 04882 | Monitoring and measurement | Acquisition/Sale of Assets or Services | |
Assign senior management to approve test plans. CC ID 13071 | Monitoring and measurement | Human Resources Management | |
Establish, implement, and maintain a testing program. CC ID 00654 [Determine whether management considers the following key testing factors when developing and implementing independent tests: App A Objective 10.2 {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Monitoring and measurement | Behavior | |
Establish, implement, and maintain a security assessment and authorization policy. CC ID 14031 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish and maintain a scoring method for Red Team exercise results. CC ID 12136 | Monitoring and measurement | Establish/Maintain Documentation | |
Include coordination amongst entities in the security assessment and authorization policy. CC ID 14222 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the scope in the security assessment and authorization policy. CC ID 14220 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the purpose in the security assessment and authorization policy. CC ID 14219 | Monitoring and measurement | Establish/Maintain Documentation | |
Disseminate and communicate the security assessment and authorization policy to interested personnel and affected parties. CC ID 14218 | Monitoring and measurement | Communicate | |
Include management commitment in the security assessment and authorization policy. CC ID 14189 | Monitoring and measurement | Establish/Maintain Documentation | |
Include compliance requirements in the security assessment and authorization policy. CC ID 14183 | Monitoring and measurement | Establish/Maintain Documentation | |
Include roles and responsibilities in the security assessment and authorization policy. CC ID 14179 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain security assessment and authorization procedures. CC ID 14056 | Monitoring and measurement | Establish/Maintain Documentation | |
Disseminate and communicate security assessment and authorization procedures to interested personnel and affected parties. CC ID 14224 | Monitoring and measurement | Communicate | |
Employ third parties to carry out testing programs, as necessary. CC ID 13178 [{third party} Determine whether management uses independent organizations to test aspects of its information security programs. App A Objective 10.4] | Monitoring and measurement | Human Resources Management | |
Document improvement actions based on test results and exercises. CC ID 16840 | Monitoring and measurement | Establish/Maintain Documentation | |
Define the test requirements for each testing program. CC ID 13177 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Proxy testing. App A Objective 10.2.g Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality, integrity, and availability of the institution's information. App A Objective 10.2.d] | Monitoring and measurement | Establish/Maintain Documentation | |
Include test requirements for the use of human subjects in the testing program. CC ID 16222 | Monitoring and measurement | Testing | |
Test the in scope system in accordance with its intended purpose. CC ID 14961 | Monitoring and measurement | Testing | |
Perform network testing in accordance with organizational standards. CC ID 16448 | Monitoring and measurement | Testing | |
Test user accounts in accordance with organizational standards. CC ID 16421 | Monitoring and measurement | Testing | |
Include mechanisms for emergency stops in the testing program. CC ID 14398 | Monitoring and measurement | Establish/Maintain Documentation | |
Document the business need justification for authorized wireless access points. CC ID 12044 | Monitoring and measurement | Establish/Maintain Documentation | |
Deny network access to rogue devices until network access approval has been received. CC ID 11852 | Monitoring and measurement | Configuration | |
Establish, implement, and maintain conformity assessment procedures. CC ID 15032 | Monitoring and measurement | Establish/Maintain Documentation | |
Share conformity assessment results with affected parties and interested personnel. CC ID 15113 | Monitoring and measurement | Communicate | |
Notify affected parties and interested personnel of technical documentation assessment certificates that have been issued. CC ID 15112 | Monitoring and measurement | Communicate | |
Notify affected parties and interested personnel of technical documentation assessment certificates that have been refused, withdrawn, suspended or restricted. CC ID 15111 | Monitoring and measurement | Communicate | |
Create technical documentation assessment certificates in an official language. CC ID 15110 | Monitoring and measurement | Establish/Maintain Documentation | |
Opt out of third party conformity assessments when the system meets harmonized standards. CC ID 15096 | Monitoring and measurement | Testing | |
Define the test frequency for each testing program. CC ID 13176 [{test frequency} Determine whether management considers the following key testing factors when developing and implementing independent tests: Frequency. App A Objective 10.2.f] | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain a stress test program for identification cards or badges. CC ID 15424 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain a penetration test program. CC ID 01105 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a Verify whether management ensures the following are done: Penetration tests that subject a system to real-world attacks and identify weaknesses. App A Objective 10.3.b Verify whether management ensures the following are done: Penetration tests that subject a system to real-world attacks and identify weaknesses. App A Objective 10.3.b] | Monitoring and measurement | Behavior | |
Disseminate and communicate the testing program to all interested personnel and affected parties. CC ID 11871 [Determine whether management considers the following key testing factors when developing and implementing independent tests: Personnel. App A Objective 10.2.b] | Monitoring and measurement | Communicate | |
Align the penetration test program with industry standards. CC ID 12469 | Monitoring and measurement | Establish/Maintain Documentation | |
Assign penetration testing to a qualified internal resource or external third party. CC ID 06429 | Monitoring and measurement | Establish Roles | |
Establish, implement, and maintain a penetration testing methodology that validates scope-reduction controls through network segmentation. CC ID 11958 | Monitoring and measurement | Testing | |
Retain penetration test results according to internal policy. CC ID 10049 | Monitoring and measurement | Records Management | |
Retain penetration test remediation action records according to internal policy. CC ID 11629 | Monitoring and measurement | Records Management | |
Ensure protocols are free from injection flaws. CC ID 16401 | Monitoring and measurement | Process or Activity | |
Establish, implement, and maintain a business line testing strategy. CC ID 13245 | Monitoring and measurement | Establish/Maintain Documentation | |
Include facilities in the business line testing strategy. CC ID 13253 | Monitoring and measurement | Establish/Maintain Documentation | |
Include electrical systems in the business line testing strategy. CC ID 13251 | Monitoring and measurement | Establish/Maintain Documentation | |
Include mechanical systems in the business line testing strategy. CC ID 13250 | Monitoring and measurement | Establish/Maintain Documentation | |
Include Heating Ventilation and Air Conditioning systems in the business line testing strategy. CC ID 13248 | Monitoring and measurement | Establish/Maintain Documentation | |
Include emergency power supplies in the business line testing strategy. CC ID 13247 | Monitoring and measurement | Establish/Maintain Documentation | |
Include environmental controls in the business line testing strategy. CC ID 13246 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain a vulnerability management program. CC ID 15721 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain a vulnerability assessment program. CC ID 11636 [{establish} Determine whether management has continuous, established routines to identify and assess vulnerabilities. Determine whether management has processes to receive vulnerability information disclosed by external individuals or groups, such as security or vulnerability researchers. App A Objective 4.4] | Monitoring and measurement | Establish/Maintain Documentation | |
Use dedicated user accounts when conducting vulnerability scans. CC ID 12098 | Monitoring and measurement | Technical Security | |
Record the vulnerability scanning activity in the vulnerability scan report. CC ID 12097 | Monitoring and measurement | Establish/Maintain Documentation | |
Disseminate and communicate the vulnerability scan results to interested personnel and affected parties. CC ID 16418 | Monitoring and measurement | Communicate | |
Maintain vulnerability scan reports as organizational records. CC ID 12092 | Monitoring and measurement | Records Management | |
Employ an approved third party to perform external vulnerability scans on the organization's systems. CC ID 12467 | Monitoring and measurement | Business Processes | |
Meet the requirements for a passing score during an external vulnerability scan or rescan. CC ID 12039 | Monitoring and measurement | Testing | |
Approve the vulnerability management program. CC ID 15722 | Monitoring and measurement | Process or Activity | |
Assign ownership of the vulnerability management program to the appropriate role. CC ID 15723 | Monitoring and measurement | Establish Roles | |
Perform penetration tests and vulnerability scans in concert, as necessary. CC ID 12111 | Monitoring and measurement | Technical Security | |
Establish, implement, and maintain a compliance monitoring policy. CC ID 00671 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain a metrics policy. CC ID 01654 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain an approach for compliance monitoring. CC ID 01653 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain risk management metrics. CC ID 01656 [{risk metric} Review whether management does the following: Uses metrics to quantify and report risks in the information security program. App A Objective 7.4.e {risk management metrics} Review whether management does the following: Uses metrics that are timely, comprehensive, and actionable to improve the program's effectiveness and efficiency. App A Objective 7.4.a Determine whether management develops and effectively uses metrics as part of the risk monitoring and reporting processes for the information security program. Review whether management does the following: App A Objective 7.4] | Monitoring and measurement | Establish/Maintain Documentation | |
Identify and document instances of non-compliance with the compliance framework. CC ID 06499 | Monitoring and measurement | Establish/Maintain Documentation | |
Identify and document events surrounding non-compliance with the organizational compliance framework. CC ID 12935 | Monitoring and measurement | Establish/Maintain Documentation | |
Align disciplinary actions with the level of compliance violation. CC ID 12404 | Monitoring and measurement | Human Resources Management | |
Establish, implement, and maintain disciplinary action notices. CC ID 16577 | Monitoring and measurement | Establish/Maintain Documentation | |
Include a copy of the order in the disciplinary action notice. CC ID 16606 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the sanctions imposed in the disciplinary action notice. CC ID 16599 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the effective date of the sanctions in the disciplinary action notice. CC ID 16589 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the requirements that were violated in the disciplinary action notice. CC ID 16588 | Monitoring and measurement | Establish/Maintain Documentation | |
Include responses to charges from interested personnel and affected parties in the disciplinary action notice. CC ID 16587 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the reasons for imposing sanctions in the disciplinary action notice. CC ID 16586 | Monitoring and measurement | Establish/Maintain Documentation | |
Disseminate and communicate the disciplinary action notice to interested personnel and affected parties. CC ID 16585 | Monitoring and measurement | Communicate | |
Include required information in the disciplinary action notice. CC ID 16584 | Monitoring and measurement | Establish/Maintain Documentation | |
Include a justification for actions taken in the disciplinary action notice. CC ID 16583 | Monitoring and measurement | Establish/Maintain Documentation | |
Include a statement on the conclusions of the investigation in the disciplinary action notice. CC ID 16582 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the investigation results in the disciplinary action notice. CC ID 16581 | Monitoring and measurement | Establish/Maintain Documentation | |
Include a description of the causes of the actions taken in the disciplinary action notice. CC ID 16580 | Monitoring and measurement | Establish/Maintain Documentation | |
Include the name of the person responsible for the charges in the disciplinary action notice. CC ID 16579 | Monitoring and measurement | Establish/Maintain Documentation | |
Include contact information in the disciplinary action notice. CC ID 16578 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain compliance program metrics. CC ID 11625 [{risk metric} Review whether management does the following: Establishes metrics to measure conformance to the standards and procedures that are used to implement policies. App A Objective 7.4.d] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain a security program metrics program. CC ID 01660 [{risk metric} Review whether management does the following: Develops metrics that demonstrate the extent to which the information security program is implemented and whether the program is effective. App A Objective 7.4.b] | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain an Information Security metrics program. CC ID 01665 [Determine whether the annual information security report is timely and contains adequate information. App A Objective 10.6 Determine whether the annual information security report is timely and contains adequate information. App A Objective 10.6 Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Monitoring and measurement | Establish/Maintain Documentation | |
Monitor the supply chain for Information Assurance effectiveness. CC ID 02043 [{outsourced process} If the institution outsources activities to a third-party service provider, determine whether management integrates those activities with the information security program. Verify that the third-party management program evidences expectations that align with the institution's information security program. App A Objective 3.3] | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain a technical measurement metrics policy. CC ID 01655 | Monitoring and measurement | Establish/Maintain Documentation | |
Establish, implement, and maintain an incident management and vulnerability management metrics program. CC ID 02085 [{software development} With respect to developed software, determine whether institution management does the following: Collects data to build metrics and reporting of configuration management compliance, and vulnerability management. App A Objective 6.28.f] | Monitoring and measurement | Business Processes | |
Delay the reporting of incident management metrics, as necessary. CC ID 15501 | Monitoring and measurement | Communicate | |
Establish, implement, and maintain a log management program. CC ID 00673 [Determine whether management has an effective log management process that involves a central logging repository, timely transmission of log files, and effective log analysis. Review whether management has the following: App A Objective 6.35] | Monitoring and measurement | Establish/Maintain Documentation | |
Deploy log normalization tools, as necessary. CC ID 12141 | Monitoring and measurement | Technical Security | |
Restrict access to logs to authorized individuals. CC ID 01342 | Monitoring and measurement | Log Management | |
Restrict access to audit trails to a need to know basis. CC ID 11641 | Monitoring and measurement | Technical Security | |
Refrain from recording unnecessary restricted data in logs. CC ID 06318 | Monitoring and measurement | Log Management | |
Back up audit trails according to backup procedures. CC ID 11642 | Monitoring and measurement | Systems Continuity | |
Back up logs according to backup procedures. CC ID 01344 | Monitoring and measurement | Log Management | |
Copy logs from all predefined hosts onto a log management infrastructure. CC ID 01346 | Monitoring and measurement | Log Management | |
Identify hosts with logs that are not being stored. CC ID 06314 | Monitoring and measurement | Log Management | |
Identify hosts with logs that are being stored at the system level only. CC ID 06315 | Monitoring and measurement | Log Management | |
Identify hosts with logs that should be stored at both the system level and the infrastructure level. CC ID 06316 | Monitoring and measurement | Log Management | |
Identify hosts with logs that are being stored at the infrastructure level only. CC ID 06317 | Monitoring and measurement | Log Management | |
Protect logs from unauthorized activity. CC ID 01345 | Monitoring and measurement | Log Management | |
Perform testing and validating activities on all logs. CC ID 06322 | Monitoring and measurement | Log Management | |
Archive the audit trail in accordance with compliance requirements. CC ID 00674 | Monitoring and measurement | Log Management | |
Enforce dual authorization as a part of information flow control for logs. CC ID 10098 | Monitoring and measurement | Configuration | |
Preserve the identity of individuals in audit trails. CC ID 10594 | Monitoring and measurement | Log Management | |
Establish, implement, and maintain a cross-organizational audit sharing agreement. CC ID 10595 | Monitoring and measurement | Establish/Maintain Documentation | |
Provide cross-organizational audit information based on the cross-organizational audit sharing agreement. CC ID 10596 | Monitoring and measurement | Audits and Risk Management | |
Report actions taken on known security issues to the Board of Directors or Senior Executive Committee on a regular basis. CC ID 12330 [Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Results of security operations activities and summaries of assurance reports. App A Objective 2.4.d Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Results of security operations activities and summaries of assurance reports. App A Objective 2.4.d] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Report known security issues to interested personnel and affected parties on a regular basis. CC ID 12329 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Filters and reviews logs for potential security events and provides adequate reports and alerts. App A Objective 6.21.f Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Monitoring and measurement | Monitor and Evaluate Occurrences | |
Define the roles and responsibilities for personnel assigned to tasks in the Audit function. CC ID 00678 | Audits and risk management | Establish Roles | |
Define and assign the external auditor's roles and responsibilities. CC ID 00683 | Audits and risk management | Establish Roles | |
Retain copies of external auditor outsourcing contracts and engagement letters. CC ID 01188 | Audits and risk management | Establish/Maintain Documentation | |
Review external auditor outsourcing contracts and engagement letters. CC ID 01189 | Audits and risk management | Establish/Maintain Documentation | |
Include the scope and work to be performed in external auditor outsourcing contracts. CC ID 01190 | Audits and risk management | Establish/Maintain Documentation | |
Review the conclusions of the external auditor's work papers and audit reports. CC ID 01200 [Review preliminary conclusions with the examiner-in-charge regarding the following: App A Objective 11.1 {include} Review preliminary conclusions with the examiner-in-charge regarding the following: Significant issues warranting inclusion as matters requiring attention or recommendations in the report of examination. App A Objective 11.1.b] | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain an audit program. CC ID 00684 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain audit policies. CC ID 13166 | Audits and risk management | Establish/Maintain Documentation | |
Assign the audit to impartial auditors. CC ID 07118 [Verify whether management ensures the following are done: Audits performed by independent internal departments or third parties. App A Objective 10.3.d] | Audits and risk management | Establish Roles | |
Define what constitutes a threat to independence. CC ID 16824 | Audits and risk management | Audits and Risk Management | |
Exercise due professional care during the planning and performance of the audit. CC ID 07119 | Audits and risk management | Behavior | |
Include resource requirements in the audit program. CC ID 15237 | Audits and risk management | Establish/Maintain Documentation | |
Include risks and opportunities in the audit program. CC ID 15236 | Audits and risk management | Establish/Maintain Documentation | |
Include provisions for legislative plurality and legislative domain in the audit program. CC ID 06959 | Audits and risk management | Audits and Risk Management | |
Establish and maintain audit terms. CC ID 13880 | Audits and risk management | Establish/Maintain Documentation | |
Refrain from approving changes to the audit terms absent reasonable justification. CC ID 13973 | Audits and risk management | Process or Activity | |
Include a statement about the inherent limitations of the audit in the audit terms. CC ID 13883 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the audit will be conducted in accordance with attestation standards in the audit terms. CC ID 13882 | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain agreed upon procedures that are in scope for the audit. CC ID 13893 | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain an in scope system description. CC ID 14873 | Audits and risk management | Establish/Maintain Documentation | |
Include in scope procedures in the audit assertion's in scope system description. CC ID 16551 | Audits and risk management | Audits and Risk Management | |
Include roles and responsibilities in the audit assertion's in scope system description. CC ID 16558 | Audits and risk management | Audits and Risk Management | |
Include the audit criteria in the audit assertion's in scope system description. CC ID 16548 | Audits and risk management | Audits and Risk Management | |
Include third party data in the audit assertion's in scope system description. CC ID 16554 | Audits and risk management | Audits and Risk Management | |
Include third party personnel in the audit assertion's in scope system description. CC ID 16552 | Audits and risk management | Audits and Risk Management | |
Include compliance requirements in the audit assertion's in scope system description. CC ID 16506 | Audits and risk management | Audits and Risk Management | |
Include third party assets in the audit assertion's in scope system description. CC ID 16550 | Audits and risk management | Audits and Risk Management | |
Include third party services in the audit assertion's in scope system description. CC ID 16503 | Audits and risk management | Establish/Maintain Documentation | |
Include monitoring controls in the audit assertion's in scope system description. CC ID 16501 | Audits and risk management | Establish/Maintain Documentation | |
Include availability commitments in the audit assertion's in scope system description. CC ID 14914 | Audits and risk management | Establish/Maintain Documentation | |
Include deviations and the corrective actions taken in the audit assertion's in scope system description. CC ID 16549 | Audits and risk management | Audits and Risk Management | |
Include changes in the audit assertion's in scope system description. CC ID 14894 | Audits and risk management | Establish/Maintain Documentation | |
Include external communications in the audit assertion's in scope system description. CC ID 14913 | Audits and risk management | Establish/Maintain Documentation | |
Include a section regarding incidents related to the system in the audit assertion’s in scope system description. CC ID 14878 | Audits and risk management | Establish/Maintain Documentation | |
Include the function performed by the in scope system in the audit assertion's in scope system description. CC ID 14911 | Audits and risk management | Establish/Maintain Documentation | |
Include the disposition of the incident in the audit assertion's in scope system description. CC ID 14896 | Audits and risk management | Establish/Maintain Documentation | |
Include the extent of the incident in the audit assertion's in scope system description. CC ID 14895 | Audits and risk management | Establish/Maintain Documentation | |
Include the timing of each incident in the audit assertion's in scope system description. CC ID 14891 | Audits and risk management | Establish/Maintain Documentation | |
Include the nature of each incident in the audit assertion's in scope system description. CC ID 14889 | Audits and risk management | Establish/Maintain Documentation | |
Include a section regarding in scope controls related to the system in the audit assertion's in scope system description. CC ID 14897 | Audits and risk management | Establish/Maintain Documentation | |
Include how the in scope system meets external requirements in the audit assertion's in scope system description. CC ID 16502 | Audits and risk management | Establish/Maintain Documentation | |
Include the timing of each control in the audit assertion's in scope system description. CC ID 14916 | Audits and risk management | Establish/Maintain Documentation | |
Include the nature of the control in the audit assertion's in scope system description. CC ID 14910 | Audits and risk management | Establish/Maintain Documentation | |
Include the information sources used in performing the control in the audit assertion's in scope system description. CC ID 14909 | Audits and risk management | Establish/Maintain Documentation | |
Include the responsible party for performing the control in the audit assertion's in scope system description. CC ID 14907 | Audits and risk management | Establish/Maintain Documentation | |
Include the subject matter to which the control is applied in the audit assertion's in scope system description. CC ID 14904 | Audits and risk management | Establish/Maintain Documentation | |
Refrain from omitting or distorting information in the audit assertion's in scope system description. CC ID 14893 | Audits and risk management | Establish/Maintain Documentation | |
Include the timing of each change in the audit assertion's in scope system description. CC ID 14892 | Audits and risk management | Establish/Maintain Documentation | |
Include the system boundaries in the audit assertion's in scope system description. CC ID 14887 | Audits and risk management | Establish/Maintain Documentation | |
Include the time frame covered by the description in the audit assertion's in scope system description. CC ID 14884 | Audits and risk management | Establish/Maintain Documentation | |
Include commitments to third parties in the audit assertion. CC ID 14899 | Audits and risk management | Establish/Maintain Documentation | |
Determine the completeness of the audit assertion's in scope system description. CC ID 14883 | Audits and risk management | Establish/Maintain Documentation | |
Include system requirements in the audit assertion's in scope system description. CC ID 14881 | Audits and risk management | Establish/Maintain Documentation | |
Include third party controls in the audit assertion's in scope system description. CC ID 14880 | Audits and risk management | Establish/Maintain Documentation | |
Hold an opening meeting with interested personnel and affected parties prior to an audit. CC ID 15256 | Audits and risk management | Audits and Risk Management | |
Identify personnel who should attend the closing meeting. CC ID 15261 | Audits and risk management | Business Processes | |
Include discussions about how particular situations will be handled in the opening meeting. CC ID 15254 | Audits and risk management | Audits and Risk Management | |
Include agreement to the audit scope and audit terms in the audit program. CC ID 06965 | Audits and risk management | Establish/Maintain Documentation | |
Establish and maintain a bespoke audit scope for each audit being performed. CC ID 13077 [Determine the appropriate scope and objectives for the examination. App A Objective 1] | Audits and risk management | Establish/Maintain Documentation | |
Include third party assets in the audit scope. CC ID 16504 | Audits and risk management | Audits and Risk Management | |
Include audit subject matter in the audit program. CC ID 07103 | Audits and risk management | Establish/Maintain Documentation | |
Examine the availability of the audit criteria in the audit program. CC ID 16520 | Audits and risk management | Investigate | |
Examine the objectivity of the audit criteria in the audit program. CC ID 07104 | Audits and risk management | Establish/Maintain Documentation | |
Examine the measurability of the audit criteria in the audit program. CC ID 07105 | Audits and risk management | Establish/Maintain Documentation | |
Examine the completeness of the audit criteria in the audit program. CC ID 07106 | Audits and risk management | Establish/Maintain Documentation | |
Examine the relevance of the audit criteria in the audit program. CC ID 07107 | Audits and risk management | Establish/Maintain Documentation | |
Determine the appropriateness of the audit subject matter. CC ID 16505 | Audits and risk management | Audits and Risk Management | |
Disseminate and communicate the audit program with the audit subject matter and audit criteria to all interested personnel and affected parties. CC ID 07116 | Audits and risk management | Establish/Maintain Documentation | |
Include the in scope material or in scope products in the audit program. CC ID 08961 | Audits and risk management | Audits and Risk Management | |
Include in scope information in the audit program. CC ID 16198 | Audits and risk management | Establish/Maintain Documentation | |
Include the out of scope material or out of scope products in the audit program. CC ID 08962 | Audits and risk management | Establish/Maintain Documentation | |
Provide a representation letter in support of the audit assertion. CC ID 07158 | Audits and risk management | Establish/Maintain Documentation | |
Include the date of the audit in the representation letter. CC ID 16517 | Audits and risk management | Audits and Risk Management | |
Include a statement that management has evaluated compliance with external requirements in the representation letter. CC ID 13942 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the assumptions used for estimates are reasonable in the representation letter. CC ID 13934 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that uncorrected misstatements are believed to be immaterial in the representation letter. CC ID 13884 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that system incidents have been disclosed to the auditor in the representation letter. CC ID 16772 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that incidents of fraud and non-compliance have been disclosed to the auditor in the representation letter. CC ID 16769 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement of responsibility for the subject matter in the representation letter. CC ID 07159 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement of responsibility for selecting the audit criteria in the representation letter. CC ID 07160 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement of responsibility regarding the appropriateness of the audit criteria in the representation letter. CC ID 07161 | Audits and risk management | Establish/Maintain Documentation | |
Include an assertion about the subject matter based on the selected audit criteria in the representation letter. CC ID 07162 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that all known matters contradicting the audit assertion have been disclosed to the auditor in the representation letter. CC ID 07163 | Audits and risk management | Establish/Maintain Documentation | |
Include the availability of all in scope records relevant to the subject matter in the representation letter. CC ID 07164 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that any known subsequent events have been disclosed to the auditor in the representation letter. CC ID 07165 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that deficiencies in internal controls have been disclosed to the auditor in the representation letter. CC ID 13899 | Audits and risk management | Establish/Maintain Documentation | |
Include an in scope system description in the audit assertion. CC ID 14872 | Audits and risk management | Establish/Maintain Documentation | |
Include any assumptions that are improbable in the audit assertion. CC ID 13950 | Audits and risk management | Establish/Maintain Documentation | |
Include investigations and legal proceedings in the audit assertion. CC ID 16846 | Audits and risk management | Establish/Maintain Documentation | |
Include how the audit scope matches in scope controls in the audit assertion. CC ID 06969 | Audits and risk management | Establish/Maintain Documentation | |
Include why specific criteria are ignored by in scope controls in the audit assertion. CC ID 07027 | Audits and risk management | Establish/Maintain Documentation | |
Include how the in scope system is designed and implemented in the audit assertion. CC ID 06970 | Audits and risk management | Establish/Maintain Documentation | |
Include the responsible party's opinion of the quality of the evidence in the audit assertion. CC ID 13949 | Audits and risk management | Establish/Maintain Documentation | |
Include the end users and affected parties of the in scope system in the audit assertion. CC ID 07028 | Audits and risk management | Establish/Maintain Documentation | |
Include the in scope services offered or in scope transactions processed in the audit assertion. CC ID 06971 | Audits and risk management | Establish/Maintain Documentation | |
Include the in scope procedures in the audit assertion. CC ID 06972 | Audits and risk management | Establish/Maintain Documentation | |
Include the in scope records produced in the audit assertion. CC ID 06968 | Audits and risk management | Establish/Maintain Documentation | |
Include how in scope material events are monitored and logged in the audit assertion. CC ID 06973 | Audits and risk management | Establish/Maintain Documentation | |
Include any in scope material events that might affect the assertion in the audit assertion. CC ID 06991 | Audits and risk management | Establish/Maintain Documentation | |
Include the in scope controls and compliance documents in the audit assertion. CC ID 06974 | Audits and risk management | Establish/Maintain Documentation | |
Include the in scope risk assessment processes in the audit assertion. CC ID 06975 [Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d Review whether management has the following: A validation of the risk identification process through audits, self-assessments, penetration tests, and vulnerability assessments. App A Objective 4.2.d] | Audits and risk management | Establish/Maintain Documentation | |
Include in scope change controls in the audit assertion. CC ID 06976 | Audits and risk management | Establish/Maintain Documentation | |
Include any in scope uncorrected errors or non-compliance issues in the audit assertion. CC ID 06989 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate a written audit assertion of the audit scope and audit terms to interested personnel and affected parties. CC ID 06967 | Audits and risk management | Establish/Maintain Documentation | |
Include the scope for the desired level of assurance in the audit program. CC ID 12793 | Audits and risk management | Communicate | |
Include conditions that might require modification of the audit program in the audit terms. CC ID 07149 | Audits and risk management | Establish/Maintain Documentation | |
Include how access to in scope systems, personnel and in scope records are provided to the auditor in the audit terms. CC ID 06988 | Audits and risk management | Establish/Maintain Documentation | |
Include the criteria for determining the desired level of assurance in the audit program. CC ID 12795 [Determine the appropriate scope and objectives for the examination. App A Objective 1] | Audits and risk management | Audits and Risk Management | |
Establish, implement, and maintain procedures for determining the desired level of assurance in the audit program. CC ID 12794 | Audits and risk management | Establish/Maintain Documentation | |
Include the expectations for the audit report in the audit terms. CC ID 07148 | Audits and risk management | Establish/Maintain Documentation | |
Establish and maintain a practitioner’s report on management’s assertions, as necessary. CC ID 13888 | Audits and risk management | Establish/Maintain Documentation | |
Hold a closing meeting following an audit to present audit findings and conclusions. CC ID 15248 | Audits and risk management | Communicate | |
Include materiality levels in the audit terms. CC ID 01238 | Audits and risk management | Establish/Maintain Documentation | |
Include material changes in information processes, Information Systems, and assets that could affect audits in the audit terms. CC ID 01239 [{hardware inventory} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Hardware and software inventories. App A Objective 1.3.c {hardware inventory} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Hardware and software inventories. App A Objective 1.3.c Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d Identify the systems that have recently undergone significant change, such as new hardware, software, configuration, and connectivity. Correlate the changed systems with the business processes they support, the extent of customer data available to those processes, and the effect of those changes on institution operations. App A Objective 1.4.d] | Audits and risk management | Establish/Maintain Documentation | |
Include material weaknesses, material failures, and material errors in information processes, Information Systems, and assets that could affect audits in the audit terms. CC ID 01240 | Audits and risk management | Establish/Maintain Documentation | |
Schedule attestation engagement meetings with interested personnel and affected parties, as necessary. CC ID 15263 | Audits and risk management | Business Processes | |
Refrain from accepting an attestation engagement when the engaging party refuses to sign the engagement letter. CC ID 14912 | Audits and risk management | Business Processes | |
Refrain from accepting an attestation engagement unless the prospective financial information includes a summary of significant assumptions. CC ID 13954 | Audits and risk management | Behavior | |
Refrain from accepting an attestation engagement when all parties disagree on the procedures. CC ID 13951 | Audits and risk management | Audits and Risk Management | |
Accept the attestation engagement when all preconditions are met. CC ID 13933 | Audits and risk management | Business Processes | |
Audit in scope audit items and compliance documents. CC ID 06730 | Audits and risk management | Audits and Risk Management | |
Collect all work papers for the audit and audit report into an engagement file. CC ID 07001 [Organize work papers to ensure clear support for significant findings by examination objective. App A Objective 11.4] | Audits and risk management | Actionable Reports or Measurements | |
Document any after the fact changes to the engagement file. CC ID 07002 | Audits and risk management | Establish/Maintain Documentation | |
Protect access to the engagement file and all associated audit documentation in compliance with Authority Documents the organization must follow. CC ID 07179 | Audits and risk management | Establish/Maintain Documentation | |
Disclose work papers in the engagement file in compliance with legal requirements. CC ID 07180 | Audits and risk management | Establish/Maintain Documentation | |
Archive the engagement file and all work papers for the period prescribed by law or contract. CC ID 10038 | Audits and risk management | Records Management | |
Conduct onsite inspections, as necessary. CC ID 16199 | Audits and risk management | Testing | |
Audit policies, standards, and procedures. CC ID 12927 | Audits and risk management | Audits and Risk Management | |
Edit the audit assertion for accuracy. CC ID 07030 | Audits and risk management | Establish/Maintain Documentation | |
Determine if the audit assertion's in scope procedures are accurately documented. CC ID 06982 | Audits and risk management | Establish/Maintain Documentation | |
Review documentation to determine the effectiveness of in scope controls. CC ID 16522 | Audits and risk management | Process or Activity | |
Include the process of using evidential matter to test in scope controls in the test plan. CC ID 06996 | Audits and risk management | Establish/Maintain Documentation | |
Audit the in scope system according to the test plan using relevant evidence. CC ID 07112 | Audits and risk management | Testing | |
Implement procedures that collect sufficient audit evidence. CC ID 07153 | Audits and risk management | Audits and Risk Management | |
Collect evidence about the in scope audit items of the audit assertion. CC ID 07154 | Audits and risk management | Audits and Risk Management | |
Collect audit evidence sufficient to avoid misstatements. CC ID 07155 | Audits and risk management | Audits and Risk Management | |
Collect audit evidence at the level of the organization's competence in the subject matter. CC ID 07156 | Audits and risk management | Audits and Risk Management | |
Collect audit evidence sufficient to overcome inadequacies in the organization's attestation. CC ID 07157 | Audits and risk management | Audits and Risk Management | |
Report that audit evidence collected was not sufficient to the proper authorities. CC ID 16847 | Audits and risk management | Communicate | |
Provide transactional walkthrough procedures for external auditors. CC ID 00672 | Audits and risk management | Testing | |
Establish, implement, and maintain interview procedures. CC ID 16282 | Audits and risk management | Establish/Maintain Documentation | |
Include roles and responsibilities in the interview procedures. CC ID 16297 | Audits and risk management | Human Resources Management | |
Coordinate the scheduling of interviews. CC ID 16293 | Audits and risk management | Process or Activity | |
Create a schedule for the interviews. CC ID 16292 | Audits and risk management | Process or Activity | |
Identify interviewees. CC ID 16290 | Audits and risk management | Process or Activity | |
Explain the testing results to the interviewee. CC ID 16291 | Audits and risk management | Process or Activity | |
Establish and maintain work papers, as necessary. CC ID 13891 | Audits and risk management | Establish/Maintain Documentation | |
Include the auditor's conclusions on work performed by individuals assigned to the audit in the work papers. CC ID 16775 | Audits and risk management | Establish/Maintain Documentation | |
Include audit irregularities in the work papers. CC ID 16774 | Audits and risk management | Establish/Maintain Documentation | |
Include corrective actions in the work papers. CC ID 16771 | Audits and risk management | Establish/Maintain Documentation | |
Include information about the organization being audited and the auditor performing the audit in the work papers. CC ID 16770 | Audits and risk management | Establish/Maintain Documentation | |
Include discussions with interested personnel and affected parties in the work papers. CC ID 16768 | Audits and risk management | Establish/Maintain Documentation | |
Include justification for departing from mandatory requirements in the work papers. CC ID 13935 | Audits and risk management | Establish/Maintain Documentation | |
Include audit evidence obtained from previous engagements in the work papers. CC ID 16518 | Audits and risk management | Audits and Risk Management | |
Include the reviewer, and dates, for using evidential matter to test in scope controls in the work papers. CC ID 06998 | Audits and risk management | Establish/Maintain Documentation | |
Include the tests, examinations, interviews and observations performed during the audit in the work papers. CC ID 07190 | Audits and risk management | Establish/Maintain Documentation | |
Include if any subject matter experts or additional research had to be undertaken to test in scope controls in the work papers. CC ID 07026 | Audits and risk management | Establish/Maintain Documentation | |
Include the tester, and dates, for using evidential matter to test in scope controls in the work papers. CC ID 06997 | Audits and risk management | Establish/Maintain Documentation | |
Include any subsequent events related to the audit assertion or audit subject matter in the work papers. CC ID 07177 | Audits and risk management | Audits and Risk Management | |
Include the causes of identified in scope control deficiencies in the work papers. CC ID 07000 | Audits and risk management | Establish/Maintain Documentation | |
Include discussions regarding the causes of identified in scope control deficiencies in the work papers. CC ID 06999 | Audits and risk management | Establish/Maintain Documentation | |
Supervise interested personnel and affected parties participating in the audit. CC ID 07150 | Audits and risk management | Monitor and Evaluate Occurrences | |
Notify interested personnel and affected parties participating in the audit of their roles and responsibilities during the audit. CC ID 07151 | Audits and risk management | Establish Roles | |
Respond to questions or clarification requests regarding the audit. CC ID 08902 | Audits and risk management | Business Processes | |
Track and measure the implementation of the organizational compliance framework. CC ID 06445 | Audits and risk management | Monitor and Evaluate Occurrences | |
Review the need for organizational efficiency as balanced against the needs of compliance and security. CC ID 07111 | Audits and risk management | Business Processes | |
Engage subject matter experts when the auditor requires additional expertise during an attestation engagement, as necessary. CC ID 13971 | Audits and risk management | Process or Activity | |
Establish, implement, and maintain a practitioner’s report on agreed-upon procedures. CC ID 13894 | Audits and risk management | Establish/Maintain Documentation | |
Provide auditors access to all in scope records, in scope assets, personnel and in scope procedures. CC ID 06966 | Audits and risk management | Audits and Risk Management | |
Provide auditors access to affected parties during the audit, as necessary. CC ID 07187 | Audits and risk management | Business Processes | |
Notify interested personnel and affected parties when an auditee refuses to provide access or participate in the audit. CC ID 08960 | Audits and risk management | Audits and Risk Management | |
Establish and maintain a practitioner's examination report on pro forma financial information. CC ID 13968 | Audits and risk management | Establish/Maintain Documentation | |
Include references to where financial information was derived in the practitioner's review report on pro forma financial information. CC ID 13982 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the financial statements used were audited by other practitioners in the practitioner's examination report on pro forma financial information, as necessary. CC ID 13981 | Audits and risk management | Establish/Maintain Documentation | |
Establish and maintain organizational audit reports. CC ID 06731 | Audits and risk management | Establish/Maintain Documentation | |
Include the justification for not following the applicable requirements in the audit report. CC ID 16822 | Audits and risk management | Audits and Risk Management | |
Include a statement that the applicable requirements were not followed in the audit report. CC ID 16821 | Audits and risk management | Audits and Risk Management | |
Include audit subject matter in the audit report. CC ID 14882 | Audits and risk management | Establish/Maintain Documentation | |
Include an other-matter paragraph in the audit report. CC ID 14901 | Audits and risk management | Establish/Maintain Documentation | |
Include that the auditee did not provide comments in the audit report. CC ID 16849 | Audits and risk management | Establish/Maintain Documentation | |
Write the audit report using clear and conspicuous language. CC ID 13948 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the sufficiency of the agreed upon procedures is the responsibility of the specified parties in the audit report. CC ID 13936 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the financial statements were audited in the audit report. CC ID 13963 | Audits and risk management | Establish/Maintain Documentation | |
Include the criteria that financial information was measured against in the audit report. CC ID 13966 | Audits and risk management | Establish/Maintain Documentation | |
Include a description of the financial information being reported on in the audit report. CC ID 13965 | Audits and risk management | Establish/Maintain Documentation | |
Include references to any adjustments of financial information in the audit report. CC ID 13964 | Audits and risk management | Establish/Maintain Documentation | |
Include in the audit report that audit opinions are not dependent on references to subject matter experts, as necessary. CC ID 13953 | Audits and risk management | Establish/Maintain Documentation | |
Include references to historical financial information used in the audit report. CC ID 13961 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement about the inherent limitations of the audit in the audit report. CC ID 14900 | Audits and risk management | Establish/Maintain Documentation | |
Include a description of the limitations on the usefulness of hypothetical assumptions in the audit report. CC ID 13958 | Audits and risk management | Establish/Maintain Documentation | |
Include the word independent in the title of audit reports. CC ID 07003 | Audits and risk management | Actionable Reports or Measurements | |
Include the date of the audit in the audit report. CC ID 07024 | Audits and risk management | Actionable Reports or Measurements | |
Structure the audit report to be in the form of procedures and findings. CC ID 13940 | Audits and risk management | Establish/Maintain Documentation | |
Include information about the organization being audited and the auditor performing the audit in the audit report. CC ID 07004 | Audits and risk management | Actionable Reports or Measurements | |
Include any discussions of significant findings in the audit report. CC ID 13955 | Audits and risk management | Establish/Maintain Documentation | |
Include the date and with whom discussions about significant findings took place in the audit report. CC ID 13962 | Audits and risk management | Establish/Maintain Documentation | |
Include the audit criteria in the audit report. CC ID 13945 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement in the audit report that the agreed upon procedures were potentially insufficient in identifying material risks, as necessary. CC ID 13957 | Audits and risk management | Establish/Maintain Documentation | |
Include all hypothetical assumptions in the audit report. CC ID 13947 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that access to the report is restricted based on least privilege in the audit report. CC ID 07023 | Audits and risk management | Actionable Reports or Measurements | |
Include a statement that identifies the distribution list for the report in the audit report. CC ID 07172 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that identifies the use restrictions for the report in the audit report. CC ID 07173 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the agreed upon procedures involves collecting evidence in the audit report. CC ID 13956 | Audits and risk management | Establish/Maintain Documentation | |
Include all of the facts and demonstrated plausibility in the audit report. CC ID 08929 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the agreed upon procedures were performed by all parties in the audit report. CC ID 13931 | Audits and risk management | Establish/Maintain Documentation | |
Include references to subject matter experts in the audit report when citing qualified opinions. CC ID 13929 | Audits and risk management | Establish/Maintain Documentation | |
Include a description of the assistance provided by Subject Matter Experts in the audit report. CC ID 13939 | Audits and risk management | Establish/Maintain Documentation | |
Include a review of the subject matter expert's findings in the audit report. CC ID 13972 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement of the character of the engagement in the audit report. CC ID 07166 | Audits and risk management | Establish/Maintain Documentation | |
Include the nature and scope of the audit performed in the statement of the character of the engagement in the audit report. CC ID 07167 | Audits and risk management | Establish/Maintain Documentation | |
Include the professional standards governing the audit in the statement of the character of the engagement in the audit report. CC ID 07168 | Audits and risk management | Establish/Maintain Documentation | |
Include all restrictions on the audit in the audit report. CC ID 13930 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the auditor has no responsibility to update the audit report after its submission. CC ID 13943 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement on the auditor's ethical requirements in the audit report. CC ID 16767 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the responsible party refused to provide a written assertion in the audit report. CC ID 13887 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that the examination involves procedures for collecting evidence in the audit report. CC ID 13941 | Audits and risk management | Establish/Maintain Documentation | |
Express an adverse opinion in the audit report when significant assumptions are not suitably supported. CC ID 13944 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that modifications to historical evidence accurately reflect current evidence in the audit report. CC ID 13938 | Audits and risk management | Establish/Maintain Documentation | |
Refrain from referencing previous engagements in the audit report. CC ID 16516 | Audits and risk management | Audits and Risk Management | |
Refrain from referencing other auditor's work in the audit report. CC ID 13881 | Audits and risk management | Establish/Maintain Documentation | |
Include that the audit findings are not a predictive analysis of future compliance in the audit report. CC ID 07018 | Audits and risk management | Establish/Maintain Documentation | |
Include how in scope controls meet external requirements in the audit report. CC ID 16450 | Audits and risk management | Establish/Maintain Documentation | |
Include the in scope records used to obtain audit evidence in the description of tests of controls and results in the audit report. CC ID 14915 | Audits and risk management | Establish/Maintain Documentation | |
Include recommended corrective actions in the audit report. CC ID 16197 | Audits and risk management | Establish/Maintain Documentation | |
Include risks and opportunities in the audit report. CC ID 16196 | Audits and risk management | Establish/Maintain Documentation | |
Include the description of tests of controls and results in the audit report. CC ID 14898 | Audits and risk management | Establish/Maintain Documentation | |
Include the nature of the tests performed in the description of tests of controls and results in the audit report. CC ID 14908 | Audits and risk management | Establish/Maintain Documentation | |
Include the test scope in the description of tests of controls and results in the audit report. CC ID 14906 | Audits and risk management | Establish/Maintain Documentation | |
Identify the stakeholders interviewed to obtain audit evidence in the description of tests of controls and results in the audit report. CC ID 14905 | Audits and risk management | Establish/Maintain Documentation | |
Include the timing of controls in the description of tests of controls and results in the audit report. CC ID 16553 | Audits and risk management | Audits and Risk Management | |
Include the controls that were tested in the description of tests of controls and results in the audit report. CC ID 14902 | Audits and risk management | Establish/Maintain Documentation | |
Include subsequent events related to the audit assertion or audit subject matter in the audit report. CC ID 16773 | Audits and risk management | Establish/Maintain Documentation | |
Include the organization's audit assertion of the in scope system in the audit report. CC ID 07005 | Audits and risk management | Actionable Reports or Measurements | |
Include that the organization is the responsible party for the content of its audit assertion and in scope system description in the audit report. CC ID 07010 | Audits and risk management | Establish/Maintain Documentation | |
Include that the organization is the responsible party for providing in scope services in the audit report. CC ID 14903 | Audits and risk management | Establish/Maintain Documentation | |
Include that the organization is the responsible party for specifying in scope controls not defined by law or contractual obligation in the audit report. CC ID 07011 | Audits and risk management | Establish/Maintain Documentation | |
Include that the organization is the responsible party for designing and implementing the in scope controls it identified in the audit scope in the audit report. CC ID 07014 | Audits and risk management | Establish/Maintain Documentation | |
Include the audit opinion regarding the accurateness of the in scope system description in the audit report. CC ID 07019 | Audits and risk management | Establish/Maintain Documentation | |
Include the attestation standards the auditor follows in the audit report. CC ID 07015 | Audits and risk management | Establish/Maintain Documentation | |
Include the audit opinion about the audit assertion in relation to the audit criteria used for evaluation in the audit report. CC ID 07169 [Document conclusions in a memo to the examiner-in-charge that provides report-ready comments for all relevant sections of the report of examination and guidance to future examiners. App A Objective 11.3] | Audits and risk management | Establish/Maintain Documentation | |
Include the auditor's significant reservations about the engagement, the audit assertion, or the audit subject matter in the audit report. CC ID 07170 | Audits and risk management | Establish/Maintain Documentation | |
Include an emphasis-of-matter paragraph in the audit report. CC ID 14890 | Audits and risk management | Establish/Maintain Documentation | |
Include the organization's in scope system description in the audit report. CC ID 11626 | Audits and risk management | Audits and Risk Management | |
Include any out of scope components of in scope systems in the audit report. CC ID 07006 | Audits and risk management | Establish/Maintain Documentation | |
Include that the organization is the responsible party for identifying material risks in the audit report. CC ID 07012 | Audits and risk management | Establish/Maintain Documentation | |
Include that the organization is the responsible party for selecting the audit criteria in the audit report. CC ID 07013 | Audits and risk management | Establish/Maintain Documentation | |
Include the scope and work performed in the audit report. CC ID 11621 | Audits and risk management | Audits and Risk Management | |
Resolve disputes before creating the audit summary. CC ID 08964 | Audits and risk management | Behavior | |
Refrain from including the description of the audit in the audit report when the auditor is disclaiming an audit opinion. CC ID 13975 | Audits and risk management | Establish/Maintain Documentation | |
Refrain from including scope limitations from changed attestation engagements in the audit report. CC ID 13983 | Audits and risk management | Establish/Maintain Documentation | |
Refrain from including in the audit report any procedures that were performed that the auditor is disclaiming in an audit opinion. CC ID 13974 | Audits and risk management | Establish/Maintain Documentation | |
Include an audit opinion in the audit report. CC ID 07017 | Audits and risk management | Establish/Maintain Documentation | |
Include qualified opinions in the audit report. CC ID 13928 | Audits and risk management | Establish/Maintain Documentation | |
Include that the auditor is the responsible party to express an opinion on the audit subject matter based on examination of evidence in the audit report. CC ID 07174 | Audits and risk management | Establish/Maintain Documentation | |
Include that the auditor did not express an opinion in the audit report, as necessary. CC ID 13886 | Audits and risk management | Establish/Maintain Documentation | |
Include items that were excluded from the audit report in the audit report. CC ID 07007 | Audits and risk management | Establish/Maintain Documentation | |
Include the organization's privacy practices in the audit report. CC ID 07029 | Audits and risk management | Establish/Maintain Documentation | |
Include items that pertain to third parties in the audit report. CC ID 07008 | Audits and risk management | Establish/Maintain Documentation | |
Refrain from including reference to procedures performed in previous attestation engagements in the audit report. CC ID 13970 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement in the audit report that no procedures were performed subsequent to the date of the practitioner's review report on pro forma financial information, as necessary. CC ID 13969 | Audits and risk management | Establish/Maintain Documentation | |
Include any of the organization's use of compensating controls that were not audited in the audit report. CC ID 07009 | Audits and risk management | Establish/Maintain Documentation | |
Include whether the use of compensating controls are necessary in the audit report. CC ID 07020 | Audits and risk management | Establish/Maintain Documentation | |
Include the pass or fail test status of all in scope controls in the audit report. CC ID 07016 | Audits and risk management | Establish/Maintain Documentation | |
Include the process of using evidential matter to test in scope controls in the audit report. CC ID 07021 | Audits and risk management | Establish/Maintain Documentation | |
Include the nature and causes of identified in scope control deviations in the audit report. CC ID 07022 | Audits and risk management | Establish/Maintain Documentation | |
Disclose any audit irregularities in the audit report. CC ID 06995 | Audits and risk management | Actionable Reports or Measurements | |
Include the written signature of the auditor's organization in the audit report. CC ID 13897 | Audits and risk management | Establish/Maintain Documentation | |
Include a statement that additional reports are being submitted in the audit report. CC ID 16848 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the audit report to all interested personnel and affected parties identified in the distribution list. CC ID 07117 | Audits and risk management | Establish/Maintain Documentation | |
Define the roles and responsibilities for distributing the audit report. CC ID 16845 | Audits and risk management | Human Resources Management | |
Disseminate and communicate the reasons the audit report was delayed to interested personnel and affected parties. CC ID 15257 | Audits and risk management | Communicate | |
Notify auditees if disclosure of audit documentation is required by law. CC ID 15249 | Audits and risk management | Communicate | |
Disseminate and communicate to the organization that access and use of audit reports are based on least privilege. CC ID 07171 | Audits and risk management | Behavior | |
Disseminate and communicate documents that contain information in support of the audit report. CC ID 07175 | Audits and risk management | Establish/Maintain Documentation | |
Correct any material misstatements in documents that contain information in support of the audit report. CC ID 07176 | Audits and risk management | Establish/Maintain Documentation | |
Notify interested personnel and affected parties after bribes are offered during the audit. CC ID 08872 | Audits and risk management | Business Processes | |
Accept the audit report. CC ID 07025 | Audits and risk management | Establish/Maintain Documentation | |
Assign responsibility for remediation actions. CC ID 13622 | Audits and risk management | Human Resources Management | |
Define penalties for uncorrected audit findings or remaining non-compliant with the audit report. CC ID 08963 | Audits and risk management | Establish/Maintain Documentation | |
Assess the quality of the audit program in regards to its documentation. CC ID 11622 | Audits and risk management | Audits and Risk Management | |
Include the audit criteria in the audit plan. CC ID 15262 | Audits and risk management | Establish/Maintain Documentation | |
Include a list of reference documents in the audit plan. CC ID 15260 | Audits and risk management | Establish/Maintain Documentation | |
Include the languages to be used for the audit in the audit plan. CC ID 15252 | Audits and risk management | Establish/Maintain Documentation | |
Include the allocation of resources in the audit plan. CC ID 15251 | Audits and risk management | Establish/Maintain Documentation | |
Include communication protocols in the audit plan. CC ID 15247 | Audits and risk management | Establish/Maintain Documentation | |
Include the level of audit sampling necessary to collect sufficient audit evidence in the audit plan. CC ID 15246 | Audits and risk management | Establish/Maintain Documentation | |
Include meeting schedules in the audit plan. CC ID 15245 | Audits and risk management | Establish/Maintain Documentation | |
Include the time frames for the audit in the audit plan. CC ID 15244 | Audits and risk management | Establish/Maintain Documentation | |
Include the time frames for conducting the audit in the audit plan. CC ID 15243 | Audits and risk management | Establish/Maintain Documentation | |
Include the locations to be audited in the audit plan. CC ID 15242 | Audits and risk management | Establish/Maintain Documentation | |
Include the processes to be audited in the audit plan. CC ID 15241 | Audits and risk management | Establish/Maintain Documentation | |
Include audit objectives in the audit plan. CC ID 15240 | Audits and risk management | Establish/Maintain Documentation | |
Include the risks associated with audit activities in the audit plan. CC ID 15239 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the audit plan to interested personnel and affected parties. CC ID 15238 | Audits and risk management | Communicate | |
Establish, implement, and maintain an audit schedule for the audit program. CC ID 13158 | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain a risk management program. CC ID 12051 [[threat assessment} Determine whether the institution's security operations activities include the following: Threat identification and assessment. App A Objective 8.1.i {threat and vulnerability management procedure} Determine whether management has effective threat identification and assessment processes, including the following: Maintaining procedures for obtaining, monitoring, assessing, and responding to evolving threat and vulnerability information. App A Objective 8.3.a {threat and vulnerability management policy} Determine whether management has effective threat identification and assessment processes, including the following: Designing policies to allow immediate and consequential threats to be dealt with expeditiously. App A Objective 8.3.e {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Audits and risk management | Establish/Maintain Documentation | |
Include the scope of risk management activities in the risk management program. CC ID 13658 | Audits and risk management | Establish/Maintain Documentation | |
Integrate the risk management program with the organization's business activities. CC ID 13661 | Audits and risk management | Business Processes | |
Integrate the risk management program into daily business decision-making. CC ID 13659 | Audits and risk management | Business Processes | |
Include managing mobile risks in the risk management program. CC ID 13535 | Audits and risk management | Establish/Maintain Documentation | |
Take into account if the system will be accessed by or have an impact on children in the risk management program. CC ID 14992 | Audits and risk management | Audits and Risk Management | |
Include regular updating in the risk management system. CC ID 14990 | Audits and risk management | Business Processes | |
Establish, implement, and maintain risk management strategies. CC ID 13209 | Audits and risk management | Establish/Maintain Documentation | |
Include off-site storage of supplies in the risk management strategies. CC ID 13221 | Audits and risk management | Establish/Maintain Documentation | |
Include data quality in the risk management strategies. CC ID 15308 | Audits and risk management | Data and Information Management | |
Include the use of alternate service providers in the risk management strategies. CC ID 13217 | Audits and risk management | Establish/Maintain Documentation | |
Include minimizing service interruptions in the risk management strategies. CC ID 13215 | Audits and risk management | Establish/Maintain Documentation | |
Include off-site storage in the risk mitigation strategies. CC ID 13213 | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain the risk assessment framework. CC ID 00685 | Audits and risk management | Establish/Maintain Documentation | |
Define and assign the roles and responsibilities for the risk assessment framework, as necessary. CC ID 06456 | Audits and risk management | Establish Roles | |
Establish, implement, and maintain a risk assessment program. CC ID 00687 | Audits and risk management | Establish/Maintain Documentation | |
Address past incidents in the risk assessment program. CC ID 12743 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: App A Objective 5.1] | Audits and risk management | Audits and Risk Management | |
Include the need for risk assessments in the risk assessment program. CC ID 06447 [[threat assessment} Determine whether the institution's security operations activities include the following: Threat identification and assessment. App A Objective 8.1.i] | Audits and risk management | Establish/Maintain Documentation | |
Include the information flow of restricted data in the risk assessment program. CC ID 12339 | Audits and risk management | Establish/Maintain Documentation | |
Establish and maintain the factors and context for risk to the organization. CC ID 12230 | Audits and risk management | Audits and Risk Management | |
Establish, implement, and maintain a financial plan to support the risk management strategy. CC ID 12786 | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain insurance requirements. CC ID 16562 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate insurance options to interested personnel and affected parties. CC ID 16572 | Audits and risk management | Communicate | |
Disseminate and communicate insurance requirements to interested personnel and affected parties. CC ID 16567 | Audits and risk management | Communicate | |
Design a portfolio of insurance options in accordance with risk decision-making criteria. CC ID 12878 | Audits and risk management | Business Processes | |
Design a portfolio of loans in accordance with risk decision-making criteria. CC ID 12877 | Audits and risk management | Business Processes | |
Design a portfolio of risk limiting and mitigating approaches in organizational contracts in accordance with risk decision-making criteria. CC ID 12903 | Audits and risk management | Business Processes | |
Address cybersecurity risks in the risk assessment program. CC ID 13193 | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain Data Protection Impact Assessments. CC ID 14830 | Audits and risk management | Process or Activity | |
Include a Data Protection Impact Assessment in the risk assessment program. CC ID 12630 | Audits and risk management | Establish/Maintain Documentation | |
Include an assessment of the necessity and proportionality of the processing operations in relation to the purposes in the Data Protection Impact Assessment. CC ID 12681 | Audits and risk management | Establish/Maintain Documentation | |
Include an assessment of the relationship between the data subject and the parties processing the data in the Data Protection Impact Assessment. CC ID 16371 | Audits and risk management | Establish/Maintain Documentation | |
Include a risk assessment of data subject's rights in the Data Protection Impact Assessment. CC ID 12674 | Audits and risk management | Establish/Maintain Documentation | |
Include the description and purpose of processing restricted data in the Data Protection Impact Assessment. CC ID 12673 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the Data Protection Impact Assessment to interested personnel and affected parties. CC ID 15313 | Audits and risk management | Communicate | |
Include consideration of the data subject's expectations in the Data Protection Impact Assessment. CC ID 16370 | Audits and risk management | Establish/Maintain Documentation | |
Include monitoring unsecured areas in the Data Protection Impact Assessment. CC ID 12671 | Audits and risk management | Establish/Maintain Documentation | |
Include security measures for protecting restricted data in the Data Protection Impact Assessment. CC ID 12635 | Audits and risk management | Establish/Maintain Documentation | |
Use the risk taxonomy when managing risk. CC ID 12280 | Audits and risk management | Behavior | |
Establish, implement, and maintain a risk assessment policy. CC ID 14026 | Audits and risk management | Establish/Maintain Documentation | |
Include compliance requirements in the risk assessment policy. CC ID 14121 | Audits and risk management | Establish/Maintain Documentation | |
Include coordination amongst entities in the risk assessment policy. CC ID 14120 | Audits and risk management | Establish/Maintain Documentation | |
Include management commitment in the risk assessment policy. CC ID 14119 | Audits and risk management | Establish/Maintain Documentation | |
Include roles and responsibilities in the risk assessment policy. CC ID 14118 | Audits and risk management | Establish/Maintain Documentation | |
Include the scope in the risk assessment policy. CC ID 14117 | Audits and risk management | Establish/Maintain Documentation | |
Include the purpose in the risk assessment policy. CC ID 14116 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the risk assessment policy to interested personnel and affected parties. CC ID 14115 | Audits and risk management | Communicate | |
Establish, implement, and maintain risk assessment procedures. CC ID 06446 [As part of the information security program, determine whether management has established risk identification processes. App A Objective 4 Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: App A Objective 5.1 Determine whether management has effective threat identification and assessment processes, including the following: Identifying and assessing threats (e.g., threat information is often ad hoc, although some providers present threat information within a defined framework that readily lends itself to analytical operations). App A Objective 8.3.b Determine whether management has effective threat identification and assessment processes, including the following: Identifying and assessing threats (e.g., threat information is often ad hoc, although some providers present threat information within a defined framework that readily lends itself to analytical operations). App A Objective 8.3.b {risk monitoring process}{risk reporting process} Determine whether management has effective risk monitoring and reporting processes. App A Objective 7 Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that follow legal requirements and contractual obligations when risk profiling. CC ID 06472 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Incorporate legal and regulatory requirements. App A Objective 5.1.b] | Audits and risk management | Establish/Maintain Documentation | |
Analyze the organization's information security environment. CC ID 13122 [Determine the complexity of the institution's information security environment. App A Objective 1.4] | Audits and risk management | Technical Security | |
Document cybersecurity risks. CC ID 12281 | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that follow standards and best practices, as necessary. CC ID 06473 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Improve consistency in risk measurement. App A Objective 5.1.c Management should develop risk measurement processes that evaluate the inherent risk to the institution. II.B Risk Measurement] | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that take into account both electronic records and printed records. CC ID 06476 | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that take into account information classification. CC ID 06477 | Audits and risk management | Establish/Maintain Documentation | |
Engage appropriate parties to assist with risk assessments, as necessary. CC ID 12153 | Audits and risk management | Human Resources Management | |
Employ risk assessment procedures that align with strategic objectives. CC ID 06474 | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that take into account prior risk assessment findings of the same scope. CC ID 06478 | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that take into account the target environment. CC ID 06479 [{information security program review} Verify whether that review does the following: Addresses the program in its current environment. App A Objective 9.1.a] | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that take into account incidents associated with the target environment. CC ID 06480 [{indicators of compromise} Determine whether management has effective incident identification and assessment processes to do the following: Analyze the event associated with the indicators. App A Objective 8.5.b {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that take into account risk factors. CC ID 16560 | Audits and risk management | Audits and Risk Management | |
Include compliance with disposition requirements in the risk assessment procedures. CC ID 12342 | Audits and risk management | Establish/Maintain Documentation | |
Include compliance with retention requirements in the risk assessment procedures. CC ID 12341 | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain a threat and risk classification scheme. CC ID 07183 [Review whether management has the following: A method or taxonomy for categorizing threats, sources, and vulnerabilities. App A Objective 4.2.b Determine whether the risk identification process produces manageable groupings of information security threats, including cybersecurity threats. Review whether management has the following: App A Objective 4.2 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {risk response} Determine whether management has effective threat identification and assessment processes, including the following: Using threat knowledge to drive risk assessment and response. App A Objective 8.3.d {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Audits and risk management | Establish/Maintain Documentation | |
Employ risk assessment procedures that include appropriate risk treatment options for each identified risk. CC ID 06484 | Audits and risk management | Establish/Maintain Documentation | |
Document organizational risk criteria. CC ID 12277 | Audits and risk management | Establish/Maintain Documentation | |
Include security threats and vulnerabilities in the threat and risk classification scheme. CC ID 00699 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Map threats and vulnerabilities App A Objective 5.1.a Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Map threats and vulnerabilities App A Objective 5.1.a Verify whether management ensures the following are done: Vulnerability assessments that define, identify, and classify the security holes found in the system. App A Objective 10.3.c] | Audits and risk management | Technical Security | |
Categorize the systems, information, and data by risk profile in the threat and risk classification scheme. CC ID 01443 [Review whether management has the following: A process to determine the institution's information security risk profile. App A Objective 4.2.c] | Audits and risk management | Audits and Risk Management | |
Include risks to critical personnel and assets in the threat and risk classification scheme. CC ID 00698 | Audits and risk management | Audits and Risk Management | |
Include the traceability of malicious code in the threat and risk classification scheme. CC ID 06600 | Audits and risk management | Establish/Maintain Documentation | |
Assign a probability of occurrence to all types of threats in the threat and risk classification scheme. CC ID 01173 | Audits and risk management | Audits and Risk Management | |
Approve the threat and risk classification scheme. CC ID 15693 | Audits and risk management | Business Processes | |
Establish, implement, and maintain risk profiling procedures for internal risk assessments. CC ID 01157 | Audits and risk management | Audits and Risk Management | |
Include language that is easy to understand in the risk assessment report. CC ID 06461 | Audits and risk management | Establish/Maintain Documentation | |
Include the environments that call for risk assessments in the risk assessment program. CC ID 06448 | Audits and risk management | Establish/Maintain Documentation | |
Include the process for defining the scope of each risk assessment in the risk assessment program. CC ID 06462 | Audits and risk management | Establish/Maintain Documentation | |
Include the circumstances that call for risk assessments in the risk assessment program. CC ID 06449 | Audits and risk management | Establish/Maintain Documentation | |
Include the roles and responsibilities involved in risk assessments in the risk assessment program. CC ID 06450 | Audits and risk management | Establish/Maintain Documentation | |
Include the methods of managing and responding to the risk assessment report in the risk assessment program. CC ID 06451 | Audits and risk management | Establish/Maintain Documentation | |
Automate as much of the risk assessment program, as necessary. CC ID 06459 | Audits and risk management | Audits and Risk Management | |
Disseminate and communicate the risk assessment procedures to interested personnel and affected parties. CC ID 14136 | Audits and risk management | Communicate | |
Approve the risk assessment program and associated risk assessment procedures at the senior management level. CC ID 06458 | Audits and risk management | Establish/Maintain Documentation | |
Perform risk assessments for all target environments, as necessary. CC ID 06452 [{application control} With respect to developed software, determine whether institution management does the following: Performs ongoing risk assessments to consider the adequacy of application-level controls in light of changing threat, network, and host environments. App A Objective 6.28.c Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Audits and risk management | Testing | |
Include the probability and potential impact of pandemics in the scope of the risk assessment. CC ID 13241 | Audits and risk management | Establish/Maintain Documentation | |
Include physical assets in the scope of the risk assessment. CC ID 13075 | Audits and risk management | Establish/Maintain Documentation | |
Include the results of the risk assessment in the risk assessment report. CC ID 06481 | Audits and risk management | Establish/Maintain Documentation | |
Approve the results of the risk assessment as documented in the risk assessment report. CC ID 07109 | Audits and risk management | Audits and Risk Management | |
Review risks to the organization's audit function when changes in the supply chain occur. CC ID 01154 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Technology service providers and software vendor listings. App A Objective 1.3.e Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Technology service providers and software vendor listings. App A Objective 1.3.e] | Audits and risk management | Audits and Risk Management | |
Review the risk to the audit function when the audit personnel status changes. CC ID 01153 | Audits and risk management | Audits and Risk Management | |
Document any reasons for modifying or refraining from modifying the organization's risk assessment when the risk assessment has been reviewed. CC ID 13312 | Audits and risk management | Establish/Maintain Documentation | |
Create a risk assessment report based on the risk assessment results. CC ID 15695 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the approved risk assessment report to interested personnel and affected parties. CC ID 10633 | Audits and risk management | Communicate | |
Notify the organization upon completion of the external audits of the organization's risk assessment. CC ID 13313 | Audits and risk management | Communicate | |
Establish, implement, and maintain a risk assessment awareness and training program. CC ID 06453 | Audits and risk management | Business Processes | |
Disseminate and communicate information about risks to all interested personnel and affected parties. CC ID 06718 | Audits and risk management | Behavior | |
Correlate the business impact of identified risks in the risk assessment report. CC ID 00686 [Review preliminary conclusions with the examiner-in-charge regarding the following: The proposed Uniform Rating System for Information Technology management component rating and the potential impact of the conclusion on the composite or other component IT ratings. App A Objective 11.1.c Review preliminary conclusions with the examiner-in-charge regarding the following: Potential impact of conclusions on the institution's risk assessment. App A Objective 11.1.d] | Audits and risk management | Audits and Risk Management | |
Include recovery of the critical path in the Business Impact Analysis. CC ID 13224 | Audits and risk management | Establish/Maintain Documentation | |
Include acceptable levels of data loss in the Business Impact Analysis. CC ID 13264 | Audits and risk management | Establish/Maintain Documentation | |
Include Recovery Point Objectives in the Business Impact Analysis. CC ID 13223 | Audits and risk management | Establish/Maintain Documentation | |
Include the Recovery Time Objectives in the Business Impact Analysis. CC ID 13222 | Audits and risk management | Establish/Maintain Documentation | |
Include pandemic risks in the Business Impact Analysis. CC ID 13219 | Audits and risk management | Establish/Maintain Documentation | |
Include tolerance to downtime in the Business Impact Analysis report. CC ID 01172 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the Business Impact Analysis to interested personnel and affected parties. CC ID 15300 | Audits and risk management | Communicate | |
Establish, implement, and maintain a risk register. CC ID 14828 | Audits and risk management | Establish/Maintain Documentation | |
Document organizational risk tolerance in a risk register. CC ID 09961 | Audits and risk management | Establish/Maintain Documentation | |
Align organizational risk tolerance to that of industry peers in the risk register. CC ID 09962 | Audits and risk management | Business Processes | |
Review the Business Impact Analysis, as necessary. CC ID 12774 | Audits and risk management | Business Processes | |
Analyze and quantify the risks to in scope systems and information. CC ID 00701 [Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: App A Objective 1.3 Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Audits and risk management | Audits and Risk Management | |
Establish and maintain a Risk Scoping and Measurement Definitions Document. CC ID 00703 | Audits and risk management | Audits and Risk Management | |
Identify the material risks in the risk assessment report. CC ID 06482 [Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3] | Audits and risk management | Audits and Risk Management | |
Establish a risk acceptance level that is appropriate to the organization's risk appetite. CC ID 00706 | Audits and risk management | Establish/Maintain Documentation | |
Investigate alternative risk control strategies appropriate to the organization's risk appetite. CC ID 12887 | Audits and risk management | Investigate | |
Select the appropriate risk treatment option for each identified risk in the risk register. CC ID 06483 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the risk acceptance level in the risk treatment plan to all interested personnel and affected parties. CC ID 06849 | Audits and risk management | Behavior | |
Document the results of the gap analysis. CC ID 16271 | Audits and risk management | Establish/Maintain Documentation | |
Prioritize and select controls based on the risk assessment findings. CC ID 00707 [Specifically, review whether management does the following: Implements controls based on the institution's risk assessment to mitigate risk from information security threats and vulnerabilities, such as interconnectivity risk. App A Objective 6.5.a Determine whether management measures the risk to guide its recommendations for and use of mitigating controls. App A Objective 5 Review the institution's policies, standards, and procedures related to the use of the following: Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. App A Objective 6.31.g {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Audits and risk management | Audits and Risk Management | |
Prioritize and categorize the effects of opportunities, threats and requirements on control activities. CC ID 12822 | Audits and risk management | Audits and Risk Management | |
Develop key indicators to inform management on the effectiveness of risk control measures. CC ID 12946 | Audits and risk management | Audits and Risk Management | |
Establish, implement, and maintain a risk treatment plan. CC ID 11983 [{oversee} Determine whether management responsibilities are appropriate and include the following: Oversight of risk mitigation activities that support the information security program. App A Objective 2.5.f Determine whether management effectively implements controls to mitigate identified risk. App A Objective 6 Management should develop and implement appropriate controls to mitigate identified risks. II.C Risk Mitigation] | Audits and risk management | Establish/Maintain Documentation | |
Include the date of the risk assessment in the risk treatment plan. CC ID 16321 | Audits and risk management | Establish/Maintain Documentation | |
Include the release status of the risk assessment in the risk treatment plan. CC ID 16320 | Audits and risk management | Audits and Risk Management | |
Identify the planned actions and controls that address high risk in the risk treatment plan. CC ID 12835 | Audits and risk management | Audits and Risk Management | |
Identify the current actions and controls that address high risk in the risk treatment plan. CC ID 12834 | Audits and risk management | Audits and Risk Management | |
Include the risk treatment strategy in the risk treatment plan. CC ID 12159 | Audits and risk management | Establish/Maintain Documentation | |
Include an overview of the migration project plan in the risk treatment plan. CC ID 11982 | Audits and risk management | Establish/Maintain Documentation | |
Include change control processes in the risk treatment plan. CC ID 11981 | Audits and risk management | Establish/Maintain Documentation | |
Include a description of the processes to check for new vulnerabilities in the risk treatment plan. CC ID 11980 | Audits and risk management | Establish/Maintain Documentation | |
Include the implemented risk management controls in the risk treatment plan. CC ID 11979 [Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Implementation of risk mitigation. App A Objective 3.1.c] | Audits and risk management | Establish/Maintain Documentation | |
Include requirements for monitoring and reporting in the risk treatment plan, as necessary. CC ID 13620 | Audits and risk management | Establish/Maintain Documentation | |
Include risk assessment results in the risk treatment plan. CC ID 11978 | Audits and risk management | Establish/Maintain Documentation | |
Include a description of usage in the risk treatment plan. CC ID 11977 | Audits and risk management | Establish/Maintain Documentation | |
Document all constraints applied to the risk treatment plan, as necessary. CC ID 13619 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the risk treatment plan to interested personnel and affected parties. CC ID 15694 | Audits and risk management | Communicate | |
Approve the risk treatment plan. CC ID 13495 | Audits and risk management | Audits and Risk Management | |
Integrate the corrective action plan based on the risk assessment findings with other risk management activities. CC ID 06457 | Audits and risk management | Establish/Maintain Documentation | |
Review and approve the risk assessment findings. CC ID 06485 [Review preliminary conclusions with the examiner-in-charge regarding the following: The proposed Uniform Rating System for Information Technology management component rating and the potential impact of the conclusion on the composite or other component IT ratings. App A Objective 11.1.c] | Audits and risk management | Establish/Maintain Documentation | |
Include risk responses in the risk management program. CC ID 13195 | Audits and risk management | Establish/Maintain Documentation | |
Review and approve material risks documented in the residual risk report, as necessary. CC ID 13672 | Audits and risk management | Business Processes | |
Establish, implement, and maintain an artificial intelligence risk management program. CC ID 16220 | Audits and risk management | Establish/Maintain Documentation | |
Include diversity and equal opportunity in the artificial intelligence risk management program. CC ID 16255 | Audits and risk management | Establish/Maintain Documentation | |
Analyze the impact of artificial intelligence systems on business operations. CC ID 16356 | Audits and risk management | Business Processes | |
Establish, implement, and maintain a cybersecurity risk management program. CC ID 16827 | Audits and risk management | Audits and Risk Management | |
Include a commitment to continuous improvement In the cybersecurity risk management program. CC ID 16839 | Audits and risk management | Establish/Maintain Documentation | |
Monitor the effectiveness of the cybersecurity risk management program. CC ID 16831 | Audits and risk management | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain a cybersecurity risk management policy. CC ID 16834 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the cybersecurity risk management policy to interested personnel and affected parties. CC ID 16832 | Audits and risk management | Communicate | |
Disseminate and communicate the cybersecurity risk management program to interested personnel and affected parties. CC ID 16829 | Audits and risk management | Communicate | |
Establish, implement, and maintain a cybersecurity risk management strategy. CC ID 11991 | Audits and risk management | Establish/Maintain Documentation | |
Include a risk prioritization approach in the Cybersecurity Risk Management Strategy. CC ID 12276 | Audits and risk management | Establish/Maintain Documentation | |
Include defense in depth strategies in the cybersecurity risk management strategy. CC ID 15582 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the cybersecurity risk management strategy to interested personnel and affected parties. CC ID 16825 | Audits and risk management | Communicate | |
Evaluate the cyber insurance market. CC ID 12695 | Audits and risk management | Business Processes | |
Evaluate the usefulness of cyber insurance to the organization. CC ID 12694 | Audits and risk management | Business Processes | |
Acquire cyber insurance, as necessary. CC ID 12693 | Audits and risk management | Business Processes | |
Establish, implement, and maintain a cybersecurity supply chain risk management program. CC ID 16826 | Audits and risk management | Establish/Maintain Documentation | |
Establish, implement, and maintain cybersecurity supply chain risk management procedures. CC ID 16830 | Audits and risk management | Establish/Maintain Documentation | |
Monitor the effectiveness of the cybersecurity supply chain risk management program. CC ID 16828 | Audits and risk management | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain a supply chain risk management policy. CC ID 14663 | Audits and risk management | Establish/Maintain Documentation | |
Include compliance requirements in the supply chain risk management policy. CC ID 14711 | Audits and risk management | Establish/Maintain Documentation | |
Include coordination amongst entities in the supply chain risk management policy. CC ID 14710 | Audits and risk management | Establish/Maintain Documentation | |
Include management commitment in the supply chain risk management policy. CC ID 14709 | Audits and risk management | Establish/Maintain Documentation | |
Include roles and responsibilities in the supply chain risk management policy. CC ID 14708 | Audits and risk management | Establish/Maintain Documentation | |
Include the scope in the supply chain risk management policy. CC ID 14707 | Audits and risk management | Establish/Maintain Documentation | |
Include the purpose in the supply chain risk management policy. CC ID 14706 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the supply chain risk management policy to all interested personnel and affected parties. CC ID 14662 | Audits and risk management | Communicate | |
Establish, implement, and maintain a supply chain risk management plan. CC ID 14713 | Audits and risk management | Establish/Maintain Documentation | |
Include processes for monitoring and reporting in the supply chain risk management plan. CC ID 15619 | Audits and risk management | Establish/Maintain Documentation | |
Include dates in the supply chain risk management plan. CC ID 15617 | Audits and risk management | Establish/Maintain Documentation | |
Include implementation milestones in the supply chain risk management plan. CC ID 15615 | Audits and risk management | Establish/Maintain Documentation | |
Include roles and responsibilities in the supply chain risk management plan. CC ID 15613 | Audits and risk management | Establish/Maintain Documentation | |
Include supply chain risk management procedures in the risk management program. CC ID 13190 | Audits and risk management | Establish/Maintain Documentation | |
Disseminate and communicate the supply chain risk management procedures to all interested personnel and affected parties. CC ID 14712 | Audits and risk management | Communicate | |
Assign key stakeholders to review and approve supply chain risk management procedures. CC ID 13199 | Audits and risk management | Human Resources Management | |
Disseminate and communicate the risk management policy to interested personnel and affected parties. CC ID 13792 | Audits and risk management | Communicate | |
Establish, implement, and maintain an access classification scheme. CC ID 00509 [{network connection type} Review whether management does the following: Identifies access points and connection types that pose risk. App A Objective 6.7.b {network connection type} Review whether management does the following: Identifies access points and connection types that pose risk. App A Objective 6.7.b] | Technical security | Establish/Maintain Documentation | |
Include restricting access to confidential data or restricted information to a need to know basis in the access classification scheme. CC ID 00510 | Technical security | Establish/Maintain Documentation | |
Include business security requirements in the access classification scheme. CC ID 00002 | Technical security | Establish/Maintain Documentation | |
Interpret and apply security requirements based upon the information classification of the system. CC ID 00003 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Technical security | Establish/Maintain Documentation | |
Include third party access in the access classification scheme. CC ID 11786 [Identify unique products and services and any required third-party access requirements. App A Objective 1.4.b] | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain security classifications for organizational assets. CC ID 00005 | Technical security | Establish/Maintain Documentation | |
Establish the criticality of the network and systems. CC ID 00006 | Technical security | Technical Security | |
Limit the use of resources by priority. CC ID 01448 | Technical security | Technical Security | |
Establish, implement, and maintain an access control program. CC ID 11702 [{controls} Review whether management does the following: Develops and maintains a culture that fosters responsible and controlled access for users. App A Objective 6.8.a] | Technical security | Establish/Maintain Documentation | |
Include instructions to change authenticators as often as necessary in the access control program. CC ID 11931 | Technical security | Establish/Maintain Documentation | |
Include guidance for how users should protect their authentication credentials in the access control program. CC ID 11929 | Technical security | Establish/Maintain Documentation | |
Include guidance on selecting authentication credentials in the access control program. CC ID 11928 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain access control policies. CC ID 00512 [{access control policy} {data transfer policy} Determine whether management maintains policies and effectively controls and protects access to and transmission of information to avoid loss or damage. Review whether management does the following: App A Objective 6.18 {enforce} Determine whether the institution's security operations activities include the following: Enforcement of access controls. App A Objective 8.1.k Determine whether management effectively provides secure customer access to financial services and plans for potential interruptions in service. Review whether management does the following: App A Objective 6.25] | Technical security | Establish/Maintain Documentation | |
Include compliance requirements in the access control policy. CC ID 14006 | Technical security | Establish/Maintain Documentation | |
Include coordination amongst entities in the access control policy. CC ID 14005 | Technical security | Establish/Maintain Documentation | |
Include management commitment in the access control policy. CC ID 14004 | Technical security | Establish/Maintain Documentation | |
Include roles and responsibilities in the access control policy. CC ID 14003 | Technical security | Establish/Maintain Documentation | |
Include the scope in the access control policy. CC ID 14002 | Technical security | Establish/Maintain Documentation | |
Include the purpose in the access control policy. CC ID 14001 | Technical security | Establish/Maintain Documentation | |
Document the business need justification for user accounts. CC ID 15490 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain an instant messaging and chat system usage policy. CC ID 11815 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the access control policies to all interested personnel and affected parties. CC ID 10061 [Review whether management does the following: Communicates and enforces the responsibilities of programmers, security administrators, and application owners in maintaining effective application access control. App A Objective 6.22.d] | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain an access rights management plan. CC ID 00513 [Review whether management has the following: A process to control privileged access. App A Objective 6.20.d Review whether management has the following: A monitoring process to oversee and manage the access rights granted to each user on the system. App A Objective 6.20.c Determine whether management has an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices. Review whether management has the following: App A Objective 6.20 Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Technical security | Establish/Maintain Documentation | |
Implement safeguards to protect access credentials from unauthorized access. CC ID 16433 | Technical security | Technical Security | |
Inventory all user accounts. CC ID 13732 | Technical security | Establish/Maintain Documentation | |
Establish and maintain contact information for user accounts, as necessary. CC ID 15418 | Technical security | Data and Information Management | |
Control access rights to organizational assets. CC ID 00004 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts and logs access to and activity on operating system parameters, system utilities (especially those with data-altering capabilities), and sensitive system resources (including files, programs, and processes), and supplements with additional security software, as necessary. App A Objective 6.21.b Determine whether management controls access to applications. Review whether management does the following: App A Objective 6.22 As part of management's process to secure the operating system and all system components, determine whether management does the following: Limits the number of employees with access to operating system and system utilities and grants only the minimum level of access required to perform job responsibilities. App A Objective 6.21.a {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical security | Technical Security | |
Configure access control lists in accordance with organizational standards. CC ID 16465 | Technical security | Configuration | |
Add all devices requiring access control to the Access Control List. CC ID 06264 | Technical security | Establish/Maintain Documentation | |
Generate but refrain from storing authenticators or Personal Identification Numbers for systems involved in high risk activities. CC ID 06835 | Technical security | Technical Security | |
Define roles for information systems. CC ID 12454 | Technical security | Human Resources Management | |
Define access needs for each role assigned to an information system. CC ID 12455 | Technical security | Human Resources Management | |
Define access needs for each system component of an information system. CC ID 12456 | Technical security | Technical Security | |
Define the level of privilege required for each system component of an information system. CC ID 12457 | Technical security | Technical Security | |
Establish access rights based on least privilege. CC ID 01411 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Limits the number of employees with access to operating system and system utilities and grants only the minimum level of access required to perform job responsibilities. App A Objective 6.21.a Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts access and applies the rule of least privilege</span> in assigning authorizations. App A Objective 6.29] | Technical security | Technical Security | |
Assign user permissions based on job responsibilities. CC ID 00538 [Review whether management does the following: Manages application access rights by using group profiles. App A Objective 6.22.b Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Technical security | Technical Security | |
Assign user privileges after they have management sign off. CC ID 00542 | Technical security | Technical Security | |
Separate processing domains to segregate user privileges and enhance information flow control. CC ID 06767 | Technical security | Configuration | |
Establish, implement, and maintain lockout procedures or lockout mechanisms to be triggered after a predetermined number of consecutive logon attempts. CC ID 01412 | Technical security | Technical Security | |
Configure the lockout procedure to disregard failed logon attempts after the user is authenticated. CC ID 13822 | Technical security | Configuration | |
Disallow unlocking user accounts absent system administrator approval. CC ID 01413 | Technical security | Technical Security | |
Establish, implement, and maintain session lock capabilities. CC ID 01417 | Technical security | Configuration | |
Limit concurrent sessions according to account type. CC ID 01416 | Technical security | Configuration | |
Establish session authenticity through Transport Layer Security. CC ID 01627 | Technical security | Technical Security | |
Configure the "tlsverify" argument to organizational standards. CC ID 14460 | Technical security | Configuration | |
Configure the "tlscacert" argument to organizational standards. CC ID 14521 | Technical security | Configuration | |
Configure the "tlscert" argument to organizational standards. CC ID 14520 | Technical security | Configuration | |
Configure the "tlskey" argument to organizational standards. CC ID 14519 | Technical security | Configuration | |
Enable access control for objects and users on each system. CC ID 04553 | Technical security | Configuration | |
Include all system components in the access control system. CC ID 11939 | Technical security | Technical Security | |
Set access control for objects and users to "deny all" unless explicitly authorized. CC ID 06301 | Technical security | Process or Activity | |
Enable access control for objects and users to match restrictions set by the system's security classification. CC ID 04850 [Determine whether management does the following: Restricts changes to authorized users. App A Objective 6.11.c] | Technical security | Technical Security | |
Enable attribute-based access control for objects and users on information systems. CC ID 16351 | Technical security | Technical Security | |
Enable role-based access control for objects and users on information systems. CC ID 12458 | Technical security | Technical Security | |
Include the objects and users subject to access control in the security policy. CC ID 11836 | Technical security | Establish/Maintain Documentation | |
Assign Information System access authorizations if implementing segregation of duties. CC ID 06323 | Technical security | Establish Roles | |
Enforce access restrictions for change control. CC ID 01428 | Technical security | Technical Security | |
Enforce access restrictions for restricted data. CC ID 01921 [{access controls} Review whether management does the following: Establishes controls to limit access to data. App A Objective 6.18.b] | Technical security | Data and Information Management | |
Permit a limited set of user actions absent identification and authentication. CC ID 04849 | Technical security | Technical Security | |
Activate third party maintenance accounts and user identifiers, as necessary. CC ID 04262 | Technical security | Technical Security | |
Establish, implement, and maintain a system use agreement for each information system. CC ID 06500 | Technical security | Establish/Maintain Documentation | |
Accept and sign the system use agreement before data or system access is enabled. CC ID 06501 | Technical security | Establish/Maintain Documentation | |
Display a logon banner and appropriate logon message before granting access to the system. CC ID 06770 | Technical security | Technical Security | |
Display previous logon information in the logon banner. CC ID 01415 | Technical security | Configuration | |
Document actions that can be performed on an information system absent identification and authentication of the user. CC ID 06771 | Technical security | Establish/Maintain Documentation | |
Use automatic equipment identification as a method of connection authentication absent an individual's identification and authentication. CC ID 06964 | Technical security | Technical Security | |
Control user privileges. CC ID 11665 | Technical security | Technical Security | |
Review all user privileges, as necessary. CC ID 06784 [Review whether management does the following: Periodically reviews and approves the application access assigned to users for appropriateness. App A Objective 6.22.c] | Technical security | Technical Security | |
Encrypt files and move them to a secure file server when a user account is disabled. CC ID 07065 | Technical security | Configuration | |
Review each user's access capabilities when their role changes. CC ID 00524 | Technical security | Technical Security | |
Change authenticators after personnel status changes. CC ID 12284 | Technical security | Human Resources Management | |
Establish and maintain a Digital Rights Management program. CC ID 07093 | Technical security | Establish/Maintain Documentation | |
Enable products restricted by Digital Rights Management to be used while offline. CC ID 07094 | Technical security | Technical Security | |
Establish, implement, and maintain User Access Management procedures. CC ID 00514 [{physical access} Review whether management does the following: Establishes and appropriately administers a user access program for physical and logical access. App A Objective 6.8.c Review whether management has the following: An authorization process to add, delete, or modify authorized user access to operating systems, applications, directories, files, and specific types of information. App A Objective 6.20.b Review whether management implements the following as appropriate: An enrollment process to add new users to the system. App A Objective 6.20.a {default password} {default account} Review whether management has the following: A process to change or disable default user accounts and passwords. App A Objective 6.20.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Technical security | Technical Security | |
Establish, implement, and maintain an authority for access authorization list. CC ID 06782 | Technical security | Establish/Maintain Documentation | |
Review and approve logical access to all assets based upon organizational policies. CC ID 06641 | Technical security | Technical Security | |
Control the addition and modification of user identifiers, user credentials, or other authenticators. CC ID 00515 | Technical security | Technical Security | |
Assign roles and responsibilities for administering user account management. CC ID 11900 | Technical security | Human Resources Management | |
Automate access control methods, as necessary. CC ID 11838 | Technical security | Technical Security | |
Automate Access Control Systems, as necessary. CC ID 06854 | Technical security | Technical Security | |
Refrain from storing logon credentials for third party applications. CC ID 13690 | Technical security | Technical Security | |
Refrain from allowing user access to identifiers and authenticators used by applications. CC ID 10048 | Technical security | Technical Security | |
Establish, implement, and maintain a password policy. CC ID 16346 | Technical security | Establish/Maintain Documentation | |
Enforce the password policy. CC ID 16347 | Technical security | Technical Security | |
Disseminate and communicate the password policies and password procedures to all users who have access to restricted data or restricted information. CC ID 00518 | Technical security | Establish/Maintain Documentation | |
Limit superuser accounts to designated System Administrators. CC ID 06766 | Technical security | Configuration | |
Enforce usage restrictions for superuser accounts. CC ID 07064 | Technical security | Technical Security | |
Establish, implement, and maintain user accounts in accordance with the organizational Governance, Risk, and Compliance framework. CC ID 00526 | Technical security | Technical Security | |
Protect and manage biometric systems and biometric data. CC ID 01261 | Technical security | Technical Security | |
Establish, implement, and maintain biometric collection procedures. CC ID 15419 | Technical security | Establish/Maintain Documentation | |
Document the business need justification for authentication data storage. CC ID 06325 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain access control procedures. CC ID 11663 | Technical security | Establish/Maintain Documentation | |
Grant access to authorized personnel or systems. CC ID 12186 | Technical security | Configuration | |
Document approving and granting access in the access control log. CC ID 06786 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts and logs access to and activity on operating system parameters, system utilities (especially those with data-altering capabilities), and sensitive system resources (including files, programs, and processes), and supplements with additional security software, as necessary. App A Objective 6.21.b] | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the access control log to interested personnel and affected parties. CC ID 16442 | Technical security | Communicate | |
Include the user identifiers of all personnel who are authorized to access a system in the system record. CC ID 15171 | Technical security | Establish/Maintain Documentation | |
Include identity information of all personnel who are authorized to access a system in the system record. CC ID 16406 | Technical security | Establish/Maintain Documentation | |
Include the date and time that access was reviewed in the system record. CC ID 16416 | Technical security | Data and Information Management | |
Include the date and time that access rights were changed in the system record. CC ID 16415 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain an identification and authentication policy. CC ID 14033 | Technical security | Establish/Maintain Documentation | |
Include the purpose in the identification and authentication policy. CC ID 14234 | Technical security | Establish/Maintain Documentation | |
Include the scope in the identification and authentication policy. CC ID 14232 | Technical security | Establish/Maintain Documentation | |
Include roles and responsibilities in the identification and authentication policy. CC ID 14230 | Technical security | Establish/Maintain Documentation | |
Include management commitment in the identification and authentication policy. CC ID 14229 | Technical security | Establish/Maintain Documentation | |
Include coordination amongst entities in the identification and authentication policy. CC ID 14227 | Technical security | Establish/Maintain Documentation | |
Include compliance requirements in the identification and authentication policy. CC ID 14225 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the identification and authentication policy to interested personnel and affected parties. CC ID 14197 | Technical security | Communicate | |
Establish, implement, and maintain identification and authentication procedures. CC ID 14053 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the identification and authentication procedures to interested personnel and affected parties. CC ID 14223 | Technical security | Communicate | |
Include digital identification procedures in the access control program. CC ID 11841 | Technical security | Technical Security | |
Disseminate and communicate user identifiers and authenticators using secure communication protocols. CC ID 06791 | Technical security | Data and Information Management | |
Include instructions to refrain from using previously used authenticators in the access control program. CC ID 11930 | Technical security | Establish/Maintain Documentation | |
Disallow the use of Personal Identification Numbers as user identifiers. CC ID 06785 | Technical security | Technical Security | |
Define the activation requirements for identification cards or badges. CC ID 06583 | Technical security | Process or Activity | |
Require multiple forms of personal identification prior to issuing user identifiers. CC ID 08712 | Technical security | Human Resources Management | |
Require proper authentication for user identifiers. CC ID 11785 [{be consistent} Review whether management does the following: Implements a robust authentication method consistent with the criticality and sensitivity of the application. App A Objective 6.22.a {authentication control} Review whether applications in use provide the following capabilities: Integrate additional authentication and encryption controls, as necessary. App A Objective 6.27.f] | Technical security | Technical Security | |
Assign authenticators to user accounts. CC ID 06855 | Technical security | Configuration | |
Assign authentication mechanisms for user account authentication. CC ID 06856 | Technical security | Configuration | |
Refrain from allowing individuals to share authentication mechanisms. CC ID 11932 | Technical security | Technical Security | |
Establish and maintain a memorized secret list. CC ID 13791 | Technical security | Establish/Maintain Documentation | |
Limit account credential reuse as a part of digital identification procedures. CC ID 12357 | Technical security | Configuration | |
Refrain from assigning authentication mechanisms for shared accounts. CC ID 11910 | Technical security | Technical Security | |
Use biometric authentication for identification and authentication, as necessary. CC ID 06857 | Technical security | Establish Roles | |
Employ live scans to verify biometric authentication. CC ID 06847 | Technical security | Technical Security | |
Disallow self-enrollment of biometric information. CC ID 11834 | Technical security | Process or Activity | |
Notify a user when an authenticator for a user account is changed. CC ID 13820 | Technical security | Communicate | |
Identify and control all network access controls. CC ID 00529 [{wired network} Review whether management does the following: Implements appropriate controls over wired and wireless networks. App A Objective 6.10.c {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical security | Technical Security | |
Establish, implement, and maintain a network configuration standard. CC ID 00530 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain network segmentation requirements. CC ID 16380 | Technical security | Establish/Maintain Documentation | |
Enforce the network segmentation requirements. CC ID 16381 | Technical security | Process or Activity | |
Ensure the data plane, control plane, and management plane have been segregated according to organizational standards. CC ID 16385 | Technical security | Technical Security | |
Establish, implement, and maintain a network security policy. CC ID 06440 | Technical security | Establish/Maintain Documentation | |
Include compliance requirements in the network security policy. CC ID 14205 | Technical security | Establish/Maintain Documentation | |
Include coordination amongst entities in the network security policy. CC ID 14204 | Technical security | Establish/Maintain Documentation | |
Include management commitment in the network security policy. CC ID 14203 | Technical security | Establish/Maintain Documentation | |
Include roles and responsibilities in the network security policy. CC ID 14202 | Technical security | Establish/Maintain Documentation | |
Include the scope in the network security policy. CC ID 14201 | Technical security | Establish/Maintain Documentation | |
Include the purpose in the network security policy. CC ID 14200 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the network security policy to interested personnel and affected parties. CC ID 14199 | Technical security | Communicate | |
Establish, implement, and maintain system and communications protection procedures. CC ID 14052 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the system and communications protection procedures to interested personnel and affected parties. CC ID 14206 | Technical security | Communicate | |
Establish, implement, and maintain a wireless networking policy. CC ID 06732 [{wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Review whether management does the following: Implements appropriate controlspan> over wired and style="background-color:#F0BBBC;" class="term_primary-noun">wireless networks. App A Objective 6.10.c] | Technical security | Establish/Maintain Documentation | |
Include usage restrictions for Bluetooth in the wireless networking policy. CC ID 16443 | Technical security | Establish/Maintain Documentation | |
Maintain up-to-date network diagrams. CC ID 00531 [Review whether management does the following: Maintains accurate network diagrams and data flow charts. App A Objective 6.10.b {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical security | Establish/Maintain Documentation | |
Include the date of the most recent update on the network diagram. CC ID 14319 | Technical security | Establish/Maintain Documentation | |
Include virtual systems in the network diagram. CC ID 16324 | Technical security | Data and Information Management | |
Include the organization's name in the network diagram. CC ID 14318 | Technical security | Establish/Maintain Documentation | |
Include Internet Protocol addresses in the network diagram. CC ID 16244 | Technical security | Establish/Maintain Documentation | |
Include Domain Name System names in the network diagram. CC ID 16240 | Technical security | Establish/Maintain Documentation | |
Accept, by formal signature, the security implications of the network topology. CC ID 12323 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate network diagrams to interested personnel and affected parties. CC ID 13137 | Technical security | Communicate | |
Maintain up-to-date data flow diagrams. CC ID 10059 [Review whether management does the following: Maintains accurate network diagrams and data flow charts. App A Objective 6.10.b {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical security | Establish/Maintain Documentation | |
Include information flows to third parties in the data flow diagram. CC ID 13185 | Technical security | Establish/Maintain Documentation | |
Document where data-at-rest and data in transit is encrypted on the data flow diagram. CC ID 16412 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the data flow diagrams to interested personnel and affected parties. CC ID 16407 | Technical security | Communicate | |
Manage all internal network connections. CC ID 06329 | Technical security | Technical Security | |
Employ Dynamic Host Configuration Protocol server logging when assigning dynamic IP addresses using the Dynamic Host Configuration Protocol. CC ID 12109 | Technical security | Technical Security | |
Establish, implement, and maintain separate virtual private networks to transport sensitive information. CC ID 12124 | Technical security | Technical Security | |
Establish, implement, and maintain separate virtual local area networks for untrusted devices. CC ID 12095 | Technical security | Technical Security | |
Plan for and approve all network changes. CC ID 00534 | Technical security | Technical Security | |
Manage all external network connections. CC ID 11842 | Technical security | Technical Security | |
Route outbound Internet traffic through a proxy server that supports decrypting network traffic. CC ID 12116 | Technical security | Technical Security | |
Prohibit systems from connecting directly to external networks. CC ID 08709 | Technical security | Configuration | |
Prohibit systems from connecting directly to internal networks outside the demilitarized zone (DMZ). CC ID 16360 | Technical security | Technical Security | |
Secure the Domain Name System. CC ID 00540 | Technical security | Configuration | |
Implement a fault-tolerant architecture. CC ID 01626 | Technical security | Technical Security | |
Implement segregation of duties. CC ID 11843 | Technical security | Technical Security | |
Configure the network to limit zone transfers to trusted servers. CC ID 01876 | Technical security | Configuration | |
Establish, implement, and maintain a Boundary Defense program. CC ID 00544 [Review whether applications in use provide the following capabilities: Protect web or Internet-facing applications through additional controls, including web application firewalls, regular scanning for new or recurring vulnerabilities, mitigation or remediation of common security weaknesses, and network segregation. App A Objective 6.27.g] | Technical security | Establish/Maintain Documentation | |
Refrain from disclosing private Internet Protocol addresses and routing information, unless necessary. CC ID 11891 | Technical security | Technical Security | |
Authorize the disclosure of private Internet Protocol addresses and routing information to external entities. CC ID 12034 | Technical security | Communicate | |
Segregate systems in accordance with organizational standards. CC ID 12546 | Technical security | Technical Security | |
Implement gateways between security domains. CC ID 16493 | Technical security | Systems Design, Build, and Implementation | |
Implement resource-isolation mechanisms in organizational networks. CC ID 16438 | Technical security | Technical Security | |
Segregate servers that contain restricted data or restricted information from direct public access. CC ID 00533 | Technical security | Technical Security | |
Prevent logical access to dedicated networks from outside the secure areas. CC ID 12310 | Technical security | Technical Security | |
Design Demilitarized Zones with proper isolation rules. CC ID 00532 | Technical security | Technical Security | |
Restrict inbound network traffic into the Demilitarized Zone. CC ID 01285 | Technical security | Data and Information Management | |
Restrict inbound network traffic into the Demilitarized Zone to Internet Protocol addresses within the Demilitarized Zone. CC ID 11998 | Technical security | Technical Security | |
Restrict inbound Internet traffic within the Demilitarized Zone to system components that provide publicly accessible services, protocols, and ports. CC ID 11993 | Technical security | Technical Security | |
Segregate applications and databases that contain restricted data or restricted information in an internal network zone. CC ID 01289 | Technical security | Data and Information Management | |
Establish, implement, and maintain a network access control standard. CC ID 00546 [Determine whether management secures access to its computer networks through multiple layers of access controls. Review whether management does the following: App A Objective 6.10 {network zone} Review whether management does the following: Establishes zones (e.g., trusted and untrusted) according to risk with appropriate access requirements within and between each zone. App A Objective 6.10.a {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls {wired network} Management should secure access to computer networks through multiple layers of access controls by doing the following: - Establishing zones (e.g., trusted and untrusted) according to the risk profile and criticality of assets contained within the zones and appropriate access requirements within and between each security zone. - Maintaining accurate network diagrams and data flow charts. - Implementing appropriate controls over wired and wireless networks. II.C.9 Network Controls] | Technical security | Establish/Maintain Documentation | |
Include assigned roles and responsibilities in the network access control standard. CC ID 06410 | Technical security | Establish Roles | |
Employ firewalls to secure network connections between networks of different security categorizations. CC ID 16373 | Technical security | Technical Security | |
Employ firewalls to secure network connections between trusted networks and untrusted networks, as necessary. CC ID 11821 | Technical security | Technical Security | |
Place firewalls between all security domains and between any Demilitarized Zone and internal network zones. CC ID 01274 | Technical security | Configuration | |
Place firewalls between wireless networks and applications or databases that contain restricted data or restricted information. CC ID 01293 | Technical security | Configuration | |
Place firewalls between all security domains and between any secure subnet and internal network zones. CC ID 11784 | Technical security | Configuration | |
Separate the wireless access points and wireless bridges from the wired network via a firewall. CC ID 04588 | Technical security | Technical Security | |
Include configuration management and rulesets in the network access control standard. CC ID 11845 | Technical security | Establish/Maintain Documentation | |
Secure the network access control standard against unauthorized changes. CC ID 11920 | Technical security | Establish/Maintain Documentation | |
Employ centralized management systems to configure and control networks, as necessary. CC ID 12540 | Technical security | Technical Security | |
Establish, implement, and maintain a firewall and router configuration standard. CC ID 00541 | Technical security | Configuration | |
Include compensating controls implemented for insecure protocols in the firewall and router configuration standard. CC ID 11948 | Technical security | Establish/Maintain Documentation | |
Include restricting inbound network traffic in the firewall and router configuration standard. CC ID 11960 | Technical security | Establish/Maintain Documentation | |
Include restricting outbound network traffic in the firewall and router configuration standard. CC ID 11961 | Technical security | Establish/Maintain Documentation | |
Include requirements for a firewall at each Internet connection and between any demilitarized zone and the internal network zone in the firewall and router configuration standard. CC ID 12435 | Technical security | Establish/Maintain Documentation | |
Include network diagrams that identify connections between all subnets and wireless networks in the firewall and router configuration standard. CC ID 12434 | Technical security | Establish/Maintain Documentation | |
Include network diagrams that identify storage or processing locations of all restricted data in the firewall and router configuration standard. CC ID 12426 | Technical security | Establish/Maintain Documentation | |
Deny or strictly control wireless traffic to applications or databases that contain restricted data or restricted information. CC ID 11847 | Technical security | Configuration | |
Include a protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 00537 | Technical security | Establish/Maintain Documentation | |
Configure network ports to organizational standards. CC ID 14007 | Technical security | Configuration | |
Include approval of the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 12547 | Technical security | Establish/Maintain Documentation | |
Include the use of protocols above and beyond common information service protocols in the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 00539 | Technical security | Establish/Maintain Documentation | |
Include justifying the use of risky protocols in the protocols, ports, applications, and services list in the firewall and router configuration standard. CC ID 01280 | Technical security | Establish/Maintain Documentation | |
Document and implement security features for each identified insecure service, protocol, and port in the protocols, ports, applications, and services list. CC ID 12033 | Technical security | Establish/Maintain Documentation | |
Identify the insecure services, protocols, and ports in the protocols, ports, applications, and services list in the firewall and router configuration. CC ID 12032 | Technical security | Establish/Maintain Documentation | |
Install and configure firewalls to be enabled on all mobile devices, if possible. CC ID 00550 | Technical security | Configuration | |
Lock personal firewall configurations to prevent them from being disabled or changed by end users. CC ID 06420 | Technical security | Technical Security | |
Configure network access and control points to protect restricted data or restricted information. CC ID 01284 | Technical security | Configuration | |
Protect data stored at external locations. CC ID 16333 | Technical security | Data and Information Management | |
Protect the firewall's network connection interfaces. CC ID 01955 | Technical security | Technical Security | |
Configure firewalls to deny all traffic by default, except explicitly designated traffic. CC ID 00547 | Technical security | Configuration | |
Allow local program exceptions on the firewall, as necessary. CC ID 01956 | Technical security | Configuration | |
Allow remote administration exceptions on the firewall, as necessary. CC ID 01957 | Technical security | Configuration | |
Allow file sharing exceptions on the firewall, as necessary. CC ID 01958 | Technical security | Configuration | |
Allow printer sharing exceptions on the firewall, as necessary. CC ID 11849 | Technical security | Configuration | |
Allow Internet Control Message Protocol exceptions on the firewall, as necessary. CC ID 01959 | Technical security | Configuration | |
Allow Remote Desktop Connection exceptions on the firewall, as necessary. CC ID 01960 | Technical security | Configuration | |
Allow UPnP framework exceptions on the firewall, as necessary. CC ID 01961 | Technical security | Configuration | |
Allow notification exceptions on the firewall, as necessary. CC ID 01962 | Technical security | Configuration | |
Allow unicast response to multicast or broadcast exceptions on the firewall, as necessary. CC ID 01964 | Technical security | Configuration | |
Allow protocol port exceptions on the firewall, as necessary. CC ID 01965 | Technical security | Configuration | |
Allow local port exceptions on the firewall, as necessary. CC ID 01966 | Technical security | Configuration | |
Establish, implement, and maintain ingress address filters on the firewall, as necessary. CC ID 01287 | Technical security | Configuration | |
Establish, implement, and maintain packet filtering requirements. CC ID 16362 | Technical security | Technical Security | |
Configure firewall filtering to only permit established connections into the network. CC ID 12482 | Technical security | Technical Security | |
Restrict outbound network traffic from systems that contain restricted data or restricted information. CC ID 01295 | Technical security | Data and Information Management | |
Deny direct Internet access to databases that store restricted data or restricted information. CC ID 01271 | Technical security | Data and Information Management | |
Synchronize and secure all router configuration files. CC ID 01291 | Technical security | Configuration | |
Synchronize and secure all firewall configuration files. CC ID 11851 | Technical security | Configuration | |
Configure firewalls to generate an audit log. CC ID 12038 | Technical security | Audits and Risk Management | |
Configure firewalls to generate an alert when a potential security incident is detected. CC ID 12165 | Technical security | Configuration | |
Record the configuration rules for network access and control points in the configuration management system. CC ID 12105 | Technical security | Establish/Maintain Documentation | |
Record the duration of the business need associated with changes to the configuration rules for network access and control points in the configuration management system. CC ID 12107 | Technical security | Establish/Maintain Documentation | |
Record each individual's name and business need associated with changes to the configuration rules for network access and control points in the configuration management system. CC ID 12106 | Technical security | Establish/Maintain Documentation | |
Install and configure application layer firewalls for all key web-facing applications. CC ID 01450 | Technical security | Configuration | |
Update application layer firewalls to the most current version. CC ID 12037 | Technical security | Process or Activity | |
Establish, implement, and maintain Voice over Internet Protocol Configuration Management standards. CC ID 11853 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain a Wireless Local Area Network Configuration Management standard. CC ID 11854 | Technical security | Establish/Maintain Documentation | |
Configure third party Wireless Local Area Network services in accordance with organizational Information Assurance standards. CC ID 00751 | Technical security | Configuration | |
Remove all unauthorized Wireless Local Area Networks. CC ID 06309 | Technical security | Configuration | |
Establish, implement, and maintain Voice over Internet Protocol design specification. CC ID 01449 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain a Wireless Local Area Network Configuration Management program. CC ID 01646 | Technical security | Establish/Maintain Documentation | |
Distrust relying solely on Wired Equivalent Privacy encryption for Wireless Local Area Networks. CC ID 01647 | Technical security | Technical Security | |
Refrain from using Wired Equivalent Privacy for Wireless Local Area Networks that use Wi-Fi Protected Access. CC ID 01648 | Technical security | Configuration | |
Conduct a Wireless Local Area Network site survey to determine the proper location for wireless access points. CC ID 00605 | Technical security | Technical Security | |
Configure Intrusion Detection Systems and Intrusion Prevention Systems to continuously check and send alerts for rogue devices connected to Wireless Local Area Networks. CC ID 04830 | Technical security | Configuration | |
Remove all unauthorized wireless access points. CC ID 11856 | Technical security | Configuration | |
Enforce information flow control. CC ID 11781 [Review whether management does the following: Implements a layered control system using different controls at different points in a transaction process. App A Objective 6.4.a Review whether management does the following: Implements appropriate controls over the electronic transmission of information or, if appropriate safeguards are unavailable, restricts the type of information that can be transmitted. App A Objective 6.18.d {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical security | Monitor and Evaluate Occurrences | |
Monitor information flows for anomalies. CC ID 16365 | Technical security | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain information flow control configuration standards. CC ID 01924 [Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7] | Technical security | Establish/Maintain Documentation | |
Restrict traffic or information flow based on the node type. CC ID 16396 | Technical security | Technical Security | |
Restrict traffic or information flow based on the destination address. CC ID 16378 | Technical security | Technical Security | |
Restrict traffic or information flow based on the origination address. CC ID 16484 | Technical security | Technical Security | |
Assign appropriate roles for enabling or disabling information flow controls. CC ID 06760 | Technical security | Establish Roles | |
Require the system to identify and authenticate approved devices before establishing a connection. CC ID 01429 [{time of day access} Review whether management does the following: Sets time-of-day or terminal limitations for some applications or for more sensitive functions within an application. App A Objective 6.22.e] | Technical security | Testing | |
Maintain a record of the challenge state during identification and authentication in an automated information exchange. CC ID 06629 | Technical security | Establish/Maintain Documentation | |
Configure network flow monitoring to organizational standards. CC ID 16364 | Technical security | Configuration | |
Develop and implement a content filtering word and phrase library. CC ID 07071 | Technical security | Establish/Maintain Documentation | |
Use content filtering scans to identify information flows by data type specification. CC ID 06762 | Technical security | Technical Security | |
Use content filtering scans to identify information flows by data type usage. CC ID 11818 | Technical security | Technical Security | |
Prevent encrypted data from bypassing content filtering mechanisms. CC ID 06758 | Technical security | Technical Security | |
Establish, implement, and maintain a data loss prevention solution to protect Access Control Lists. CC ID 12128 | Technical security | Technical Security | |
Constrain the information flow of restricted data or restricted information. CC ID 06763 [Review whether management does the following: Implements appropriate controls over the electronic transmission of information or, if appropriate safeguards are unavailable, restricts the type of information that can be transmitted. App A Objective 6.18.d] | Technical security | Data and Information Management | |
Restrict access to restricted data and restricted information on a need to know basis. CC ID 12453 | Technical security | Data and Information Management | |
Prohibit restricted data or restricted information from being sent to mobile devices. CC ID 04725 | Technical security | Data and Information Management | |
Prohibit restricted data or restricted information from being copied or moved absent approval of system boundaries for information flow control. CC ID 06310 | Technical security | Data and Information Management | |
Establish, implement, and maintain information flow control policies inside the system and between interconnected systems. CC ID 01410 [{access control policy} {data transfer policy} Determine whether management maintains policies and effectively controls and protects access to and transmission of information to avoid loss or damage. Review whether management does the following: App A Objective 6.18 {network connection} {low risk system} Review whether management does the following: Identifies connections between and access across low-risk and high-risk systems. App A Objective 6.7.c {network connection} {low risk system} Review whether management does the following: Identifies connections between and access across low-risk and high-risk systems. App A Objective 6.7.c Review whether management does the following: Implements and assesses the adequacy of appropriate controls to ensure the security of connections. App A Objective 6.7.e Determine whether management comprehensively and effectively identifies, measures, mitigates, monitors, and reports interconnectivity risk. Review whether management does the following: App A Objective 6.7 Determine the extent of network connectivity internally and externally and the boundaries and functions of security domains. App A Objective 1.4.c {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical security | Establish/Maintain Documentation | |
Define risk tolerance to illicit data flow for each type of information classification. CC ID 01923 | Technical security | Data and Information Management | |
Establish, implement, and maintain a document printing policy. CC ID 14384 | Technical security | Establish/Maintain Documentation | |
Include printing to personal printers during a continuity event in the document printing policy. CC ID 14396 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain information flow procedures. CC ID 04542 | Technical security | Establish/Maintain Documentation | |
Disclose non-privacy related restricted information after a court makes a determination the information is material to a court case. CC ID 06242 | Technical security | Data and Information Management | |
Exchange non-privacy related restricted information with approved third parties if the information supports an approved activity. CC ID 06243 | Technical security | Data and Information Management | |
Establish, implement, and maintain information exchange procedures. CC ID 11782 | Technical security | Establish/Maintain Documentation | |
Perform content sanitization on data-in-transit. CC ID 16512 | Technical security | Data and Information Management | |
Perform content conversion on data-in-transit. CC ID 16510 | Technical security | Data and Information Management | |
Protect data from unauthorized access while transmitting between separate parts of the system. CC ID 16499 | Technical security | Data and Information Management | |
Protect data from modification or loss while transmitting between separate parts of the system. CC ID 04554 | Technical security | Data and Information Management | |
Protect data from unauthorized disclosure while transmitting between separate parts of the system. CC ID 11859 | Technical security | Data and Information Management | |
Review and approve information exchange system connections. CC ID 07143 | Technical security | Technical Security | |
Log issuers who send personal data in cleartext in the transfer audit log. CC ID 12312 | Technical security | Log Management | |
Establish, implement, and maintain measures to detect and prevent the use of unsafe internet services. CC ID 13104 | Technical security | Technical Security | |
Refrain from storing restricted data at unsafe Internet services or virtual servers. CC ID 13107 | Technical security | Technical Security | |
Establish, implement, and maintain whitelists and blacklists of domain names. CC ID 07097 | Technical security | Establish/Maintain Documentation | |
Deploy sender policy framework records in the organization's Domain Name Servers. CC ID 12183 | Technical security | Configuration | |
Block uncategorized sites using URL filtering. CC ID 12140 | Technical security | Technical Security | |
Establish, implement, and maintain whitelists and blacklists of web content. CC ID 15234 | Technical security | Data and Information Management | |
Establish, implement, and maintain whitelists and blacklists of software. CC ID 11780 | Technical security | Establish/Maintain Documentation | |
Implement information flow control policies when making decisions about information sharing or collaboration. CC ID 10094 | Technical security | Behavior | |
Establish, implement, and maintain a data loss prevention program. CC ID 13050 [Determine whether management responsibilities are appropriate and include the following: Protection of data consistently throughout the institution. App A Objective 2.5.j Review whether management does the following: Requires secure storage of all types of sensitive information, whether on computer systems, portable devices, physical media, or hard-copy documents. App A Objective 6.18.a {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Technical security | Establish/Maintain Documentation | |
Include the data loss prevention strategy as part of the data loss prevention program. CC ID 13051 | Technical security | Establish/Maintain Documentation | |
Secure access to each system component operating system. CC ID 00551 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Restricts operating system access to specific terminals in physically secure and monitored locations. App A Objective 6.21.c] | Technical security | Configuration | |
Enforce privileged accounts and non-privileged accounts for system access. CC ID 00558 | Technical security | Technical Security | |
Separate user functionality from system management functionality. CC ID 11858 | Technical security | Technical Security | |
Segregate electronically stored information from operating system access. CC ID 00552 | Technical security | Configuration | |
Control all methods of remote access and teleworking. CC ID 00559 [Determine whether management effectively controls employees' use of remote devices. Review whether management does the following: App A Objective 6.24 Review whether management does the following: Implements controls over remote devices provided by the institution (e.g., securely configures remote access devices, protects devices against malware, patches and updates software, encrypts sensitive data, implements secure containers, audits device access, uses remote disable and wipe capabilities, and uses geolocation). App A Objective 6.24.b Review whether management does the following: Provides remote access in a safe and sound manner. App A Objective 6.23.a {access controls} Review whether management does the following: Implements the controls necessary to offer remote access securely (e.g., disables unnecessary remote access, obtains approvals for and performs audits of remote access, maintains robust configurations, enables logging and monitoring, secures devices, restricts remote access during specific times, controls applications, enables strong authentication, and uses encryption). App A Objective 6.23.b] | Technical security | Technical Security | |
Assign virtual escorting to authorized personnel. CC ID 16440 | Technical security | Process or Activity | |
Establish, implement, and maintain a remote access and teleworking program. CC ID 04545 [{employee-owned device} Determine whether management has policies and procedures to ensure that remote access by employees, whether using institution or personally owned devices, is provided in a safe and sound manner. Review whether management does the following: App A Objective 6.23] | Technical security | Establish/Maintain Documentation | |
Include information security requirements in the remote access and teleworking program. CC ID 15704 | Technical security | Establish/Maintain Documentation | |
Refrain from allowing remote users to copy files to remote devices. CC ID 06792 | Technical security | Technical Security | |
Control remote administration in accordance with organizational standards. CC ID 04459 | Technical security | Configuration | |
Control remote access through a network access control. CC ID 01421 | Technical security | Technical Security | |
Install and maintain remote control software and other remote control mechanisms on critical systems. CC ID 06371 | Technical security | Configuration | |
Prohibit remote access to systems processing cleartext restricted data or restricted information. CC ID 12324 | Technical security | Technical Security | |
Employ multifactor authentication for remote access to the organization's network. CC ID 12505 | Technical security | Technical Security | |
Implement multifactor authentication techniques. CC ID 00561 | Technical security | Configuration | |
Implement phishing-resistant multifactor authentication techniques. CC ID 16541 | Technical security | Technical Security | |
Document and approve requests to bypass multifactor authentication. CC ID 15464 | Technical security | Establish/Maintain Documentation | |
Limit the source addresses from which remote administration is performed. CC ID 16393 | Technical security | Technical Security | |
Protect remote access accounts with encryption. CC ID 00562 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Prohibits remote access to operating system and system utilities, where feasible, and, at a minimum, requires strong authentication and encrypted sessions before allowing such remote access. App A Objective 6.21.e] | Technical security | Configuration | |
Manage the use of encryption controls and cryptographic controls. CC ID 00570 [{authentication control} Review whether applications in use provide the following capabilities: Integrate additional authentication and encryption controls, as necessary. App A Objective 6.27.f] | Technical security | Technical Security | |
Comply with the encryption laws of the local country. CC ID 16377 | Technical security | Business Processes | |
Define the cryptographic module security functions and the cryptographic module operational modes. CC ID 06542 | Technical security | Establish/Maintain Documentation | |
Define the cryptographic boundaries. CC ID 06543 | Technical security | Establish/Maintain Documentation | |
Establish and maintain the documentation requirements for cryptographic modules. CC ID 06544 | Technical security | Establish/Maintain Documentation | |
Establish and maintain the security requirements for cryptographic module ports and cryptographic module interfaces. CC ID 06545 | Technical security | Establish/Maintain Documentation | |
Implement the documented cryptographic module security functions. CC ID 06755 | Technical security | Data and Information Management | |
Establish, implement, and maintain documentation for the delivery and operation of cryptographic modules. CC ID 06547 | Technical security | Establish/Maintain Documentation | |
Document the operation of the cryptographic module. CC ID 06546 | Technical security | Establish/Maintain Documentation | |
Employ cryptographic controls that comply with applicable requirements. CC ID 12491 | Technical security | Technical Security | |
Establish, implement, and maintain digital signatures. CC ID 13828 | Technical security | Data and Information Management | |
Include the expiration date in digital signatures. CC ID 13833 | Technical security | Data and Information Management | |
Include audience restrictions in digital signatures. CC ID 13834 | Technical security | Data and Information Management | |
Include the subject in digital signatures. CC ID 13832 | Technical security | Data and Information Management | |
Include the issuer in digital signatures. CC ID 13831 | Technical security | Data and Information Management | |
Include identifiers in the digital signature. CC ID 13829 | Technical security | Data and Information Management | |
Generate and protect a secret random number for each digital signature. CC ID 06577 | Technical security | Establish/Maintain Documentation | |
Establish the security strength requirements for the digital signature process. CC ID 06578 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain an encryption management and cryptographic controls policy. CC ID 04546 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30] | Technical security | Establish/Maintain Documentation | |
Refrain from allowing the use of cleartext for input or output of restricted data or restricted information. CC ID 04823 | Technical security | Configuration | |
Encrypt in scope data or in scope information, as necessary. CC ID 04824 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30 Management should implement the type and level of encryption commensurate with the sensitivity of the information. II.C.19 Encryption Management should implement the type and level of encryption commensurate with the sensitivity of the information. II.C.19 Encryption] | Technical security | Data and Information Management | |
Digitally sign records and data, as necessary. CC ID 16507 | Technical security | Data and Information Management | |
Make key usage for data fields unique for each device. CC ID 04828 | Technical security | Technical Security | |
Decrypt restricted data for the minimum time required. CC ID 12308 | Technical security | Data and Information Management | |
Decrypt personal data only on dedicated networks, not on public networks. CC ID 12309 | Technical security | Data and Information Management | |
Accept only trusted keys and/or certificates. CC ID 11988 | Technical security | Technical Security | |
Establish, implement, and maintain cryptographic key creation domain parameter requirements. CC ID 06575 | Technical security | Data and Information Management | |
Define the asymmetric signature field for the CHUID container on identification cards or badges. CC ID 06584 | Technical security | Process or Activity | |
Implement cryptographic operations and support functions on identification cards or badges. CC ID 06585 | Technical security | Process or Activity | |
Disseminate and communicate the encryption management and cryptographic controls policy to all interested personnel and affected parties. CC ID 15476 | Technical security | Communicate | |
Define the format of the biometric data on identification cards or badges. CC ID 06586 | Technical security | Process or Activity | |
Protect salt values and hash values in accordance with organizational standards. CC ID 16471 | Technical security | Data and Information Management | |
Provide guidance to customers on how to securely transmit, store, and update cryptographic keys. CC ID 12040 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the encryption management procedures to all interested personnel and affected parties. CC ID 15477 | Technical security | Communicate | |
Establish, implement, and maintain encryption management procedures. CC ID 15475 | Technical security | Establish/Maintain Documentation | |
Define and assign cryptographic, encryption and key management roles and responsibilities. CC ID 15470 | Technical security | Establish Roles | |
Establish, implement, and maintain cryptographic key management procedures. CC ID 00571 [{encryption type}{encryption strength} Determine how and where management uses encryption and if the type and strength are sufficient to protect information appropriately. Additionally, determine whether management has effective controls over encryption key management. App A Objective 6.30] | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate cryptographic key management procedures to interested personnel and affected parties. CC ID 13164 | Technical security | Communicate | |
Bind keys to each identity. CC ID 12337 | Technical security | Technical Security | |
Include recommended cryptographic key management procedures for cloud service providers in the cryptographic key management procedures. CC ID 13152 | Technical security | Establish/Maintain Documentation | |
Include requesting cryptographic key types in the cryptographic key management procedures. CC ID 13151 | Technical security | Establish/Maintain Documentation | |
Recover encrypted data for lost cryptographic keys, compromised cryptographic keys, or damaged cryptographic keys. CC ID 01301 | Technical security | Data and Information Management | |
Generate strong cryptographic keys. CC ID 01299 | Technical security | Data and Information Management | |
Generate unique cryptographic keys for each user. CC ID 12169 | Technical security | Technical Security | |
Use approved random number generators for creating cryptographic keys. CC ID 06574 | Technical security | Data and Information Management | |
Implement decryption keys so that they are not linked to user accounts. CC ID 06851 | Technical security | Technical Security | |
Include the establishment of cryptographic keys in the cryptographic key management procedures. CC ID 06540 | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate cryptographic keys securely. CC ID 01300 | Technical security | Data and Information Management | |
Control the input and output of cryptographic keys from a cryptographic module. CC ID 06541 | Technical security | Data and Information Management | |
Store cryptographic keys securely. CC ID 01298 | Technical security | Data and Information Management | |
Restrict access to cryptographic keys. CC ID 01297 | Technical security | Data and Information Management | |
Store cryptographic keys in encrypted format. CC ID 06084 | Technical security | Data and Information Management | |
Store key-encrypting keys and data-encrypting keys in different locations. CC ID 06085 | Technical security | Technical Security | |
Include offsite backups of cryptographic keys in the cryptographic key management procedures. CC ID 13127 | Technical security | Establish/Maintain Documentation | |
Change cryptographic keys in accordance with organizational standards. CC ID 01302 | Technical security | Data and Information Management | |
Destroy cryptographic keys promptly after the retention period. CC ID 01303 | Technical security | Data and Information Management | |
Control cryptographic keys with split knowledge and dual control. CC ID 01304 | Technical security | Data and Information Management | |
Prevent the unauthorized substitution of cryptographic keys. CC ID 01305 | Technical security | Data and Information Management | |
Manage outdated cryptographic keys, compromised cryptographic keys, or revoked cryptographic keys. CC ID 06852 | Technical security | Technical Security | |
Archive outdated cryptographic keys. CC ID 06884 | Technical security | Data and Information Management | |
Archive revoked cryptographic keys. CC ID 11819 | Technical security | Data and Information Management | |
Require key custodians to sign the cryptographic key management policy. CC ID 01308 | Technical security | Establish/Maintain Documentation | |
Require key custodians to sign the key custodian's roles and responsibilities. CC ID 11820 | Technical security | Human Resources Management | |
Manage the digital signature cryptographic key pair. CC ID 06576 | Technical security | Data and Information Management | |
Establish, implement, and maintain requirements for Personal Identity Verification authentication certificates. CC ID 06587 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain Public Key certificate application procedures. CC ID 07079 | Technical security | Establish/Maintain Documentation | |
Establish a Registration Authority to support the Public Key Infrastructure. CC ID 15725 | Technical security | Establish Roles | |
Include the Identification and Authentication of individuals or entities in the Public Key certificate application procedures. CC ID 07080 | Technical security | Establish/Maintain Documentation | |
Include approving or rejecting Public Key certificate applications in the Public Key certificate application procedure. CC ID 07081 | Technical security | Establish/Maintain Documentation | |
Include revocation of Public Key certificates in the Public Key certificate procedures. CC ID 07082 | Technical security | Establish/Maintain Documentation | |
Publish revoked Public Key certificates in the Certificate Revocation List. CC ID 07089 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain Public Key renewal or rekeying request procedures. CC ID 07083 | Technical security | Establish/Maintain Documentation | |
Include identification and authentication in Public Key renewal or rekeying request procedures. CC ID 11816 | Technical security | Establish/Maintain Documentation | |
Issue authentication mechanisms that support the Public Key Infrastructure. CC ID 07092 | Technical security | Technical Security | |
Establish a Root Certification Authority to support the Public Key Infrastructure. CC ID 07084 | Technical security | Technical Security | |
Establish, implement, and maintain Public Key certificate procedures. CC ID 07085 | Technical security | Establish/Maintain Documentation | |
Include signing and issuing Public Key certificates in the Public Key certificate procedures. CC ID 11817 | Technical security | Establish/Maintain Documentation | |
Include publishing Public Key certificates in the Public Key certificate procedures. CC ID 07087 | Technical security | Establish/Maintain Documentation | |
Include access to issued Public Key certificates in the Public Key certificate procedures. CC ID 07086 | Technical security | Establish/Maintain Documentation | |
Connect the Public Key Infrastructure to the organization's identity and access management system. CC ID 07091 | Technical security | Technical Security | |
Archive Public Key certificate records according to organizational Records Management rules. CC ID 07090 | Technical security | Records Management | |
Refrain from storing encryption keys with cloud service providers when cryptographic key management services are in place locally. CC ID 13153 | Technical security | Technical Security | |
Refrain from permitting cloud service providers to manage encryption keys when cryptographic key management services are in place locally. CC ID 13154 | Technical security | Technical Security | |
Use strong data encryption to transmit in scope data or in scope information, as necessary. CC ID 00564 | Technical security | Technical Security | |
Ensure restricted data or restricted information are encrypted prior to or at the time of transmission. CC ID 01749 | Technical security | Configuration | |
Configure the encryption strength to be appropriate for the encryption methodology of the cryptographic controls. CC ID 12492 | Technical security | Technical Security | |
Encrypt traffic over networks with trusted cryptographic keys. CC ID 12490 | Technical security | Technical Security | |
Authorize transactions of data transmitted over public networks or shared data networks. CC ID 00566 | Technical security | Establish/Maintain Documentation | |
Treat data messages that do not receive an acknowledgment as never been sent. CC ID 14416 | Technical security | Technical Security | |
Establish trusted paths to transmit restricted data or restricted information over public networks or wireless networks. CC ID 00568 | Technical security | Technical Security | |
Protect application services information transmitted over a public network from unauthorized modification. CC ID 12021 | Technical security | Technical Security | |
Protect application services information transmitted over a public network from unauthorized disclosure. CC ID 12020 | Technical security | Technical Security | |
Protect application services information transmitted over a public network from contract disputes. CC ID 12019 | Technical security | Technical Security | |
Protect application services information transmitted over a public network from fraudulent activity. CC ID 12018 | Technical security | Technical Security | |
Establish, implement, and maintain a malicious code protection program. CC ID 00574 [Determine whether management has implemented defense-in-depth to protect, detect, and respond to malware. App A Objective 6.17] | Technical security | Establish/Maintain Documentation | |
Disseminate and communicate the malicious code protection policy to all interested personnel and affected parties. CC ID 15485 | Technical security | Communicate | |
Disseminate and communicate the malicious code protection procedures to all interested personnel and affected parties. CC ID 15484 | Technical security | Communicate | |
Establish, implement, and maintain malicious code protection procedures. CC ID 15483 | Technical security | Establish/Maintain Documentation | |
Establish, implement, and maintain a malicious code protection policy. CC ID 15478 | Technical security | Establish/Maintain Documentation | |
Restrict downloading to reduce malicious code attacks. CC ID 04576 | Technical security | Behavior | |
Install security and protection software, as necessary. CC ID 00575 [Determine whether the institution's security operations activities include the following: Security software and device management (e.g., maintaining the signatures on signaturebased devices and firewall rules). App A Objective 8.1.a {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Technical security | Configuration | |
Install and maintain container security solutions. CC ID 16178 | Technical security | Technical Security | |
Protect the system against replay attacks. CC ID 04552 | Technical security | Technical Security | |
Define and assign roles and responsibilities for malicious code protection. CC ID 15474 | Technical security | Establish Roles | |
Lock antivirus configurations. CC ID 10047 | Technical security | Configuration | |
Establish, implement, and maintain an application security policy. CC ID 06438 | Technical security | Establish/Maintain Documentation | |
Include all vulnerabilities in the application security review. CC ID 12036 | Technical security | Process or Activity | |
Assign application security reviews for web-facing applications to an organization that specializes in application security. CC ID 12035 | Technical security | Establish Roles | |
Establish, implement, and maintain a physical security program. CC ID 11757 [Determine whether the institution's security operations activities include the following: Physical security management (e.g., CCTV, guards, and badge systems). App A Objective 8.1.e] | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain physical security plans. CC ID 13307 | Physical and environmental protection | Establish/Maintain Documentation | |
Include a maintenance schedule for the physical security plan in the physical security plan. CC ID 13309 | Physical and environmental protection | Establish/Maintain Documentation | |
Document any reasons for modifying or refraining from modifying the physical security plan after it has been reviewed. CC ID 13315 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain physical security procedures. CC ID 13076 [Determine whether management applies appropriate physical security controls to protect its premises and more sensitive areas, such as its data center(s). App A Objective 6.9] | Physical and environmental protection | Establish/Maintain Documentation | |
Analyze and evaluate engineering systems. CC ID 13080 | Physical and environmental protection | Physical and Environmental Protection | |
Analyze and evaluate facilities and their structural elements. CC ID 13079 | Physical and environmental protection | Physical and Environmental Protection | |
Analyze and evaluate mechanical systems, as necessary. CC ID 13078 | Physical and environmental protection | Physical and Environmental Protection | |
Disallow disabling tamper detection and response mechanisms, absent authorization. CC ID 12211 | Physical and environmental protection | Configuration | |
Prevent security mechanisms from being compromised by adverse physical conditions. CC ID 12215 | Physical and environmental protection | Configuration | |
Alert interested personnel and affected parties when evidence of tampering is discovered. CC ID 15319 | Physical and environmental protection | Communicate | |
Protect assets from tampering or unapproved substitution. CC ID 11902 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a facility physical security program. CC ID 00711 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain opening procedures for businesses. CC ID 16671 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain closing procedures for businesses. CC ID 16670 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish and maintain a contract for accessing facilities that transmit, process, or store restricted data. CC ID 12050 | Physical and environmental protection | Establish/Maintain Documentation | |
Refrain from providing access to facilities that transmit, process, or store restricted data until the contract for accessing the facility is signed. CC ID 12311 | Physical and environmental protection | Behavior | |
Protect the facility from crime. CC ID 06347 | Physical and environmental protection | Physical and Environmental Protection | |
Define communication methods for reporting crimes. CC ID 06349 | Physical and environmental protection | Establish/Maintain Documentation | |
Include identification cards or badges in the physical security program. CC ID 14818 | Physical and environmental protection | Establish/Maintain Documentation | |
Protect facilities from eavesdropping. CC ID 02222 | Physical and environmental protection | Physical and Environmental Protection | |
Implement audio protection controls on telephone systems in controlled areas. CC ID 16455 | Physical and environmental protection | Technical Security | |
Establish, implement, and maintain security procedures for virtual meetings. CC ID 15581 | Physical and environmental protection | Establish/Maintain Documentation | |
Hold conferences requiring sensitive information discussions in spaces that have commensurate security. CC ID 11440 | Physical and environmental protection | Physical and Environmental Protection | |
Provide one-time meeting support for discussions involving Top Secret information. CC ID 11441 | Physical and environmental protection | Physical and Environmental Protection | |
Create security zones in facilities, as necessary. CC ID 16295 | Physical and environmental protection | Physical and Environmental Protection | |
Establish clear zones around any sensitive facilities. CC ID 02214 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain floor plans. CC ID 16419 | Physical and environmental protection | Establish/Maintain Documentation | |
Include network infrastructure and cabling infrastructure on the floor plan. CC ID 16420 | Physical and environmental protection | Establish/Maintain Documentation | |
Post floor plans of critical facilities in secure locations. CC ID 16138 | Physical and environmental protection | Communicate | |
Post and maintain security signage for all facilities. CC ID 02201 | Physical and environmental protection | Establish/Maintain Documentation | |
Inspect items brought into the facility. CC ID 06341 | Physical and environmental protection | Physical and Environmental Protection | |
Maintain all physical security systems. CC ID 02206 | Physical and environmental protection | Physical and Environmental Protection | |
Maintain all security alarm systems. CC ID 11669 | Physical and environmental protection | Physical and Environmental Protection | |
Identify and document physical access controls for all physical entry points. CC ID 01637 | Physical and environmental protection | Establish/Maintain Documentation | |
Control physical access to (and within) the facility. CC ID 01329 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain physical access procedures. CC ID 13629 | Physical and environmental protection | Establish/Maintain Documentation | |
Meet the physical access requirements of disabled individuals, if reasonably possible. CC ID 00419 | Physical and environmental protection | Physical and Environmental Protection | |
Configure the access control system to grant access only during authorized working hours. CC ID 12325 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a visitor access permission policy. CC ID 06699 | Physical and environmental protection | Establish/Maintain Documentation | |
Escort visitors within the facility, as necessary. CC ID 06417 | Physical and environmental protection | Establish/Maintain Documentation | |
Check the visitor's stated identity against a provided government issued identification. CC ID 06701 | Physical and environmental protection | Physical and Environmental Protection | |
Authorize visitors before granting entry to physical areas containing restricted data or restricted information. CC ID 01330 | Physical and environmental protection | Testing | |
Disseminate and communicate the right of the organization to search visitors while at the facility. CC ID 06702 | Physical and environmental protection | Behavior | |
Establish, implement, and maintain procedures for changing a visitor's access requirements. CC ID 12048 | Physical and environmental protection | Establish/Maintain Documentation | |
Maintain and review facility access lists of personnel who have been granted authorized entry to (and within) facilities that contain restricted data or restricted information. CC ID 01436 | Physical and environmental protection | Establish/Maintain Documentation | |
Authorize physical access to sensitive areas based on job functions. CC ID 12462 | Physical and environmental protection | Establish/Maintain Documentation | |
Escort uncleared personnel who need to work in or access controlled access areas. CC ID 00747 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain physical identification procedures. CC ID 00713 | Physical and environmental protection | Establish/Maintain Documentation | |
Disallow opting out of wearing or displaying identification cards or badges. CC ID 13030 | Physical and environmental protection | Human Resources Management | |
Implement physical identification processes. CC ID 13715 | Physical and environmental protection | Process or Activity | |
Refrain from using knowledge-based authentication for in-person identity verification. CC ID 13717 | Physical and environmental protection | Process or Activity | |
Issue photo identification badges to all employees. CC ID 12326 | Physical and environmental protection | Physical and Environmental Protection | |
Implement operational requirements for card readers. CC ID 02225 | Physical and environmental protection | Testing | |
Establish, implement, and maintain lost or damaged identification card procedures, as necessary. CC ID 14819 | Physical and environmental protection | Establish/Maintain Documentation | |
Report lost badges, stolen badges, and broken badges to the Security Manager. CC ID 12334 | Physical and environmental protection | Physical and Environmental Protection | |
Manage constituent identification inside the facility. CC ID 02215 | Physical and environmental protection | Behavior | |
Direct each employee to be responsible for their identification card or badge. CC ID 12332 | Physical and environmental protection | Human Resources Management | |
Manage visitor identification inside the facility. CC ID 11670 | Physical and environmental protection | Physical and Environmental Protection | |
Issue visitor identification badges to all non-employees. CC ID 00543 | Physical and environmental protection | Behavior | |
Secure unissued visitor identification badges. CC ID 06712 | Physical and environmental protection | Physical and Environmental Protection | |
Retrieve visitor identification badges prior to the exit of a visitor from the facility. CC ID 01331 | Physical and environmental protection | Behavior | |
Include name, date of entry, and validity period on disposable identification cards or badges. CC ID 12331 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain identification issuance procedures for identification cards or badges. CC ID 06598 | Physical and environmental protection | Establish/Maintain Documentation | |
Record the assigned identification card or badge serial number when issuing an identification card or badge. CC ID 06714 | Physical and environmental protection | Process or Activity | |
Include error handling controls in identification issuance procedures. CC ID 13709 | Physical and environmental protection | Establish/Maintain Documentation | |
Include an appeal process in the identification issuance procedures. CC ID 15428 | Physical and environmental protection | Business Processes | |
Include information security in the identification issuance procedures. CC ID 15425 | Physical and environmental protection | Establish/Maintain Documentation | |
Include identity proofing processes in the identification issuance procedures. CC ID 06597 | Physical and environmental protection | Process or Activity | |
Establish, implement, and maintain post-issuance update procedures for identification cards or badges. CC ID 15426 | Physical and environmental protection | Establish/Maintain Documentation | |
Include an identity registration process in the identification issuance procedures. CC ID 11671 | Physical and environmental protection | Establish/Maintain Documentation | |
Restrict access to the badge system to authorized personnel. CC ID 12043 | Physical and environmental protection | Physical and Environmental Protection | |
Enforce dual control for badge assignments. CC ID 12328 | Physical and environmental protection | Physical and Environmental Protection | |
Enforce dual control for accessing unassigned identification cards or badges. CC ID 12327 | Physical and environmental protection | Physical and Environmental Protection | |
Refrain from imprinting the company name or company logo on identification cards or badges. CC ID 12282 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain identification renewal procedures for identification cards or badges. CC ID 06599 | Physical and environmental protection | Establish/Maintain Documentation | |
Assign employees the responsibility for controlling their identification badges. CC ID 12333 | Physical and environmental protection | Human Resources Management | |
Establish, implement, and maintain identification re-issuing procedures for identification cards or badges. CC ID 06596 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain identification mechanism termination procedures. CC ID 06306 | Physical and environmental protection | Establish/Maintain Documentation | |
Prevent tailgating through physical entry points. CC ID 06685 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a door security standard. CC ID 06686 | Physical and environmental protection | Establish/Maintain Documentation | |
Install doors so that exposed hinges are on the secured side. CC ID 06687 | Physical and environmental protection | Configuration | |
Install emergency doors to permit egress only. CC ID 06688 | Physical and environmental protection | Configuration | |
Install contact alarms on doors, as necessary. CC ID 06710 | Physical and environmental protection | Configuration | |
Use locks to protect against unauthorized physical access. CC ID 06342 | Physical and environmental protection | Physical and Environmental Protection | |
Use locks with electronic authentication systems or cipher locks, as necessary. CC ID 06650 | Physical and environmental protection | Configuration | |
Secure unissued access mechanisms. CC ID 06713 | Physical and environmental protection | Technical Security | |
Establish, implement, and maintain a lock and access mechanism inventory (keys, lock combinations, or key cards) for all physical access control systems. CC ID 00748 | Physical and environmental protection | Establish/Maintain Documentation | |
Change cipher lock codes, as necessary. CC ID 06651 | Physical and environmental protection | Technical Security | |
Record the assigned access mechanism serial number or cipher lock code when issuing controlled items. CC ID 06715 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain a window security standard. CC ID 06689 | Physical and environmental protection | Establish/Maintain Documentation | |
Install contact alarms on openable windows, as necessary. CC ID 06690 | Physical and environmental protection | Configuration | |
Install glass break alarms on windows, as necessary. CC ID 06691 | Physical and environmental protection | Configuration | |
Post signs at all physical entry points stating the organization's right to inspect upon entry. CC ID 02204 | Physical and environmental protection | Establish/Maintain Documentation | |
Install and maintain security lighting at all physical entry points. CC ID 02205 | Physical and environmental protection | Physical and Environmental Protection | |
Use vandal resistant light fixtures for all security lighting. CC ID 16130 | Physical and environmental protection | Physical and Environmental Protection | |
Manage access to loading docks, unloading docks, and mail rooms. CC ID 02210 | Physical and environmental protection | Physical and Environmental Protection | |
Secure the loading dock with physical access controls or security guards. CC ID 06703 | Physical and environmental protection | Physical and Environmental Protection | |
Isolate loading areas from information processing facilities, if possible. CC ID 12028 | Physical and environmental protection | Physical and Environmental Protection | |
Screen incoming mail and deliveries. CC ID 06719 | Physical and environmental protection | Physical and Environmental Protection | |
Protect access to the facility's mechanical systems area. CC ID 02212 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain elevator security guidelines. CC ID 02232 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain stairwell security guidelines. CC ID 02233 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain glass opening security guidelines. CC ID 02234 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain after hours facility access procedures. CC ID 06340 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish a security room, if necessary. CC ID 00738 | Physical and environmental protection | Physical and Environmental Protection | |
Implement physical security standards for mainframe rooms or data centers. CC ID 00749 | Physical and environmental protection | Physical and Environmental Protection | |
Establish and maintain equipment security cages in a shared space environment. CC ID 06711 | Physical and environmental protection | Physical and Environmental Protection | |
Secure systems in lockable equipment cabinets, as necessary. CC ID 06716 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain vault physical security standards. CC ID 02203 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a guideline for working in a secure area. CC ID 04538 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain emergency re-entry procedures. CC ID 11672 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain emergency exit procedures. CC ID 01252 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, Implement, and maintain a camera operating policy. CC ID 15456 | Physical and environmental protection | Establish/Maintain Documentation | |
Disseminate and communicate the camera installation policy to interested personnel and affected parties. CC ID 15461 | Physical and environmental protection | Communicate | |
Establish and maintain a visitor log. CC ID 00715 | Physical and environmental protection | Log Management | |
Require all visitors to sign in to the visitor log before the entrance of a visitor to the facility. CC ID 06700 | Physical and environmental protection | Establish/Maintain Documentation | |
Require all visitors to sign out of the visitor log before the exit of a visitor from the facility. CC ID 06649 | Physical and environmental protection | Behavior | |
Record the visitor's name in the visitor log. CC ID 00557 | Physical and environmental protection | Log Management | |
Record the visitor's organization in the visitor log. CC ID 12121 | Physical and environmental protection | Log Management | |
Record the visitor's acceptable access areas in the visitor log. CC ID 12237 | Physical and environmental protection | Log Management | |
Record the date and time of entry in the visitor log. CC ID 13255 | Physical and environmental protection | Establish/Maintain Documentation | |
Record the onsite personnel authorizing physical access for the visitor in the visitor log. CC ID 12466 | Physical and environmental protection | Establish/Maintain Documentation | |
Retain all records in the visitor log as prescribed by law. CC ID 00572 | Physical and environmental protection | Log Management | |
Establish, implement, and maintain a physical access log. CC ID 12080 | Physical and environmental protection | Establish/Maintain Documentation | |
Log the entrance of a staff member to a facility or designated rooms within the facility. CC ID 01641 | Physical and environmental protection | Log Management | |
Store facility access logs in off-site storage. CC ID 06958 | Physical and environmental protection | Log Management | |
Log the exit of a staff member to a facility or designated rooms within the facility. CC ID 11675 | Physical and environmental protection | Monitor and Evaluate Occurrences | |
Configure video cameras to cover all physical entry points. CC ID 06302 | Physical and environmental protection | Configuration | |
Configure video cameras to prevent physical tampering or disablement. CC ID 06303 | Physical and environmental protection | Configuration | |
Retain video events according to Records Management procedures. CC ID 06304 | Physical and environmental protection | Records Management | |
Establish, implement, and maintain physical security threat reports. CC ID 02207 | Physical and environmental protection | Establish/Maintain Documentation | |
Build and maintain fencing, as necessary. CC ID 02235 | Physical and environmental protection | Physical and Environmental Protection | |
Implement security measures for all interior spaces that allow for any payment transactions. CC ID 06352 | Physical and environmental protection | Physical and Environmental Protection | |
Physically segregate business areas in accordance with organizational standards. CC ID 16718 | Physical and environmental protection | Physical and Environmental Protection | |
Employ security guards to provide physical security, as necessary. CC ID 06653 | Physical and environmental protection | Establish Roles | |
Establish, implement, and maintain a facility wall standard. CC ID 06692 | Physical and environmental protection | Establish/Maintain Documentation | |
Design interior walls with sound absorbing materials as well as thermal resistant materials. CC ID 06372 | Physical and environmental protection | Physical and Environmental Protection | |
Design interior walls that provide security to extend from true floor to true ceiling. CC ID 06693 | Physical and environmental protection | Configuration | |
Refrain from search and seizure inside organizational facilities absent a warrant. CC ID 09980 | Physical and environmental protection | Behavior | |
Disallow either search or seizure of any person inside organizational facilities absent a warrant. CC ID 09981 | Physical and environmental protection | Behavior | |
Disallow copying or excerpting from documents, books, or records that are on or in the premises of an organizational facility absent a warrant. CC ID 09982 | Physical and environmental protection | Business Processes | |
Disallow inspecting computers or searching computer records inside organizational facilities absent a warrant. CC ID 09983 | Physical and environmental protection | Behavior | |
Do nothing to help during a search and seizure inside organizational facilities absent a warrant and being legally compelled to assist. CC ID 09984 | Physical and environmental protection | Behavior | |
Establish, implement, and maintain physical security controls for distributed assets. CC ID 00718 | Physical and environmental protection | Physical and Environmental Protection | |
Control the transiting and internal distribution or external distribution of assets. CC ID 00963 [Review whether management does the following: Maintains the security of physical media, including backup tapes, containing sensitive information while in transit, including to off-site storage, or when shared with third parties. App A Objective 6.18.f {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Physical and environmental protection | Records Management | |
Log the transiting, internal distribution, and external distribution of restricted storage media. CC ID 12321 | Physical and environmental protection | Log Management | |
Encrypt digital media containing sensitive information during transport outside controlled areas. CC ID 14258 | Physical and environmental protection | Technical Security | |
Obtain management authorization for restricted storage media transit or distribution from a controlled access area. CC ID 00964 | Physical and environmental protection | Records Management | |
Use locked containers to transport non-digital media outside of controlled areas. CC ID 14286 | Physical and environmental protection | Physical and Environmental Protection | |
Transport restricted media using a delivery method that can be tracked. CC ID 11777 | Physical and environmental protection | Business Processes | |
Restrict physical access to distributed assets. CC ID 11865 | Physical and environmental protection | Physical and Environmental Protection | |
House network hardware in lockable rooms or lockable equipment cabinets. CC ID 01873 | Physical and environmental protection | Physical and Environmental Protection | |
Protect electronic storage media with physical access controls. CC ID 00720 | Physical and environmental protection | Physical and Environmental Protection | |
Protect physical assets with earthquake-resistant mechanisms. CC ID 06360 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a media protection policy. CC ID 14029 | Physical and environmental protection | Establish/Maintain Documentation | |
Include compliance requirements in the media protection policy. CC ID 14185 | Physical and environmental protection | Establish/Maintain Documentation | |
Include coordination amongst entities in the media protection policy. CC ID 14184 | Physical and environmental protection | Establish/Maintain Documentation | |
Include management commitment in the media protection policy. CC ID 14182 | Physical and environmental protection | Establish/Maintain Documentation | |
Include roles and responsibilities in the media protection policy. CC ID 14180 | Physical and environmental protection | Establish/Maintain Documentation | |
Include the scope in the media protection policy. CC ID 14167 | Physical and environmental protection | Establish/Maintain Documentation | |
Include the purpose in the media protection policy. CC ID 14166 | Physical and environmental protection | Establish/Maintain Documentation | |
Disseminate and communicate the media protection policy to interested personnel and affected parties. CC ID 14165 | Physical and environmental protection | Communicate | |
Establish, implement, and maintain media protection procedures. CC ID 14062 | Physical and environmental protection | Establish/Maintain Documentation | |
Disseminate and communicate the media protection procedures to interested personnel and affected parties. CC ID 14186 | Physical and environmental protection | Communicate | |
Establish, implement, and maintain removable storage media controls. CC ID 06680 [As part of management's process to secure the operating system and all system components, determine whether management does the following: Secures or removes external drives and portable media from system consoles, terminals, or PCs running terminal emulations, residing outside of physically secure locations. App A Objective 6.21.d As part of management's process to secure the operating system and all system components, determine whether management does the following: Secures or removes external drives and portable media from system consoles, terminals, or PCs running terminal emulations, residing outside of physically secure locations. App A Objective 6.21.d] | Physical and environmental protection | Data and Information Management | |
Control access to restricted storage media. CC ID 04889 | Physical and environmental protection | Data and Information Management | |
Physically secure all electronic storage media that store restricted data or restricted information. CC ID 11664 | Physical and environmental protection | Physical and Environmental Protection | |
Separate duplicate originals and backup media from the original electronic storage media. CC ID 00961 | Physical and environmental protection | Records Management | |
Treat archive media as evidence. CC ID 00960 | Physical and environmental protection | Records Management | |
Log the transfer of removable storage media. CC ID 12322 | Physical and environmental protection | Log Management | |
Establish, implement, and maintain storage media access control procedures. CC ID 00959 | Physical and environmental protection | Establish/Maintain Documentation | |
Require removable storage media be in the custody of an authorized individual. CC ID 12319 | Physical and environmental protection | Behavior | |
Control the storage of restricted storage media. CC ID 00965 | Physical and environmental protection | Records Management | |
Store removable storage media containing restricted data or restricted information using electronic media storage cabinets or electronic media storage vaults. CC ID 00717 | Physical and environmental protection | Physical and Environmental Protection | |
Protect the combinations for all combination locks. CC ID 02199 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain electronic media storage container repair guidelines. CC ID 02200 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish and maintain eavesdropping protection for vaults. CC ID 02231 | Physical and environmental protection | Physical and Environmental Protection | |
Serialize all removable storage media. CC ID 00949 | Physical and environmental protection | Configuration | |
Protect distributed assets against theft. CC ID 06799 | Physical and environmental protection | Physical and Environmental Protection | |
Include Information Technology assets in the asset removal policy. CC ID 13162 | Physical and environmental protection | Establish/Maintain Documentation | |
Specify the assets to be returned or removed in the asset removal policy. CC ID 13163 | Physical and environmental protection | Establish/Maintain Documentation | |
Disseminate and communicate the asset removal policy to interested personnel and affected parties. CC ID 13160 | Physical and environmental protection | Communicate | |
Establish, implement, and maintain asset removal procedures or asset decommissioning procedures. CC ID 04540 | Physical and environmental protection | Establish/Maintain Documentation | |
Prohibit assets from being taken off-site absent prior authorization. CC ID 12027 | Physical and environmental protection | Process or Activity | |
Control the delivery of assets through physical entry points and physical exit points. CC ID 01441 | Physical and environmental protection | Physical and Environmental Protection | |
Control the removal of assets through physical entry points and physical exit points. CC ID 11681 | Physical and environmental protection | Physical and Environmental Protection | |
Maintain records of all system components entering and exiting the facility. CC ID 14304 | Physical and environmental protection | Log Management | |
Establish, implement, and maintain on-site logical controls for all distributed assets. CC ID 11682 | Physical and environmental protection | Technical Security | |
Establish, implement, and maintain off-site logical controls for all distributed assets. CC ID 11683 | Physical and environmental protection | Technical Security | |
Establish, implement, and maintain on-site physical controls for all distributed assets. CC ID 04820 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain off-site physical controls for all distributed assets. CC ID 04539 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain missing asset reporting procedures. CC ID 06336 | Physical and environmental protection | Establish/Maintain Documentation | |
Employ asset location technologies in accordance with applicable laws and regulations. CC ID 10627 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain end user computing device security guidelines. CC ID 00719 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain a locking screen saver policy. CC ID 06717 | Physical and environmental protection | Establish/Maintain Documentation | |
Encrypt information stored on devices in publicly accessible areas. CC ID 16410 | Physical and environmental protection | Data and Information Management | |
Secure workstations to desks with security cables. CC ID 04724 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a mobile device management program. CC ID 15212 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain a mobile device management policy. CC ID 15214 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain mobile device emergency sanitization procedures. CC ID 16454 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain mobile device security guidelines. CC ID 04723 [{information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Physical and environmental protection | Establish/Maintain Documentation | |
Require users to refrain from leaving mobile devices unattended. CC ID 16446 | Physical and environmental protection | Business Processes | |
Wipe information from mobile devices after a predetermined number of unsuccessful logon attempts. CC ID 14242 | Physical and environmental protection | Data and Information Management | |
Include the expectation of data loss in the event of sanitizing the mobile device in the mobile device security guidelines. CC ID 12292 | Physical and environmental protection | Establish/Maintain Documentation | |
Include legal requirements in the mobile device security guidelines. CC ID 12291 | Physical and environmental protection | Establish/Maintain Documentation | |
Include the use of privacy filters in the mobile device security guidelines. CC ID 16452 | Physical and environmental protection | Physical and Environmental Protection | |
Include prohibiting the usage of unapproved application stores in the mobile device security guidelines. CC ID 12290 | Physical and environmental protection | Establish/Maintain Documentation | |
Include requiring users to create data backups in the mobile device security guidelines. CC ID 12289 | Physical and environmental protection | Establish/Maintain Documentation | |
Include the definition of mobile devices in the mobile device security guidelines. CC ID 12288 | Physical and environmental protection | Establish/Maintain Documentation | |
Refrain from responding to unsolicited Personal Identification Number requests. CC ID 12430 | Physical and environmental protection | Physical and Environmental Protection | |
Refrain from pairing Bluetooth devices in unsecured areas. CC ID 12429 | Physical and environmental protection | Physical and Environmental Protection | |
Encrypt information stored on mobile devices. CC ID 01422 | Physical and environmental protection | Data and Information Management | |
Separate systems that transmit, process, or store restricted data from those that do not by deploying physical access controls. CC ID 00722 | Physical and environmental protection | Physical and Environmental Protection | |
Secure system components from unauthorized viewing. CC ID 01437 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain asset return procedures. CC ID 04537 | Physical and environmental protection | Establish/Maintain Documentation | |
Request the return of all appropriate assets upon notification of a personnel status change. CC ID 06678 | Physical and environmental protection | Behavior | |
Require the return of all assets upon notification an individual is terminated. CC ID 06679 | Physical and environmental protection | Behavior | |
Prohibit the use of recording devices near restricted data or restricted information, absent authorization. CC ID 04598 | Physical and environmental protection | Behavior | |
Prohibit usage of cell phones near restricted data or restricted information, absent authorization. CC ID 06354 | Physical and environmental protection | Behavior | |
Prohibit mobile device usage near restricted data or restricted information, absent authorization. CC ID 04597 | Physical and environmental protection | Behavior | |
Prohibit wireless technology usage near restricted data or restricted information, absent authorization. CC ID 08706 | Physical and environmental protection | Configuration | |
Establish, implement, and maintain open storage container procedures. CC ID 02198 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain a clean desk policy. CC ID 06534 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain a clear screen policy. CC ID 12436 | Physical and environmental protection | Technical Security | |
Establish, implement, and maintain contact card reader security guidelines. CC ID 06588 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain contactless card reader security guidelines. CC ID 06589 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain Personal Identification Number input device security guidelines. CC ID 06590 | Physical and environmental protection | Establish/Maintain Documentation | |
Identify customer property within the organizational facility. CC ID 06612 | Physical and environmental protection | Physical and Environmental Protection | |
Protect customer property under the care of the organization. CC ID 11685 | Physical and environmental protection | Physical and Environmental Protection | |
Prohibit the unauthorized remote activation of collaborative computing devices. CC ID 06768 | Physical and environmental protection | Technical Security | |
Provide a physical disconnect of collaborative computing devices in a way that supports ease of use. CC ID 06769 | Physical and environmental protection | Configuration | |
Indicate the active use of collaborative computing devices to users physically present at the device. CC ID 10647 | Physical and environmental protection | Technical Security | |
Provide storage media shelving capable of bearing all potential loads. CC ID 11400 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain proper aircraft security. CC ID 02213 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a vehicle access program. CC ID 02216 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish parking requirements for vehicles. CC ID 02218 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain proper container security. CC ID 02208 | Physical and environmental protection | Physical and Environmental Protection | |
Lock closable storage containers. CC ID 06307 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain returned card procedures. CC ID 13567 | Physical and environmental protection | Establish/Maintain Documentation | |
Refrain from distributing returned cards to staff with the responsibility for payment card issuance. CC ID 13572 | Physical and environmental protection | Business Processes | |
Establish and maintain the physical security of non-issued payment cards. CC ID 06402 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish, implement, and maintain payment card disposal procedures. CC ID 16137 | Physical and environmental protection | Establish/Maintain Documentation | |
Control the issuance of payment cards. CC ID 06403 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a mailing control log. CC ID 16136 | Physical and environmental protection | Establish/Maintain Documentation | |
Assign roles and responsibilities for the issuance of payment cards. CC ID 16134 | Physical and environmental protection | Establish Roles | |
Inventory payment cards, as necessary. CC ID 13547 | Physical and environmental protection | Records Management | |
Store non-issued payment cards in a lockable cabinet or safe. CC ID 06404 | Physical and environmental protection | Physical and Environmental Protection | |
Deliver payment cards to customers using secure methods. CC ID 06405 | Physical and environmental protection | Physical and Environmental Protection | |
Activate payment cards sent to customers upon receiving instructions to activate the payment card. CC ID 13052 | Physical and environmental protection | Business Processes | |
Establish, implement, and maintain payment card usage security measures. CC ID 06406 | Physical and environmental protection | Establish/Maintain Documentation | |
Notify customers about payment card usage security measures. CC ID 06407 | Physical and environmental protection | Behavior | |
Establish, implement, and maintain payment card disposal procedures. CC ID 16135 | Physical and environmental protection | Establish/Maintain Documentation | |
Establish and maintain physical security of assets used for publicity. CC ID 06724 | Physical and environmental protection | Physical and Environmental Protection | |
Install and protect network cabling. CC ID 08624 | Physical and environmental protection | Physical and Environmental Protection | |
Control physical access to network cables. CC ID 00723 | Physical and environmental protection | Process or Activity | |
Install and protect fiber optic cable, as necessary. CC ID 08625 | Physical and environmental protection | Physical and Environmental Protection | |
Restrict fiber optic cables to carry only specific security classification traffic. CC ID 08628 | Physical and environmental protection | Physical and Environmental Protection | |
Label fiber optic flying leads according to security classification of data being carried over the fiber optic cables. CC ID 08640 | Physical and environmental protection | Physical and Environmental Protection | |
Install network cable in a way that allows ease of inspecting. CC ID 08626 | Physical and environmental protection | Physical and Environmental Protection | |
Bundle network cables together at each inspection point by security classification of data being carried over that cable. CC ID 08649 | Physical and environmental protection | Physical and Environmental Protection | |
Establish and maintain security classifications for network cabling. CC ID 08627 | Physical and environmental protection | Establish/Maintain Documentation | |
Label conduit according to security classification of data being carried over the network cable inside the conduit. CC ID 08630 | Physical and environmental protection | Physical and Environmental Protection | |
Label each end of a network cable run. CC ID 08632 | Physical and environmental protection | Physical and Environmental Protection | |
Terminate approved network cables on the patch panel. CC ID 08633 | Physical and environmental protection | Physical and Environmental Protection | |
Color code cables in accordance with organizational standards. CC ID 16422 | Physical and environmental protection | Physical and Environmental Protection | |
Establish and maintain documentation for network cabling schemes. CC ID 08641 | Physical and environmental protection | Establish/Maintain Documentation | |
Prevent installing network cabling inside walls shared with third parties. CC ID 08648 | Physical and environmental protection | Physical and Environmental Protection | |
Install network cabling specifically for maintenance purposes. CC ID 10613 | Physical and environmental protection | Physical and Environmental Protection | |
Install and maintain network jacks and outlet boxes. CC ID 08635 | Physical and environmental protection | Physical and Environmental Protection | |
Color code outlet boxes in accordance with organizational standards. CC ID 16451 | Physical and environmental protection | Physical and Environmental Protection | |
Maintain wiring circuits and outlets that are separate from the computer room. CC ID 16142 | Physical and environmental protection | Physical and Environmental Protection | |
Implement physical controls to restrict access to publicly accessible network jacks. CC ID 11989 | Physical and environmental protection | Physical and Environmental Protection | |
Label network cabling outlet boxes. CC ID 08631 | Physical and environmental protection | Physical and Environmental Protection | |
Enable network jacks at the patch panel, as necessary. CC ID 06305 | Physical and environmental protection | Configuration | |
Implement logical controls to enable network jacks, as necessary. CC ID 11934 | Physical and environmental protection | Physical and Environmental Protection | |
Identify network jacks by security classification according to security classification of data being carried over the cable. CC ID 08634 | Physical and environmental protection | Physical and Environmental Protection | |
Identify network cable faceplates by security classification according to security classification of data being carried over the cable. CC ID 08643 | Physical and environmental protection | Physical and Environmental Protection | |
Install and maintain network patch panels. CC ID 08636 | Physical and environmental protection | Physical and Environmental Protection | |
Separate network patch panels in different network cabinets according to security classification of data being carried over the cables. CC ID 08637 | Physical and environmental protection | Physical and Environmental Protection | |
Assign access to network patch panels on a need to know basis. CC ID 08638 | Physical and environmental protection | Physical and Environmental Protection | |
Encase network cabling in conduit or closed cable reticulation systems, as necessary. CC ID 08647 | Physical and environmental protection | Physical and Environmental Protection | |
Install conduit on walls connecting to network cable outlet boxes, as necessary. CC ID 08646 | Physical and environmental protection | Physical and Environmental Protection | |
Seal data conduit couplings and data conduit fitting bodies. CC ID 08629 | Physical and environmental protection | Physical and Environmental Protection | |
Install cable reticulation systems as close to the network cabinets as possible. CC ID 08642 | Physical and environmental protection | Physical and Environmental Protection | |
Partition cable bundles in cable reticulation systems by security classification of data being carried over the network cable. CC ID 08645 | Physical and environmental protection | Physical and Environmental Protection | |
Establish, implement, and maintain a business continuity program. CC ID 13210 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Establish, implement, and maintain a continuity framework. CC ID 00732 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Establish and maintain the scope of the continuity framework. CC ID 11908 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include the organization's business products and services in the scope of the continuity framework. CC ID 12235 [Determine whether management effectively provides secure customer access to financial services and plans for potential interruptions in service. Review whether management does the following: App A Objective 6.25 Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include information security continuity in the scope of the continuity framework. CC ID 12009 [Determine whether management effectively manages the following information security considerations related to business continuity planning. Review management's ability to do the following: App A Objective 6.34 Review management's ability to do the following: Define information security needs for backup sites and alternate communication networks. App A Objective 6.34.b {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Operational and Systems Continuity | Systems Continuity | |
Establish, implement, and maintain continuity roles and responsibilities. CC ID 00733 [{information security personnel} Review management's ability to do the following: Identify personnel with key information security roles during a disaster and training of personnel in those roles. App A Objective 6.34.a {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Operational and Systems Continuity | Establish Roles | |
Establish, implement, and maintain a continuity plan. CC ID 00752 [Review whether patch management processes include the following: A documentation process to ensure the institution's information assets and technology inventory and disaster recovery plans are updated as appropriate when patches are applied. App A Objective 6.15.g] | Operational and Systems Continuity | Establish/Maintain Documentation | |
Identify all stakeholders in the continuity plan. CC ID 13256 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Notify interested personnel and affected parties upon activation of the continuity plan. CC ID 16777 | Operational and Systems Continuity | Communicate | |
Maintain normal security levels when an emergency occurs. CC ID 06377 | Operational and Systems Continuity | Systems Continuity | |
Execute fail-safe procedures when an emergency occurs. CC ID 07108 | Operational and Systems Continuity | Systems Continuity | |
Include a business continuity testing policy in the continuity plan, as necessary. CC ID 13234 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Lead or manage business continuity and system continuity, as necessary. CC ID 12240 | Operational and Systems Continuity | Human Resources Management | |
Allocate financial resources to implement the continuity plan, as necessary. CC ID 12993 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Allocate personnel to implement the continuity plan, as necessary. CC ID 12992 | Operational and Systems Continuity | Human Resources Management | |
Include the in scope system's location in the continuity plan. CC ID 16246 | Operational and Systems Continuity | Systems Continuity | |
Include the system description in the continuity plan. CC ID 16241 | Operational and Systems Continuity | Systems Continuity | |
Establish, implement, and maintain redundant systems. CC ID 16354 | Operational and Systems Continuity | Configuration | |
Include identification procedures in the continuity plan, as necessary. CC ID 14372 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Refrain from adopting impromptu measures when continuity procedures exist. CC ID 13093 | Operational and Systems Continuity | Behavior | |
Include the continuity strategy in the continuity plan. CC ID 13189 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include roles and responsibilities in the continuity plan, as necessary. CC ID 13254 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Document and use the lessons learned to update the continuity plan. CC ID 10037 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Implement alternate security mechanisms when the means of implementing the security function is unavailable. CC ID 10605 [{supplement} With respect to developed software, determine whether institution management does the following: Implements minimum controls recommended by third-party service providers and considers supplemental controls as appropriate. App A Objective 6.28.d] | Operational and Systems Continuity | Technical Security | |
Coordinate continuity planning with governmental entities, as necessary. CC ID 13258 | Operational and Systems Continuity | Process or Activity | |
Record business continuity management system performance for posterity. CC ID 12411 | Operational and Systems Continuity | Monitor and Evaluate Occurrences | |
Coordinate continuity planning with community organizations, as necessary. CC ID 13259 | Operational and Systems Continuity | Process or Activity | |
Coordinate and incorporate supply chain members' continuity plans, as necessary. CC ID 13242 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include incident management procedures in the continuity plan. CC ID 13244 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include the use of virtual meeting tools in the continuity plan. CC ID 14390 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include scenario analyses of various contingency scenarios in the continuity plan. CC ID 13057 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include the annual statement based on the continuity plan review in the continuity plan. CC ID 12775 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include the roles and responsibilities of the organization's legal counsel in the continuity plan. CC ID 16233 | Operational and Systems Continuity | Establish Roles | |
Disseminate and communicate the continuity procedures to interested personnel and affected parties. CC ID 14055 | Operational and Systems Continuity | Communicate | |
Document the uninterrupted power requirements for all in scope systems. CC ID 06707 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Install an Uninterruptible Power Supply sized to support all critical systems. CC ID 00725 | Operational and Systems Continuity | Configuration | |
Install a generator sized to support the facility. CC ID 06709 | Operational and Systems Continuity | Configuration | |
Establish, implement, and maintain a fuel supply large enough to support the generators during an emergency. CC ID 06376 | Operational and Systems Continuity | Acquisition/Sale of Assets or Services | |
Document all supporting information in the continuity plan, such as purpose, scope, and requirements. CC ID 01371 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include notifications to alternate facilities in the continuity plan. CC ID 13220 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Approve the continuity plan requirements before documenting the continuity plan. CC ID 12778 | Operational and Systems Continuity | Systems Continuity | |
Document the concept of operations in the continuity plan, including a line of succession. CC ID 01372 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Establish, implement, and maintain damage assessment procedures. CC ID 01267 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Establish, implement, and maintain a recovery plan. CC ID 13288 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Notify interested personnel and affected parties of updates to the recovery plan. CC ID 13302 | Operational and Systems Continuity | Communicate | |
Include procedures to restore network connectivity in the recovery plan. CC ID 16250 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include addressing backup failures in the recovery plan. CC ID 13298 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include procedures to verify completion of the data backup procedure in the recovery plan. CC ID 13297 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include the roles and responsibilities of responders in the recovery plan. CC ID 13296 | Operational and Systems Continuity | Human Resources Management | |
Include the procedures for the storage of information necessary to recover functionality in the recovery plan. CC ID 13295 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include the backup procedures for information necessary to recover functionality in the recovery plan. CC ID 13294 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include the criteria for activation in the recovery plan. CC ID 13293 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include escalation procedures in the recovery plan. CC ID 16248 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include procedures to preserve data before beginning the recovery process in the recovery plan. CC ID 13292 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Disseminate and communicate the recovery plan to interested personnel and affected parties. CC ID 14859 | Operational and Systems Continuity | Communicate | |
Include restoration procedures in the continuity plan. CC ID 01169 [{restoration strategy} {follow-up strategy} Determine whether management has effective incident response processes, including the following: Restoration and follow-up strategies. App A Objective 8.6.i] | Operational and Systems Continuity | Establish Roles | |
Include risk prioritized recovery procedures for each business unit in the recovery plan. CC ID 01166 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Include the recovery plan in the continuity plan. CC ID 01377 | Operational and Systems Continuity | Establish/Maintain Documentation | |
Disseminate and communicate the recovery status of the contingency plan to interested personnel and affected parties. CC ID 12758 | Operational and Systems Continuity | Communicate | |
Disseminate and communicate business functions across multiple facilities separated by geographic separation. CC ID 10662 | Operational and Systems Continuity | Systems Continuity | |
Disseminate and communicate processing activities across multiple facilities using geographic separation. CC ID 10663 | Operational and Systems Continuity | Systems Continuity | |
Disseminate and communicate electronic media storage devices across multiple facilities using geographic separation. CC ID 10664 | Operational and Systems Continuity | Systems Continuity | |
Establish, implement, and maintain a business continuity plan testing program. CC ID 14829 | Operational and Systems Continuity | Testing | |
Include the coordination and interfaces among third parties in the coverage of the scope of testing the continuity plan. CC ID 12769 [{incident response plan} Review whether management does the following: Develops and tests a response plan in conjunction with the institution's ISPs and third-party service providers to mitigate the interruption of mobile or remote financial services. App A Objective 6.25.c Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Operational and Systems Continuity | Testing | |
Establish, implement, and maintain high level operational roles and responsibilities. CC ID 00806 | Human Resources management | Establish Roles | |
Assign the roles and responsibilities of management in establishing, implementing, and maintaining the information security program. CC ID 13112 [{information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Determine whether the board, or a committee of the board, is responsible for overseeing the development, implementation, and maintenance of the institution's information security program. App A Objective 2.2 Determine whether the board holds management accountable for the following: Central oversight and coordination. App A Objective 2.3.a Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3] | Human Resources management | Human Resources Management | |
Define and assign the Board of Directors roles and responsibilities and senior management roles and responsibilities, including signing off on key policies and procedures. CC ID 00807 [Determine whether the board holds management accountable for the following: App A Objective 2.3 Determine whether the board holds management accountable for the following: Assignment of responsibility. App A Objective 2.3.b] | Human Resources management | Establish Roles | |
Establish and maintain board committees, as necessary. CC ID 14789 | Human Resources management | Human Resources Management | |
Define and assign the roles and responsibilities of the chairman of the board. CC ID 14786 | Human Resources management | Establish/Maintain Documentation | |
Assign oversight of C-level executives to the Board of Directors. CC ID 14784 | Human Resources management | Human Resources Management | |
Establish, implement, and maintain candidate selection procedures to the board of directors. CC ID 14782 | Human Resources management | Establish/Maintain Documentation | |
Include the criteria of mixed experiences and skills in the candidate selection procedures. CC ID 14791 | Human Resources management | Establish/Maintain Documentation | |
Assign oversight of the financial management program to the board of directors. CC ID 14781 | Human Resources management | Human Resources Management | |
Assign senior management to the role of supporting Quality Management. CC ID 13692 | Human Resources management | Human Resources Management | |
Assign senior management to the role of authorizing official. CC ID 14238 | Human Resources management | Establish Roles | |
Assign members who are independent from management to the Board of Directors. CC ID 12395 | Human Resources management | Human Resources Management | |
Assign ownership of risks to the Board of Directors or senior management. CC ID 13662 | Human Resources management | Human Resources Management | |
Assign the organization's board and senior management to oversee the continuity planning process. CC ID 12991 | Human Resources management | Human Resources Management | |
Define and assign the security staff roles and responsibilities. CC ID 11750 [Determine whether security officers and employees know, understand, and are accountable for fulfilling their security responsibilities. App A Objective 2.7 Determine whether management has effective threat monitoring processes, including the following: Establishing responsibility and accountability for security personnel and system administrators for monitoring. App A Objective 8.4.b Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Human Resources management | Establish/Maintain Documentation | |
Define and assign workforce roles and responsibilities. CC ID 13267 | Human Resources management | Human Resources Management | |
Assign roles and responsibilities for physical security, as necessary. CC ID 13113 [{layered security} {information security} {coordinate} Determine whether management responsibilities are appropriate and include the following: Coordination of both information and physical security. App A Objective 2.5.h] | Human Resources management | Establish Roles | |
Establish, implement, and maintain a personnel management program. CC ID 14018 | Human Resources management | Establish/Maintain Documentation | |
Establish, implement, and maintain a personnel security program. CC ID 10628 | Human Resources management | Establish/Maintain Documentation | |
Assign security clearance procedures to qualified personnel. CC ID 06812 | Human Resources management | Establish Roles | |
Assign personnel screening procedures to qualified personnel. CC ID 11699 | Human Resources management | Establish Roles | |
Establish, implement, and maintain personnel screening procedures. CC ID 11700 | Human Resources management | Establish/Maintain Documentation | |
Perform a personal identification check during personnel screening. CC ID 06721 | Human Resources management | Human Resources Management | |
Perform a criminal records check during personnel screening. CC ID 06643 | Human Resources management | Establish/Maintain Documentation | |
Include all residences in the criminal records check. CC ID 13306 | Human Resources management | Process or Activity | |
Document any reasons a full criminal records check could not be performed. CC ID 13305 | Human Resources management | Establish/Maintain Documentation | |
Perform a personal references check during personnel screening. CC ID 06645 | Human Resources management | Human Resources Management | |
Perform a credit check during personnel screening. CC ID 06646 | Human Resources management | Human Resources Management | |
Perform an academic records check during personnel screening. CC ID 06647 | Human Resources management | Establish/Maintain Documentation | |
Perform a drug test during personnel screening. CC ID 06648 | Human Resources management | Testing | |
Perform a resume check during personnel screening. CC ID 06659 | Human Resources management | Human Resources Management | |
Perform a curriculum vitae check during personnel screening. CC ID 06660 | Human Resources management | Human Resources Management | |
Allow personnel being screened to appeal findings and appeal decisions. CC ID 06720 | Human Resources management | Human Resources Management | |
Disseminate and communicate screening results to interested personnel and affected parties. CC ID 16445 | Human Resources management | Communicate | |
Perform personnel screening procedures, as necessary. CC ID 11763 | Human Resources management | Human Resources Management | |
Establish, implement, and maintain security clearance procedures. CC ID 00783 [Review whether management does the following: Establishes and effectively administers appropriate security screening in IT hiring practices. App A Objective 6.8.b {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Establish/Maintain Documentation | |
Perform security clearance procedures, as necessary. CC ID 06644 | Human Resources management | Human Resources Management | |
Establish and maintain security clearances. CC ID 01634 | Human Resources management | Human Resources Management | |
Establish and maintain the staff structure in line with the strategic plan. CC ID 00764 | Human Resources management | Establish Roles | |
Delegate authority for specific processes, as necessary. CC ID 06780 | Human Resources management | Behavior | |
Establish, implement, and maintain segregation of duties compensating controls if segregation of duties is not practical. CC ID 06960 | Human Resources management | Technical Security | |
Train all personnel and third parties, as necessary. CC ID 00785 [(train} Review whether the institution has the following: Training to prepare staff for their short- and long-term security responsibilities. App A Objective 2.9.c] | Human Resources management | Behavior | |
Establish, implement, and maintain an education methodology. CC ID 06671 | Human Resources management | Business Processes | |
Support certification programs as viable training programs. CC ID 13268 | Human Resources management | Human Resources Management | |
Include evidence of experience in applications for professional certification. CC ID 16193 | Human Resources management | Establish/Maintain Documentation | |
Include supporting documentation in applications for professional certification. CC ID 16195 | Human Resources management | Establish/Maintain Documentation | |
Submit applications for professional certification. CC ID 16192 | Human Resources management | Training | |
Retrain all personnel, as necessary. CC ID 01362 | Human Resources management | Behavior | |
Tailor training to meet published guidance on the subject being taught. CC ID 02217 [{training} Determine whether management develops customer awareness and education efforts that address both retail (consumer) and commercial account holders. App A Objective 6.26] | Human Resources management | Behavior | |
Tailor training to be taught at each person's level of responsibility. CC ID 06674 | Human Resources management | Behavior | |
Conduct cross-training or staff backup training to minimize dependency on critical individuals. CC ID 00786 | Human Resources management | Behavior | |
Use automated mechanisms in the training environment, where appropriate. CC ID 06752 | Human Resources management | Behavior | |
Hire third parties to conduct training, as necessary. CC ID 13167 | Human Resources management | Human Resources Management | |
Review the current published guidance and awareness and training programs. CC ID 01245 | Human Resources management | Establish/Maintain Documentation | |
Establish, implement, and maintain training plans. CC ID 00828 | Human Resources management | Establish/Maintain Documentation | |
Include prevention techniques in training regarding diseases or sicknesses. CC ID 14387 | Human Resources management | Training | |
Include the concept of disease clusters when training to recognize conditions of diseases or sicknesses. CC ID 14386 | Human Resources management | Training | |
Develop or acquire content to update the training plans. CC ID 12867 | Human Resources management | Training | |
Designate training facilities in the training plan. CC ID 16200 | Human Resources management | Training | |
Include portions of the visitor control program in the training plan. CC ID 13287 | Human Resources management | Establish/Maintain Documentation | |
Include ethical culture in the training plan, as necessary. CC ID 12801 | Human Resources management | Human Resources Management | |
Include in scope external requirements in the training plan, as necessary. CC ID 13041 [{security awareness training} {compliance training} Review whether management does the following: Provides training to support awareness and policy compliance. App A Objective 6.8.f {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Training | |
Include duties and responsibilities in the training plan, as necessary. CC ID 12800 | Human Resources management | Human Resources Management | |
Conduct bespoke roles and responsibilities training, as necessary. CC ID 13192 | Human Resources management | Training | |
Include risk management in the training plan, as necessary. CC ID 13040 | Human Resources management | Training | |
Conduct Archives and Records Management training. CC ID 00975 | Human Resources management | Behavior | |
Conduct personal data processing training. CC ID 13757 | Human Resources management | Training | |
Include in personal data processing training how to provide the contact information for the categories of personal data the organization may disclose. CC ID 13758 | Human Resources management | Training | |
Include the cloud service usage standard in the training plan. CC ID 13039 | Human Resources management | Training | |
Establish, implement, and maintain a security awareness program. CC ID 11746 [{facilitate} Determine whether management responsibilities are appropriate and include the following: Facilitation of annual information security and awareness training and ongoing security-related communications to employees. App A Objective 2.5.l {security awareness training} {compliance training} Review whether management does the following: Provides training to support awareness and policy compliance. App A Objective 6.8.f {security awareness program} Review whether management has the following: Common awareness and enforcement mechanisms between lines of business and information security. App A Objective 3.2.c Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Human Resources management | Establish/Maintain Documentation | |
Establish, implement, and maintain a security awareness and training policy. CC ID 14022 | Human Resources management | Establish/Maintain Documentation | |
Include compliance requirements in the security awareness and training policy. CC ID 14092 | Human Resources management | Establish/Maintain Documentation | |
Include coordination amongst entities in the security awareness and training policy. CC ID 14091 | Human Resources management | Establish/Maintain Documentation | |
Establish, implement, and maintain security awareness and training procedures. CC ID 14054 | Human Resources management | Establish/Maintain Documentation | |
Disseminate and communicate the security awareness and training procedures to interested personnel and affected parties. CC ID 14138 | Human Resources management | Communicate | |
Include management commitment in the security awareness and training policy. CC ID 14049 | Human Resources management | Establish/Maintain Documentation | |
Include roles and responsibilities in the security awareness and training policy. CC ID 14048 | Human Resources management | Establish/Maintain Documentation | |
Include the scope in the security awareness and training policy. CC ID 14047 | Human Resources management | Establish/Maintain Documentation | |
Include the purpose in the security awareness and training policy. CC ID 14045 | Human Resources management | Establish/Maintain Documentation | |
Include configuration management procedures in the security awareness program. CC ID 13967 | Human Resources management | Establish/Maintain Documentation | |
Include media protection in the security awareness program. CC ID 16368 | Human Resources management | Training | |
Document security awareness requirements. CC ID 12146 | Human Resources management | Establish/Maintain Documentation | |
Include safeguards for information systems in the security awareness program. CC ID 13046 | Human Resources management | Establish/Maintain Documentation | |
Include security policies and security standards in the security awareness program. CC ID 13045 | Human Resources management | Establish/Maintain Documentation | |
Include physical security in the security awareness program. CC ID 16369 | Human Resources management | Training | |
Include mobile device security guidelines in the security awareness program. CC ID 11803 | Human Resources management | Establish/Maintain Documentation | |
Include updates on emerging issues in the security awareness program. CC ID 13184 | Human Resources management | Training | |
Include cybersecurity in the security awareness program. CC ID 13183 | Human Resources management | Training | |
Include implications of non-compliance in the security awareness program. CC ID 16425 | Human Resources management | Training | |
Include the acceptable use policy in the security awareness program. CC ID 15487 | Human Resources management | Training | |
Include training based on the participants' level of responsibility and access level in the security awareness program. CC ID 11802 [{security requirements} {align} Review whether management ascertains assurance through the following: Alignment of personnel skills and program needs. App A Objective 10.1.b {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Human Resources management | Establish/Maintain Documentation | |
Include a requirement to train all new hires and interested personnel in the security awareness program. CC ID 11800 | Human Resources management | Establish/Maintain Documentation | |
Include remote access in the security awareness program. CC ID 13892 | Human Resources management | Establish/Maintain Documentation | |
Document the goals of the security awareness program. CC ID 12145 | Human Resources management | Establish/Maintain Documentation | |
Compare current security awareness assessment reports to the security awareness baseline. CC ID 12150 | Human Resources management | Establish/Maintain Documentation | |
Establish and maintain management's commitment to supporting the security awareness program. CC ID 12151 | Human Resources management | Human Resources Management | |
Establish and maintain a steering committee to guide the security awareness program. CC ID 12149 | Human Resources management | Human Resources Management | |
Document the scope of the security awareness program. CC ID 12148 | Human Resources management | Establish/Maintain Documentation | |
Establish, implement, and maintain a security awareness baseline. CC ID 12147 | Human Resources management | Establish/Maintain Documentation | |
Encourage interested personnel to obtain security certification. CC ID 11804 | Human Resources management | Human Resources Management | |
Disseminate and communicate the security awareness program to all interested personnel and affected parties. CC ID 00823 [{facilitate} Determine whether management responsibilities are appropriate and include the following: Facilitation of annual information security and awareness training and ongoing security-related communications to employees. App A Objective 2.5.l] | Human Resources management | Behavior | |
Train all personnel and third parties on how to recognize and report security incidents. CC ID 01211 | Human Resources management | Behavior | |
Train all personnel and third parties on how to recognize and report system failures. CC ID 13475 | Human Resources management | Training | |
Require personnel to acknowledge, through writing their signature, that they have read and understand the organization's security policies. CC ID 01363 [Determine whether security officers and employees know, understand, and are accountable for fulfilling their security responsibilities. App A Objective 2.7] | Human Resources management | Establish/Maintain Documentation | |
Establish, implement, and maintain an environmental management system awareness program. CC ID 15200 | Human Resources management | Establish/Maintain Documentation | |
Conduct tampering prevention training. CC ID 11875 | Human Resources management | Training | |
Include the mandate to refrain from installing, refrain from replacing, and refrain from returning any asset absent verification in the tampering prevention training. CC ID 11877 | Human Resources management | Training | |
Include how to identify and authenticate third parties claiming to be maintenance personnel in the tampering prevention training. CC ID 11876 | Human Resources management | Training | |
Include how to report tampering and unauthorized substitution in the tampering prevention training. CC ID 11879 | Human Resources management | Training | |
Include how to prevent physical tampering in the tampering prevention training. CC ID 11878 | Human Resources management | Training | |
Include procedures on how to inspect devices in the tampering prevention training. CC ID 11990 | Human Resources management | Training | |
Train interested personnel and affected parties to collect digital forensic evidence. CC ID 08658 | Human Resources management | Training | |
Conduct crime prevention training. CC ID 06350 | Human Resources management | Behavior | |
Manage cloud services. CC ID 13144 [Review whether management does the following: Requires appropriate controls over data stored in a cloud environment. App A Objective 6.18.c {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Operational management | Business Processes | |
Refrain from implementing network elements in a public cloud. CC ID 16382 | Operational management | Technical Security | |
Protect clients' hosted environments. CC ID 11862 | Operational management | Physical and Environmental Protection | |
Notify cloud customers of the geographic locations of the cloud service organization and its assets. CC ID 13037 | Operational management | Communicate | |
Establish, implement, and maintain cloud service agreements. CC ID 13157 | Operational management | Establish/Maintain Documentation | |
Include the asset removal policy in the cloud service agreement. CC ID 13161 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain cloud management procedures. CC ID 13149 | Operational management | Technical Security | |
Establish, implement, and maintain a migration process and/or strategy to transfer systems from one asset to another. CC ID 16384 | Operational management | Process or Activity | |
Define and enforce the deployment requirements for applications and virtual network devices in a public cloud. CC ID 16383 | Operational management | Process or Activity | |
Include cloud security requirements in the cloud management procedures. CC ID 16366 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a cloud service usage standard. CC ID 13143 | Operational management | Establish/Maintain Documentation | |
Use strong data encryption when storing information within a cloud service. CC ID 16411 | Operational management | Technical Security | |
Include the roles and responsibilities of cloud service users in the cloud service usage standard. CC ID 13984 | Operational management | Establish/Maintain Documentation | |
Include information security requirements in the cloud service usage standard. CC ID 13148 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate documentation of pertinent monitoring capabilities to interested personnel and affected parties. CC ID 13159 | Operational management | Communicate | |
Disseminate and communicate the legal jurisdiction of cloud services to interested personnel and affected parties. CC ID 13147 | Operational management | Communicate | |
Establish, implement, and maintain a Governance, Risk, and Compliance framework. CC ID 01406 | Operational management | Establish/Maintain Documentation | |
Evaluate the use of technology in supporting Governance, Risk, and Compliance capabilities. CC ID 12895 [Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3 Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3 Determine whether the institution continually assesses the capability of technology needed to sustain an appropriate level of information security based on the size, complexity, and risk appetite of the institution. App A Objective 6.3] | Operational management | Process or Activity | |
Establish, implement, and maintain an internal control framework. CC ID 00820 [Specifically, review whether management does the following: Reviews and improves or updates the security controls, where necessary. App A Objective 6.5.c] | Operational management | Establish/Maintain Documentation | |
Define the scope for the internal control framework. CC ID 16325 | Operational management | Business Processes | |
Assign ownership of the internal control framework to the appropriate organizational role. CC ID 06437 | Operational management | Establish Roles | |
Assign resources to implement the internal control framework. CC ID 00816 [Determine whether the board provides adequate funding to develop and implement a successful information security function. Review whether the institution has the following: App A Objective 2.9 Determine whether the institution's board and management understand and support information security and provide appropriate resources for the implementation of an effective security program. App A Objective 2.1.a Specifically, review whether management does the following: Evaluates whether the institution has the necessary resources, personnel training, and testing to maximize the effectiveness of the controls. App A Objective 6.5.b Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Operational management | Business Processes | |
Define and assign the roles and responsibilities for interested personnel and affected parties when establishing, implementing, and maintaining the internal control framework. CC ID 07146 | Operational management | Establish Roles | |
Establish, implement, and maintain a baseline of internal controls. CC ID 12415 | Operational management | Business Processes | |
Include the business need justification for excluding controls in the baseline of internal controls. CC ID 16129 | Operational management | Establish/Maintain Documentation | |
Include the implementation status of controls in the baseline of internal controls. CC ID 16128 | Operational management | Establish/Maintain Documentation | |
Leverage actionable information to support internal controls. CC ID 12414 | Operational management | Business Processes | |
Include procedures for continuous quality improvement in the internal control framework. CC ID 00819 [Review whether policies, standards, and procedures have the following characteristics: Are appropriately flexible to address changes in the environment. App A Objective 6.1.e] | Operational management | Establish/Maintain Documentation | |
Include continuous service account management procedures in the internal control framework. CC ID 13860 | Operational management | Establish/Maintain Documentation | |
Include threat assessment in the internal control framework. CC ID 01347 [Review whether management has the following: A threat assessment to help focus the risk identification efforts. App A Objective 4.2.a {threat identification process}{threat assessment process} Determine whether management has effective threat identification and assessment processes, including the following: App A Objective 8.3 Determine whether management has a means to collect data on potential threats to identify information security risks. Determine whether management uses threat modeling (e.g., development of attack trees) to assist in identifying and quantifying risk and in better understanding the nature, frequency, and sophistication of threats. App A Objective 4.3 {risk response} Management should do the following: - Identify and assess threats. - Use threat knowledge to drive risk assessment and response. - Design policies to allow immediate and consequential threats to be dealt with expeditiously. III.A Threat Identification and Assessment] | Operational management | Establish/Maintain Documentation | |
Automate threat assessments, as necessary. CC ID 06877 | Operational management | Configuration | |
Include vulnerability management and risk assessment in the internal control framework. CC ID 13102 [Determine whether management effectively identifies threats and vulnerabilities continuously. App A Objective 4.1 Determine whether the institution's security operations activities include the following: Vulnerability identification (e.g., operation or supervision of vulnerability scans, self-assessments, penetration tests, and analysis of audit results). App A Objective 8.1.c Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Risk assessment process, including threat identification and assessment. App A Objective 2.4.a] | Operational management | Establish/Maintain Documentation | |
Automate vulnerability management, as necessary. CC ID 11730 [{analyze} Determine whether management has effective threat identification and assessment processes, including the following: Using tools to assist in the analysis of vulnerabilities (e.g., design of system, operation of the system, security procedures, business line controls, and implementation of the system and controls). App A Objective 8.3.c] | Operational management | Configuration | |
Include personnel security procedures in the internal control framework. CC ID 01349 | Operational management | Establish/Maintain Documentation | |
Include continuous security warning monitoring procedures in the internal control framework. CC ID 01358 | Operational management | Establish/Maintain Documentation | |
Include incident alert thresholds in the continuous security warning monitoring procedures. CC ID 13205 | Operational management | Establish/Maintain Documentation | |
Include security information sharing procedures in the internal control framework. CC ID 06489 | Operational management | Establish/Maintain Documentation | |
Share security information with interested personnel and affected parties. CC ID 11732 | Operational management | Communicate | |
Evaluate information sharing partners, as necessary. CC ID 12749 | Operational management | Process or Activity | |
Include security incident response procedures in the internal control framework. CC ID 01359 [{incident response policy} Review management's ability to do the following: Develop policies that address the concepts of information security incident response and resilience and test information security incident scenarios. App A Objective 6.34.c Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1 {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations {information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Operational management | Establish/Maintain Documentation | |
Include incident response escalation procedures in the internal control framework. CC ID 11745 | Operational management | Establish/Maintain Documentation | |
Include continuous user account management procedures in the internal control framework. CC ID 01360 | Operational management | Establish/Maintain Documentation | |
Authorize and document all exceptions to the internal control framework. CC ID 06781 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate the internal control framework to all interested personnel and affected parties. CC ID 15229 | Operational management | Communicate | |
Establish, implement, and maintain an information security program. CC ID 00812 [{implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 {information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Determine whether the information security program is subject to periodic review and whether management provides for continual improvement in the program's effectiveness. Verify whether that review does the following: App A Objective 9.1 {security program} Review whether management has the following: Security policies, standards, and procedures that are designed to support and to align with the policies in the lines of business. App A Objective 3.2.a Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Operational management | Establish/Maintain Documentation | |
Include physical safeguards in the information security program. CC ID 12375 | Operational management | Establish/Maintain Documentation | |
Include technical safeguards in the information security program. CC ID 12374 | Operational management | Establish/Maintain Documentation | |
Include administrative safeguards in the information security program. CC ID 12373 | Operational management | Establish/Maintain Documentation | |
Include system development in the information security program. CC ID 12389 | Operational management | Establish/Maintain Documentation | |
Include system maintenance in the information security program. CC ID 12388 | Operational management | Establish/Maintain Documentation | |
Include system acquisition in the information security program. CC ID 12387 | Operational management | Establish/Maintain Documentation | |
Include access control in the information security program. CC ID 12386 | Operational management | Establish/Maintain Documentation | |
Include operations management in the information security program. CC ID 12385 [Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 Determine whether management appropriately integrates the information security program across the institution's lines of business and support functions. Review whether management has the following: App A Objective 3.2 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2 Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations] | Operational management | Establish/Maintain Documentation | |
Include communication management in the information security program. CC ID 12384 | Operational management | Establish/Maintain Documentation | |
Include environmental security in the information security program. CC ID 12383 | Operational management | Establish/Maintain Documentation | |
Include physical security in the information security program. CC ID 12382 | Operational management | Establish/Maintain Documentation | |
Include human resources security in the information security program. CC ID 12381 | Operational management | Establish/Maintain Documentation | |
Include asset management in the information security program. CC ID 12380 [Determine whether the institution's security operations activities include the following: Security software and device management (e.g., maintaining the signatures on signaturebased devices and firewall rules). App A Objective 8.1.a] | Operational management | Establish/Maintain Documentation | |
Include a continuous monitoring program in the information security program. CC ID 14323 | Operational management | Establish/Maintain Documentation | |
Include change management procedures in the continuous monitoring plan. CC ID 16227 | Operational management | Establish/Maintain Documentation | |
include recovery procedures in the continuous monitoring plan. CC ID 16226 | Operational management | Establish/Maintain Documentation | |
Include mechanisms for decommissioning a system in the continuous monitoring plan. CC ID 16225 | Operational management | Establish/Maintain Documentation | |
Include mechanisms for appeal and override in the continuous monitoring plan. CC ID 16223 | Operational management | Establish/Maintain Documentation | |
Include how the information security department is organized in the information security program. CC ID 12379 | Operational management | Establish/Maintain Documentation | |
Include risk management in the information security program. CC ID 12378 [Determine whether management has adequately incorporated information security into its overall ITRM process. App A Objective 2.10 Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Measurement of risks. App A Objective 3.1.b {risk identification} Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: Identification of threats and risks. App A Objective 3.1.a Determine whether the institution has an effective information security program that supports the ITRM process. Review whether the program includes the following: App A Objective 3.1 Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management Management should develop and implement a process to identify risk. II.A Risk Identification] | Operational management | Establish/Maintain Documentation | |
Include mitigating supply chain risks in the information security program. CC ID 13352 | Operational management | Establish/Maintain Documentation | |
Provide management direction and support for the information security program. CC ID 11999 [Determine whether the board holds management accountable for the following: Support of the information security program. App A Objective 2.3.c Determine whether the institution's board and management understand and support information security and provide appropriate resources for the implementation of an effective security program. App A Objective 2.1.a {security operations management process} Determine whether management establishes defined processes and appropriate governance to facilitate the performance of security operations. Determine whether management coordinates security operations activities with the institution's lines of business and with the institution's third-party service providers. App A Objective 8.2] | Operational management | Process or Activity | |
Monitor and review the effectiveness of the information security program. CC ID 12744 [Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether the board approves a written information security program and receives a report on the effectiveness of the information security program at least annually. Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: App A Objective 2.4 Determine whether policies, standards, and procedures are of sufficient scope and depth to guide information security-related decisions. Review whether policies, standards, and procedures have the following characteristics: App A Objective 6.1 Determine whether management has an effective information security program. App A Objective 9 {information security testing] Determine whether management uses the following types of tests and evaluations to determine the effectiveness of the information security program. Verify whether management ensures the following are done: App A Objective 10.3 Determine whether the information security program is subject to periodic review and whether management provides for continual improvement in the program's effectiveness. Verify whether that review does the following: App A Objective 9.1 Determine whether assurance activities provide sufficient confidence that the security program is operating as expected and reaching intended goals. App A Objective 10 Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 Review whether the program includes the following: Methods to assess the program's effectiveness. App A Objective 3.1.e {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Operational management | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain an information security policy. CC ID 11740 [{information security policies} {information security standards} {information security procedures} Determine whether management responsibilities are appropriate and include the following: Establishment of appropriate policies, standards, and procedures to support the information security program. App A Objective 2.5.b Review whether management has processes to do the following: Update the information security program to reflect changes. App A Objective 4.5.b] | Operational management | Establish/Maintain Documentation | |
Align the information security policy with the organization's risk acceptance level. CC ID 13042 | Operational management | Business Processes | |
Include business processes in the information security policy. CC ID 16326 | Operational management | Establish/Maintain Documentation | |
Include the information security strategy in the information security policy. CC ID 16125 | Operational management | Establish/Maintain Documentation | |
Include a commitment to continuous improvement in the information security policy. CC ID 16123 | Operational management | Establish/Maintain Documentation | |
Include roles and responsibilities in the information security policy. CC ID 16120 | Operational management | Establish/Maintain Documentation | |
Include a commitment to the information security requirements in the information security policy. CC ID 13496 | Operational management | Establish/Maintain Documentation | |
Include information security objectives in the information security policy. CC ID 13493 | Operational management | Establish/Maintain Documentation | |
Include the use of Cloud Services in the information security policy. CC ID 13146 | Operational management | Establish/Maintain Documentation | |
Include notification procedures in the information security policy. CC ID 16842 | Operational management | Establish/Maintain Documentation | |
Approve the information security policy at the organization's management level or higher. CC ID 11737 [Determine whether the information security policy is annually reviewed and approved by the board. App A Objective 6.2] | Operational management | Process or Activity | |
Establish, implement, and maintain information security procedures. CC ID 12006 [{perform} Review whether management ascertains assurance through the following: Testing and evaluations through a combination of self-assessments, penetration tests, vulnerability assessments, and audits with appropriate coverage, depth, and independence. App A Objective 10.1.a Determine whether management has security operations that encompass necessary security-related functions, are guided by defined processes, are integrated with lines of business and activities outsourced to third-party service providers, and have adequate resources (e.g., staff and technology). App A Objective 8 {incident response} Management should design policies and procedures to effectively manage security operations with the following characteristics: - Broadly scoped to address all ongoing security-related functions. - Guided by defined processes. - Integrated with lines of business and third parties. - Appropriately staffed and supplied with technology for continual incident detection and response activities. III Security Operations {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Operational management | Business Processes | |
Describe the group activities that protect restricted data in the information security procedures. CC ID 12294 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate the information security procedures to all interested personnel and affected parties. CC ID 16303 | Operational management | Communicate | |
Document the roles and responsibilities for all activities that protect restricted data in the information security procedures. CC ID 12304 | Operational management | Establish/Maintain Documentation | |
Define thresholds for approving information security activities in the information security program. CC ID 15702 | Operational management | Process or Activity | |
Assign ownership of the information security program to the appropriate role. CC ID 00814 | Operational management | Establish Roles | |
Assign the responsibility for establishing, implementing, and maintaining the information security program to the appropriate role. CC ID 11884 [Determine whether management responsibilities are appropriate and include the following: App A Objective 2.5 {implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a Determine whether the board holds management accountable for the following: Effectiveness of the information security program. App A Objective 2.3.d] | Operational management | Human Resources Management | |
Assign information security responsibilities to interested personnel and affected parties in the information security program. CC ID 11885 [Determine whether management has designated one or more individuals as an information security officer and determine appropriateness of the reporting line. App A Objective 2.6 {define} Determine whether management responsibilities are appropriate and include the following: Definition of the information security responsibilities of third parties. App A Objective 2.5.k Review whether policies, standards, and procedures have the following characteristics: Delineate areas of responsibility. App A Objective 6.1.b Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program Management should promote effective IT governance by doing the following: - Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems. - Clearly defining and communicating information security responsibilities and accountability throughout the institution. - Providing adequate resources to effectively support the information security program. I Governance of the Information Security Program] | Operational management | Establish/Maintain Documentation | |
Assign the responsibility for distributing the information security program to the appropriate role. CC ID 11883 [{delineate}{communicate} Determine whether management responsibilities are appropriate and include the following: Delineation of clear lines of responsibility and communication of accountability for information security. App A Objective 2.5.d {implement} Determine whether management responsibilities are appropriate and include the following: Implementation of the information security program by clearly communicating responsibilities and holding appropriate individuals accountable for carrying out these responsibilities. App A Objective 2.5.a] | Operational management | Human Resources Management | |
Disseminate and communicate the information security policy to interested personnel and affected parties. CC ID 11739 [Review whether policies, standards, and procedures have the following characteristics: Are reviewed and agreed to by employees. App A Objective 6.1.d] | Operational management | Communicate | |
Establish, implement, and maintain a social media governance program. CC ID 06536 | Operational management | Establish/Maintain Documentation | |
Refrain from requiring supervision when users are accessing social media applications. CC ID 14011 | Operational management | Business Processes | |
Refrain from requiring users to disclose social media account usernames or authenticators. CC ID 14009 | Operational management | Business Processes | |
Refrain from accepting instant messages from unknown senders. CC ID 12537 | Operational management | Behavior | |
Include instant messaging, texting, and tweeting in the social media acceptable use policy. CC ID 04578 | Operational management | Establish/Maintain Documentation | |
Include explicit restrictions in the social media acceptable use policy. CC ID 06655 | Operational management | Establish/Maintain Documentation | |
Include contributive content sites in the social media acceptable use policy. CC ID 06656 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain operational control procedures. CC ID 00831 | Operational management | Establish/Maintain Documentation | |
Include assigning and approving operations in operational control procedures. CC ID 06382 | Operational management | Establish/Maintain Documentation | |
Include startup processes in operational control procedures. CC ID 00833 | Operational management | Establish/Maintain Documentation | |
Include change control processes in the operational control procedures. CC ID 16793 | Operational management | Establish/Maintain Documentation | |
Establish and maintain a data processing run manual. CC ID 00832 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a Standard Operating Procedures Manual. CC ID 00826 | Operational management | Establish/Maintain Documentation | |
Use systems in accordance with the standard operating procedures manual. CC ID 15049 | Operational management | Process or Activity | |
Include metrics in the standard operating procedures manual. CC ID 14988 | Operational management | Establish/Maintain Documentation | |
Include maintenance measures in the standard operating procedures manual. CC ID 14986 | Operational management | Establish/Maintain Documentation | |
Include the expected lifetime of the system in the standard operating procedures manual. CC ID 14984 | Operational management | Establish/Maintain Documentation | |
Include technical measures used to interpret output in the standard operating procedures manual. CC ID 14982 | Operational management | Establish/Maintain Documentation | |
Include predetermined changes in the standard operating procedures manual. CC ID 14977 | Operational management | Establish/Maintain Documentation | |
Include specifications for input data in the standard operating procedures manual. CC ID 14975 | Operational management | Establish/Maintain Documentation | |
Include risks to health and safety or fundamental rights in the standard operating procedures manual. CC ID 14973 | Operational management | Establish/Maintain Documentation | |
Include circumstances that may impact the system in the standard operating procedures manual. CC ID 14972 | Operational management | Establish/Maintain Documentation | |
Include what the system was tested and validated for in the standard operating procedures manual. CC ID 14969 | Operational management | Establish/Maintain Documentation | |
Include the intended purpose in the standard operating procedures manual. CC ID 14967 | Operational management | Establish/Maintain Documentation | |
Include information on system performance in the standard operating procedures manual. CC ID 14965 | Operational management | Establish/Maintain Documentation | |
Include contact details in the standard operating procedures manual. CC ID 14962 | Operational management | Establish/Maintain Documentation | |
Include information sharing procedures in standard operating procedures. CC ID 12974 | Operational management | Records Management | |
Establish, implement, and maintain information sharing agreements. CC ID 15645 | Operational management | Business Processes | |
Provide support for information sharing activities. CC ID 15644 | Operational management | Process or Activity | |
Adhere to operating procedures as defined in the Standard Operating Procedures Manual. CC ID 06328 | Operational management | Business Processes | |
Disseminate and communicate the Standard Operating Procedures Manual to all interested personnel and affected parties. CC ID 12026 | Operational management | Communicate | |
Establish, implement, and maintain a job scheduling methodology. CC ID 00834 | Operational management | Establish/Maintain Documentation | |
Establish and maintain a job schedule exceptions list. CC ID 00835 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a data processing continuity plan. CC ID 00836 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain Voice over Internet Protocol operating procedures. CC ID 04583 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain the Acceptable Use Policy. CC ID 01350 [{unapproved information technology resources} Review whether management does the following: Has policies restricting the use of unsanctioned or unapproved IT resources (e.g., online storage services, unapproved mobile device applications, and unapproved devices). App A Objective 6.18.g Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Operational management | Establish/Maintain Documentation | |
Include that explicit management authorization must be given for the use of all technologies and their documentation in the Acceptable Use Policy. CC ID 01351 | Operational management | Establish/Maintain Documentation | |
Include requiring users to protect restricted data in accordance with the Governance, Risk, and Compliance framework in the Acceptable Use Policy. CC ID 11894 | Operational management | Establish/Maintain Documentation | |
Include Bring Your Own Device agreements in the Acceptable Use Policy. CC ID 15703 | Operational management | Establish/Maintain Documentation | |
Include the obligations of users in the Bring Your Own Device agreement. CC ID 15708 | Operational management | Establish/Maintain Documentation | |
Include the rights of the organization in the Bring Your Own Device agreement. CC ID 15707 | Operational management | Establish/Maintain Documentation | |
Include the circumstances in which the organization may confiscate, audit, or inspect assets in the Bring Your Own Device agreement. CC ID 15706 | Operational management | Establish/Maintain Documentation | |
Include the circumstances in which the organization may manage assets in the Bring Your Own Device agreement. CC ID 15705 | Operational management | Establish/Maintain Documentation | |
Include Bring Your Own Device usage in the Acceptable Use Policy. CC ID 12293 | Operational management | Establish/Maintain Documentation | |
Include a web usage policy in the Acceptable Use Policy. CC ID 16496 | Operational management | Establish/Maintain Documentation | |
Include Bring Your Own Device security guidelines in the Acceptable Use Policy. CC ID 01352 [{employee-owned device} Review whether management does the following: Implements controls over institution owned and personally owned devices used by employees to access the network (e.g., disallows remote access without business justification, requires management approval, reviews remote access approvals, restricts access to authorized network areas, logs remote access, implements robust authentication, uses encryption, and uses application white-listing). App A Objective 6.24.a {employee-owned device} Review whether management does the following: Uses an effective method to ensure personally owned devices meet defined institution security standards (e.g., such as operating system version, patch levels, and anti-malware solutions). App A Objective 6.24.c] | Operational management | Establish/Maintain Documentation | |
Include asset tags in the Acceptable Use Policy. CC ID 01354 | Operational management | Establish/Maintain Documentation | |
Specify the owner of applicable assets in the Acceptable Use Policy. CC ID 15699 | Operational management | Establish/Maintain Documentation | |
Include asset use policies in the Acceptable Use Policy. CC ID 01355 | Operational management | Establish/Maintain Documentation | |
Include authority for access authorization lists for assets in all relevant Acceptable Use Policies. CC ID 11872 | Operational management | Establish/Maintain Documentation | |
Include access control mechanisms in the Acceptable Use Policy. CC ID 01353 [{employee-owned device} Review whether management does the following: Implements controls over institution owned and personally owned devices used by employees to access the network (e.g., disallows remote access without business justification, requires management approval, reviews remote access approvals, restricts access to authorized network areas, logs remote access, implements robust authentication, uses encryption, and uses application white-listing). App A Objective 6.24.a] | Operational management | Establish/Maintain Documentation | |
Include temporary activation of remote access technologies for third parties in the Acceptable Use Policy. CC ID 11892 | Operational management | Technical Security | |
Include prohibiting the copying or moving of restricted data from its original source onto local hard drives or removable storage media in the Acceptable Use Policy. CC ID 11893 | Operational management | Establish/Maintain Documentation | |
Include a removable storage media use policy in the Acceptable Use Policy. CC ID 06772 | Operational management | Data and Information Management | |
Correlate the Acceptable Use Policy with the network security policy. CC ID 01356 | Operational management | Establish/Maintain Documentation | |
Include appropriate network locations for each technology in the Acceptable Use Policy. CC ID 11881 | Operational management | Establish/Maintain Documentation | |
Correlate the Acceptable Use Policy with the approved product list. CC ID 01357 | Operational management | Establish/Maintain Documentation | |
Include facility access and facility use in the Acceptable Use Policy. CC ID 06441 | Operational management | Establish/Maintain Documentation | |
Include the usage restrictions of mobile code technologies in the Acceptable Use Policy. CC ID 15311 | Operational management | Establish/Maintain Documentation | |
Include a software installation policy in the Acceptable Use Policy. CC ID 06749 | Operational management | Establish/Maintain Documentation | |
Document idle session termination and logout for remote access technologies in the Acceptable Use Policy. CC ID 12472 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate the Acceptable Use Policy to all interested personnel and affected parties. CC ID 12431 | Operational management | Communicate | |
Require interested personnel and affected parties to sign Acceptable Use Policies. CC ID 06661 [Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | Operational management | Establish/Maintain Documentation | |
Require interested personnel and affected parties to re-sign Acceptable Use Policies, as necessary. CC ID 06663 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain an Intellectual Property Right program. CC ID 00821 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain domain name registration and renewal procedures. CC ID 07075 | Operational management | Business Processes | |
Establish, implement, and maintain Intellectual Property Rights protection procedures. CC ID 11512 | Operational management | Establish/Maintain Documentation | |
Protect against circumvention of the organization's Intellectual Property Rights. CC ID 11513 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain an e-mail policy. CC ID 06439 | Operational management | Establish/Maintain Documentation | |
Include business use of personal e-mail in the e-mail policy. CC ID 14381 | Operational management | Establish/Maintain Documentation | |
Identify the sender in all electronic messages. CC ID 13996 | Operational management | Data and Information Management | |
Protect policies, standards, and procedures from unauthorized modification or disclosure. CC ID 10603 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain nondisclosure agreements. CC ID 04536 | Operational management | Establish/Maintain Documentation | |
Require interested personnel and affected parties to sign nondisclosure agreements. CC ID 06667 [Review the institution's policies, standards, and procedures related to the use of the following: Nondisclosure agreements with third-party service providers with access to the institution's systems and data (including before, during, and following termination of the contract). App A Objective 6.31.d {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Operational management | Establish/Maintain Documentation | |
Require interested personnel and affected parties to re-sign nondisclosure agreements, as necessary. CC ID 06669 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a use of information agreement. CC ID 06215 [{nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Operational management | Establish/Maintain Documentation | |
Include use limitations in the use of information agreement. CC ID 06244 | Operational management | Establish/Maintain Documentation | |
Include disclosure requirements in the use of information agreement. CC ID 11735 | Operational management | Establish/Maintain Documentation | |
Include information recipients in the use of information agreement. CC ID 06245 | Operational management | Establish/Maintain Documentation | |
Include reporting out of scope use of information in the use of information agreement. CC ID 06246 | Operational management | Establish/Maintain Documentation | |
Include disclosure of information in the use of information agreement. CC ID 11830 | Operational management | Establish/Maintain Documentation | |
Include information security procedures assigned to the information recipient in the use of information agreement. CC ID 07130 | Operational management | Establish/Maintain Documentation | |
Include information security procedures assigned to the originator in the use of information agreement. CC ID 14418 | Operational management | Establish/Maintain Documentation | |
Include a do not contact rule for the individuals identified in a data set in the use of information agreement. CC ID 07131 | Operational management | Establish/Maintain Documentation | |
Include the information recipient's third parties accepting the agreement in the use of information agreement. CC ID 07132 | Operational management | Establish/Maintain Documentation | |
Implement and comply with the Governance, Risk, and Compliance framework. CC ID 00818 | Operational management | Business Processes | |
Provide assurance to interested personnel and affected parties that the Governance, Risk, and Compliance capability is reliable, effective, efficient, and responsive. CC ID 12788 [{is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {is complete} {is transparent} {is relevant} Review whether management ascertains assurance through the following: Reporting that is timely, complete, transparent, and relevant to management decisions. App A Objective 10.1.c {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing {information security program need} Management should ascertain that the information security program is operating securely, as expected, and reaching intended goals by doing the following: - Testing and evaluating through self-assessments, tests, and audits with appropriate coverage, depth, and independence. - Aligning personnel skills and program needs. - Establishing and implementing a reporting process that includes the assembly and distribution of assurance reports that are timely, complete, transparent, and relevant to management decisions. IV.A Assurance and Testing] | Operational management | Communicate | |
Review systems for compliance with organizational information security policies. CC ID 12004 [Determine whether management does the following: Identifies all system components affected by the changes. App A Objective 6.11.e] | Operational management | Business Processes | |
Establish, implement, and maintain an Asset Management program. CC ID 06630 | Operational management | Business Processes | |
Establish, implement, and maintain classification schemes for all systems and assets. CC ID 01902 [{sensitivity of assets} (asset classification} Review whether management does the following: Uses the classification to determine the sensitivity and criticality of assets. App A Objective 6.6.c {sensitivity of assets} (asset classification} Review whether management does the following: Uses the classification to determine the sensitivity and criticality of assets. App A Objective 6.6.c] | Operational management | Establish/Maintain Documentation | |
Apply security controls to each level of the information classification standard. CC ID 01903 [{supplement} With respect to developed software, determine whether institution management does the following: Implements minimum controls recommended by third-party service providers and considers supplemental controls as appropriate. App A Objective 6.28.d Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Operational management | Systems Design, Build, and Implementation | |
Establish, implement, and maintain the systems' confidentiality level. CC ID 01904 | Operational management | Establish/Maintain Documentation | |
Define confidentiality controls. CC ID 01908 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain the systems' availability level. CC ID 01905 | Operational management | Establish/Maintain Documentation | |
Restrict unscheduled downtime in order to maintain high availability for critical systems. CC ID 12742 | Operational management | Process or Activity | |
Define integrity controls. CC ID 01909 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain the systems' integrity level. CC ID 01906 | Operational management | Establish/Maintain Documentation | |
Define availability controls. CC ID 01911 | Operational management | Establish/Maintain Documentation | |
Establish safety classifications for systems according to their potential harmful effects to operators or end users. CC ID 06603 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain an asset safety classification scheme. CC ID 06604 [Review whether management does the following: Identifies assets that require protection, such as those that store, transmit, or process sensitive customer information, or trade secrets. App A Objective 6.6.a] | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain the Asset Classification Policy. CC ID 06642 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate the Asset Classification Policy to interested personnel and affected parties. CC ID 14851 | Operational management | Communicate | |
Classify assets according to the Asset Classification Policy. CC ID 07186 [Review whether management does the following: Classifies assets appropriately. App A Objective 6.6.b Management should inventory and classify assets, including hardware, software, information, and connections. II.C.5 Inventory and Classification of Assets] | Operational management | Establish Roles | |
Classify virtual systems by type and purpose. CC ID 16332 | Operational management | Business Processes | |
Document the decision for assigning an asset to a specific asset classification in the Asset Classification Policy. CC ID 07185 | Operational management | Establish/Maintain Documentation | |
Apply asset protection mechanisms for all assets according to their assigned Asset Classification Policy. CC ID 07184 [{asset classification} Specifically, review whether management does the following: Uses the classification to implement controls required to safeguard the institution's assets. App A Objective 6.6.d] | Operational management | Establish Roles | |
Disallow systems from processing information, disseminating and communicating information, or storing information that is above the system's assigned asset classification. CC ID 06606 | Operational management | Configuration | |
Assign decomposed system components the same asset classification as the originating system. CC ID 06605 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain an asset inventory. CC ID 06631 [{asset inventory} Review whether management does the following: Updates the inventory(ies) appropriately. App A Objective 6.6.e] | Operational management | Business Processes | |
Establish, implement, and maintain an Information Technology inventory with asset discovery audit trails. CC ID 00689 [Determine whether management effectively maintains an inventory(ies) of hardware, software, information, and connections. Review whether management does the following: App A Objective 6.6 Management should inventory and classify assets, including hardware, software, information, and connections. II.C.5 Inventory and Classification of Assets] | Operational management | Establish/Maintain Documentation | |
Include all account types in the Information Technology inventory. CC ID 13311 | Operational management | Establish/Maintain Documentation | |
Include each Information System's system boundaries in the Information Technology inventory. CC ID 00695 | Operational management | Systems Design, Build, and Implementation | |
Identify processes, Information Systems, and third parties that transmit, process, or store restricted data. CC ID 06289 | Operational management | Data and Information Management | |
Include each Information System's major applications in the Information Technology inventory. CC ID 01407 | Operational management | Establish/Maintain Documentation | |
Categorize all major applications according to the business information they process. CC ID 07182 | Operational management | Establish/Maintain Documentation | |
Document the resources, hazards, and Evaluation Assurance Levels for each major application. CC ID 01164 | Operational management | Establish/Maintain Documentation | |
Include the General Support Systems and security support structure in the Information Technology inventory. CC ID 01408 | Operational management | Establish/Maintain Documentation | |
Include each Information System's minor applications in the Information Technology inventory. CC ID 01409 | Operational management | Establish/Maintain Documentation | |
Conduct environmental surveys. CC ID 00690 | Operational management | Physical and Environmental Protection | |
Categorize facilities in the Information Technology inventory according to their environmental risks. CC ID 06729 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a hardware asset inventory. CC ID 00691 [{software asset inventory}{information technology inventory} Review whether the institution's life cycle management includes the following: Maintaining inventories of systems and applications. App A Objective 6.16.a] | Operational management | Establish/Maintain Documentation | |
Include network equipment in the Information Technology inventory. CC ID 00693 | Operational management | Establish/Maintain Documentation | |
Include mobile devices that store restricted data or restricted information in the Information Technology inventory. CC ID 04719 | Operational management | Establish/Maintain Documentation | |
Include interconnected systems and Software as a Service in the Information Technology inventory. CC ID 04885 | Operational management | Process or Activity | |
Include software in the Information Technology inventory. CC ID 00692 [{software asset inventory}{information technology inventory} Review whether the institution's life cycle management includes the following: Maintaining inventories of systems and applications. App A Objective 6.16.a] | Operational management | Establish/Maintain Documentation | |
Establish and maintain a list of authorized software and versions required for each system. CC ID 12093 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a storage media inventory. CC ID 00694 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a records inventory and database inventory. CC ID 01260 | Operational management | Establish/Maintain Documentation | |
Add inventoried assets to the asset register database, as necessary. CC ID 07051 | Operational management | Establish/Maintain Documentation | |
Organize the asset register database by grouping objects according to an organizational information classification standard. CC ID 07181 | Operational management | Establish/Maintain Documentation | |
Use automated tools to collect Information Technology inventory information, as necessary. CC ID 07054 | Operational management | Technical Security | |
Link the authentication system to the asset inventory. CC ID 13718 | Operational management | Technical Security | |
Record a unique name for each asset in the asset inventory. CC ID 16305 | Operational management | Data and Information Management | |
Record the decommission date for applicable assets in the asset inventory. CC ID 14920 | Operational management | Establish/Maintain Documentation | |
Record the status of information systems in the asset inventory. CC ID 16304 | Operational management | Data and Information Management | |
Record the communication interfaces for applicable assets in the asset inventory. CC ID 16301 | Operational management | Data and Information Management | |
Record the Uniform Resource Locator for applicable assets in the asset inventory. CC ID 14918 | Operational management | Establish/Maintain Documentation | |
Include source code in the asset inventory. CC ID 14858 | Operational management | Records Management | |
Assign ownership of maintaining the asset inventory, as necessary. CC ID 12344 | Operational management | Human Resources Management | |
Record the review date for applicable assets in the asset inventory. CC ID 14919 | Operational management | Establish/Maintain Documentation | |
Record software license information for each asset in the asset inventory. CC ID 11736 | Operational management | Data and Information Management | |
Record services for applicable assets in the asset inventory. CC ID 13733 | Operational management | Establish/Maintain Documentation | |
Record protocols for applicable assets in the asset inventory. CC ID 13734 | Operational management | Establish/Maintain Documentation | |
Record the software version in the asset inventory. CC ID 12196 | Operational management | Establish/Maintain Documentation | |
Record the publisher for applicable assets in the asset inventory. CC ID 13725 | Operational management | Establish/Maintain Documentation | |
Record the authentication system in the asset inventory. CC ID 13724 | Operational management | Establish/Maintain Documentation | |
Tag unsupported assets in the asset inventory. CC ID 13723 | Operational management | Establish/Maintain Documentation | |
Record the install date for applicable assets in the asset inventory. CC ID 13720 | Operational management | Establish/Maintain Documentation | |
Record the make, model of device for applicable assets in the asset inventory. CC ID 12465 | Operational management | Establish/Maintain Documentation | |
Record the asset tag for physical assets in the asset inventory. CC ID 06632 | Operational management | Establish/Maintain Documentation | |
Record the host name of applicable assets in the asset inventory. CC ID 13722 | Operational management | Establish/Maintain Documentation | |
Record network ports for applicable assets in the asset inventory. CC ID 13730 | Operational management | Establish/Maintain Documentation | |
Record the MAC address for applicable assets in the asset inventory. CC ID 13721 | Operational management | Establish/Maintain Documentation | |
Record the operating system version for applicable assets in the asset inventory. CC ID 11748 | Operational management | Data and Information Management | |
Record the operating system type for applicable assets in the asset inventory. CC ID 06633 | Operational management | Establish/Maintain Documentation | |
Record rooms at external locations in the asset inventory. CC ID 16302 | Operational management | Data and Information Management | |
Record the department associated with the asset in the asset inventory. CC ID 12084 | Operational management | Establish/Maintain Documentation | |
Record the physical location for applicable assets in the asset inventory. CC ID 06634 | Operational management | Establish/Maintain Documentation | |
Record the manufacturer's serial number for applicable assets in the asset inventory. CC ID 06635 | Operational management | Establish/Maintain Documentation | |
Record the firmware version for applicable assets in the asset inventory. CC ID 12195 | Operational management | Establish/Maintain Documentation | |
Record the related business function for applicable assets in the asset inventory. CC ID 06636 | Operational management | Establish/Maintain Documentation | |
Record the deployment environment for applicable assets in the asset inventory. CC ID 06637 | Operational management | Establish/Maintain Documentation | |
Record the Internet Protocol address for applicable assets in the asset inventory. CC ID 06638 | Operational management | Establish/Maintain Documentation | |
Record trusted keys and certificates in the asset inventory. CC ID 15486 | Operational management | Data and Information Management | |
Record cipher suites and protocols in the asset inventory. CC ID 15489 | Operational management | Data and Information Management | |
Link the software asset inventory to the hardware asset inventory. CC ID 12085 | Operational management | Establish/Maintain Documentation | |
Record the owner for applicable assets in the asset inventory. CC ID 06640 | Operational management | Establish/Maintain Documentation | |
Record all compliance requirements for applicable assets in the asset inventory. CC ID 15696 | Operational management | Establish/Maintain Documentation | |
Record all changes to assets in the asset inventory. CC ID 12190 | Operational management | Establish/Maintain Documentation | |
Record cloud service derived data in the asset inventory. CC ID 13007 | Operational management | Establish/Maintain Documentation | |
Include cloud service customer data in the asset inventory. CC ID 13006 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a system redeployment program. CC ID 06276 [Review whether the institution's life cycle management includes the following: Planning for the update or replacement of und-color:#CBD0E5;" class="term_secondary-verb">tyle="background-color:#F0BBBC;" class="term_primary-noun">systems nearing obsolescence. App A Objective 6.16.d] | Operational management | Establish/Maintain Documentation | |
Notify interested personnel and affected parties prior to when the system is redeployed or the system is disposed. CC ID 06400 | Operational management | Behavior | |
Wipe all data on systems prior to when the system is redeployed or the system is disposed. CC ID 06401 | Operational management | Data and Information Management | |
Transfer legal ownership of assets when the system is redeployed to a third party. CC ID 06698 | Operational management | Acquisition/Sale of Assets or Services | |
Document the staff's operating knowledge of the system prior to a personnel status change. CC ID 06937 | Operational management | Establish/Maintain Documentation | |
Redeploy systems to other organizational units, as necessary. CC ID 11452 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a system disposal program. CC ID 14431 [Review whether the institution's life cycle management includes the following: Adhering to an approved end-of-life or sunset policy for older systems. App A Objective 6.16.b Determine whether management plans for the life cycles of the institution's systems, eventual end of life, and any corresponding business impacts. Review whether the institution's life cycle management includes the following: App A Objective 6.16 {system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain disposal procedures. CC ID 16513 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain asset sanitization procedures. CC ID 16511 | Operational management | Establish/Maintain Documentation | |
Destroy systems in accordance with the system disposal program. CC ID 16457 | Operational management | Business Processes | |
Approve the release of systems and waste material into the public domain. CC ID 16461 | Operational management | Business Processes | |
Establish, implement, and maintain system destruction procedures. CC ID 16474 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain printer and multifunction device disposition procedures. CC ID 15216 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a customer service program. CC ID 00846 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain an Incident Management program. CC ID 00853 | Operational management | Business Processes | |
Define and assign the roles and responsibilities for Incident Management program. CC ID 13055 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Operational management | Human Resources Management | |
Include incident escalation procedures in the Incident Management program. CC ID 00856 [Determine whether management has effective incident identification and assessment processes to do the following: Escalate the event consistent with the classification. App A Objective 8.5.e {notification process} Determine whether management has effective incident response processes, including the following: Thresholds for reporting significant security incidents and processes to notify, as appropriate, the institution's regulators of those incidents that may affect the institution or the financial system. App A Objective 8.6.f {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Operational management | Establish/Maintain Documentation | |
Define the characteristics of the Incident Management program. CC ID 00855 | Operational management | Establish/Maintain Documentation | |
Include the criteria for an incident in the Incident Management program. CC ID 12173 [Determine whether management has effective incident identification and assessment processes to do the following: Identify indicators of compromise. App A Objective 8.5.a {incident response procedures} Determine whether management has effective incident response processes, including the following: Protocols defined in the incident response policy to declare and respond to an incident once identified. App A Objective 8.6.a {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Operational management | Establish/Maintain Documentation | |
Include detection procedures in the Incident Management program. CC ID 00588 | Operational management | Establish/Maintain Documentation | |
Categorize the incident following an incident response. CC ID 13208 | Operational management | Technical Security | |
Define and document impact thresholds to be used in categorizing incidents. CC ID 10033 [{adhere} {information security incident} Determine whether management responsibilities are appropriate and include the following: Adherence to risk thresholds established by the board relating to information security threats or incidents, including those relating to cybersecurity. App A Objective 2.5.e {notification process} Determine whether management has effective incident response processes, including the following: Thresholds for reporting significant security incidents and processes to notify, as appropriate, the institution's regulators of those incidents that may affect the institution or the financial system. App A Objective 8.6.f] | Operational management | Establish/Maintain Documentation | |
Record actions taken by investigators during a forensic investigation in the forensic investigation report. CC ID 07095 | Operational management | Establish/Maintain Documentation | |
Include data loss event notifications in the Incident Response program. CC ID 00364 | Operational management | Establish/Maintain Documentation | |
Include required information in the written request to delay the notification to affected parties. CC ID 16785 | Operational management | Establish/Maintain Documentation | |
Submit written requests to delay the notification of affected parties. CC ID 16783 | Operational management | Communicate | |
Revoke the written request to delay the notification. CC ID 16843 | Operational management | Process or Activity | |
Design the text of the notice for all incident response notifications to be no smaller than 10-point type. CC ID 12985 | Operational management | Establish/Maintain Documentation | |
Refrain from charging for providing incident response notifications. CC ID 13876 | Operational management | Business Processes | |
Title breach notifications "Notice of Data Breach". CC ID 12977 | Operational management | Establish/Maintain Documentation | |
Display titles of incident response notifications clearly and conspicuously. CC ID 12986 | Operational management | Establish/Maintain Documentation | |
Display headings in incident response notifications clearly and conspicuously. CC ID 12987 | Operational management | Establish/Maintain Documentation | |
Design the incident response notification to call attention to its nature and significance. CC ID 12984 | Operational management | Establish/Maintain Documentation | |
Use plain language to write incident response notifications. CC ID 12976 | Operational management | Establish/Maintain Documentation | |
Include directions for changing the user's authenticator or security questions and answers in the breach notification. CC ID 12983 | Operational management | Establish/Maintain Documentation | |
Refrain from including restricted information in the incident response notification. CC ID 16806 | Operational management | Actionable Reports or Measurements | |
Include the affected parties rights in the incident response notification. CC ID 16811 | Operational management | Establish/Maintain Documentation | |
Include details of the investigation in incident response notifications. CC ID 12296 | Operational management | Establish/Maintain Documentation | |
Include the issuer's name in incident response notifications. CC ID 12062 | Operational management | Establish/Maintain Documentation | |
Include a "What Happened" heading in breach notifications. CC ID 12978 | Operational management | Establish/Maintain Documentation | |
Include a general description of the data loss event in incident response notifications. CC ID 04734 | Operational management | Establish/Maintain Documentation | |
Include time information in incident response notifications. CC ID 04745 | Operational management | Establish/Maintain Documentation | |
Include the identification of the data source in incident response notifications. CC ID 12305 | Operational management | Establish/Maintain Documentation | |
Include a "What Information Was Involved" heading in the breach notification. CC ID 12979 | Operational management | Establish/Maintain Documentation | |
Include the type of information that was lost in incident response notifications. CC ID 04735 | Operational management | Establish/Maintain Documentation | |
Include the type of information the organization maintains about the affected parties in incident response notifications. CC ID 04776 | Operational management | Establish/Maintain Documentation | |
Include a "What We Are Doing" heading in the breach notification. CC ID 12982 | Operational management | Establish/Maintain Documentation | |
Include what the organization has done to enhance data protection controls in incident response notifications. CC ID 04736 | Operational management | Establish/Maintain Documentation | |
Include what the organization is offering or has already done to assist affected parties in incident response notifications. CC ID 04737 | Operational management | Establish/Maintain Documentation | |
Include a "For More Information" heading in breach notifications. CC ID 12981 | Operational management | Establish/Maintain Documentation | |
Include details of the companies and persons involved in incident response notifications. CC ID 12295 | Operational management | Establish/Maintain Documentation | |
Include the credit reporting agencies' contact information in incident response notifications. CC ID 04744 | Operational management | Establish/Maintain Documentation | |
Include the reporting individual's contact information in incident response notifications. CC ID 12297 | Operational management | Establish/Maintain Documentation | |
Include any consequences in the incident response notifications. CC ID 12604 | Operational management | Establish/Maintain Documentation | |
Include whether the notification was delayed due to a law enforcement investigation in incident response notifications. CC ID 04746 | Operational management | Establish/Maintain Documentation | |
Include a "What You Can Do" heading in the breach notification. CC ID 12980 | Operational management | Establish/Maintain Documentation | |
Include contact information in incident response notifications. CC ID 04739 | Operational management | Establish/Maintain Documentation | |
Include a copy of the incident response notification in breach notifications, as necessary. CC ID 13085 | Operational management | Communicate | |
Post the incident response notification on the organization's website. CC ID 16809 | Operational management | Process or Activity | |
Document the determination for providing a substitute incident response notification. CC ID 16841 | Operational management | Process or Activity | |
Send electronic substitute incident response notifications to affected parties, as necessary. CC ID 04747 | Operational management | Behavior | |
Include contact information in the substitute incident response notification. CC ID 16776 | Operational management | Establish/Maintain Documentation | |
Post substitute incident response notifications to the organization's website, as necessary. CC ID 04748 | Operational management | Establish/Maintain Documentation | |
Send substitute incident response notifications to breach notification organizations, as necessary. CC ID 04750 | Operational management | Behavior | |
Publish the substitute incident response notification in a general circulation periodical, as necessary. CC ID 04769 | Operational management | Behavior | |
Establish, implement, and maintain a restoration log. CC ID 12745 | Operational management | Establish/Maintain Documentation | |
Include a description of the restored data that was restored manually in the restoration log. CC ID 15463 | Operational management | Data and Information Management | |
Include a description of the restored data in the restoration log. CC ID 15462 | Operational management | Data and Information Management | |
Establish, implement, and maintain compromised system reaccreditation procedures. CC ID 00592 | Operational management | Establish/Maintain Documentation | |
Analyze security violations in Suspicious Activity Reports. CC ID 00591 | Operational management | Establish/Maintain Documentation | |
Include lessons learned from analyzing security violations in the Incident Management program. CC ID 01234 [{information security program review} Verify whether that review does the following: Demonstrates that lessons learned from experience, audit findings, and other opportunities for improvement are identified and applied. App A Objective 9.1.b Determine whether the report to the board describes the overall status of the information security program and discusses material matters related to the program such as the following: Security breaches or violations and management's responses. App A Objective 2.4.e] | Operational management | Monitor and Evaluate Occurrences | |
Include incident monitoring procedures in the Incident Management program. CC ID 01207 [{incident management] Determine whether the institution's security operations activities include the following: Incident detection and management. App A Objective 8.1.j {incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a {incident identification process}{incident assessment process} Determine whether management has effective incident identification and assessment processes to do the following: App A Objective 8.5] | Operational management | Establish/Maintain Documentation | |
Include incident response procedures in the Incident Management program. CC ID 01218 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {incident identification process}{incident assessment process} Determine whether management has effective incident identification and assessment processes to do the following: App A Objective 8.5] | Operational management | Establish/Maintain Documentation | |
Include incident management procedures in the Incident Management program. CC ID 12689 [{incident management] Determine whether the institution's security operations activities include the following: Incident detection and management. App A Objective 8.1.j] | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain temporary and emergency access revocation procedures. CC ID 15334 | Operational management | Establish/Maintain Documentation | |
Include after-action analysis procedures in the Incident Management program. CC ID 01219 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain incident management audit logs. CC ID 13514 | Operational management | Records Management | |
Log incidents in the Incident Management audit log. CC ID 00857 [{incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f] | Operational management | Establish/Maintain Documentation | |
Include who the incident was reported to in the incident management audit log. CC ID 16487 | Operational management | Log Management | |
Include corrective actions in the incident management audit log. CC ID 16466 | Operational management | Establish/Maintain Documentation | |
Include the organization's business products and services affected by disruptions in the Incident Management audit log. CC ID 12234 | Operational management | Log Management | |
Include incident reporting procedures in the Incident Management program. CC ID 11772 [{incident reporting procedure} Determine whether management has effective incident identification and assessment processes to do the following: Report internally and externally as appropriate. App A Objective 8.5.f {incident response process} {monitoring process} Review whether management does the following: Logs access and events, defines alerts for significant events, and develops processes to monitor and respond to anomalies and alerts. App A Objective 6.22.f {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment {internal reporting}{external reporting} Management should have a process to enable the following: - Identify indicators of compromise. - Analyze the event associated with the indicators. - Classify the event. - Escalate the event consistent with the classification. - Report internally and externally as appropriate. III.C Incident Identification and Assessment] | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain incident reporting time frame standards. CC ID 12142 | Operational management | Communicate | |
Establish, implement, and maintain an Incident Response program. CC ID 00579 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Operational management | Establish/Maintain Documentation | |
Create an incident response report following an incident response. CC ID 12700 | Operational management | Establish/Maintain Documentation | |
Include disciplinary actions taken in the incident response report. CC ID 16810 | Operational management | Establish/Maintain Documentation | |
Include the persons responsible for the incident in the incident response report. CC ID 16808 | Operational management | Establish/Maintain Documentation | |
Include the number of individuals the incident response notification was sent to in the incident response report. CC ID 16789 | Operational management | Establish/Maintain Documentation | |
Include any consequences to organizational reputation and confidence due to the incident in the incident response report. CC ID 12728 | Operational management | Establish/Maintain Documentation | |
Include the number of customers that were affected by the incident in the incident response report. CC ID 12727 | Operational management | Establish/Maintain Documentation | |
Include investments associated with the incident in the incident response report. CC ID 12726 | Operational management | Establish/Maintain Documentation | |
Include costs associated with the incident in the incident response report. CC ID 12725 | Operational management | Establish/Maintain Documentation | |
Include losses due to the incident in the incident response report. CC ID 12724 | Operational management | Establish/Maintain Documentation | |
Include a description of the impact the incident had on customer service in the incident response report. CC ID 12735 | Operational management | Establish/Maintain Documentation | |
Include foregone revenue from the incident in the incident response report. CC ID 12723 | Operational management | Establish/Maintain Documentation | |
Include the magnitude of the incident in the incident response report. CC ID 12722 | Operational management | Establish/Maintain Documentation | |
Include implications of the incident in the incident response report. CC ID 12721 | Operational management | Establish/Maintain Documentation | |
Include measures to prevent similar incidents from occurring in the incident response report. CC ID 12720 | Operational management | Establish/Maintain Documentation | |
Include breaches of regulatory requirements due to the incident in the incident response report. CC ID 12719 | Operational management | Establish/Maintain Documentation | |
Include information on all affected assets in the incident response report. CC ID 12718 | Operational management | Establish/Maintain Documentation | |
Include the scope of the incident in the incident response report. CC ID 12717 | Operational management | Establish/Maintain Documentation | |
Include the duration of the incident in the incident response report. CC ID 12716 | Operational management | Establish/Maintain Documentation | |
Include the extent of the incident in the incident response report. CC ID 12715 | Operational management | Establish/Maintain Documentation | |
Include measures to mitigate the root causes of the incident in the incident response report. CC ID 12714 [Determine whether management uses tools to perform threat analysis and analyzes information security events to help do the following: Highlight potential areas for mitigation. App A Objective 5.1.d Review management's response to issues raised at, or since, the last examination. Consider the following: Resolution of root causes rather than just specific issues. App A Objective 1.2.b] | Operational management | Establish/Maintain Documentation | |
Include the reasons the incident occurred in the incident response report. CC ID 12711 | Operational management | Establish/Maintain Documentation | |
Include the frequency of similar incidents occurring in the incident response report. CC ID 12712 | Operational management | Establish/Maintain Documentation | |
Include lessons learned from the incident in the incident response report. CC ID 12713 | Operational management | Establish/Maintain Documentation | |
Include where the incident occurred in the incident response report. CC ID 12710 | Operational management | Establish/Maintain Documentation | |
Include when the incident occurred in the incident response report. CC ID 12709 | Operational management | Establish/Maintain Documentation | |
Include corrective action taken to eradicate the incident in the incident response report. CC ID 12708 | Operational management | Establish/Maintain Documentation | |
Include a description of the impact the incident had on regulatory compliance in the incident response report. CC ID 12704 | Operational management | Establish/Maintain Documentation | |
Include a description of the impact the incident had on operations in the incident response report. CC ID 12703 [Review whether management does the following: Uses metrics to measure security policy implementation, the adequacy of security services delivery, and the impact of security events on business processes. App A Objective 7.4.c] | Operational management | Establish/Maintain Documentation | |
Include an executive summary of the incident in the incident response report. CC ID 12702 | Operational management | Establish/Maintain Documentation | |
Include a root cause analysis of the incident in the incident response report. CC ID 12701 | Operational management | Establish/Maintain Documentation | |
Submit the incident response report to the proper authorities in a timely manner. CC ID 12705 | Operational management | Communicate | |
Employ tools and mechanisms to support the organization's Incident Response program. CC ID 13182 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Operational management | Acquisition/Sale of Assets or Services | |
Define target resolution times for incident response in the Incident Response program. CC ID 13072 | Operational management | Establish/Maintain Documentation | |
Mitigate reported incidents. CC ID 12973 | Operational management | Actionable Reports or Measurements | |
Establish, implement, and maintain an incident response plan. CC ID 12056 | Operational management | Establish/Maintain Documentation | |
Include addressing external communications in the incident response plan. CC ID 13351 | Operational management | Establish/Maintain Documentation | |
Include addressing internal communications in the incident response plan. CC ID 13350 | Operational management | Establish/Maintain Documentation | |
Include change control procedures in the incident response plan. CC ID 15479 | Operational management | Establish/Maintain Documentation | |
Include addressing information sharing in the incident response plan. CC ID 13349 | Operational management | Establish/Maintain Documentation | |
Include dynamic reconfiguration in the incident response plan. CC ID 14306 | Operational management | Establish/Maintain Documentation | |
Include a definition of reportable incidents in the incident response plan. CC ID 14303 | Operational management | Establish/Maintain Documentation | |
Include the management support needed for incident response in the incident response plan. CC ID 14300 | Operational management | Establish/Maintain Documentation | |
Include root cause analysis in the incident response plan. CC ID 16423 | Operational management | Establish/Maintain Documentation | |
Include how incident response fits into the organization in the incident response plan. CC ID 14294 | Operational management | Establish/Maintain Documentation | |
Include the resources needed for incident response in the incident response plan. CC ID 14292 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a cyber incident response plan. CC ID 13286 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate the cyber incident response plan to interested personnel and affected parties. CC ID 16838 | Operational management | Communicate | |
Include incident response team structures in the Incident Response program. CC ID 01237 | Operational management | Establish/Maintain Documentation | |
Include the incident response team member's roles and responsibilities in the Incident Response program. CC ID 01652 [{incident response personnel} Determine whether management has effective incident identification and assessment processes to do the following: Identify personnel empowered to declare an incident. App A Objective 8.5.g {assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g] | Operational management | Establish Roles | |
Include the incident response point of contact's roles and responsibilities in the Incident Response program. CC ID 01877 | Operational management | Establish Roles | |
Include the head of information security's roles and responsibilities in the Incident Response program. CC ID 01878 | Operational management | Establish Roles | |
Include the customer database owner's roles and responsibilities in the Incident Response program. CC ID 01879 | Operational management | Establish Roles | |
Include the online sales department's roles and responsibilities in the Incident Response program. CC ID 01880 | Operational management | Establish Roles | |
Include the incident response point of contact for credit card payment system's roles and responsibilities in the Incident Response program. CC ID 01881 | Operational management | Establish Roles | |
Include the organizational legal counsel's roles and responsibilities in the Incident Response program. CC ID 01882 | Operational management | Establish Roles | |
Include the Human Resources point of contact's roles and responsibilities in the Incident Response program. CC ID 01883 | Operational management | Establish Roles | |
Include the organizational incident response network architecture point of contact's roles and responsibilities in the Incident Response program. CC ID 01884 | Operational management | Establish Roles | |
Include the organizational incident response public relations point of contact's roles and responsibilities in the Incident Response program. CC ID 01885 | Operational management | Establish Roles | |
Include the organizational incident response location manager's roles and responsibilities in the Incident Response program. CC ID 01886 | Operational management | Establish Roles | |
Assign the distribution of security alerts to the appropriate role in the incident response program. CC ID 11887 | Operational management | Human Resources Management | |
Assign establishing, implementing, and maintaining incident response procedures to the appropriate role in the incident response program. CC ID 12473 | Operational management | Establish/Maintain Documentation | |
Assign the distribution of incident response procedures to the appropriate role in the incident response program. CC ID 12474 | Operational management | Communicate | |
Include personnel contact information in the event of an incident in the Incident Response program. CC ID 06385 | Operational management | Establish/Maintain Documentation | |
Include what information interested personnel and affected parties need in the event of an incident in the Incident Response program. CC ID 11789 [{incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d {incident response plan} Determine whether management has effective incident response processes, including the following: A plan that is comprehensive, coordinated, integrated, and periodically tested with appropriate internal and external parties. App A Objective 8.6.d] | Operational management | Establish/Maintain Documentation | |
Include identifying remediation actions in the incident response plan. CC ID 13354 | Operational management | Establish/Maintain Documentation | |
Include procedures for providing updated status information to the crisis management team in the incident response plan. CC ID 12776 | Operational management | Establish/Maintain Documentation | |
Include coverage of all system components in the Incident Response program. CC ID 11955 | Operational management | Establish/Maintain Documentation | |
Prepare for incident response notifications. CC ID 00584 [Review the institution's policies, standards, and procedures related to the use of the following: Coordination of incident response policies and contractual notification requirements. App A Objective 6.31.f {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Operational management | Establish/Maintain Documentation | |
Include incident response team services in the Incident Response program. CC ID 11766 [Determine whether management has effective incident identification and assessment processes to do the following: Enable the use of response teams and responses depending on the type of event. App A Objective 8.5.d] | Operational management | Establish/Maintain Documentation | |
Include the incident response training program in the Incident Response program. CC ID 06750 [{incident response program} Determine whether management has effective incident response processes, including the following: Policies and procedures to guide the response, assigning responsibilities to individuals; providing appropriate training; formalizing information flows; and selecting, installing, and understanding the tools used in the response effort. App A Objective 8.6.e] | Operational management | Establish/Maintain Documentation | |
Incorporate simulated events into the incident response training program. CC ID 06751 | Operational management | Behavior | |
Incorporate realistic exercises that are tested into the incident response training program. CC ID 06753 [{information security incident response}{information security incident resilience}{personnel with key information security role} Management should do the following: - Identify personnel who will have critical information security roles during a disaster, and train personnel in those roles. - Define information security needs for backup sites and alternate communication networks. - Establish and maintain policies that address the concepts of information security incident response and resilience, and test information security incident scenarios. II.C.21 Business Continuity Considerations] | Operational management | Behavior | |
Conduct incident response training. CC ID 11889 [{assign} Determine whether management has effective incident response processes, including the following: Assignment of responsibilities, training, and testing. App A Objective 8.6.g] | Operational management | Training | |
Establish, implement, and maintain an incident response policy. CC ID 14024 | Operational management | Establish/Maintain Documentation | |
Include compliance requirements in the incident response policy. CC ID 14108 | Operational management | Establish/Maintain Documentation | |
Include coordination amongst entities in the incident response policy. CC ID 14107 | Operational management | Establish/Maintain Documentation | |
Include management commitment in the incident response policy. CC ID 14106 | Operational management | Establish/Maintain Documentation | |
Include roles and responsibilities in the incident response policy. CC ID 14105 | Operational management | Establish/Maintain Documentation | |
Include the scope in the incident response policy. CC ID 14104 | Operational management | Establish/Maintain Documentation | |
Include the purpose in the incident response policy. CC ID 14101 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate the incident response policy to interested personnel and affected parties. CC ID 14099 | Operational management | Communicate | |
Include references to industry best practices in the incident response procedures. CC ID 11956 | Operational management | Establish/Maintain Documentation | |
Include responding to alerts from security monitoring systems in the incident response procedures. CC ID 11949 | Operational management | Establish/Maintain Documentation | |
Maintain contact with breach notification organizations for notification purposes in the event a privacy breach has occurred. CC ID 01213 | Operational management | Behavior | |
Include business continuity procedures in the Incident Response program. CC ID 06433 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Operational management | Establish/Maintain Documentation | |
Coordinate backup procedures as defined in the system continuity plan with backup procedures necessary for incident response procedures. CC ID 06432 | Operational management | Establish/Maintain Documentation | |
Include consumer protection procedures in the Incident Response program. CC ID 12755 | Operational management | Systems Continuity | |
Include the reimbursement of customers for financial losses due to incidents in the Incident Response program. CC ID 12756 | Operational management | Business Processes | |
Include business recovery procedures in the Incident Response program. CC ID 11774 [Review whether management has the following: Incident response programs that include all affected lines of business and support units. App A Objective 3.2.b] | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a digital forensic evidence framework. CC ID 08652 [Determine whether the institution's security operations activities include the following: Forensics (e.g., analysis of potentially compromised systems). App A Objective 8.1.b] | Operational management | Establish/Maintain Documentation | |
Retain collected evidence for potential future legal actions. CC ID 01235 [{incident response} Determine whether management has effective threat monitoring processes, including the following: Defining threat monitoring policies that provide for both continual and ad hoc monitoring of communications and systems, effective incident detection and response, and the use of monitoring reports in subsequent legal proceedings. App A Objective 8.4.a] | Operational management | Records Management | |
Define the business scenarios that require digital forensic evidence. CC ID 08653 | Operational management | Establish/Maintain Documentation | |
Define the circumstances for collecting digital forensic evidence. CC ID 08657 | Operational management | Establish/Maintain Documentation | |
Identify potential sources of digital forensic evidence. CC ID 08651 | Operational management | Investigate | |
Document the legal requirements for evidence collection. CC ID 08654 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a digital forensic evidence collection program. CC ID 08655 | Operational management | Establish/Maintain Documentation | |
Include roles and responsibilities in the digital forensic evidence collection program. CC ID 15724 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain secure storage and handling of evidence procedures. CC ID 08656 | Operational management | Records Management | |
Disseminate and communicate the incident response procedures to all interested personnel and affected parties. CC ID 01215 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate the final incident report, which includes the investigation results and any remediation activity results. CC ID 12306 [Determine whether the institution has risk monitoring and reporting processes that address changing threat conditions in both the institution and the greater financial industry. Determine whether these processes address information security events faced by the institution, the effectiveness of management's response, and the institution's resilience to those events. Review whether the reporting process includes a method of disseminating those reports to appropriate members of management. App A Objective 7.1] | Operational management | Actionable Reports or Measurements | |
Document the results of incident response tests and provide them to senior management. CC ID 14857 | Operational management | Actionable Reports or Measurements | |
Establish, implement, and maintain a change control program. CC ID 00886 [Determine whether management has a process to introduce changes to the environment (e.g., configuration management of IT systems and applications, hardening of systems and applications, use of standard builds, and patch management) in a controlled manner. Determine whether management does the following: App A Objective 6.11 {change control program} Determine whether management does the following: Maintains procedures to guide the process of introducing changes to the environment. App A Objective 6.11.a Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Operational management | Establish/Maintain Documentation | |
Include potential consequences of unintended changes in the change control program. CC ID 12243 | Operational management | Establish/Maintain Documentation | |
Include version control in the change control program. CC ID 13119 | Operational management | Establish/Maintain Documentation | |
Include service design and transition in the change control program. CC ID 13920 | Operational management | Establish/Maintain Documentation | |
Separate the production environment from development environment or test environment for the change control process. CC ID 11864 | Operational management | Maintenance | |
Integrate configuration management procedures into the change control program. CC ID 13646 | Operational management | Technical Security | |
Establish, implement, and maintain a back-out plan. CC ID 13623 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain back-out procedures for each proposed change in a change request. CC ID 00373 [Determine whether management does the following: Defines rollback procedures in the event of unintended or negative consequences with the introduced changes. App A Objective 6.11.h] | Operational management | Establish/Maintain Documentation | |
Manage change requests. CC ID 00887 | Operational management | Business Processes | |
Include documentation of the impact level of proposed changes in the change request. CC ID 11942 [Determine whether management does the following: Reviews the potential impact changes have on security controls. App A Objective 6.11.d] | Operational management | Establish/Maintain Documentation | |
Establish and maintain a change request approver list. CC ID 06795 | Operational management | Establish/Maintain Documentation | |
Document all change requests in change request forms. CC ID 06794 | Operational management | Establish/Maintain Documentation | |
Approve tested change requests. CC ID 11783 [Determine whether management does the following: Verifies the application or system owner has authorized changes in advance. App A Objective 6.11.i] | Operational management | Data and Information Management | |
Validate the system before implementing approved changes. CC ID 01510 | Operational management | Systems Design, Build, and Implementation | |
Disseminate and communicate proposed changes to all interested personnel and affected parties. CC ID 06807 | Operational management | Behavior | |
Establish, implement, and maintain emergency change procedures. CC ID 00890 | Operational management | Establish/Maintain Documentation | |
Perform emergency changes, as necessary. CC ID 12707 | Operational management | Process or Activity | |
Back up emergency changes after the change has been performed. CC ID 12734 | Operational management | Process or Activity | |
Log emergency changes after they have been performed. CC ID 12733 | Operational management | Establish/Maintain Documentation | |
Perform risk assessments prior to approving change requests. CC ID 00888 | Operational management | Testing | |
Implement changes according to the change control program. CC ID 11776 [Determine whether management does the following: Defines change requirements. App A Objective 6.11.b] | Operational management | Business Processes | |
Provide audit trails for all approved changes. CC ID 13120 [Determine whether management does the following: Maintains an audit trail of all changes. App A Objective 6.11.m Review whether applications in use provide the following capabilities: Provide a prudent level of security (e.g., password and audit policies), audit trails of security and access changes, and user activity logs. App A Objective 6.27.a] | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a patch management program. CC ID 00896 [Review whether patch management processes include the following: An effective monitoring process that identifies the availability of software patches. App A Objective 6.15.a {system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c Determine whether management has a process to update and patch operating systems, network devices, and software applications, including internally developed software provided to customers, for newly discovered vulnerabilities. Review whether patch management processes include the following: App A Objective 6.15 Review whether applications in use provide the following capabilities: Allow administrators to review and install patches for applications in a timely manner. App A Objective 6.27.d Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | Operational management | Process or Activity | |
Document the sources of all software updates. CC ID 13316 | Operational management | Establish/Maintain Documentation | |
Implement patch management software, as necessary. CC ID 12094 [Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d Review whether patch management processes include the following: A process for obtaining, testing, and securely installing the patches. App A Objective 6.15.d] | Operational management | Technical Security | |
Include updates and exceptions to hardened images as a part of the patch management program. CC ID 12087 [{patch exception process} Review whether patch management processes include the following: An exception process, with appropriate documentation, for patches that an institution decides to delay or not apply. App A Objective 6.15.e] | Operational management | Technical Security | |
Establish, implement, and maintain a patch management policy. CC ID 16432 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain patch management procedures. CC ID 15224 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a patch log. CC ID 01642 [{system modification} {software modification} Review whether the institution's life cycle management includes the following: Tracking changes made to the systems and applications, availability of updates, and the planned end of support by the vendor. App A Objective 6.16.c] | Operational management | Establish/Maintain Documentation | |
Prioritize deploying patches according to vulnerability risk metrics. CC ID 06796 [{patch prioritization} Review whether patch management processes include the following: A prioritization process to determine which patches to apply across classes of computers and applications. App A Objective 6.15.c] | Operational management | Business Processes | |
Establish, implement, and maintain a software release policy. CC ID 00893 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain traceability documentation. CC ID 16388 | Operational management | Systems Design, Build, and Implementation | |
Disseminate and communicate software update information to users and regulators. CC ID 06602 | Operational management | Behavior | |
Allow interested personnel and affected parties to opt out of specific version releases and software updates. CC ID 06809 | Operational management | Data and Information Management | |
Update associated documentation after the system configuration has been changed. CC ID 00891 [Review whether patch management processes include the following: A documentation process to ensure the institution's information assets and technology inventory and disaster recovery plans are updated as appropriate when patches are applied. App A Objective 6.15.g] | Operational management | Establish/Maintain Documentation | |
Document the organization's local environments. CC ID 06726 [Are appropriately implemented and enforced. App A Objective 6.1.a As part of management's process to secure the operating system and all system components, determine whether management does the following: App A Objective 6.21 If the institution outsources cloud computing or storage to a third-party service provider, refer to the FFIEC's "Outsourced Cloud Computing" statement. App A Objective 6.32 If the institution outsources the management of security services to a third-party service provider, refer to the information available in appendix D of the IT Handbook's "Outsourcing Technology Services" booklet and the related examination procedures. App A Objective 6.33] | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain local environment security profiles. CC ID 07037 | Operational management | Establish/Maintain Documentation | |
Include individuals assigned to the local environment in the local environment security profile. CC ID 07038 | Operational management | Establish/Maintain Documentation | |
Include security requirements in the local environment security profile. CC ID 15717 | Operational management | Establish/Maintain Documentation | |
Include the business processes assigned to the local environment in the local environment security profile. CC ID 07039 | Operational management | Establish/Maintain Documentation | |
Include the technology used in the local environment in the local environment security profile. CC ID 07040 | Operational management | Establish/Maintain Documentation | |
Include contact information for critical personnel assigned to the local environment in the local environment security profile. CC ID 07041 | Operational management | Establish/Maintain Documentation | |
Include facility information for the local environment in the local environment security profile. CC ID 07042 | Operational management | Establish/Maintain Documentation | |
Include facility access information for the local environment in the local environment security profile. CC ID 11773 | Operational management | Establish/Maintain Documentation | |
Disseminate and communicate the local environment security profile to interested personnel and affected parties. CC ID 15716 | Operational management | Communicate | |
Update the local environment security profile, as necessary. CC ID 07043 | Operational management | Establish/Maintain Documentation | |
Establish, implement, and maintain a Configuration Management program. CC ID 00867 [Determine whether appropriate processes exist for configuration management (managing and controlling configurations of systems, applications, and other technology). App A Objective 6.12 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | System hardening through configuration management | Establish/Maintain Documentation | |
Establish, implement, and maintain configuration control and Configuration Status Accounting. CC ID 00863 | System hardening through configuration management | Business Processes | |
Establish, implement, and maintain appropriate system labeling. CC ID 01900 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the identification number of the third party who performed the conformity assessment procedures on all promotional materials. CC ID 15041 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the identification number of the third party who conducted the conformity assessment procedures after the CE marking of conformity. CC ID 15040 | System hardening through configuration management | Establish/Maintain Documentation | |
Verify configuration files requiring passwords for automation do not contain those passwords after the installation process is complete. CC ID 06555 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain a configuration management policy. CC ID 14023 | System hardening through configuration management | Establish/Maintain Documentation | |
Establish, implement, and maintain configuration management procedures. CC ID 14074 | System hardening through configuration management | Establish/Maintain Documentation | |
Disseminate and communicate the configuration management procedures to interested personnel and affected parties. CC ID 14139 | System hardening through configuration management | Communicate | |
Include compliance requirements in the configuration management policy. CC ID 14072 | System hardening through configuration management | Establish/Maintain Documentation | |
Include coordination amongst entities in the configuration management policy. CC ID 14071 | System hardening through configuration management | Establish/Maintain Documentation | |
Include management commitment in the configuration management policy. CC ID 14070 | System hardening through configuration management | Establish/Maintain Documentation | |
Include roles and responsibilities in the configuration management policy. CC ID 14069 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the scope in the configuration management policy. CC ID 14068 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the purpose in the configuration management policy. CC ID 14067 | System hardening through configuration management | Establish/Maintain Documentation | |
Disseminate and communicate the configuration management policy to interested personnel and affected parties. CC ID 14066 | System hardening through configuration management | Communicate | |
Establish, implement, and maintain a configuration management plan. CC ID 01901 | System hardening through configuration management | Establish/Maintain Documentation | |
Include configuration management procedures in the configuration management plan. CC ID 14248 | System hardening through configuration management | Establish/Maintain Documentation | |
Include roles and responsibilities in the configuration management plan. CC ID 14247 | System hardening through configuration management | Establish/Maintain Documentation | |
Approve the configuration management plan. CC ID 14717 | System hardening through configuration management | Business Processes | |
Establish, implement, and maintain system tracking documentation. CC ID 15266 | System hardening through configuration management | Establish/Maintain Documentation | |
Include prioritization codes in the system tracking documentation. CC ID 15283 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the type and category of the request in the system tracking documentation. CC ID 15281 | System hardening through configuration management | Establish/Maintain Documentation | |
Include contact information in the system tracking documentation. CC ID 15280 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the username in the system tracking documentation. CC ID 15278 | System hardening through configuration management | Establish/Maintain Documentation | |
Include a problem description in the system tracking documentation. CC ID 15276 | System hardening through configuration management | Establish/Maintain Documentation | |
Include affected systems in the system tracking documentation. CC ID 15275 | System hardening through configuration management | Establish/Maintain Documentation | |
Include root causes in the system tracking documentation. CC ID 15274 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the name of who is responsible for resolution in the system tracking documentation. CC ID 15273 | System hardening through configuration management | Establish/Maintain Documentation | |
Include current status in the system tracking documentation. CC ID 15272 | System hardening through configuration management | Establish/Maintain Documentation | |
Employ the Configuration Management program. CC ID 11904 | System hardening through configuration management | Configuration | |
Record Configuration Management items in the Configuration Management database. CC ID 00861 | System hardening through configuration management | Establish/Maintain Documentation | |
Disseminate and communicate the configuration management program to all interested personnel and affected parties. CC ID 11946 | System hardening through configuration management | Communicate | |
Establish, implement, and maintain a Configuration Management Database with accessible reporting capabilities. CC ID 02132 [{software development} With respect to developed software, determine whether institution management does the following: Collects data to build metrics and reporting of configuration management compliance, and vulnerability management. App A Objective 6.28.f] | System hardening through configuration management | Establish/Maintain Documentation | |
Document external connections for all systems. CC ID 06415 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain a configuration baseline based on the least functionality principle. CC ID 00862 [Determine whether management uses standard builds, allowing one documented configuration to be applied to multiple computers in a controlled manner, to create hardware and software inventories, update or patch systems, restore systems, investigate anomalies, and audit configurations. App A Objective 6.14 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | System hardening through configuration management | Establish/Maintain Documentation | |
Include the measures used to account for any differences in operation between the test environments and production environments in the baseline configuration. CC ID 13285 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the differences between test environments and production environments in the baseline configuration. CC ID 13284 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the applied security patches in the baseline configuration. CC ID 13271 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the installed application software and version numbers in the baseline configuration. CC ID 13270 | System hardening through configuration management | Establish/Maintain Documentation | |
Include installed custom software in the baseline configuration. CC ID 13274 | System hardening through configuration management | Establish/Maintain Documentation | |
Include network ports in the baseline configuration. CC ID 13273 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the operating systems and version numbers in the baseline configuration. CC ID 13269 | System hardening through configuration management | Establish/Maintain Documentation | |
Include backup procedures in the Configuration Management policy. CC ID 01314 | System hardening through configuration management | Establish/Maintain Documentation | |
Establish, implement, and maintain system hardening procedures. CC ID 12001 [{application hardening process}{system hardening process} Determine whether management has processes to harden applications and systems (e.g., installing minimum services, installing necessary patches, configuring appropriate security settings, enforcing principle of least privilege, changing default passwords, and enabling logging). App A Objective 6.13 {application hardening process}{system hardening process} Determine whether management has processes to harden applications and systems (e.g., installing minimum services, installing necessary patches, configuring appropriate security settings, enforcing principle of least privilege, changing default passwords, and enabling logging). App A Objective 6.13 Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment Management should have a process to introduce changes to the environment in a controlled manner. Changes to the IT environment include the following: - Configuration management of IT systems and applications. - Hardening of systems and applications. - Use of standard builds. - Patch management. II.C.10 Change Management Within the IT Environment] | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the Intrusion Detection System and Intrusion Prevention System in accordance with organizational standards. CC ID 04831 | System hardening through configuration management | Configuration | |
Configure session timeout and reauthentication settings according to organizational standards. CC ID 12460 | System hardening through configuration management | Technical Security | |
Enable historical logging on the Intrusion Detection System and Intrusion Prevention System. CC ID 04836 | System hardening through configuration management | Configuration | |
Configure automatic logoff to terminate the sessions based on inactivity according to organizational standards. CC ID 04490 | System hardening through configuration management | Configuration | |
Configure the Intrusion Detection System and the Intrusion Prevention System to detect rogue devices and unauthorized connections. CC ID 04837 | System hardening through configuration management | Configuration | |
Configure the Intrusion Detection System and the Intrusion Prevention System to alert upon finding rogue devices and unauthorized connections. CC ID 07062 | System hardening through configuration management | Configuration | |
Display an explicit logout message when disconnecting an authenticated communications session. CC ID 10093 | System hardening through configuration management | Configuration | |
Invalidate session identifiers upon session termination. CC ID 10649 | System hardening through configuration management | Technical Security | |
Configure “Docker” to organizational standards. CC ID 14457 | System hardening through configuration management | Configuration | |
Configure the "autolock" argument to organizational standards. CC ID 14547 | System hardening through configuration management | Configuration | |
Configure the "COPY" instruction to organizational standards. CC ID 14515 | System hardening through configuration management | Configuration | |
Configure the "memory" argument to organizational standards. CC ID 14497 | System hardening through configuration management | Configuration | |
Configure the "docker0" bridge to organizational standards. CC ID 14504 | System hardening through configuration management | Configuration | |
Configure the "docker exec commands" to organizational standards. CC ID 14502 | System hardening through configuration management | Configuration | |
Configure the "health-cmd" argument to organizational standards. CC ID 14527 | System hardening through configuration management | Configuration | |
Configure the maximum number of images to organizational standards. CC ID 14545 | System hardening through configuration management | Configuration | |
Configure the minimum number of manager nodes to organizational standards. CC ID 14543 | System hardening through configuration management | Configuration | |
Configure the "on-failure" restart policy to organizational standards. CC ID 14542 | System hardening through configuration management | Configuration | |
Configure the maximum number of containers to organizational standards. CC ID 14540 | System hardening through configuration management | Configuration | |
Configure the "lifetime_minutes" to organizational standards. CC ID 14539 | System hardening through configuration management | Configuration | |
Configure the "Linux kernel capabilities" to organizational standards. CC ID 14531 | System hardening through configuration management | Configuration | |
Configure the "Docker socket" to organizational standards. CC ID 14506 | System hardening through configuration management | Configuration | |
Configure the "read-only" argument to organizational standards. CC ID 14498 | System hardening through configuration management | Configuration | |
Configure the signed image enforcement to organizational standards. CC ID 14517 | System hardening through configuration management | Configuration | |
Configure the "storage-opt" argument to organizational standards. CC ID 14658 | System hardening through configuration management | Configuration | |
Configure the "swarm services" to organizational standards. CC ID 14516 | System hardening through configuration management | Configuration | |
Configure the "experimental" argument to organizational standards. CC ID 14494 | System hardening through configuration management | Configuration | |
Configure the cluster role-based access control policies to organizational standards. CC ID 14514 | System hardening through configuration management | Configuration | |
Configure the "secret management commands" to organizational standards. CC ID 14512 | System hardening through configuration management | Configuration | |
Configure the "renewal_threshold_minutes" to organizational standards. CC ID 14538 | System hardening through configuration management | Configuration | |
Configure the "docker swarm unlock-key" command to organizational standards. CC ID 14490 | System hardening through configuration management | Configuration | |
Configure the "per_user_limit" to organizational standards. CC ID 14523 | System hardening through configuration management | Configuration | |
Configure the "privileged" argument to organizational standards. CC ID 14510 | System hardening through configuration management | Configuration | |
Configure the "update instructions" to organizational standards. CC ID 14525 | System hardening through configuration management | Configuration | |
Configure the "swarm mode" to organizational standards. CC ID 14508 | System hardening through configuration management | Configuration | |
Configure the "USER" directive to organizational standards. CC ID 14507 | System hardening through configuration management | Configuration | |
Configure the "DOCKER_CONTENT_TRUST" to organizational standards. CC ID 14488 | System hardening through configuration management | Configuration | |
Configure the "no-new-privileges" argument to organizational standards. CC ID 14474 | System hardening through configuration management | Configuration | |
Configure the "seccomp-profile" argument to organizational standards. CC ID 14503 | System hardening through configuration management | Configuration | |
Configure the "cpu-shares" argument to organizational standards. CC ID 14489 | System hardening through configuration management | Configuration | |
Configure the "volume" argument to organizational standards. CC ID 14533 | System hardening through configuration management | Configuration | |
Configure the "cgroup-parent" to organizational standards. CC ID 14466 | System hardening through configuration management | Configuration | |
Configure the "live-restore" argument to organizational standards. CC ID 14465 | System hardening through configuration management | Configuration | |
Configure the "userland-proxy" argument to organizational standards. CC ID 14464 | System hardening through configuration management | Configuration | |
Configure the "user namespace support" to organizational standards. CC ID 14462 | System hardening through configuration management | Configuration | |
Configure "etcd" to organizational standards. CC ID 14535 | System hardening through configuration management | Configuration | |
Configure the "auto-tls" argument to organizational standards. CC ID 14621 | System hardening through configuration management | Configuration | |
Configure the "peer-auto-tls" argument to organizational standards. CC ID 14636 | System hardening through configuration management | Configuration | |
Configure the "peer-client-cert-auth" argument to organizational standards. CC ID 14614 | System hardening through configuration management | Configuration | |
Configure the "peer-cert-file" argument to organizational standards. CC ID 14606 | System hardening through configuration management | Configuration | |
Configure the "key-file" argument to organizational standards. CC ID 14604 | System hardening through configuration management | Configuration | |
Configure the "cert-file" argument to organizational standards. CC ID 14602 | System hardening through configuration management | Configuration | |
Configure the "client-cert-auth" argument to organizational standards. CC ID 14596 | System hardening through configuration management | Configuration | |
Configure the "peer-key-file" argument to organizational standards. CC ID 14595 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain container orchestration. CC ID 16350 | System hardening through configuration management | Technical Security | |
Configure "Kubernetes" to organizational standards. CC ID 14528 | System hardening through configuration management | Configuration | |
Configure the "ImagePolicyWebhook" admission controller to organizational standards. CC ID 14657 | System hardening through configuration management | Configuration | |
Configure the "allowedCapabilities" to organizational standards. CC ID 14653 | System hardening through configuration management | Configuration | |
Configure the "allowPrivilegeEscalation" flag to organizational standards. CC ID 14645 | System hardening through configuration management | Configuration | |
Configure the "Security Context" to organizational standards. CC ID 14656 | System hardening through configuration management | Configuration | |
Configure the "cluster-admin" role to organizational standards. CC ID 14642 | System hardening through configuration management | Configuration | |
Configure the "automountServiceAccountToken" to organizational standards. CC ID 14639 | System hardening through configuration management | Configuration | |
Configure the "seccomp" profile to organizational standards. CC ID 14652 | System hardening through configuration management | Configuration | |
Configure the "securityContext.privileged" flag to organizational standards. CC ID 14641 | System hardening through configuration management | Configuration | |
Configure the "audit-policy-file" to organizational standards. CC ID 14610 | System hardening through configuration management | Configuration | |
Configure the "bind-address" argument to organizational standards. CC ID 14601 | System hardening through configuration management | Configuration | |
Configure the "request-timeout" argument to organizational standards. CC ID 14583 | System hardening through configuration management | Configuration | |
Configure the "secure-port" argument to organizational standards. CC ID 14582 | System hardening through configuration management | Configuration | |
Configure the "service-account-key-file" argument to organizational standards. CC ID 14581 | System hardening through configuration management | Configuration | |
Configure the "insecure-bind-address" argument to organizational standards. CC ID 14580 | System hardening through configuration management | Configuration | |
Configure the "service-account-lookup" argument to organizational standards. CC ID 14579 | System hardening through configuration management | Configuration | |
Configure the "admission control plugin PodSecurityPolicy" to organizational standards. CC ID 14578 | System hardening through configuration management | Configuration | |
Configure the "profiling" argument to organizational standards. CC ID 14577 | System hardening through configuration management | Configuration | |
Configure the "hostNetwork" flag to organizational standards. CC ID 14649 | System hardening through configuration management | Configuration | |
Configure the "hostPID" flag to organizational standards. CC ID 14648 | System hardening through configuration management | Configuration | |
Configure the "etcd-certfile" argument to organizational standards. CC ID 14584 | System hardening through configuration management | Configuration | |
Configure the "runAsUser.rule" to organizational standards. CC ID 14651 | System hardening through configuration management | Configuration | |
Configure the "requiredDropCapabilities" to organizational standards. CC ID 14650 | System hardening through configuration management | Configuration | |
Configure the "hostIPC" flag to organizational standards. CC ID 14643 | System hardening through configuration management | Configuration | |
Configure the "admission control plugin ServiceAccount" to organizational standards. CC ID 14576 | System hardening through configuration management | Configuration | |
Configure the "insecure-port" argument to organizational standards. CC ID 14575 | System hardening through configuration management | Configuration | |
Configure the "admission control plugin AlwaysPullImages" to organizational standards. CC ID 14574 | System hardening through configuration management | Configuration | |
Configure the "pod" to organizational standards. CC ID 14644 | System hardening through configuration management | Configuration | |
Configure the "ClusterRoles" to organizational standards. CC ID 14637 | System hardening through configuration management | Configuration | |
Configure the "event-qps" argument to organizational standards. CC ID 14633 | System hardening through configuration management | Configuration | |
Configure the "Kubelet" to organizational standards. CC ID 14635 | System hardening through configuration management | Configuration | |
Configure the "NET_RAW" to organizational standards. CC ID 14647 | System hardening through configuration management | Configuration | |
Configure the "make-iptables-util-chains" argument to organizational standards. CC ID 14638 | System hardening through configuration management | Configuration | |
Configure the "hostname-override" argument to organizational standards. CC ID 14631 | System hardening through configuration management | Configuration | |
Configure the "admission control plugin NodeRestriction" to organizational standards. CC ID 14573 | System hardening through configuration management | Configuration | |
Configure the "admission control plugin AlwaysAdmit" to organizational standards. CC ID 14572 | System hardening through configuration management | Configuration | |
Configure the "etcd-cafile" argument to organizational standards. CC ID 14592 | System hardening through configuration management | Configuration | |
Configure the "encryption-provider-config" argument to organizational standards. CC ID 14587 | System hardening through configuration management | Configuration | |
Configure the "rotate-certificates" argument to organizational standards. CC ID 14640 | System hardening through configuration management | Configuration | |
Configure the "etcd-keyfile" argument to organizational standards. CC ID 14586 | System hardening through configuration management | Configuration | |
Configure the "client-ca-file" argument to organizational standards. CC ID 14585 | System hardening through configuration management | Configuration | |
Configure the "kube-apiserver" to organizational standards. CC ID 14589 | System hardening through configuration management | Configuration | |
Configure the "tls-private-key-file" argument to organizational standards. CC ID 14590 | System hardening through configuration management | Configuration | |
Configure the "streaming-connection-idle-timeout" argument to organizational standards. CC ID 14634 | System hardening through configuration management | Configuration | |
Configure the "RotateKubeletServerCertificate" argument to organizational standards. CC ID 14626 | System hardening through configuration management | Configuration | |
Configure the "protect-kernel-defaults" argument to organizational standards. CC ID 14629 | System hardening through configuration management | Configuration | |
Configure the "read-only-port" argument to organizational standards. CC ID 14627 | System hardening through configuration management | Configuration | |
Configure the "admission control plugin NamespaceLifecycle" to organizational standards. CC ID 14571 | System hardening through configuration management | Configuration | |
Configure the "terminated-pod-gc-threshold" argument to organizational standards. CC ID 14593 | System hardening through configuration management | Configuration | |
Configure the "tls-cert-file" argument to organizational standards. CC ID 14588 | System hardening through configuration management | Configuration | |
Configure the "kubelet-certificate-authority" argument to organizational standards. CC ID 14570 | System hardening through configuration management | Configuration | |
Configure the "service-account-private-key-file" argument to organizational standards. CC ID 14607 | System hardening through configuration management | Configuration | |
Configure the "admission control plugin SecurityContextDeny" to organizational standards. CC ID 14569 | System hardening through configuration management | Configuration | |
Configure the "kubelet-client-certificate" argument to organizational standards. CC ID 14568 | System hardening through configuration management | Configuration | |
Configure the "root-ca-file" argument to organizational standards. CC ID 14599 | System hardening through configuration management | Configuration | |
Configure the "admission control plugin EventRateLimit" to organizational standards. CC ID 14567 | System hardening through configuration management | Configuration | |
Configure the "use-service-account-credentials" argument to organizational standards. CC ID 14594 | System hardening through configuration management | Configuration | |
Configure the "token-auth-file" argument to organizational standards. CC ID 14566 | System hardening through configuration management | Configuration | |
Configure the "authorization-mode" argument to organizational standards. CC ID 14565 | System hardening through configuration management | Configuration | |
Configure the "anonymous-auth" argument to organizational standards. CC ID 14564 | System hardening through configuration management | Configuration | |
Configure the "kubelet-client-key" argument to organizational standards. CC ID 14563 | System hardening through configuration management | Configuration | |
Configure the "kubelet-https" argument to organizational standards. CC ID 14561 | System hardening through configuration management | Configuration | |
Configure the "basic-auth-file" argument to organizational standards. CC ID 14559 | System hardening through configuration management | Configuration | |
Configure the Remote Deposit Capture system to organizational standards. CC ID 13569 | System hardening through configuration management | Configuration | |
Prohibit files from containing wild cards, as necessary. CC ID 16318 | System hardening through configuration management | Process or Activity | |
Block and/or remove unnecessary software and unauthorized software. CC ID 00865 | System hardening through configuration management | Configuration | |
Assign system hardening to qualified personnel. CC ID 06813 | System hardening through configuration management | Establish Roles | |
Use the latest approved version of all software. CC ID 00897 | System hardening through configuration management | Technical Security | |
Install the most current Windows Service Pack. CC ID 01695 | System hardening through configuration management | Configuration | |
Install critical security updates and important security updates in a timely manner. CC ID 01696 | System hardening through configuration management | Configuration | |
Include risk information when communicating critical security updates. CC ID 14948 | System hardening through configuration management | Communicate | |
Change default configurations, as necessary. CC ID 00877 [Review whether applications in use provide the following capabilities: Provide the ability to change and disable default application accounts upon installation. App A Objective 6.27.c] | System hardening through configuration management | Configuration | |
Configure custom security parameters for X-Windows. CC ID 02168 | System hardening through configuration management | Configuration | |
Configure custom security settings for Lotus Domino. CC ID 02171 | System hardening through configuration management | Configuration | |
Configure custom security settings for the Automated Security Enhancement Tool. CC ID 02177 | System hardening through configuration management | Configuration | |
Configure custom Security settings for Sun Answerbook2. CC ID 02178 | System hardening through configuration management | Configuration | |
Configure custom security settings for Command (PROM) Monitor. CC ID 02180 | System hardening through configuration management | Configuration | |
Configure and secure each interface for Executive Interfaces. CC ID 02182 | System hardening through configuration management | Configuration | |
Reconfigure the default settings and configure the system security for Site Management Complex. CC ID 02183 | System hardening through configuration management | Configuration | |
Configure the unisys executive (GENNED) GEN tags. CC ID 02184 | System hardening through configuration management | Configuration | |
Reconfigure the default Console Mode privileges. CC ID 02189 | System hardening through configuration management | Configuration | |
Restrict access to security-related Console Mode key-in groups based on the security profiles. CC ID 02190 | System hardening through configuration management | Configuration | |
Configure security profiles for the various Console Mode levels. CC ID 02191 | System hardening through configuration management | Configuration | |
Configure custom access privileges for all mapper files. CC ID 02194 | System hardening through configuration management | Configuration | |
Configure custom access privileges for the PSERVER configuration file. CC ID 02195 | System hardening through configuration management | Configuration | |
Configure custom access privileges for the DEPCON configuration file. CC ID 02196 | System hardening through configuration management | Configuration | |
Disable the default NetWare user web page unless absolutely necessary. CC ID 04447 | System hardening through configuration management | Configuration | |
Enable and reset the primary administrator names, primary administrator passwords, root names, and root passwords. CC ID 04448 | System hardening through configuration management | Configuration | |
Remove unnecessary documentation or unprotected documentation from installed applications. CC ID 04452 | System hardening through configuration management | Configuration | |
Complete the NetWare eGuide configuration. CC ID 04449 | System hardening through configuration management | Configuration | |
Verify the usr/aset/masters/uid_aliases file exists and contains an appropriate aliases list. CC ID 04902 | System hardening through configuration management | Configuration | |
Set the low security directory list properly. CC ID 04903 | System hardening through configuration management | Configuration | |
Set the medium security directory list properly. CC ID 04904 | System hardening through configuration management | Configuration | |
Set the high security directory list properly. CC ID 04905 | System hardening through configuration management | Configuration | |
Set the UID aliases pointer properly. CC ID 04906 | System hardening through configuration management | Configuration | |
Verify users are listed in the ASET userlist file. CC ID 04907 | System hardening through configuration management | Technical Security | |
Verify Automated Security Enhancement Tool checks the NIS+ tables, as appropriate. CC ID 04908 | System hardening through configuration management | Testing | |
Reconfigure the encryption keys from their default setting or previous setting. CC ID 06079 | System hardening through configuration management | Configuration | |
Change the default Service Set Identifier for Wireless Access Points and wireless bridges. CC ID 06086 | System hardening through configuration management | Configuration | |
Revoke public execute privileges for all processes or applications that allow such privileges. CC ID 06568 | System hardening through configuration management | Configuration | |
Configure the system's booting configuration. CC ID 10656 | System hardening through configuration management | Configuration | |
Configure the system to boot directly to the correct Operating System. CC ID 04509 | System hardening through configuration management | Configuration | |
Verify an appropriate bootloader is used. CC ID 04900 | System hardening through configuration management | Configuration | |
Configure the ability to boot from USB devices, as appropriate. CC ID 04901 | System hardening through configuration management | Configuration | |
Configure the system to boot from hardware enforced read-only media. CC ID 10657 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain procedures to standardize operating system software installation. CC ID 00869 | System hardening through configuration management | Establish/Maintain Documentation | |
Verify operating system installation plans include software security considerations. CC ID 00870 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Approved Installation Sites for ActiveX Controls" security mechanism properly. CC ID 04909 | System hardening through configuration management | Configuration | |
Configure Least Functionality and Least Privilege settings to organizational standards. CC ID 07599 | System hardening through configuration management | Configuration | |
Prohibit directories from having read/write capability, as appropriate. CC ID 16313 | System hardening through configuration management | Configuration | |
Configure "Block public access (bucket settings)" to organizational standards. CC ID 15444 | System hardening through configuration management | Configuration | |
Configure S3 Bucket Policies to organizational standards. CC ID 15431 | System hardening through configuration management | Configuration | |
Configure "Allow suggested apps in Windows Ink Workspace" to organizational standards. CC ID 15417 | System hardening through configuration management | Configuration | |
Configure "Allow Cloud Search" to organizational standards. CC ID 15416 | System hardening through configuration management | Configuration | |
Configure "Configure Watson events" to organizational standards. CC ID 15414 | System hardening through configuration management | Configuration | |
Configure "Allow Clipboard synchronization across devices" to organizational standards. CC ID 15412 | System hardening through configuration management | Configuration | |
Configure "Prevent users from modifying settings" to organizational standards. CC ID 15411 | System hardening through configuration management | Configuration | |
Configure "Prevent users from sharing files within their profile" to organizational standards. CC ID 15408 | System hardening through configuration management | Configuration | |
Configure "Manage preview builds" to organizational standards. CC ID 15405 | System hardening through configuration management | Configuration | |
Configure "Turn off Help Experience Improvement Program" to organizational standards. CC ID 15403 | System hardening through configuration management | Configuration | |
Configure "Sign-in and lock last interactive user automatically after a restart" to organizational standards. CC ID 15402 | System hardening through configuration management | Configuration | |
Configure "Hardened UNC Paths" to organizational standards. CC ID 15400 | System hardening through configuration management | Configuration | |
Configure "Turn off all Windows spotlight features" to organizational standards. CC ID 15397 | System hardening through configuration management | Configuration | |
Configure "Allow Message Service Cloud Sync" to organizational standards. CC ID 15396 | System hardening through configuration management | Configuration | |
Configure "Configure local setting override for reporting to Microsoft MAPS" to organizational standards. CC ID 15394 | System hardening through configuration management | Configuration | |
Configure "Configure Windows spotlight on lock screen" to organizational standards. CC ID 15391 | System hardening through configuration management | Configuration | |
Configure "Do not suggest third-party content in Windows spotlight" to organizational standards. CC ID 15389 | System hardening through configuration management | Configuration | |
Configure "Enable Font Providers" to organizational standards. CC ID 15388 | System hardening through configuration management | Configuration | |
Configure "Disallow copying of user input methods to the system account for sign-in" to organizational standards. CC ID 15386 | System hardening through configuration management | Configuration | |
Configure "Do not display network selection UI" to organizational standards. CC ID 15381 | System hardening through configuration management | Configuration | |
Configure "Turn off KMS Client Online AVS Validation" to organizational standards. CC ID 15380 | System hardening through configuration management | Configuration | |
Configure "Allow Telemetry" to organizational standards. CC ID 15378 | System hardening through configuration management | Configuration | |
Configure "Allow users to enable online speech recognition services" to organizational standards. CC ID 15377 | System hardening through configuration management | Configuration | |
Configure "Prevent enabling lock screen camera" to organizational standards. CC ID 15373 | System hardening through configuration management | Configuration | |
Configure "Continue experiences on this device" to organizational standards. CC ID 15372 | System hardening through configuration management | Configuration | |
Configure "Prevent the usage of OneDrive for file storage" to organizational standards. CC ID 15369 | System hardening through configuration management | Configuration | |
Configure "Do not use diagnostic data for tailored experiences" to organizational standards. CC ID 15367 | System hardening through configuration management | Configuration | |
Configure "Network access: Restrict clients allowed to make remote calls to SAM" to organizational standards. CC ID 15365 | System hardening through configuration management | Configuration | |
Configure "Turn off Microsoft consumer experiences" to organizational standards. CC ID 15363 | System hardening through configuration management | Configuration | |
Configure "Allow Use of Camera" to organizational standards. CC ID 15362 | System hardening through configuration management | Configuration | |
Configure "Allow Online Tips" to organizational standards. CC ID 15360 | System hardening through configuration management | Configuration | |
Configure "Turn off cloud optimized content" to organizational standards. CC ID 15357 | System hardening through configuration management | Configuration | |
Configure "Apply UAC restrictions to local accounts on network logons" to organizational standards. CC ID 15356 | System hardening through configuration management | Configuration | |
Configure "Toggle user control over Insider builds" to organizational standards. CC ID 15354 | System hardening through configuration management | Configuration | |
Configure "Allow network connectivity during connected-standby (plugged in)" to organizational standards. CC ID 15353 | System hardening through configuration management | Configuration | |
Configure "Do not show feedback notifications" to organizational standards. CC ID 15350 | System hardening through configuration management | Configuration | |
Configure "Prevent enabling lock screen slide show" to organizational standards. CC ID 15349 | System hardening through configuration management | Configuration | |
Configure "Turn off the advertising ID" to organizational standards. CC ID 15348 | System hardening through configuration management | Configuration | |
Configure "Allow Windows Ink Workspace" to organizational standards. CC ID 15346 | System hardening through configuration management | Configuration | |
Configure "Allow a Windows app to share application data between users" to organizational standards. CC ID 15345 | System hardening through configuration management | Configuration | |
Configure "Turn off handwriting personalization data sharing" to organizational standards. CC ID 15339 | System hardening through configuration management | Configuration | |
Configure the "Devices: Prevent users from installing printer drivers" to organizational standards. CC ID 07600 | System hardening through configuration management | Configuration | |
Configure the "Log on as a service" to organizational standards. CC ID 07609 | System hardening through configuration management | Configuration | |
Configure "Restore files and directories" to organizational standards. CC ID 07610 | System hardening through configuration management | Configuration | |
Configure the "Back up files and directories" to organizational standards. CC ID 07629 | System hardening through configuration management | Configuration | |
Configure the "Change the system time" to organizational standards. CC ID 07633 | System hardening through configuration management | Configuration | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts" to organizational standards. CC ID 07635 | System hardening through configuration management | Configuration | |
Configure the "Perform volume maintenance tasks" to organizational standards. CC ID 07653 | System hardening through configuration management | Configuration | |
Configure the "Create global objects" to organizational standards. CC ID 07659 | System hardening through configuration management | Configuration | |
Configure the "System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies" to organizational standards. CC ID 07660 | System hardening through configuration management | Configuration | |
Configure the "DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax" to organizational standards. CC ID 07671 | System hardening through configuration management | Configuration | |
Configure the "Network access: Named Pipes that can be accessed anonymously" to organizational standards. CC ID 07676 | System hardening through configuration management | Configuration | |
Configure the "Change the time zone" to organizational standards. CC ID 07677 | System hardening through configuration management | Configuration | |
Configure the "Adjust memory quotas for a process" to organizational standards. CC ID 07685 | System hardening through configuration management | Configuration | |
Configure the "Add workstations to domain" to organizational standards. CC ID 07689 | System hardening through configuration management | Configuration | |
Configure the "Take ownership of files or other objects" to organizational standards. CC ID 07691 | System hardening through configuration management | Configuration | |
Configure the "Access this computer from the network" to organizational standards. CC ID 07706 | System hardening through configuration management | Configuration | |
Configure the "MSS: (AutoReboot) Allow Windows to automatically restart after a system crash (recommended except for highly secure environments)" to organizational standards. CC ID 07710 | System hardening through configuration management | Configuration | |
Configure the "Shutdown: Allow system to be shut down without having to log on" to organizational standards. CC ID 07717 | System hardening through configuration management | Configuration | |
Configure the "System objects: Require case insensitivity for non-Windows subsystems" to organizational standards. CC ID 07718 | System hardening through configuration management | Configuration | |
Configure the "Domain controller: Allow server operators to schedule tasks" to organizational standards. CC ID 07722 | System hardening through configuration management | Configuration | |
Configure the "Debug programs" to organizational standards. CC ID 07729 | System hardening through configuration management | Configuration | |
Configure the "Increase scheduling priority" to organizational standards. CC ID 07739 | System hardening through configuration management | Configuration | |
Configure the "Load and unload device drivers" to organizational standards. CC ID 07745 | System hardening through configuration management | Configuration | |
Configure the "Modify an object label" to organizational standards. CC ID 07755 | System hardening through configuration management | Configuration | |
Configure the "Deny log on as a service" to organizational standards. CC ID 07762 | System hardening through configuration management | Configuration | |
Configure the "Recovery console: Allow automatic administrative logon" to organizational standards. CC ID 07770 | System hardening through configuration management | Configuration | |
Configure the "Create a token object" to organizational standards. CC ID 07774 | System hardening through configuration management | Configuration | |
Configure the "Create symbolic links" to organizational standards. CC ID 07778 | System hardening through configuration management | Configuration | |
Configure the "Deny access to this computer from the network" to organizational standards. CC ID 07779 | System hardening through configuration management | Configuration | |
Configure the "Deny log on locally" to organizational standards. CC ID 07781 | System hardening through configuration management | Configuration | |
Configure the "Manage auditing and security log" to organizational standards. CC ID 07783 | System hardening through configuration management | Configuration | |
Configure the "Lock pages in memory" to organizational standards. CC ID 07784 | System hardening through configuration management | Configuration | |
Configure the "Shutdown: Clear virtual memory pagefile" to organizational standards. CC ID 07787 | System hardening through configuration management | Configuration | |
Configure the "Increase a process working set" to organizational standards. CC ID 07788 | System hardening through configuration management | Configuration | |
Configure the "Generate security audits" to organizational standards. CC ID 07796 | System hardening through configuration management | Configuration | |
Configure the "Remove computer from docking station" to organizational standards. CC ID 07802 | System hardening through configuration management | Configuration | |
Configure the "System settings: Optional subsystems" to organizational standards. CC ID 07804 | System hardening through configuration management | Configuration | |
Configure the "Shut down the system" to organizational standards. CC ID 07808 | System hardening through configuration management | Configuration | |
Configure the "Bypass traverse checking" to organizational standards. CC ID 07809 | System hardening through configuration management | Configuration | |
Configure the "Always install with elevated privileges" to organizational standards. CC ID 07811 | System hardening through configuration management | Configuration | |
Configure the "Allow log on through Remote Desktop Services" to organizational standards. CC ID 07813 | System hardening through configuration management | Configuration | |
Configure the "MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)" to organizational standards. CC ID 07814 | System hardening through configuration management | Configuration | |
Configure the "Create permanent shared objects" to organizational standards. CC ID 07818 | System hardening through configuration management | Configuration | |
Configure the "Devices: Allow undock without having to log on" to organizational standards. CC ID 07821 | System hardening through configuration management | Configuration | |
Configure the "Devices: Restrict floppy access to locally logged-on user only" to organizational standards. CC ID 07823 | System hardening through configuration management | Configuration | |
Configure the "Log on as a batch job" to organizational standards. CC ID 07838 | System hardening through configuration management | Configuration | |
Configure the "MSS: (AutoShareServer) Enable Administrative Shares (recommended except for highly secure environments)" to organizational standards. CC ID 07841 | System hardening through configuration management | Configuration | |
Configure the "DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax" to organizational standards. CC ID 07842 | System hardening through configuration management | Configuration | |
Configure the "Replace a process level token" to organizational standards. CC ID 07845 | System hardening through configuration management | Configuration | |
Configure the "Modify firmware environment values" to organizational standards. CC ID 07847 | System hardening through configuration management | Configuration | |
Configure the "Deny log on through Remote Desktop Services" to organizational standards. CC ID 07854 | System hardening through configuration management | Configuration | |
Configure the "Devices: Allowed to format and eject removable media" to organizational standards. CC ID 07862 | System hardening through configuration management | Configuration | |
Configure the "Profile single process" to organizational standards. CC ID 07866 | System hardening through configuration management | Configuration | |
Configure the "Turn off Autoplay" to organizational standards. CC ID 07867 | System hardening through configuration management | Configuration | |
Configure the "Devices: Restrict CD-ROM access to locally logged-on user only" to organizational standards. CC ID 07871 | System hardening through configuration management | Configuration | |
Configure the "Deny log on as a batch job" to organizational standards. CC ID 07876 | System hardening through configuration management | Configuration | |
Configure the "Create a pagefile" to organizational standards. CC ID 07878 | System hardening through configuration management | Configuration | |
Configure the "Profile system performance" to organizational standards. CC ID 07879 | System hardening through configuration management | Configuration | |
Configure the "Impersonate a client after authentication" to organizational standards. CC ID 07882 | System hardening through configuration management | Configuration | |
Configure the "MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)" to organizational standards. CC ID 07886 | System hardening through configuration management | Configuration | |
Configure the "Force shutdown from a remote system" to organizational standards. CC ID 07889 | System hardening through configuration management | Configuration | |
Configure the "Act as part of the operating system" to organizational standards. CC ID 07891 | System hardening through configuration management | Configuration | |
Configure the "Allow log on locally" to organizational standards. CC ID 07894 | System hardening through configuration management | Configuration | |
Configure the "Synchronize directory service data" to organizational standards. CC ID 07897 | System hardening through configuration management | Configuration | |
Configure the "Access Credential Manager as a trusted caller" to organizational standards. CC ID 07898 | System hardening through configuration management | Configuration | |
Configure the "Enable computer and user accounts to be trusted for delegation" to organizational standards. CC ID 07900 | System hardening through configuration management | Configuration | |
Configure the "Recovery console: Allow floppy copy and access to all drives and all folders" to organizational standards. CC ID 07901 | System hardening through configuration management | Configuration | |
Configure the "Software channel permissions" to organizational standards. CC ID 07910 | System hardening through configuration management | Configuration | |
Configure the "Allow drag and drop or copy and paste files" to organizational standards. CC ID 07915 | System hardening through configuration management | Configuration | |
Configure the "Disable Per-User Installation of ActiveX Controls" to organizational standards. CC ID 07918 | System hardening through configuration management | Configuration | |
Configure the "Download signed ActiveX controls" to organizational standards. CC ID 07921 | System hardening through configuration management | Configuration | |
Configure the "Disable "Configuring History"" to organizational standards. CC ID 07922 | System hardening through configuration management | Configuration | |
Configure the "Turn off ActiveX opt-in prompt" to organizational standards. CC ID 07928 | System hardening through configuration management | Configuration | |
Configure the "Allow installation of desktop items" to organizational standards. CC ID 07931 | System hardening through configuration management | Configuration | |
Configure the "Only allow approved domains to use ActiveX controls without prompt" to organizational standards. CC ID 07936 | System hardening through configuration management | Configuration | |
Configure the "Initialize and script ActiveX controls not marked as safe" to organizational standards. CC ID 07945 | System hardening through configuration management | Configuration | |
Configure the "Allow file downloads" to organizational standards. CC ID 07960 | System hardening through configuration management | Configuration | |
Configure the "Turn off the Security Settings Check feature" to organizational standards. CC ID 07979 | System hardening through configuration management | Configuration | |
Configure the "Disable the Advanced page" to organizational standards. CC ID 07981 | System hardening through configuration management | Configuration | |
Configure the "Intranet Sites: Include all network paths (UNCs)" to organizational standards. CC ID 07986 | System hardening through configuration management | Configuration | |
Configure the "Disable changing Automatic Configuration settings" to organizational standards. CC ID 07992 | System hardening through configuration management | Configuration | |
Configure the "Turn off "Delete Browsing History" functionality" to organizational standards. CC ID 07993 | System hardening through configuration management | Configuration | |
Configure the "Allow META REFRESH" to organizational standards. CC ID 07998 | System hardening through configuration management | Configuration | |
Configure the "Prevent Deleting Temporary Internet Files" to organizational standards. CC ID 08000 | System hardening through configuration management | Configuration | |
Configure the "Security Zones: Do not allow users to change policies" to organizational standards. CC ID 08001 | System hardening through configuration management | Configuration | |
Configure the "Only use the ActiveX Installer Service for installation of ActiveX Controls" to organizational standards. CC ID 08003 | System hardening through configuration management | Configuration | |
Configure the "Prevent "Fix settings" functionality" to organizational standards. CC ID 08010 | System hardening through configuration management | Configuration | |
Configure the "XAML browser applications" to organizational standards. CC ID 08011 | System hardening through configuration management | Configuration | |
Configure the "Run .NET Framework-reliant components signed with Authenticode" to organizational standards CC ID 08014 | System hardening through configuration management | Configuration | |
Configure the "Access data sources across domains" to organizational standards. CC ID 08018 | System hardening through configuration management | Configuration | |
Configure the "Allow script-initiated windows without size or position constraints" to organizational standards. CC ID 08020 | System hardening through configuration management | Configuration | |
Configure the "Disable Save this program to disk option" to organizational standards. CC ID 08021 | System hardening through configuration management | Configuration | |
Configure the "Security Zones: Do not allow users to add/delete sites" to organizational standards. CC ID 08061 | System hardening through configuration management | Configuration | |
Configure the "Script ActiveX controls marked safe for scripting" to organizational standards. CC ID 08067 | System hardening through configuration management | Configuration | |
Configure the "Prevent Deleting Cookies" to organizational standards. CC ID 08069 | System hardening through configuration management | Configuration | |
Configure the "Allow binary and script behaviors" to organizational standards. CC ID 08070 | System hardening through configuration management | Configuration | |
Configure the "Launching applications and files in an IFRAME" to organizational standards. CC ID 08078 | System hardening through configuration management | Configuration | |
Configure the "Allow status bar updates via script" to organizational standards. CC ID 08081 | System hardening through configuration management | Configuration | |
Configure the "Turn off Crash Detection" to organizational standards. CC ID 08085 | System hardening through configuration management | Configuration | |
Configure the "Security Zones: Use only machine settings" to organizational standards. CC ID 08088 | System hardening through configuration management | Configuration | |
Configure the "Web sites in less privileged Web content zones can navigate into this zone" to organizational standards. CC ID 08089 | System hardening through configuration management | Configuration | |
Configure the "Disable the Security page" to organizational standards. CC ID 08090 | System hardening through configuration management | Configuration | |
Configure the "Automatically check for Internet Explorer updates" to organizational standards. CC ID 08094 | System hardening through configuration management | Configuration | |
Configure the "Navigate windows and frames across different domains" to organizational standards. CC ID 08107 | System hardening through configuration management | Configuration | |
Configure the "Allow active scripting" setting to organizational standards. CC ID 08115 | System hardening through configuration management | Configuration | |
Configure the "Allow font downloads" to organizational standards. CC ID 08116 | System hardening through configuration management | Configuration | |
Configure the "Disable changing proxy settings" to organizational standards. CC ID 08126 | System hardening through configuration management | Configuration | |
Configure the "Disable changing connection settings" to organizational standards. CC ID 08129 | System hardening through configuration management | Configuration | |
Configure the "Run .NET Framework-reliant components not signed with Authenticode" to organizational standards CC ID 08130 | System hardening through configuration management | Configuration | |
Configure the "Turn off printing over HTTP" to organizational standards. CC ID 08162 | System hardening through configuration management | Configuration | |
Configure the "Registry policy processing" to organizational standards. CC ID 08169 | System hardening through configuration management | Configuration | |
Configure the "Disable remote Desktop Sharing" to organizational standards. CC ID 08186 | System hardening through configuration management | Configuration | |
Configure the "Report operating system errors" to organizational standards. CC ID 08187 | System hardening through configuration management | Configuration | |
Configure the "Enumerate administrator accounts on elevation" to organizational standards. CC ID 08190 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Update device driver searching" to organizational standards. CC ID 08193 | System hardening through configuration management | Configuration | |
Configure the "Do not allow drive redirection" to organizational standards. CC ID 08199 | System hardening through configuration management | Configuration | |
Configure the "Turn off the Windows Messenger Customer Experience Improvement Program" to organizational standards. CC ID 08204 | System hardening through configuration management | Configuration | |
Configure the "Turn off downloading of print drivers over HTTP" to organizational standards. CC ID 08218 | System hardening through configuration management | Configuration | |
Configure the "Do not process the run once list" to organizational standards. CC ID 08219 | System hardening through configuration management | Configuration | |
Configure the "Deny log on through Terminal Services" to organizational standards. CC ID 08220 | System hardening through configuration management | Configuration | |
Configure the "Offer Remote Assistance" to organizational standards. CC ID 08222 | System hardening through configuration management | Configuration | |
Configure the "Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box" to organizational standards. CC ID 08228 | System hardening through configuration management | Configuration | |
Configure the "Allow users to connect remotely using Remote Desktop Services" to organizational standards. CC ID 08234 | System hardening through configuration management | Configuration | |
Configure the "MSS: (AutoShareWks) Enable Administrative Shares (recommended except for highly secure environments)" to organizational standards. CC ID 08247 | System hardening through configuration management | Configuration | |
Configure the "MSS: (NtfsDisable8dot3NameCreation) Enable the computer to stop generating 8.3 style filenames" to organizational standards. CC ID 08253 | System hardening through configuration management | Configuration | |
Configure the "Solicited Remote Assistance" to organizational standards. CC ID 08265 | System hardening through configuration management | Configuration | |
Configure "Turn off the "Publish to Web" task for files and folders" to organizational standards. CC ID 08285 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Windows Messenger to be run" to organizational standards. CC ID 08288 | System hardening through configuration management | Configuration | |
Configure the "Allow log on through Terminal Services" to organizational standards. CC ID 08291 | System hardening through configuration management | Configuration | |
Configure the "Require trusted path for credential entry." to organizational standards CC ID 08293 | System hardening through configuration management | Configuration | |
Configure the "Turn off Search Companion content file updates" to organizational standards. CC ID 08302 | System hardening through configuration management | Configuration | |
Configure the "Prevent access to registry editing tools" to organizational standards. CC ID 08331 | System hardening through configuration management | Configuration | |
Configure the "Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet" to organizational standards. CC ID 08347 | System hardening through configuration management | Configuration | |
Configure the "Turn on SmartScreen Filter scan" to organizational standards. CC ID 08357 | System hardening through configuration management | Configuration | |
Configure the "Disallow WinRM from storing RunAs credentials" to organizational standards. CC ID 08362 | System hardening through configuration management | Configuration | |
Configure the "Turn off URL Suggestions" to organizational standards. CC ID 08372 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from bypassing SmartScreen Filter's application reputation warnings about files that are not commonly downloaded from the Internet" to organizational standards. CC ID 08385 | System hardening through configuration management | Configuration | |
Configure the "Prevent access to Delete Browsing History" to organizational standards. CC ID 08387 | System hardening through configuration management | Configuration | |
Configure the "Turn off InPrivate Browsing" to organizational standards. CC ID 08421 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Location Provider" to organizational standards. CC ID 08427 | System hardening through configuration management | Configuration | |
Configure the "Turn on Suggested Sites" to organizational standards. CC ID 08434 | System hardening through configuration management | Configuration | |
Configure the "Turn off access to the Store" to organizational standards. CC ID 08436 | System hardening through configuration management | Configuration | |
Configure the "Point and Print Restrictions" to organizational standards. CC ID 08441 | System hardening through configuration management | Configuration | |
Configure the "Prevent changing proxy settings" to organizational standards. CC ID 08447 | System hardening through configuration management | Configuration | |
Configure the "Allow deleting browsing history on exit" to organizational standards. CC ID 08456 | System hardening through configuration management | Configuration | |
Configure the "Allow scripting of Internet Explorer WebBrowser controls" to organizational standards. CC ID 08464 | System hardening through configuration management | Configuration | |
Configure the "Turn off Managing SmartScreen Filter for Internet Explorer 9" to organizational standards. CC ID 08472 | System hardening through configuration management | Configuration | |
Configure the "Check Administrator Group Membership" to organizational standards. CC ID 08473 | System hardening through configuration management | Configuration | |
Configure the "Check if AppLocker is Enabled" to organizational standards. CC ID 08475 | System hardening through configuration management | Configuration | |
Configure the "Prevent the computer from joining a homegroup" to organizational standards. CC ID 08486 | System hardening through configuration management | Configuration | |
Configure the "Disable Browser Geolocation" to organizational standards. CC ID 08491 | System hardening through configuration management | Configuration | |
Configure the "Allow Remote Shell Access" to organizational standards. CC ID 08496 | System hardening through configuration management | Configuration | |
Configure the "Turn Off the Display (Plugged In)" to organizational standards. CC ID 08502 | System hardening through configuration management | Configuration | |
Configure the "Do not enumerate connected users on domain-joined computers" to organizational standards. CC ID 08507 | System hardening through configuration management | Configuration | |
Configure the "Enable dragging of content from different domains across windows" to organizational standards. CC ID 08517 | System hardening through configuration management | Configuration | |
Configure the "Turn off first-run prompt" to organizational standards. CC ID 08521 | System hardening through configuration management | Configuration | |
Configure the "Allow Scriptlets" to organizational standards. CC ID 08523 | System hardening through configuration management | Configuration | |
Configure the "Turn on ActiveX Filtering" to organizational standards. CC ID 08524 | System hardening through configuration management | Configuration | |
Configure the "Userdata persistence" to organizational standards. CC ID 08533 | System hardening through configuration management | Configuration | |
Configure the "Enable dragging of content from different domains within a window" to organizational standards. CC ID 08535 | System hardening through configuration management | Configuration | |
Configure the "Turn off app notifications on the lock screen" to organizational standards. CC ID 08536 | System hardening through configuration management | Configuration | |
Configure the "Allow updates to status bar via script" to organizational standards. CC ID 08540 | System hardening through configuration management | Configuration | |
Configure the "Enumerate local users on domain-joined computers" to organizational standards. CC ID 08546 | System hardening through configuration management | Configuration | |
Configure the "Prevent deleting websites that the user has visited" to organizational standards. CC ID 08547 | System hardening through configuration management | Configuration | |
Configure the "Install new versions of Internet Explorer automatically" to organizational standards. CC ID 08551 | System hardening through configuration management | Configuration | |
Configure the "Make proxy settings per-machine (rather than per-user)" to organizational standards. CC ID 08553 | System hardening through configuration management | Configuration | |
Configure the "Disable external branding of Internet Explorer" to organizational standards. CC ID 08555 | System hardening through configuration management | Configuration | |
Configure the "Include local path when user is uploading files to a server" to organizational standards. CC ID 08557 | System hardening through configuration management | Configuration | |
Configure the "Configure Solicited Remote Assistance" to organizational standards. CC ID 08561 | System hardening through configuration management | Configuration | |
Configure the "Allow loading of XAML files" to organizational standards. CC ID 08562 | System hardening through configuration management | Configuration | |
Configure the "Do not display the password reveal button" to organizational standards. CC ID 08567 | System hardening through configuration management | Configuration | |
Configure the "Prevent running First Run wizard" to organizational standards. CC ID 08572 | System hardening through configuration management | Configuration | |
Configure the "Turn off location" to organizational standards. CC ID 08575 | System hardening through configuration management | Configuration | |
Configure the "Turn on Enhanced Protected Mode" to organizational standards. CC ID 08577 | System hardening through configuration management | Configuration | |
Configure the "Turn off browser geolocation" to organizational standards. CC ID 08580 | System hardening through configuration management | Configuration | |
Configure the "Do not display the reveal password button" to organizational standards. CC ID 08583 | System hardening through configuration management | Configuration | |
Configure the "Include updated website lists from Microsoft" to organizational standards. CC ID 08593 | System hardening through configuration management | Configuration | |
Configure the "Turn off Event Viewer "Events.asp" links" to organizational standards. CC ID 08604 | System hardening through configuration management | Configuration | |
Configure the "Configure Offer Remote Assistance" to organizational standards. CC ID 08605 | System hardening through configuration management | Configuration | |
Configure the "Prevent specifying the update check interval (in days)" to organizational standards. CC ID 08608 | System hardening through configuration management | Configuration | |
Configure the "Turn Off the Display (On Battery)" to organizational standards. CC ID 08609 | System hardening through configuration management | Configuration | |
Configure the "Prevent participation in the Customer Experience Improvement Program" to organizational standards. CC ID 08611 | System hardening through configuration management | Configuration | |
Configure the "Add a specific list of search providers to the user's search provider list" setting to organizational standards. CC ID 10420 | System hardening through configuration management | Configuration | |
Configure the "Admin-approved behaviors" setting to organizational standards. CC ID 10421 | System hardening through configuration management | Configuration | |
Configure the "Allow the display of image download placeholders" setting to organizational standards. CC ID 10422 | System hardening through configuration management | Configuration | |
Configure the "Allow the printing of background colors and images" setting to organizational standards. CC ID 10423 | System hardening through configuration management | Configuration | |
Configure the "Audio/Video Player" setting to organizational standards. CC ID 10424 | System hardening through configuration management | Configuration | |
Configure the "Auto-hide the Toolbars" setting to organizational standards. CC ID 10425 | System hardening through configuration management | Configuration | |
Configure the "Binary Behavior Security Restriction: All Processes" setting to organizational standards. CC ID 10426 | System hardening through configuration management | Configuration | |
Configure the "Binary Behavior Security Restriction: Internet Explorer Processes" setting to organizational standards. CC ID 10427 | System hardening through configuration management | Configuration | |
Configure the "Binary Behavior Security Restriction: Process List" setting to organizational standards. CC ID 10428 | System hardening through configuration management | Configuration | |
Configure the "Carpoint" setting to organizational standards. CC ID 10429 | System hardening through configuration management | Configuration | |
Configure the "Configure new tab page default behavior" setting to organizational standards. CC ID 10430 | System hardening through configuration management | Configuration | |
Configure the "Customize Command Labels" setting to organizational standards. CC ID 10431 | System hardening through configuration management | Configuration | |
Configure the "Customize User Agent String" setting to organizational standards. CC ID 10432 | System hardening through configuration management | Configuration | |
Configure the "Deploy default Accelerators" setting to organizational standards. CC ID 10433 | System hardening through configuration management | Configuration | |
Configure the "Deploy non-default Accelerators" setting to organizational standards. CC ID 10434 | System hardening through configuration management | Configuration | |
Configure the "DHTML Edit Control" setting to organizational standards. CC ID 10435 | System hardening through configuration management | Configuration | |
Configure the "Disable caching of Auto-Proxy scripts" setting to organizational standards. CC ID 10436 | System hardening through configuration management | Configuration | |
Configure the "Disable changing accessibility settings" setting to organizational standards. CC ID 10437 | System hardening through configuration management | Configuration | |
Configure the "Disable changing Calendar and Contact settings" setting to organizational standards. CC ID 10438 | System hardening through configuration management | Configuration | |
Configure the "Disable changing color settings" setting to organizational standards. CC ID 10439 | System hardening through configuration management | Configuration | |
Configure the "Disable changing default browser check" setting to organizational standards. CC ID 10440 | System hardening through configuration management | Configuration | |
Configure the "Disable changing font settings" setting to organizational standards. CC ID 10441 | System hardening through configuration management | Configuration | |
Configure the "Disable changing home page settings" setting to organizational standards. CC ID 10442 | System hardening through configuration management | Configuration | |
Configure the "Disable changing language settings" setting to organizational standards. CC ID 10443 | System hardening through configuration management | Configuration | |
Configure the "Disable changing link color settings" setting to organizational standards. CC ID 10444 | System hardening through configuration management | Configuration | |
Configure the "Disable changing Messaging settings" setting to organizational standards. CC ID 10445 | System hardening through configuration management | Configuration | |
Configure the "Disable changing ratings settings" setting to organizational standards. CC ID 10446 | System hardening through configuration management | Configuration | |
Configure the "Disable changing secondary home page settings" setting to organizational standards. CC ID 10447 | System hardening through configuration management | Configuration | |
Configure the "Disable changing Temporary Internet files settings" setting to organizational standards. CC ID 10448 | System hardening through configuration management | Configuration | |
Configure the "Disable Context menu" setting to organizational standards. CC ID 10449 | System hardening through configuration management | Configuration | |
Configure the "Disable customizing browser toolbar buttons" setting to organizational standards. CC ID 10450 | System hardening through configuration management | Configuration | |
Configure the "Disable customizing browser toolbars" setting to organizational standards. CC ID 10451 | System hardening through configuration management | Configuration | |
Configure the "Disable Import/Export Settings wizard" setting to organizational standards. CC ID 10452 | System hardening through configuration management | Configuration | |
Configure the "Disable Open in New Window menu option" setting to organizational standards. CC ID 10453 | System hardening through configuration management | Configuration | |
Configure the "Disable the Connections page" setting to organizational standards. CC ID 10454 | System hardening through configuration management | Configuration | |
Configure the "Disable the Content page" setting to organizational standards. CC ID 10455 | System hardening through configuration management | Configuration | |
Configure the "Disable the General page" setting to organizational standards. CC ID 10456 | System hardening through configuration management | Configuration | |
Configure the "Disable the Programs page" setting to organizational standards. CC ID 10457 | System hardening through configuration management | Configuration | |
Configure the "Disable toolbars and extensions when InPrivate Browsing starts" setting to organizational standards. CC ID 10458 | System hardening through configuration management | Configuration | |
Configure the "Display error message on proxy script download failure" setting to organizational standards. CC ID 10459 | System hardening through configuration management | Configuration | |
Configure the "Do not collect InPrivate Filtering data" setting to organizational standards. CC ID 10460 | System hardening through configuration management | Configuration | |
Configure the "Do not save encrypted pages to disk" setting to organizational standards. CC ID 10461 | System hardening through configuration management | Configuration | |
Configure the "Empty Temporary Internet Files folder when browser is closed" setting to organizational standards. CC ID 10462 | System hardening through configuration management | Configuration | |
Configure the "Enforce Full Screen Mode" setting to organizational standards. CC ID 10463 | System hardening through configuration management | Configuration | |
Configure the "File menu: Disable closing the browser and Explorer windows" setting to organizational standards. CC ID 10464 | System hardening through configuration management | Configuration | |
Configure the "File menu: Disable New menu option" setting to organizational standards. CC ID 10465 | System hardening through configuration management | Configuration | |
Configure the "File menu: Disable Open menu option" setting to organizational standards. CC ID 10466 | System hardening through configuration management | Configuration | |
Configure the "File menu: Disable Save As Web Page Complete" setting to organizational standards. CC ID 10467 | System hardening through configuration management | Configuration | |
Configure the "File menu: Disable Save As.. menu option" setting to organizational standards. CC ID 10468 | System hardening through configuration management | Configuration | |
Configure the "File size limits for Internet zone" setting to organizational standards. CC ID 10469 | System hardening through configuration management | Configuration | |
Configure the "File size limits for Intranet zone" setting to organizational standards. CC ID 10470 | System hardening through configuration management | Configuration | |
Configure the "File size limits for Local Machine zone" setting to organizational standards. CC ID 10471 | System hardening through configuration management | Configuration | |
Configure the "File size limits for Restricted Sites zone" setting to organizational standards. CC ID 10472 | System hardening through configuration management | Configuration | |
Configure the "File size limits for Trusted Sites zone" setting to organizational standards. CC ID 10473 | System hardening through configuration management | Configuration | |
Configure the "Help menu: Remove 'Send Feedback' menu option" setting to organizational standards. CC ID 10474 | System hardening through configuration management | Configuration | |
Configure the "Help menu: Remove 'Tour' menu option" setting to organizational standards. CC ID 10475 | System hardening through configuration management | Configuration | |
Configure the "Hide Favorites menu" setting to organizational standards. CC ID 10476 | System hardening through configuration management | Configuration | |
Configure the "Hide the Command Bar" setting to organizational standards. CC ID 10477 | System hardening through configuration management | Configuration | |
Configure the "Hide the Status Bar" setting to organizational standards. CC ID 10478 | System hardening through configuration management | Configuration | |
Configure the "InPrivate Filtering Threshold" setting to organizational standards. CC ID 10479 | System hardening through configuration management | Configuration | |
Configure the "Internet Zone Restricted Protocols" setting to organizational standards. CC ID 10480 | System hardening through configuration management | Configuration | |
Configure the "Internet Zone Template" setting to organizational standards. CC ID 10481 | System hardening through configuration management | Configuration | |
Configure the "Intranet Sites: Include all local (intranet) sites not listed in other zones" setting to organizational standards. CC ID 10482 | System hardening through configuration management | Configuration | |
Configure the "Intranet Sites: Include all sites that bypass the proxy server" setting to organizational standards. CC ID 10483 | System hardening through configuration management | Configuration | |
Configure the "Intranet Zone Restricted Protocols" setting to organizational standards. CC ID 10484 | System hardening through configuration management | Configuration | |
Configure the "Intranet Zone Template" setting to organizational standards. CC ID 10485 | System hardening through configuration management | Configuration | |
Configure the "Investor" setting to organizational standards. CC ID 10486 | System hardening through configuration management | Configuration | |
Configure the "Local Machine Zone Restricted Protocols" setting to organizational standards. CC ID 10487 | System hardening through configuration management | Configuration | |
Configure the "Local Machine Zone Template" setting to organizational standards. CC ID 10488 | System hardening through configuration management | Configuration | |
Configure the "Lock all Toolbars" setting to organizational standards. CC ID 10489 | System hardening through configuration management | Configuration | |
Configure the "Locked-Down Internet Zone Template" setting to organizational standards. CC ID 10490 | System hardening through configuration management | Configuration | |
Configure the "Locked-Down Intranet Zone Template" setting to organizational standards. CC ID 10491 | System hardening through configuration management | Configuration | |
Configure the "Locked-Down Local Machine Zone Template" setting to organizational standards. CC ID 10492 | System hardening through configuration management | Configuration | |
Configure the "Locked-Down Restricted Sites Zone Template" setting to organizational standards. CC ID 10493 | System hardening through configuration management | Configuration | |
Configure the "Locked-Down Trusted Sites Zone Template" setting to organizational standards. CC ID 10494 | System hardening through configuration management | Configuration | |
Configure the "Maximum number of connections per server (HTTP 1.0)" setting to organizational standards. CC ID 10495 | System hardening through configuration management | Configuration | |
Configure the "Maximum number of connections per server (HTTP 1.1)" setting to organizational standards. CC ID 10496 | System hardening through configuration management | Configuration | |
Configure the "Menu Controls" setting to organizational standards. CC ID 10497 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Agent" setting to organizational standards. CC ID 10498 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Chat" setting to organizational standards. CC ID 10499 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Scriptlet Component" setting to organizational standards. CC ID 10500 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Survey Control" setting to organizational standards. CC ID 10501 | System hardening through configuration management | Configuration | |
Configure the "Moving the menu bar above the navigation bar" setting to organizational standards. CC ID 10502 | System hardening through configuration management | Configuration | |
Configure the "MSNBC" setting to organizational standards. CC ID 10503 | System hardening through configuration management | Configuration | |
Configure the "NetShow File Transfer Control" setting to organizational standards. CC ID 10504 | System hardening through configuration management | Configuration | |
Configure the "Network Protocol Lockdown: All Processes" setting to organizational standards. CC ID 10505 | System hardening through configuration management | Configuration | |
Configure the "Network Protocol Lockdown: Internet Explorer Processes" setting to organizational standards. CC ID 10506 | System hardening through configuration management | Configuration | |
Configure the "Network Protocol Lockdown: Process List" setting to organizational standards. CC ID 10507 | System hardening through configuration management | Configuration | |
Configure the "Play animations in web pages" setting to organizational standards. CC ID 10508 | System hardening through configuration management | Configuration | |
Configure the "Play sounds in web pages" setting to organizational standards. CC ID 10509 | System hardening through configuration management | Configuration | |
Configure the "Pop-up allow list" setting to organizational standards. CC ID 10510 | System hardening through configuration management | Configuration | |
Configure the "Prevent configuration of search from the Address bar" setting to organizational standards. CC ID 10511 | System hardening through configuration management | Configuration | |
Configure the "Prevent Deleting Favorites Site Data" setting to organizational standards. CC ID 10512 | System hardening through configuration management | Configuration | |
Configure the "Prevent Deleting Form Data" setting to organizational standards. CC ID 10513 | System hardening through configuration management | Configuration | |
Configure the "Prevent Deleting InPrivate Filtering data" setting to organizational standards. CC ID 10514 | System hardening through configuration management | Configuration | |
Configure the "Prevent Deleting Passwords" setting to organizational standards. CC ID 10515 | System hardening through configuration management | Configuration | |
Configure the "Prevent Internet Explorer Search box from displaying" setting to organizational standards. CC ID 10516 | System hardening through configuration management | Configuration | |
Configure the "Prevent setting of the code download path for each machine" setting to organizational standards. CC ID 10517 | System hardening through configuration management | Configuration | |
Configure the "Prevent the configuration of cipher strength update information URLs" setting to organizational standards. CC ID 10518 | System hardening through configuration management | Configuration | |
Configure the "Prevent the use of Windows colors" setting to organizational standards. CC ID 10519 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from choosing default text size" setting to organizational standards. CC ID 10520 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from configuring background color" setting to organizational standards. CC ID 10521 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from configuring text color" setting to organizational standards. CC ID 10522 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from configuring the color of links that have already been clicked" setting to organizational standards. CC ID 10523 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from configuring the color of links that have not yet been clicked" setting to organizational standards. CC ID 10524 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from configuring the hover color" setting to organizational standards. CC ID 10525 | System hardening through configuration management | Configuration | |
Configure the "Restrict changing the default search provider" setting to organizational standards. CC ID 10526 | System hardening through configuration management | Configuration | |
Configure the "Restrict search providers to a specific list of providers" setting to organizational standards. CC ID 10527 | System hardening through configuration management | Configuration | |
Configure the "Restricted Sites Zone Restricted Protocols" setting to organizational standards. CC ID 10528 | System hardening through configuration management | Configuration | |
Configure the "Restricted Sites Zone Template" setting to organizational standards. CC ID 10529 | System hardening through configuration management | Configuration | |
Configure the "Send internationalized domain names" setting to organizational standards. CC ID 10530 | System hardening through configuration management | Configuration | |
Configure the "Set location of Stop and Refresh buttons" setting to organizational standards. CC ID 10531 | System hardening through configuration management | Configuration | |
Configure the "Set tab process growth" setting to organizational standards. CC ID 10532 | System hardening through configuration management | Configuration | |
Configure the "Flash" setting to organizational standards. CC ID 10533 | System hardening through configuration management | Configuration | |
Configure the "Tools menu: Disable Internet Options.. menu option" setting to organizational standards. CC ID 10534 | System hardening through configuration management | Configuration | |
Configure the "Trusted Sites Zone Restricted Protocols" setting to organizational standards. CC ID 10535 | System hardening through configuration management | Configuration | |
Configure the "Trusted Sites Zone Template" setting to organizational standards. CC ID 10536 | System hardening through configuration management | Configuration | |
Configure the "Turn off Accelerators" setting to organizational standards. CC ID 10537 | System hardening through configuration management | Configuration | |
Configure the "Turn off Automatic Crash Recovery Prompt" setting to organizational standards. CC ID 10538 | System hardening through configuration management | Configuration | |
Configure the "Turn off automatic image resizing" setting to organizational standards. CC ID 10539 | System hardening through configuration management | Configuration | |
Configure the "Turn off ClearType" setting to organizational standards. CC ID 10540 | System hardening through configuration management | Configuration | |
Configure the "Turn off Compatibility View button" setting to organizational standards. CC ID 10541 | System hardening through configuration management | Configuration | |
Configure the "Turn off Compatibility View" setting to organizational standards. CC ID 10542 | System hardening through configuration management | Configuration | |
Configure the "Turn off configuration of default behavior of new tab creation" setting to organizational standards. CC ID 10543 | System hardening through configuration management | Configuration | |
Configure the "Turn off configuration of tabbed browsing pop-up behavior" setting to organizational standards. CC ID 10544 | System hardening through configuration management | Configuration | |
Configure the "Turn off configuration of window reuse" setting to organizational standards. CC ID 10545 | System hardening through configuration management | Configuration | |
Configure the "Turn off configuring underline links" setting to organizational standards. CC ID 10546 | System hardening through configuration management | Configuration | |
Configure the "Turn off Cross Document Messaging" setting to organizational standards. CC ID 10547 | System hardening through configuration management | Configuration | |
Configure the "Turn off Data URI Support" setting to organizational standards. CC ID 10548 | System hardening through configuration management | Configuration | |
Configure the "Turn off Developer Tools" setting to organizational standards. CC ID 10549 | System hardening through configuration management | Configuration | |
Configure the "Turn off displaying the Internet Explorer Help Menu" setting to organizational standards. CC ID 10550 | System hardening through configuration management | Configuration | |
Configure the "Turn off Favorites bar" setting to organizational standards. CC ID 10551 | System hardening through configuration management | Configuration | |
Configure the "Turn off friendly http error messages" setting to organizational standards. CC ID 10552 | System hardening through configuration management | Configuration | |
Configure the "Turn off InPrivate Filtering" setting to organizational standards. CC ID 10553 | System hardening through configuration management | Configuration | |
Configure the "Turn off Managing Pop-up Allow list" setting to organizational standards. CC ID 10554 | System hardening through configuration management | Configuration | |
Configure the "Turn off managing Pop-up filter level" setting to organizational standards. CC ID 10555 | System hardening through configuration management | Configuration | |
Configure the "Turn off page zooming functionality" setting to organizational standards. CC ID 10556 | System hardening through configuration management | Configuration | |
Configure the "Turn off picture display" setting to organizational standards. CC ID 10557 | System hardening through configuration management | Configuration | |
Configure the "Turn off pop-up management" setting to organizational standards. CC ID 10558 | System hardening through configuration management | Configuration | |
Configure the "Turn off Print Menu" setting to organizational standards. CC ID 10559 | System hardening through configuration management | Configuration | |
Configure the "Turn off Quick Tabs functionality" setting to organizational standards. CC ID 10560 | System hardening through configuration management | Configuration | |
Configure the "Turn off Reopen Last Browsing Session" setting to organizational standards. CC ID 10561 | System hardening through configuration management | Configuration | |
Configure the "Turn off sending URLs as UTF-8 (requires restart)" setting to organizational standards. CC ID 10562 | System hardening through configuration management | Configuration | |
Configure the "Turn off smart image dithering" setting to organizational standards. CC ID 10563 | System hardening through configuration management | Configuration | |
Configure the "Turn off smooth scrolling" setting to organizational standards. CC ID 10564 | System hardening through configuration management | Configuration | |
Configure the "Turn off suggestions for all user-installed providers" setting to organizational standards. CC ID 10565 | System hardening through configuration management | Configuration | |
Configure the "Turn off Tab Grouping" setting to organizational standards. CC ID 10566 | System hardening through configuration management | Configuration | |
Configure the "Turn off tabbed browsing" setting to organizational standards. CC ID 10567 | System hardening through configuration management | Configuration | |
Configure the "Turn off the activation of the quick pick menu" setting to organizational standards. CC ID 10568 | System hardening through configuration management | Configuration | |
Configure the "Turn off the auto-complete feature for web addresses" setting to organizational standards. CC ID 10569 | System hardening through configuration management | Configuration | |
Configure the "Turn off the XDomainRequest Object" setting to organizational standards. CC ID 10570 | System hardening through configuration management | Configuration | |
Configure the "Turn off toolbar upgrade tool" setting to organizational standards. CC ID 10571 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Search AutoComplete" setting to organizational standards. CC ID 10572 | System hardening through configuration management | Configuration | |
Configure the "Turn on automatic detection of the intranet" setting to organizational standards. CC ID 10573 | System hardening through configuration management | Configuration | |
Configure the "Turn on Automatic Signup" setting to organizational standards. CC ID 10574 | System hardening through configuration management | Configuration | |
Configure the "Turn on Caret Browsing support" setting to organizational standards. CC ID 10575 | System hardening through configuration management | Configuration | |
Configure the "Turn on Compatibility Logging" setting to organizational standards. CC ID 10576 | System hardening through configuration management | Configuration | |
Configure the "Turn on Information bar notification for intranet content" setting to organizational standards. CC ID 10577 | System hardening through configuration management | Configuration | |
Configure the "Turn on inline AutoComplete for Web addresses" setting to organizational standards. CC ID 10578 | System hardening through configuration management | Configuration | |
Configure the "Turn on Internet Explorer 7 Standards Mode" setting to organizational standards. CC ID 10579 | System hardening through configuration management | Configuration | |
Configure the "Turn on Internet Explorer Standards Mode for Local Intranet" setting to organizational standards. CC ID 10580 | System hardening through configuration management | Configuration | |
Configure the "Turn on menu bar by default" setting to organizational standards. CC ID 10581 | System hardening through configuration management | Configuration | |
Configure the "Turn on the display of a notification about every script error" setting to organizational standards. CC ID 10582 | System hardening through configuration management | Configuration | |
Configure the "Turn on the hover color option" setting to organizational standards. CC ID 10583 | System hardening through configuration management | Configuration | |
Configure the "Use Automatic Detection for dial-up connections" setting to organizational standards. CC ID 10584 | System hardening through configuration management | Configuration | |
Configure the "Use HTTP 1.1 through proxy connections" setting to organizational standards. CC ID 10585 | System hardening through configuration management | Configuration | |
Configure the "Use HTTP 1.1" setting to organizational standards. CC ID 10586 | System hardening through configuration management | Configuration | |
Configure the "Use large Icons for Command Buttons" setting to organizational standards. CC ID 10587 | System hardening through configuration management | Configuration | |
Configure the "Use Policy Accelerators" setting to organizational standards. CC ID 10588 | System hardening through configuration management | Configuration | |
Configure the "Use Policy List of Internet Explorer 7 sites" setting to organizational standards. CC ID 10589 | System hardening through configuration management | Configuration | |
Configure the "Use UTF-8 for mailto links" setting to organizational standards. CC ID 10590 | System hardening through configuration management | Configuration | |
Configure the "View menu: Disable Full Screen menu option" setting to organizational standards. CC ID 10591 | System hardening through configuration management | Configuration | |
Configure the "View menu: Disable Source menu option" setting to organizational standards. CC ID 10592 | System hardening through configuration management | Configuration | |
Configure the "MSS: (NoDriveTypeAutoRun) Disable Autorun for all drives (recommended)" setting to organizational standards. CC ID 10607 | System hardening through configuration management | Configuration | |
Configure the "AutoRun" setting to organizational standards. CC ID 10608 | System hardening through configuration management | Configuration | |
Implement hardware-based write-protect for system firmware components. CC ID 10659 | System hardening through configuration management | Technical Security | |
Implement procedures to manually disable hardware-based write-protect to change computer firmware. CC ID 10660 | System hardening through configuration management | Technical Security | |
Configure the "Disable binding directly to IPropertySetStorage without intermediate layers." setting to organizational standards. CC ID 10861 | System hardening through configuration management | Configuration | |
Configure the "Disable delete notifications on all volumes" setting to organizational standards. CC ID 10862 | System hardening through configuration management | Configuration | |
Configure the "Disable IE security prompt for Windows Installer scripts" setting to organizational standards. CC ID 10863 | System hardening through configuration management | Configuration | |
Configure the "Disable or enable software Secure Attention Sequence" setting to organizational standards. CC ID 10865 | System hardening through configuration management | Configuration | |
Configure the "Disable text prediction" setting to organizational standards. CC ID 10867 | System hardening through configuration management | Configuration | |
Configure the "Disable Windows Error Reporting" machine setting should be configured correctly. to organizational standards. CC ID 10868 | System hardening through configuration management | Configuration | |
Configure the "Disable Windows Installer" setting to organizational standards. CC ID 10869 | System hardening through configuration management | Configuration | |
Configure the "Display a custom message when installation is prevented by a policy setting" setting to organizational standards. CC ID 10886 | System hardening through configuration management | Configuration | |
Configure the "Enable/Disable PerfTrack" setting to organizational standards. CC ID 10953 | System hardening through configuration management | Configuration | |
Configure the "Enforce disk quota limit" setting to organizational standards. CC ID 10956 | System hardening through configuration management | Configuration | |
Configure the "Limit audio playback quality" setting to organizational standards. CC ID 11006 | System hardening through configuration management | Configuration | |
Configure the "Limit disk space used by offline files" setting to organizational standards. CC ID 11007 | System hardening through configuration management | Configuration | |
Configure the "Limit maximum color depth" setting to organizational standards. CC ID 11008 | System hardening through configuration management | Configuration | |
Configure the "Limit maximum display resolution" setting to organizational standards. CC ID 11009 | System hardening through configuration management | Configuration | |
Configure the "Limit maximum number of monitors" setting to organizational standards. CC ID 11010 | System hardening through configuration management | Configuration | |
Configure the "Limit outstanding packets" setting to organizational standards. CC ID 11012 | System hardening through configuration management | Configuration | |
Configure the "Limit reservable bandwidth" setting to organizational standards. CC ID 11013 | System hardening through configuration management | Configuration | |
Configure the "Limit the age of files in the BITS Peercache" setting to organizational standards. CC ID 11014 | System hardening through configuration management | Configuration | |
Configure the "Limit the BITS Peercache size" setting to organizational standards. CC ID 11015 | System hardening through configuration management | Configuration | |
Configure the "Limit the maximum BITS job download time" setting to organizational standards. CC ID 11016 | System hardening through configuration management | Configuration | |
Configure the "Limit the maximum number of BITS jobs for each user" setting to organizational standards. CC ID 11018 | System hardening through configuration management | Configuration | |
Configure the "Limit the maximum number of BITS jobs for this computer" setting to organizational standards. CC ID 11019 | System hardening through configuration management | Configuration | |
Configure the "Limit the maximum number of ranges that can be added to the file in a BITS job" setting to organizational standards. CC ID 11021 | System hardening through configuration management | Configuration | |
Configure the "Limit the size of the entire roaming user profile cache" setting to organizational standards. CC ID 11022 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Support Diagnostic Tool: Restrict tool download" setting to organizational standards. CC ID 11044 | System hardening through configuration management | Configuration | |
Configure the "Prevent access to 16-bit applications" setting to organizational standards. CC ID 11066 | System hardening through configuration management | Configuration | |
Configure the "Prevent Automatic Updates" setting to organizational standards. CC ID 11067 | System hardening through configuration management | Configuration | |
Configure the "Prevent Back-ESC mapping" setting to organizational standards. CC ID 11068 | System hardening through configuration management | Configuration | |
Configure the "Prevent backing up to local disks" setting to organizational standards. CC ID 11069 | System hardening through configuration management | Configuration | |
Configure the "Prevent backing up to optical media (CD/DVD)" setting to organizational standards. CC ID 11071 | System hardening through configuration management | Configuration | |
Configure the "Prevent display of the user interface for critical errors" setting to organizational standards. CC ID 11074 | System hardening through configuration management | Configuration | |
Configure the "Prevent flicks" setting to organizational standards. CC ID 11075 | System hardening through configuration management | Configuration | |
Configure the "Prevent Flicks Learning Mode" setting to organizational standards. CC ID 11076 | System hardening through configuration management | Configuration | |
Configure the "Prevent Input Panel tab from appearing" setting to organizational standards. CC ID 11077 | System hardening through configuration management | Configuration | |
Configure the "Prevent launch an application" setting to organizational standards. CC ID 11081 | System hardening through configuration management | Configuration | |
Configure the "Prevent license upgrade" setting to organizational standards. CC ID 11082 | System hardening through configuration management | Configuration | |
Configure the "Prevent Media Sharing" setting to organizational standards. CC ID 11083 | System hardening through configuration management | Configuration | |
Configure the "Prevent plaintext PINs from being returned by Credential Manager" setting to organizational standards. CC ID 11084 | System hardening through configuration management | Configuration | |
Configure the "Prevent press and hold" setting to organizational standards. CC ID 11085 | System hardening through configuration management | Configuration | |
Configure the "Prevent Quick Launch Toolbar Shortcut Creation" setting to organizational standards. CC ID 11086 | System hardening through configuration management | Configuration | |
Configure the "Prevent restoring local previous versions" setting to organizational standards. CC ID 11087 | System hardening through configuration management | Configuration | |
Configure the "Prevent restoring previous versions from backups" setting to organizational standards. CC ID 11088 | System hardening through configuration management | Configuration | |
Configure the "Prevent Roaming Profile changes from propagating to the server" setting to organizational standards. CC ID 11090 | System hardening through configuration management | Configuration | |
Configure the "Prevent Video Smoothing" setting to organizational standards. CC ID 11091 | System hardening through configuration management | Configuration | |
Configure the "Prevent Windows Anytime Upgrade from running." setting to organizational standards. CC ID 11092 | System hardening through configuration management | Configuration | |
Configure the "Prohibit Access of the Windows Connect Now wizards" setting to organizational standards. CC ID 11100 | System hardening through configuration management | Configuration | |
Configure the "Prohibit Flyweight Patching" setting to organizational standards. CC ID 11101 | System hardening through configuration management | Configuration | |
Configure the "Prohibit installing or uninstalling color profiles" setting to organizational standards. CC ID 11103 | System hardening through configuration management | Configuration | |
Configure the "Prohibit patching" setting to organizational standards. CC ID 11104 | System hardening through configuration management | Configuration | |
Configure the "Prohibit removal of updates" setting to organizational standards. CC ID 11105 | System hardening through configuration management | Configuration | |
Configure the "Prohibit rollback" setting to organizational standards. CC ID 11106 | System hardening through configuration management | Configuration | |
Configure the "Prohibit Use of Restart Manager" setting to organizational standards. CC ID 11107 | System hardening through configuration management | Configuration | |
Configure the "Restrict Internet communication" setting to organizational standards. CC ID 11140 | System hardening through configuration management | Configuration | |
Configure the "Restrict potentially unsafe HTML Help functions to specified folders" setting to organizational standards. CC ID 11141 | System hardening through configuration management | Configuration | |
Configure the "Restrict system locales" setting to organizational standards. CC ID 11143 | System hardening through configuration management | Configuration | |
Configure the "Restrict these programs from being launched from Help" setting to organizational standards. CC ID 11144 | System hardening through configuration management | Configuration | |
Configure the "Restrict unpacking and installation of gadgets that are not digitally signed." setting to organizational standards. CC ID 11145 | System hardening through configuration management | Configuration | |
Configure the "Restrict user locales" setting to organizational standards. CC ID 11146 | System hardening through configuration management | Configuration | |
Configure the "Terminate session when time limits are reached" setting to organizational standards. CC ID 11241 | System hardening through configuration management | Configuration | |
Configure the "Turn off access to all Windows Update features" setting to organizational standards. CC ID 11254 | System hardening through configuration management | Configuration | |
Configure the "Turn off access to the OEM and Microsoft branding section" setting to organizational standards. CC ID 11255 | System hardening through configuration management | Configuration | |
Configure the "Turn off access to the performance center core section" setting to organizational standards. CC ID 11256 | System hardening through configuration management | Configuration | |
Configure the "Turn off access to the solutions to performance problems section" setting to organizational standards. CC ID 11257 | System hardening through configuration management | Configuration | |
Configure the "Turn off Active Help" setting to organizational standards. CC ID 11258 | System hardening through configuration management | Configuration | |
Configure the "Turn off Application Compatibility Engine" setting to organizational standards. CC ID 11261 | System hardening through configuration management | Configuration | |
Configure the "Turn off Application Telemetry" setting to organizational standards. CC ID 11262 | System hardening through configuration management | Configuration | |
Configure the "Turn off AutoComplete integration with Input Panel" setting to organizational standards. CC ID 11263 | System hardening through configuration management | Configuration | |
Configure the "Turn off automatic learning" setting to organizational standards. CC ID 11264 | System hardening through configuration management | Configuration | |
Configure the "Turn off Automatic Root Certificates Update" setting to organizational standards. CC ID 11265 | System hardening through configuration management | Configuration | |
Configure the "Turn off automatic termination of applications that block or cancel shutdown" setting to organizational standards. CC ID 11266 | System hardening through configuration management | Configuration | |
Configure the "Turn off automatic wake" setting to organizational standards. CC ID 11267 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Boot and Resume Optimizations" setting to organizational standards. CC ID 11269 | System hardening through configuration management | Configuration | |
Configure the "Turn off Configuration" setting to organizational standards. CC ID 11271 | System hardening through configuration management | Configuration | |
Configure the "Turn off creation of System Restore Checkpoints" setting to organizational standards. CC ID 11273 | System hardening through configuration management | Configuration | |
Configure the "Turn off Data Execution Prevention for HTML Help Executible" setting to organizational standards. CC ID 11274 | System hardening through configuration management | Configuration | |
Configure the "Turn off downloading of game information" setting to organizational standards. CC ID 11276 | System hardening through configuration management | Configuration | |
Configure the "Turn off Fair Share CPU Scheduling" setting to organizational standards. CC ID 11277 | System hardening through configuration management | Configuration | |
Configure the "Turn off game updates" setting to organizational standards. CC ID 11279 | System hardening through configuration management | Configuration | |
Configure the "Turn off hardware buttons" setting to organizational standards. CC ID 11280 | System hardening through configuration management | Configuration | |
Configure the "Turn off location scripting" setting to organizational standards. CC ID 11287 | System hardening through configuration management | Configuration | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Global" to organizational standards. CC ID 11290 | System hardening through configuration management | Configuration | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Site Local" to organizational standards. CC ID 11292 | System hardening through configuration management | Configuration | |
Configure the "Turn off Multicast Name Resolution" setting to organizational standards. CC ID 11293 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Non Volatile Cache Feature" setting to organizational standards. CC ID 11294 | System hardening through configuration management | Configuration | |
Configure the "Turn off numerical sorting in Windows Explorer" setting to organizational standards. CC ID 11295 | System hardening through configuration management | Configuration | |
Configure the "Turn off pen feedback" setting to organizational standards. CC ID 11297 | System hardening through configuration management | Configuration | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Global" to organizational standards. CC ID 11298 | System hardening through configuration management | Configuration | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Site Local" to organizational standards. CC ID 11300 | System hardening through configuration management | Configuration | |
Configure the "Turn off Problem Steps Recorder" setting to organizational standards. CC ID 11301 | System hardening through configuration management | Configuration | |
Configure the "Turn off Program Compatibility Assistant" setting to organizational standards. CC ID 11302 | System hardening through configuration management | Configuration | |
Configure the "Turn off Program Inventory" setting to organizational standards. CC ID 11303 | System hardening through configuration management | Configuration | |
Configure the "Turn off Real-Time Monitoring" setting to organizational standards. CC ID 11304 | System hardening through configuration management | Configuration | |
Configure the "Turn off restore functionality" setting to organizational standards. CC ID 11306 | System hardening through configuration management | Configuration | |
Configure the "Turn off Routinely Taking Action" setting to organizational standards. CC ID 11308 | System hardening through configuration management | Configuration | |
Configure the "Turn off sensors" setting to organizational standards. CC ID 11309 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Solid State Mode" setting to organizational standards. CC ID 11310 | System hardening through configuration management | Configuration | |
Configure the "Turn off SwitchBack Compatibility Engine" setting to organizational standards. CC ID 11311 | System hardening through configuration management | Configuration | |
Configure the "Turn off System Restore" setting to organizational standards. CC ID 11312 | System hardening through configuration management | Configuration | |
Configure the "Turn off Tablet PC touch input" setting to organizational standards. CC ID 11313 | System hardening through configuration management | Configuration | |
Configure the "Turn off the ability to back up data files" setting to organizational standards. CC ID 11315 | System hardening through configuration management | Configuration | |
Configure the "Turn off the ability to create a system image" setting to organizational standards. CC ID 11316 | System hardening through configuration management | Configuration | |
Configure the "Turn off the communities features" setting to organizational standards. CC ID 11317 | System hardening through configuration management | Configuration | |
Configure the "Turn off Touch Panning" setting to organizational standards. CC ID 11320 | System hardening through configuration management | Configuration | |
Configure the "Turn off tracking of last play time of games in the Games folder" setting to organizational standards. CC ID 11321 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Customer Experience Improvement Program" setting to organizational standards. CC ID 11323 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Defender" setting to organizational standards. CC ID 11324 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows HotStart" setting to organizational standards. CC ID 11325 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Installer RDS Compatibility" setting to organizational standards. CC ID 11326 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Mobility Center" setting to organizational standards. CC ID 11327 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows presentation settings" setting to organizational standards. CC ID 11329 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows SideShow" setting to organizational standards. CC ID 11330 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Startup Sound" setting to organizational standards. CC ID 11331 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain idle session termination and logout capabilities. CC ID 01418 | System hardening through configuration management | Configuration | |
Refrain from using assertion lifetimes to limit each session. CC ID 13871 | System hardening through configuration management | Technical Security | |
Configure Session Configuration settings in accordance with organizational standards. CC ID 07698 | System hardening through configuration management | Configuration | |
Invalidate unexpected session identifiers. CC ID 15307 | System hardening through configuration management | Configuration | |
Configure the "MaxStartups" settings to organizational standards. CC ID 15329 | System hardening through configuration management | Configuration | |
Reject session identifiers that are not valid. CC ID 15306 | System hardening through configuration management | Configuration | |
Configure the "MaxSessions" settings to organizational standards. CC ID 15330 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Message title for users attempting to log on" to organizational standards. CC ID 07699 | System hardening through configuration management | Configuration | |
Configure the "LoginGraceTime" settings to organizational standards. CC ID 15328 | System hardening through configuration management | Configuration | |
Configure the "Network security: Force logoff when logon hours expire" to organizational standards. CC ID 07738 | System hardening through configuration management | Configuration | |
Configure the "MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)" to organizational standards. CC ID 07758 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network server: Disconnect clients when logon hours expire" to organizational standards. CC ID 07824 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network server: Amount of idle time required before suspending session" to organizational standards. CC ID 07826 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Do not display last user name" to organizational standards. CC ID 07832 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Display user information when the session is locked" to organizational standards. CC ID 07848 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Message text for users attempting to log on" to organizational standards. CC ID 07870 | System hardening through configuration management | Configuration | |
Configure the "Always prompt for password upon connection" to organizational standards. CC ID 08229 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Machine inactivity limit" to organizational standards. CC ID 08350 | System hardening through configuration management | Configuration | |
Install custom applications, only if they are trusted. CC ID 04822 | System hardening through configuration management | Configuration | |
Configure virtual networks in accordance with the information security policy. CC ID 13165 | System hardening through configuration management | Configuration | |
Configure Simple Network Management Protocol (SNMP) to organizational standards. CC ID 12423 | System hardening through configuration management | Configuration | |
Establish access requirements for SNMP community strings. CC ID 16357 | System hardening through configuration management | Technical Security | |
Configure Simple Network Management Protocol to enable authentication and privacy. CC ID 12427 | System hardening through configuration management | Configuration | |
Change the community string for Simple Network Management Protocol, as necessary. CC ID 01872 | System hardening through configuration management | Configuration | |
Configure the system's storage media. CC ID 10618 | System hardening through configuration management | Configuration | |
Configure the system's electronic storage media's encryption settings. CC ID 11927 | System hardening through configuration management | Configuration | |
Prohibit the use of sanitization-resistant media in Information Systems. CC ID 10617 | System hardening through configuration management | Configuration | |
Configure Internet Browser security options according to organizational standards. CC ID 02166 | System hardening through configuration management | Configuration | |
Configure the "Internet Explorer Maintenance Policy Processing - Allow processing across a slow network connection" setting. CC ID 04910 | System hardening through configuration management | Configuration | |
Configure the "Disable Internet Connection wizard" setting. CC ID 02242 | System hardening through configuration management | Configuration | |
Configure the "Disable Automatic Install of Internet Explorer components" setting. CC ID 04337 | System hardening through configuration management | Configuration | |
Configure the "Disable Periodic Check for Internet Explorer software updates" setting. CC ID 04338 | System hardening through configuration management | Configuration | |
Configure the "Do not allow users to enable or disable add-ons" setting in Internet Explorer properly. CC ID 04340 | System hardening through configuration management | Configuration | |
Configure the "Turn off Crash Detection" setting in Internet Explorer properly. CC ID 04345 | System hardening through configuration management | Configuration | |
Configure the "internet explorer processes (mk protocol)" setting. CC ID 04347 | System hardening through configuration management | Configuration | |
Configure the "internet explorer processes (consistent MIME handling)" setting. CC ID 04348 | System hardening through configuration management | Configuration | |
Configure the "internet explorer processes (MIME sniffing)" setting. CC ID 04349 | System hardening through configuration management | Configuration | |
Configure the "Internet Explorer Processes (Restrict ActiveX Install)" setting. CC ID 04352 | System hardening through configuration management | Configuration | |
Configure the "internet explorer processes (restrict file download)" setting. CC ID 04353 | System hardening through configuration management | Configuration | |
Configure the "Deny all add-ons unless specifically allowed in the Add-on List" setting. CC ID 04354 | System hardening through configuration management | Configuration | |
Configure the "Disable Save this program to disk option" setting in limited functionality environments properly. CC ID 04366 | System hardening through configuration management | Configuration | |
Configure the "Disable the Advanced Page" setting in limited functionality environments. CC ID 04367 | System hardening through configuration management | Configuration | |
Configure the "Disable the Security Page" setting in limited functionality environments properly. CC ID 04368 | System hardening through configuration management | Configuration | |
Configure the "Disable adding channels" setting in Internet Explorer properly. CC ID 04369 | System hardening through configuration management | Configuration | |
Configure the "Disable adding schedules for offline pages" setting. CC ID 04370 | System hardening through configuration management | Configuration | |
Configure the "Disable all scheduled offline pages" setting. CC ID 04371 | System hardening through configuration management | Configuration | |
Configure the "Disable channel user interface completely" setting. CC ID 04372 | System hardening through configuration management | Configuration | |
Configure the "Disable downloading of site subscription content" setting. CC ID 04373 | System hardening through configuration management | Configuration | |
Configure the "Disable editing and creating of schedule groups" setting. CC ID 04374 | System hardening through configuration management | Configuration | |
Configure the "Disable editing schedules for offline pages" setting. CC ID 04375 | System hardening through configuration management | Configuration | |
Configure the "Disable offline page hit logging" setting. CC ID 04376 | System hardening through configuration management | Configuration | |
Configure the "Disable removing channels" setting. CC ID 04377 | System hardening through configuration management | Configuration | |
Configure the "Disable removing schedules for offline pages" setting. CC ID 04378 | System hardening through configuration management | Configuration | |
Configure the "Disable 'Configuring History'" setting in specialized security environments properly. CC ID 04405 | System hardening through configuration management | Configuration | |
Configure the "Disable AutoComplete for forms" setting in limited functionality environments properly. CC ID 04406 | System hardening through configuration management | Configuration | |
Configure the "Prevent 'fix settings' functionality" setting in limited functionality environments properly. CC ID 04407 | System hardening through configuration management | Configuration | |
Configure the "Prevent deletion of 'Temporary Internet Files and Cookies'" setting in limited functionality environments properly. CC ID 04408 | System hardening through configuration management | Configuration | |
Configure the "Turn Off 'Delete Browsing History' Functionality" setting in limited functionality environments properly. CC ID 04409 | System hardening through configuration management | Configuration | |
Configure the "Turn off the Security Settings Check feature" setting in limited functionality environments properly. CC ID 04410 | System hardening through configuration management | Configuration | |
Configure the "Prevent ignoring certificate errors" setting in limited functionality environments properly. CC ID 04411 | System hardening through configuration management | Configuration | |
Configure the "allow install on demand (Internet Explorer)" setting in limited functionality environments properly. CC ID 04412 | System hardening through configuration management | Configuration | |
Configure the "Check for server certificate revocation" setting in limited functionality environments properly. CC ID 04413 | System hardening through configuration management | Configuration | |
Configure the "Access data sources across domains" setting. CC ID 04415 | System hardening through configuration management | Configuration | |
Configure the "Allow active scripting" setting in limited functionality environments properly. CC ID 04416 | System hardening through configuration management | Configuration | |
Configure the "Allow binary and script behaviors" setting in limited functionality environments properly. CC ID 04417 | System hardening through configuration management | Configuration | |
Configure the "Allow cut, copy, or paste operations from the clipboard via script" setting. CC ID 04418 | System hardening through configuration management | Configuration | |
Configure the "Allow drag and drop or copy and paste files" setting. CC ID 04419 | System hardening through configuration management | Configuration | |
Configure the "Allow file downloads" setting in limited functionality environments properly. CC ID 04420 | System hardening through configuration management | Configuration | |
Configure the "Allow font downloads" setting in limited functionality environments properly. CC ID 04421 | System hardening through configuration management | Configuration | |
Configure the "Allow installation of desktop items" setting in limited functionality environments properly. CC ID 04422 | System hardening through configuration management | Configuration | |
Configure the "Allow META REFRESH" setting in limited functionality environments properly. CC ID 04423 | System hardening through configuration management | Configuration | |
Configure the "Allow script-initiated windows without size or position constraints" setting in limited functionality environments properly. CC ID 04424 | System hardening through configuration management | Configuration | |
Configure the "Allow status bar updates via script" setting in limited functionality environments properly. CC ID 04425 | System hardening through configuration management | Configuration | |
Configure the "Automatic prompting for file downloads" setting in limited functionality environments properly. CC ID 04426 | System hardening through configuration management | Configuration | |
Configure the "Download signed ActiveX controls" setting in limited functionality environments properly. CC ID 04427 | System hardening through configuration management | Configuration | |
Configure the "Download unsigned ActiveX controls" setting in limited functionality environments properly. CC ID 04428 | System hardening through configuration management | Configuration | |
Configure the "Initialize and script ActiveX controls not marked as safe" setting in limited functionality environments properly. CC ID 04429 | System hardening through configuration management | Configuration | |
Configure the "Java permissions" setting in limited functionality environments properly. CC ID 04430 | System hardening through configuration management | Configuration | |
Configure the "Launching applications and files in an IFRAME" setting in limited functionality environments properly. CC ID 04431 | System hardening through configuration management | Configuration | |
Configure the "Logon Options" setting in limited functionality environments. CC ID 04432 | System hardening through configuration management | Configuration | |
Configure the "Navigate sub-frames across different domains" setting in limited functionality environments properly. CC ID 04433 | System hardening through configuration management | Configuration | |
Configure the "Open file based on content, not on file extension" setting in limited functionality environments properly. CC ID 04434 | System hardening through configuration management | Configuration | |
Configure the "Run.NET Framework-reliant components not signed with Authenticode" setting in limited functionality environments properly. CC ID 04435 | System hardening through configuration management | Configuration | |
Configure the "Run.NET Framework-reliant components signed with Authenticode" setting in limited functionality environments properly. CC ID 04436 | System hardening through configuration management | Configuration | |
Configure the "Run ActiveX controls and plugins" setting in limited functionality environments properly. CC ID 04437 | System hardening through configuration management | Configuration | |
Configure the "Script ActiveX controls marked safe for scripting" setting in limited functionality environments properly. CC ID 04438 | System hardening through configuration management | Configuration | |
Configure the "Scripting of Java applets" setting in limited functionality environments properly. CC ID 04439 | System hardening through configuration management | Configuration | |
Configure the "Software channel permissions" setting in limited functionality environments properly. CC ID 04440 | System hardening through configuration management | Configuration | |
Configure the "Use Pop-up Blocker" setting in limited functionality environments properly. CC ID 04441 | System hardening through configuration management | Configuration | |
Configure the "Web sites in less privileged Web content zones could navigate into this zone" setting in limited functionality environments properly. CC ID 04442 | System hardening through configuration management | Configuration | |
Configure the .NET Framework to prevent unauthorized mobile code from executing. CC ID 04531 | System hardening through configuration management | Configuration | |
Configure the "Turn off changing the URL to be displayed for checking updates to Internet Explorer and Internet Tools" setting. CC ID 04644 | System hardening through configuration management | Configuration | |
Configure the "Prevent performance of first run customize settings" setting. CC ID 04645 | System hardening through configuration management | Configuration | |
Configure the "Allow Scriptlets" setting in limited functionality environments properly. CC ID 02237 | System hardening through configuration management | Configuration | |
Configure the "Disable showing the splash screen" setting. CC ID 02238 | System hardening through configuration management | Configuration | |
Configure the "Add-on List" setting. CC ID 02239 | System hardening through configuration management | Configuration | |
Configure the "Loose XAML" setting in limited functionality environments properly. CC ID 02240 | System hardening through configuration management | Configuration | |
Configure the "Disable the Privacy page" setting. CC ID 02241 | System hardening through configuration management | Configuration | |
Configure the "XPS documents" setting in limited functionality environments properly. CC ID 02243 | System hardening through configuration management | Configuration | |
Configure the "Turn off Managing Phishing filter" setting. CC ID 02244 | System hardening through configuration management | Configuration | |
Configure the "Turn on Protected Mode" setting in limited functionality environments properly. CC ID 02245 | System hardening through configuration management | Configuration | |
Configure the "Userdata persistence" setting in limited functionality environments properly. CC ID 02246 | System hardening through configuration management | Configuration | |
Configure the "Display mixed content" setting in limited functionality environments properly. CC ID 02247 | System hardening through configuration management | Configuration | |
Configure the "Check for signature on download programs" setting. CC ID 02250 | System hardening through configuration management | Configuration | |
Configure the "Turn on the Internet Connection Wizard Auto Detect" setting. CC ID 02252 | System hardening through configuration management | Configuration | |
Configure the "Web Browser Applications" setting for the Restricted Sites Zone properly. CC ID 02254 | System hardening through configuration management | Configuration | |
Configure the "Turn off page transitions" setting. CC ID 02255 | System hardening through configuration management | Configuration | |
Configure the "Turn off configuring the update check interval (in days)" setting. CC ID 02257 | System hardening through configuration management | Configuration | |
Configure the "Web Browser Applications" setting for the Internet Zone properly. CC ID 02259 | System hardening through configuration management | Configuration | |
Configure the "Turn Off First-Run Opt-In" setting in limited functionality environments properly. CC ID 02261 | System hardening through configuration management | Configuration | |
Configure the "Do not allow resetting Internet Explorer settings" setting. CC ID 02262 | System hardening through configuration management | Configuration | |
Configure the "Enable third-party browser extensions" setting. CC ID 02263 | System hardening through configuration management | Configuration | |
Configure the "Disable the reset Web settings feature" setting. CC ID 02264 | System hardening through configuration management | Configuration | |
Configure the "Disable external branding of Internet Explorer" setting. CC ID 02266 | System hardening through configuration management | Configuration | |
Configure the "Enable Native XMLHttp Support" setting. CC ID 02267 | System hardening through configuration management | Configuration | |
Configure the "Site to Zone Assignment List" to organizational standards. CC ID 08650 | System hardening through configuration management | Configuration | |
Configure the "Notification bar" setting to organizational standards. CC ID 10008 | System hardening through configuration management | Configuration | |
Implement only one application or primary function per network component or server. CC ID 00879 | System hardening through configuration management | Systems Design, Build, and Implementation | |
Remove all unnecessary functionality. CC ID 00882 | System hardening through configuration management | Configuration | |
Document that all enabled functions support secure configurations. CC ID 11985 | System hardening through configuration management | Establish/Maintain Documentation | |
Find and eradicate unauthorized world writable files. CC ID 01541 | System hardening through configuration management | Configuration | |
Strip dangerous/unneeded SUID/SGID system executables. CC ID 01542 | System hardening through configuration management | Configuration | |
Find and eradicate unauthorized SUID/SGID system executables. CC ID 01543 | System hardening through configuration management | Configuration | |
Find and eradicate unowned files and unowned directories. CC ID 01544 | System hardening through configuration management | Configuration | |
Disable logon prompts on serial ports. CC ID 01553 | System hardening through configuration management | Configuration | |
Disable "nobody" access for Secure RPC. CC ID 01554 | System hardening through configuration management | Configuration | |
Disable all unnecessary interfaces. CC ID 04826 | System hardening through configuration management | Configuration | |
Enable or disable all unused USB ports as appropriate. CC ID 06042 | System hardening through configuration management | Configuration | |
Disable all user-mounted removable file systems. CC ID 01536 | System hardening through configuration management | Configuration | |
Set the Bluetooth Security Mode to the organizational standard. CC ID 00587 | System hardening through configuration management | Configuration | |
Secure the Bluetooth headset connections. CC ID 00593 | System hardening through configuration management | Configuration | |
Disable automatic dial-in access to computers that have installed modems. CC ID 02036 | System hardening through configuration management | Configuration | |
Configure the "Turn off AutoPlay" setting. CC ID 01787 | System hardening through configuration management | Configuration | |
Configure the "Devices: Restrict floppy access to locally logged on users only" setting. CC ID 01732 | System hardening through configuration management | Configuration | |
Configure the "Devices: Restrict CD-ROM access to locally logged on users" setting. CC ID 01731 | System hardening through configuration management | Configuration | |
Configure the "Remove CD Burning features" setting. CC ID 04379 | System hardening through configuration management | Configuration | |
Disable Autorun. CC ID 01790 | System hardening through configuration management | Configuration | |
Disable USB devices (aka hotplugger). CC ID 01545 | System hardening through configuration management | Configuration | |
Enable or disable all unused auxiliary ports as appropriate. CC ID 06414 | System hardening through configuration management | Configuration | |
Remove rhosts support unless absolutely necessary. CC ID 01555 | System hardening through configuration management | Configuration | |
Remove weak authentication services from Pluggable Authentication Modules. CC ID 01556 | System hardening through configuration management | Configuration | |
Remove the /etc/hosts.equiv file. CC ID 01559 | System hardening through configuration management | Configuration | |
Create the /etc/ftpd/ftpusers file. CC ID 01560 | System hardening through configuration management | Configuration | |
Remove the X Wrapper and enable the X Display Manager. CC ID 01564 | System hardening through configuration management | Configuration | |
Remove empty crontab files and restrict file permissions to the file. CC ID 01571 | System hardening through configuration management | Configuration | |
Remove all compilers and assemblers from the system. CC ID 01594 | System hardening through configuration management | Configuration | |
Disable all unnecessary applications unless otherwise noted in a policy exception. CC ID 04827 | System hardening through configuration management | Configuration | |
Restrict and control the use of privileged utility programs. CC ID 12030 | System hardening through configuration management | Technical Security | |
Disable the storing of movies in cache in Apple's QuickTime. CC ID 04489 | System hardening through configuration management | Configuration | |
Install and enable file sharing utilities, as necessary. CC ID 02174 | System hardening through configuration management | Configuration | |
Disable boot services unless boot services are absolutely necessary. CC ID 01481 | System hardening through configuration management | Configuration | |
Disable File Services for Macintosh unless File Services for Macintosh are absolutely necessary. CC ID 04279 | System hardening through configuration management | Configuration | |
Configure the Trivial FTP Daemon service to organizational standards. CC ID 01484 | System hardening through configuration management | Configuration | |
Disable printer daemons or the printer service unless printer daemons or the printer service is absolutely necessary. CC ID 01487 | System hardening through configuration management | Configuration | |
Disable web server unless web server is absolutely necessary. CC ID 01490 | System hardening through configuration management | Configuration | |
Disable portmapper unless portmapper is absolutely necessary. CC ID 01492 | System hardening through configuration management | Configuration | |
Disable writesrv, pmd, and httpdlite unless writesrv, pmd, and httpdlite are absolutely necessary. CC ID 01498 | System hardening through configuration management | Configuration | |
Disable hwscan hardware detection unless hwscan hardware detection is absolutely necessary. CC ID 01504 | System hardening through configuration management | Configuration | |
Configure the “xinetd” service to organizational standards. CC ID 01509 | System hardening through configuration management | Configuration | |
Configure the /etc/xinetd.conf file permissions as appropriate. CC ID 01568 | System hardening through configuration management | Configuration | |
Disable inetd unless inetd is absolutely necessary. CC ID 01508 | System hardening through configuration management | Configuration | |
Disable Network Computing System unless it is absolutely necessary. CC ID 01497 | System hardening through configuration management | Configuration | |
Disable print server for macintosh unless print server for macintosh is absolutely necessary. CC ID 04284 | System hardening through configuration management | Configuration | |
Disable Print Server unless Print Server is absolutely necessary. CC ID 01488 | System hardening through configuration management | Configuration | |
Disable ruser/remote login/remote shell/rcp command, unless it is absolutely necessary. CC ID 01480 | System hardening through configuration management | Configuration | |
Disable xfsmd unless xfsmd is absolutely necessary. CC ID 02179 | System hardening through configuration management | Configuration | |
Disable RPC-based services unless RPC-based services are absolutely necessary. CC ID 01455 | System hardening through configuration management | Configuration | |
Disable netfs script unless netfs script is absolutely necessary. CC ID 01495 | System hardening through configuration management | Configuration | |
Disable Remote Procedure Calls unless Remote Procedure Calls are absolutely necessary and if enabled, set restrictions. CC ID 01456 | System hardening through configuration management | Configuration | |
Configure the "RPC Endpoint Mapper Client Authentication" setting. CC ID 04327 | System hardening through configuration management | Configuration | |
Disable ncpfs Script unless ncpfs Script is absolutely necessary. CC ID 01494 | System hardening through configuration management | Configuration | |
Disable sendmail server unless sendmail server is absolutely necessary. CC ID 01511 | System hardening through configuration management | Configuration | |
Disable postfix unless postfix is absolutely necessary. CC ID 01512 | System hardening through configuration management | Configuration | |
Disable directory server unless directory server is absolutely necessary. CC ID 01464 | System hardening through configuration management | Configuration | |
Disable Windows-compatibility client processes unless Windows-compatibility client processes are absolutely necessary. CC ID 01471 | System hardening through configuration management | Configuration | |
Disable Windows-compatibility servers unless Windows-compatibility servers are absolutely necessary. CC ID 01470 | System hardening through configuration management | Configuration | |
Configure the “Network File System” server to organizational standards CC ID 01472 | System hardening through configuration management | Configuration | |
Configure NFS to respond or not as appropriate to NFS client requests that do not include a User ID. CC ID 05981 | System hardening through configuration management | Configuration | |
Configure NFS with appropriate authentication methods. CC ID 05982 | System hardening through configuration management | Configuration | |
Configure the "AUTH_DES authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08971 | System hardening through configuration management | Configuration | |
Configure the "AUTH_KERB authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08972 | System hardening through configuration management | Configuration | |
Configure the "AUTH_NONE authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08973 | System hardening through configuration management | Configuration | |
Configure the "AUTH_UNIX authentication mechanism" for "NFS server" setting to organizational standards. CC ID 08974 | System hardening through configuration management | Configuration | |
Disable webmin processes unless the webmin process is absolutely necessary. CC ID 01501 | System hardening through configuration management | Configuration | |
Disable automount daemon unless automount daemon is absolutely necessary. CC ID 01476 | System hardening through configuration management | Configuration | |
Disable CDE-related daemons unless CDE-related daemons are absolutely necessary. CC ID 01474 | System hardening through configuration management | Configuration | |
Disable finger unless finger is absolutely necessary. CC ID 01505 | System hardening through configuration management | Configuration | |
Disable Rexec unless Rexec is absolutely necessary. CC ID 02164 | System hardening through configuration management | Configuration | |
Disable Squid cache server unless Squid cache server is absolutely necessary. CC ID 01502 | System hardening through configuration management | Configuration | |
Disable Kudzu hardware detection unless Kudzu hardware detection is absolutely necessary. CC ID 01503 | System hardening through configuration management | Configuration | |
Install and enable public Instant Messaging clients as necessary. CC ID 02173 | System hardening through configuration management | Configuration | |
Disable x font server unless x font server is absolutely necessary. CC ID 01499 | System hardening through configuration management | Configuration | |
Validate, approve, and document all UNIX shells prior to use. CC ID 02161 | System hardening through configuration management | Establish/Maintain Documentation | |
Disable NFS client processes unless NFS client processes are absolutely necessary. CC ID 01475 | System hardening through configuration management | Configuration | |
Disable the use of removable storage media for systems that process restricted data or restricted information, as necessary. CC ID 06681 | System hardening through configuration management | Data and Information Management | |
Disable removable storage media daemon unless the removable storage media daemon is absolutely necessary. CC ID 01477 | System hardening through configuration management | Configuration | |
Disable GSS daemon unless GSS daemon is absolutely necessary. CC ID 01465 | System hardening through configuration management | Configuration | |
Disable Computer Browser unless Computer Browser is absolutely necessary. CC ID 01814 | System hardening through configuration management | Configuration | |
Configure the Computer Browser ResetBrowser Frames as appropriate. CC ID 05984 | System hardening through configuration management | Configuration | |
Configure the /etc/samba/smb.conf file file permissions as appropriate. CC ID 05989 | System hardening through configuration management | Configuration | |
Disable NetMeeting remote desktop sharing unless NetMeeting remote desktop sharing is absolutely necessary. CC ID 01821 | System hardening through configuration management | Configuration | |
Disable web directory browsing on all web-enabled devices. CC ID 01874 | System hardening through configuration management | Configuration | |
Disable WWW publishing services unless WWW publishing services are absolutely necessary. CC ID 01833 | System hardening through configuration management | Configuration | |
Install and enable samba, as necessary. CC ID 02175 | System hardening through configuration management | Configuration | |
Configure the samba hosts allow option with an appropriate set of networks. CC ID 05985 | System hardening through configuration management | Configuration | |
Configure the samba security option option as appropriate. CC ID 05986 | System hardening through configuration management | Configuration | |
Configure the samba encrypt passwords option as appropriate. CC ID 05987 | System hardening through configuration management | Configuration | |
Configure the Samba 'smb passwd file' option with an appropriate password file or no password file. CC ID 05988 | System hardening through configuration management | Configuration | |
Disable Usenet Internet news package file capabilities unless Usenet Internet news package file capabilities are absolutely necessary. CC ID 02176 | System hardening through configuration management | Configuration | |
Disable iPlanet Web Server unless iPlanet Web Server is absolutely necessary. CC ID 02172 | System hardening through configuration management | Configuration | |
Disable volume manager unless volume manager is absolutely necessary. CC ID 01469 | System hardening through configuration management | Configuration | |
Disable Solaris Management Console unless Solaris Management Console is absolutely necessary. CC ID 01468 | System hardening through configuration management | Configuration | |
Disable the Graphical User Interface unless it is absolutely necessary. CC ID 01466 | System hardening through configuration management | Configuration | |
Disable help and support unless help and support is absolutely necessary. CC ID 04280 | System hardening through configuration management | Configuration | |
Disable speech recognition unless speech recognition is absolutely necessary. CC ID 04491 | System hardening through configuration management | Configuration | |
Disable or secure the NetWare QuickFinder search engine. CC ID 04453 | System hardening through configuration management | Configuration | |
Disable messenger unless messenger is absolutely necessary. CC ID 01819 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Windows Messenger to be run" setting. CC ID 04516 | System hardening through configuration management | Configuration | |
Configure the "Do not automatically start Windows Messenger initially" setting. CC ID 04517 | System hardening through configuration management | Configuration | |
Configure the "Turn off the Windows Messenger Customer Experience Improvement Program" setting. CC ID 04330 | System hardening through configuration management | Configuration | |
Disable automatic updates unless automatic updates are absolutely necessary. CC ID 01811 | System hardening through configuration management | Configuration | |
Configure automatic update installation and shutdown/restart options and shutdown/restart procedures to organizational standards. CC ID 05979 | System hardening through configuration management | Configuration | |
Disable Name Service Cache Daemon unless Name Service Cache Daemon is absolutely necessary. CC ID 04846 | System hardening through configuration management | Configuration | |
Prohibit R-command files from existing for root or administrator. CC ID 16322 | System hardening through configuration management | Configuration | |
Verify the /bin/rsh file exists or not, as appropriate. CC ID 05101 | System hardening through configuration management | Configuration | |
Verify the /sbin/rsh file exists or not, as appropriate. CC ID 05102 | System hardening through configuration management | Configuration | |
Verify the /usr/bin/rsh file exists or not, as appropriate. CC ID 05103 | System hardening through configuration management | Configuration | |
Verify the /etc/ftpusers file exists or not, as appropriate. CC ID 05104 | System hardening through configuration management | Configuration | |
Verify the /etc/rsh file exists or not, as appropriate. CC ID 05105 | System hardening through configuration management | Configuration | |
Install or uninstall the AIDE package, as appropriate. CC ID 05106 | System hardening through configuration management | Configuration | |
Enable the GNOME automounter (gnome-volume-manager) as necessary. CC ID 05107 | System hardening through configuration management | Configuration | |
Install or uninstall the setroubleshoot package, as appropriate. CC ID 05108 | System hardening through configuration management | Configuration | |
Configure Avahi properly. CC ID 05109 | System hardening through configuration management | Configuration | |
Install or uninstall OpenNTPD, as appropriate. CC ID 05110 | System hardening through configuration management | Configuration | |
Configure the "httpd" service to organizational standards. CC ID 05111 | System hardening through configuration management | Configuration | |
Install or uninstall the net-smtp package properly. CC ID 05112 | System hardening through configuration management | Configuration | |
Configure the apache web service properly. CC ID 05113 | System hardening through configuration management | Configuration | |
Configure the vlock package properly. CC ID 05114 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain service accounts. CC ID 13861 | System hardening through configuration management | Technical Security | |
Manage access credentials for service accounts. CC ID 13862 | System hardening through configuration management | Technical Security | |
Configure the daemon account properly. CC ID 05115 | System hardening through configuration management | Configuration | |
Configure the bin account properly. CC ID 05116 | System hardening through configuration management | Configuration | |
Configure the nuucp account properly. CC ID 05117 | System hardening through configuration management | Configuration | |
Configure the smmsp account properly. CC ID 05118 | System hardening through configuration management | Configuration | |
Configure the listen account properly. CC ID 05119 | System hardening through configuration management | Configuration | |
Configure the gdm account properly. CC ID 05120 | System hardening through configuration management | Configuration | |
Configure the webservd account properly. CC ID 05121 | System hardening through configuration management | Configuration | |
Configure the nobody account properly. CC ID 05122 | System hardening through configuration management | Configuration | |
Configure the noaccess account properly. CC ID 05123 | System hardening through configuration management | Configuration | |
Configure the nobody4 account properly. CC ID 05124 | System hardening through configuration management | Configuration | |
Configure the sys account properly. CC ID 05125 | System hardening through configuration management | Configuration | |
Configure the adm account properly. CC ID 05126 | System hardening through configuration management | Configuration | |
Configure the lp account properly. CC ID 05127 | System hardening through configuration management | Configuration | |
Configure the uucp account properly. CC ID 05128 | System hardening through configuration management | Configuration | |
Install or uninstall the tftp-server package, as appropriate. CC ID 05130 | System hardening through configuration management | Configuration | |
Enable the web console as necessary. CC ID 05131 | System hardening through configuration management | Configuration | |
Enable rlogin auth by Pluggable Authentication Modules or pam.d properly. CC ID 05132 | System hardening through configuration management | Configuration | |
Enable rsh auth by Pluggable Authentication Modules properly. CC ID 05133 | System hardening through configuration management | Configuration | |
Enable the listening sendmail daemon, as appropriate. CC ID 05134 | System hardening through configuration management | Configuration | |
Configure Squid properly. CC ID 05135 | System hardening through configuration management | Configuration | |
Configure the "global Package signature checking" setting to organizational standards. CC ID 08735 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Package signature checking" setting for "all configured repositories" to organizational standards. CC ID 08736 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "verify against the package database" setting for "all installed software packages" to organizational standards. CC ID 08737 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "isdn4k-utils" package to organizational standards. CC ID 08738 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "postfix" package to organizational standards. CC ID 08739 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "vsftpd" package to organizational standards. CC ID 08740 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "net-snmpd" package to organizational standards. CC ID 08741 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "rsyslog" package to organizational standards. CC ID 08742 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "ipsec-tools" package to organizational standards. CC ID 08743 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "pam_ccreds" package to organizational standards. CC ID 08744 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "talk-server" package to organizational standards. CC ID 08745 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "talk" package to organizational standards. CC ID 08746 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "irda-utils" package to organizational standards. CC ID 08747 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "/etc/shells" file to organizational standards. CC ID 08978 | System hardening through configuration management | Configuration | |
Configure the LDAP package to organizational standards. CC ID 09937 | System hardening through configuration management | Configuration | |
Configure the "FTP server" package to organizational standards. CC ID 09938 | System hardening through configuration management | Configuration | |
Configure the "HTTP Proxy Server" package to organizational standards. CC ID 09939 | System hardening through configuration management | Configuration | |
Configure the "prelink" package to organizational standards. CC ID 11379 | System hardening through configuration management | Configuration | |
Configure the Network Information Service (NIS) package to organizational standards. CC ID 11380 | System hardening through configuration management | Configuration | |
Configure the "time" setting to organizational standards. CC ID 11381 | System hardening through configuration management | Configuration | |
Configure the "biosdevname" package to organizational standards. CC ID 11383 | System hardening through configuration management | Configuration | |
Configure the "ufw" setting to organizational standards. CC ID 11384 | System hardening through configuration management | Configuration | |
Configure the "Devices: Allow undock without having to log on" setting. CC ID 01728 | System hardening through configuration management | Configuration | |
Limit the user roles that are allowed to format and eject removable storage media. CC ID 01729 | System hardening through configuration management | Configuration | |
Prevent users from installing printer drivers. CC ID 01730 | System hardening through configuration management | Configuration | |
Minimize the inetd.conf file and set the file to the appropriate permissions. CC ID 01506 | System hardening through configuration management | Configuration | |
Configure the unsigned driver installation behavior. CC ID 01733 | System hardening through configuration management | Configuration | |
Configure the unsigned non-driver installation behavior. CC ID 02038 | System hardening through configuration management | Configuration | |
Remove all demonstration applications on the system. CC ID 01875 | System hardening through configuration management | Configuration | |
Configure the system to disallow optional Subsystems. CC ID 04265 | System hardening through configuration management | Configuration | |
Configure the "Remove Security tab" setting. CC ID 04380 | System hardening through configuration management | Configuration | |
Disable all unnecessary services unless otherwise noted in a policy exception. CC ID 00880 | System hardening through configuration management | Configuration | |
Disable rquotad unless rquotad is absolutely necessary. CC ID 01473 | System hardening through configuration management | Configuration | |
Configure the rquotad service to use a static port or a dynamic portmapper port as appropriate. CC ID 05983 | System hardening through configuration management | Configuration | |
Disable telnet unless telnet use is absolutely necessary. CC ID 01478 | System hardening through configuration management | Configuration | |
Disable File Transfer Protocol unless File Transfer Protocol use is absolutely necessary. CC ID 01479 | System hardening through configuration management | Configuration | |
Configure anonymous FTP to restrict the use of restricted data. CC ID 16314 | System hardening through configuration management | Configuration | |
Disable anonymous access to File Transfer Protocol. CC ID 06739 | System hardening through configuration management | Configuration | |
Disable Internet Message Access Protocol unless Internet Message Access Protocol use is absolutely necessary. CC ID 01485 | System hardening through configuration management | Configuration | |
Disable Post Office Protocol unless its use is absolutely necessary. CC ID 01486 | System hardening through configuration management | Configuration | |
Disable SQLServer processes unless SQLServer processes use is absolutely necessary. CC ID 01500 | System hardening through configuration management | Configuration | |
Disable alerter unless alerter use is absolutely necessary. CC ID 01810 | System hardening through configuration management | Configuration | |
Disable Background Intelligent Transfer Service unless Background Intelligent Transfer Service use is absolutely necessary. CC ID 01812 | System hardening through configuration management | Configuration | |
Disable ClipBook unless ClipBook use is absolutely necessary. CC ID 01813 | System hardening through configuration management | Configuration | |
Disable Fax Service unless Fax Service use is absolutely necessary. CC ID 01815 | System hardening through configuration management | Configuration | |
Disable IIS admin service unless IIS admin service use is absolutely necessary. CC ID 01817 | System hardening through configuration management | Configuration | |
Disable indexing service unless indexing service use is absolutely necessary. CC ID 01818 | System hardening through configuration management | Configuration | |
Disable net logon unless net logon use is absolutely necessary. CC ID 01820 | System hardening through configuration management | Configuration | |
Disable Remote Desktop Help Session Manager unless Remote Desktop Help Session Manager use is absolutely necessary. CC ID 01822 | System hardening through configuration management | Configuration | |
Disable the "Offer Remote Assistance" setting. CC ID 04325 | System hardening through configuration management | Configuration | |
Disable the "Solicited Remote Assistance" setting. CC ID 04326 | System hardening through configuration management | Configuration | |
Disable Remote Registry Service unless Remote Registry Service use is absolutely necessary. CC ID 01823 | System hardening through configuration management | Configuration | |
Disable Routing and Remote Access unless Routing and Remote Access use is necessary. CC ID 01824 | System hardening through configuration management | Configuration | |
Disable task scheduler unless task scheduler use is absolutely necessary. CC ID 01829 | System hardening through configuration management | Configuration | |
Disable Terminal Services unless Terminal Services use is absolutely necessary. CC ID 01831 | System hardening through configuration management | Configuration | |
Disable Universal Plug and Play device host unless Universal Plug and Play device host use is absolutely necessary. CC ID 01832 | System hardening through configuration management | Configuration | |
Disable File Service Protocol. CC ID 02167 | System hardening through configuration management | Configuration | |
Disable the License Logging Service unless unless it is absolutely necessary. CC ID 04282 | System hardening through configuration management | Configuration | |
Disable Remote Access Auto Connection Manager unless Remote Access Auto Connection Manager use is absolutely necessary. CC ID 04285 | System hardening through configuration management | Configuration | |
Disable Remote Access Connection Manager unless Remote Access Connection Manager use is absolutely necessary. CC ID 04286 | System hardening through configuration management | Configuration | |
Disable Remote Administration Service unless remote administration management is absolutely necessary. CC ID 04287 | System hardening through configuration management | Configuration | |
Disable remote installation unless remote installation is absolutely necessary. CC ID 04288 | System hardening through configuration management | Configuration | |
Disable Remote Server Manager unless Remote Server Manager is absolutely necessary. CC ID 04289 | System hardening through configuration management | Configuration | |
Disable Remote Server Monitor unless Remote Server Monitor use is absolutely necessary. CC ID 04290 | System hardening through configuration management | Configuration | |
Disable Remote Storage Notification unless Remote Storage Notification use is absolutely necessary. CC ID 04291 | System hardening through configuration management | Configuration | |
Disable Remote Storage Server unless Remote Storage Server use is absolutely necessary. CC ID 04292 | System hardening through configuration management | Configuration | |
Disable telephony services unless telephony services use is absolutely necessary. CC ID 04293 | System hardening through configuration management | Configuration | |
Disable Wireless Zero Configuration service unless Wireless Zero Configuration service use is absolutely necessary. CC ID 04294 | System hardening through configuration management | Configuration | |
Disable SSDP/UPnp unless SSDP/UPnP is absolutely necessary. CC ID 04315 | System hardening through configuration management | Configuration | |
Configure the "ntpd service" setting to organizational standards. CC ID 04911 | System hardening through configuration management | Configuration | |
Configure the "echo service" setting to organizational standards. CC ID 04912 | System hardening through configuration management | Configuration | |
Configure the "echo-dgram service" setting to organizational standards. CC ID 09927 | System hardening through configuration management | Configuration | |
Configure the "echo-stream service" setting to organizational standards. CC ID 09928 | System hardening through configuration management | Configuration | |
Configure the "AllowTcpForwarding" to organizational standards. CC ID 15327 | System hardening through configuration management | Configuration | |
Configure the "tcpmux-server" setting to organizational standards. CC ID 09929 | System hardening through configuration management | Configuration | |
Configure the "netstat service" setting to organizational standards. CC ID 04913 | System hardening through configuration management | Configuration | |
Configure the "character generator protocol (chargen)" setting to organizational standards. CC ID 04914 | System hardening through configuration management | Configuration | |
Configure the "tftpd service" setting to organizational standards. CC ID 04915 | System hardening through configuration management | Configuration | |
Configure the "walld service" setting to organizational standards. CC ID 04916 | System hardening through configuration management | Configuration | |
Configure the "rstatd service" setting to organizational standards. CC ID 04917 | System hardening through configuration management | Configuration | |
Configure the "sprayd service" setting to organizational standards. CC ID 04918 | System hardening through configuration management | Configuration | |
Configure the "rusersd service" setting to organizational standards. CC ID 04919 | System hardening through configuration management | Configuration | |
Configure the "inn service" setting to organizational standards. CC ID 04920 | System hardening through configuration management | Configuration | |
Configure the "font service" setting to organizational standards. CC ID 04921 | System hardening through configuration management | Configuration | |
Configure the "ident service" setting to organizational standards. CC ID 04922 | System hardening through configuration management | Configuration | |
Configure the "rexd service" setting to organizational standards. CC ID 04923 | System hardening through configuration management | Configuration | |
Configure the "daytime service" setting to organizational standards. CC ID 04924 | System hardening through configuration management | Configuration | |
Configure the "dtspc (cde-spc) service" setting to organizational standards. CC ID 04925 | System hardening through configuration management | Configuration | |
Configure the "cmsd service" setting to organizational standards. CC ID 04926 | System hardening through configuration management | Configuration | |
Configure the "ToolTalk service" setting to organizational standards. CC ID 04927 | System hardening through configuration management | Configuration | |
Configure the "discard service" setting to organizational standards. CC ID 04928 | System hardening through configuration management | Configuration | |
Configure the "vino-server service" setting to organizational standards. CC ID 04929 | System hardening through configuration management | Configuration | |
Configure the "bind service" setting to organizational standards. CC ID 04930 | System hardening through configuration management | Configuration | |
Configure the "nfsd service" setting to organizational standards. CC ID 04931 | System hardening through configuration management | Configuration | |
Configure the "mountd service" setting to organizational standards. CC ID 04932 | System hardening through configuration management | Configuration | |
Configure the "statd service" setting to organizational standards. CC ID 04933 | System hardening through configuration management | Configuration | |
Configure the "lockd service" setting to organizational standards. CC ID 04934 | System hardening through configuration management | Configuration | |
Configure the lockd service to use a static port or a dynamic portmapper port for User Datagram Protocol as appropriate. CC ID 05980 | System hardening through configuration management | Configuration | |
Configure the "decode sendmail alias" setting to organizational standards. CC ID 04935 | System hardening through configuration management | Configuration | |
Configure the sendmail vrfy command, as appropriate. CC ID 04936 | System hardening through configuration management | Configuration | |
Configure the sendmail expn command, as appropriate. CC ID 04937 | System hardening through configuration management | Configuration | |
Configure .netrc with an appropriate set of services. CC ID 04938 | System hardening through configuration management | Configuration | |
Enable NFS insecure locks as necessary. CC ID 04939 | System hardening through configuration management | Configuration | |
Configure the "X server ac" setting to organizational standards. CC ID 04940 | System hardening through configuration management | Configuration | |
Configure the "X server core" setting to organizational standards. CC ID 04941 | System hardening through configuration management | Configuration | |
Enable or disable the setroubleshoot service, as appropriate. CC ID 05540 | System hardening through configuration management | Configuration | |
Configure the "X server nolock" setting to organizational standards. CC ID 04942 | System hardening through configuration management | Configuration | |
Enable or disable the mcstrans service, as appropriate. CC ID 05541 | System hardening through configuration management | Configuration | |
Configure the "PAM console" setting to organizational standards. CC ID 04943 | System hardening through configuration management | Configuration | |
Enable or disable the restorecond service, as appropriate. CC ID 05542 | System hardening through configuration management | Configuration | |
Enable the rhnsd service as necessary. CC ID 04944 | System hardening through configuration management | Configuration | |
Enable the yum-updatesd service as necessary. CC ID 04945 | System hardening through configuration management | Configuration | |
Enable the autofs service as necessary. CC ID 04946 | System hardening through configuration management | Configuration | |
Enable the ip6tables service as necessary. CC ID 04947 | System hardening through configuration management | Configuration | |
Configure syslog to organizational standards. CC ID 04949 | System hardening through configuration management | Configuration | |
Enable the auditd service as necessary. CC ID 04950 | System hardening through configuration management | Configuration | |
Enable the logwatch service as necessary. CC ID 04951 | System hardening through configuration management | Configuration | |
Enable the logrotate (syslog rotator) service as necessary. CC ID 04952 | System hardening through configuration management | Configuration | |
Install or uninstall the telnet server package, only if absolutely necessary. CC ID 04953 | System hardening through configuration management | Configuration | |
Enable the ypbind service as necessary. CC ID 04954 | System hardening through configuration management | Configuration | |
Enable the ypserv service as necessary. CC ID 04955 | System hardening through configuration management | Configuration | |
Enable the firstboot service as necessary. CC ID 04956 | System hardening through configuration management | Configuration | |
Enable the gpm service as necessary. CC ID 04957 | System hardening through configuration management | Configuration | |
Enable the irqbalance service as necessary. CC ID 04958 | System hardening through configuration management | Configuration | |
Enable the isdn service as necessary. CC ID 04959 | System hardening through configuration management | Configuration | |
Enable the kdump service as necessary. CC ID 04960 | System hardening through configuration management | Configuration | |
Enable the mdmonitor service as necessary. CC ID 04961 | System hardening through configuration management | Configuration | |
Enable the microcode_ctl service as necessary. CC ID 04962 | System hardening through configuration management | Configuration | |
Enable the pcscd service as necessary. CC ID 04963 | System hardening through configuration management | Configuration | |
Enable the smartd service as necessary. CC ID 04964 | System hardening through configuration management | Configuration | |
Enable the readahead_early service as necessary. CC ID 04965 | System hardening through configuration management | Configuration | |
Enable the readahead_later service as necessary. CC ID 04966 | System hardening through configuration management | Configuration | |
Enable the messagebus service as necessary. CC ID 04967 | System hardening through configuration management | Configuration | |
Enable the haldaemon service as necessary. CC ID 04968 | System hardening through configuration management | Configuration | |
Enable the apmd service as necessary. CC ID 04969 | System hardening through configuration management | Configuration | |
Enable the acpid service as necessary. CC ID 04970 | System hardening through configuration management | Configuration | |
Enable the cpuspeed service as necessary. CC ID 04971 | System hardening through configuration management | Configuration | |
Enable the network service as necessary. CC ID 04972 | System hardening through configuration management | Configuration | |
Enable the hidd service as necessary. CC ID 04973 | System hardening through configuration management | Configuration | |
Enable the crond service as necessary. CC ID 04974 | System hardening through configuration management | Configuration | |
Install and enable the anacron service as necessary. CC ID 04975 | System hardening through configuration management | Configuration | |
Enable the xfs service as necessary. CC ID 04976 | System hardening through configuration management | Configuration | |
Install and enable the Avahi daemon service, as necessary. CC ID 04977 | System hardening through configuration management | Configuration | |
Enable the CUPS service, as necessary. CC ID 04978 | System hardening through configuration management | Configuration | |
Enable the hplip service as necessary. CC ID 04979 | System hardening through configuration management | Configuration | |
Enable the dhcpd service as necessary. CC ID 04980 | System hardening through configuration management | Configuration | |
Enable the nfslock service as necessary. CC ID 04981 | System hardening through configuration management | Configuration | |
Enable the rpcgssd service as necessary. CC ID 04982 | System hardening through configuration management | Configuration | |
Enable the rpcidmapd service as necessary. CC ID 04983 | System hardening through configuration management | Configuration | |
Enable the rpcsvcgssd service as necessary. CC ID 04985 | System hardening through configuration management | Configuration | |
Configure root squashing for all NFS shares, as appropriate. CC ID 04986 | System hardening through configuration management | Configuration | |
Configure write access to NFS shares, as appropriate. CC ID 04987 | System hardening through configuration management | Configuration | |
Configure the named service, as appropriate. CC ID 04988 | System hardening through configuration management | Configuration | |
Configure the vsftpd service, as appropriate. CC ID 04989 | System hardening through configuration management | Configuration | |
Configure the “dovecot” service to organizational standards. CC ID 04990 | System hardening through configuration management | Configuration | |
Configure Server Message Block (SMB) to organizational standards. CC ID 04991 | System hardening through configuration management | Configuration | |
Enable the snmpd service as necessary. CC ID 04992 | System hardening through configuration management | Configuration | |
Enable the calendar manager as necessary. CC ID 04993 | System hardening through configuration management | Configuration | |
Enable the GNOME logon service as necessary. CC ID 04994 | System hardening through configuration management | Configuration | |
Enable the WBEM services as necessary. CC ID 04995 | System hardening through configuration management | Configuration | |
Enable the keyserv service as necessary. CC ID 04996 | System hardening through configuration management | Configuration | |
Enable the Generic Security Service daemon as necessary. CC ID 04997 | System hardening through configuration management | Configuration | |
Enable the volfs service as necessary. CC ID 04998 | System hardening through configuration management | Configuration | |
Enable the smserver service as necessary. CC ID 04999 | System hardening through configuration management | Configuration | |
Enable the mpxio-upgrade service as necessary. CC ID 05000 | System hardening through configuration management | Configuration | |
Enable the metainit service as necessary. CC ID 05001 | System hardening through configuration management | Configuration | |
Enable the meta service as necessary. CC ID 05003 | System hardening through configuration management | Configuration | |
Enable the metaed service as necessary. CC ID 05004 | System hardening through configuration management | Configuration | |
Enable the metamh service as necessary. CC ID 05005 | System hardening through configuration management | Configuration | |
Enable the Local RPC Port Mapping Service as necessary. CC ID 05006 | System hardening through configuration management | Configuration | |
Enable the Kerberos kadmind service as necessary. CC ID 05007 | System hardening through configuration management | Configuration | |
Enable the Kerberos krb5kdc service as necessary. CC ID 05008 | System hardening through configuration management | Configuration | |
Enable the Kerberos kpropd service as necessary. CC ID 05009 | System hardening through configuration management | Configuration | |
Enable the Kerberos ktkt_warnd service as necessary. CC ID 05010 | System hardening through configuration management | Configuration | |
Enable the sadmin service as necessary. CC ID 05011 | System hardening through configuration management | Configuration | |
Enable the IPP listener as necessary. CC ID 05012 | System hardening through configuration management | Configuration | |
Enable the serial port listener as necessary. CC ID 05013 | System hardening through configuration management | Configuration | |
Enable the Smart Card Helper service as necessary. CC ID 05014 | System hardening through configuration management | Configuration | |
Enable the Application Management service as necessary. CC ID 05015 | System hardening through configuration management | Configuration | |
Enable the Resultant Set of Policy (RSoP) Provider service as necessary. CC ID 05016 | System hardening through configuration management | Configuration | |
Enable the Network News Transport Protocol service as necessary. CC ID 05017 | System hardening through configuration management | Configuration | |
Enable the network Dynamic Data Exchange service as necessary. CC ID 05018 | System hardening through configuration management | Configuration | |
Enable the Distributed Link Tracking Server service as necessary. CC ID 05019 | System hardening through configuration management | Configuration | |
Enable the RARP service as necessary. CC ID 05020 | System hardening through configuration management | Configuration | |
Configure the ".NET Framework service" setting to organizational standards. CC ID 05021 | System hardening through configuration management | Configuration | |
Enable the Network DDE Share Database Manager service as necessary. CC ID 05022 | System hardening through configuration management | Configuration | |
Enable the Certificate Services service as necessary. CC ID 05023 | System hardening through configuration management | Configuration | |
Configure the ATI hotkey poller service properly. CC ID 05024 | System hardening through configuration management | Configuration | |
Configure the Interix Subsystem Startup service properly. CC ID 05025 | System hardening through configuration management | Configuration | |
Configure the Cluster Service service properly. CC ID 05026 | System hardening through configuration management | Configuration | |
Configure the IAS Jet Database Access service properly. CC ID 05027 | System hardening through configuration management | Configuration | |
Configure the IAS service properly. CC ID 05028 | System hardening through configuration management | Configuration | |
Configure the IP Version 6 Helper service properly. CC ID 05029 | System hardening through configuration management | Configuration | |
Configure "Message Queuing service" to organizational standards. CC ID 05030 | System hardening through configuration management | Configuration | |
Configure the Message Queuing Down Level Clients service properly. CC ID 05031 | System hardening through configuration management | Configuration | |
Configure the Windows Management Instrumentation Driver Extensions service properly. CC ID 05033 | System hardening through configuration management | Configuration | |
Configure the TCP/IP NetBIOS Helper Service properly. CC ID 05034 | System hardening through configuration management | Configuration | |
Configure the Utility Manager service properly. CC ID 05035 | System hardening through configuration management | Configuration | |
Configure the secondary logon service properly. CC ID 05036 | System hardening through configuration management | Configuration | |
Configure the Windows Management Instrumentation service properly. CC ID 05037 | System hardening through configuration management | Configuration | |
Configure the Workstation service properly. CC ID 05038 | System hardening through configuration management | Configuration | |
Configure the Windows Installer service properly. CC ID 05039 | System hardening through configuration management | Configuration | |
Configure the Windows System Resource Manager service properly. CC ID 05040 | System hardening through configuration management | Configuration | |
Configure the WinHTTP Web Proxy Auto-Discovery Service properly. CC ID 05041 | System hardening through configuration management | Configuration | |
Configure the Services for Unix Client for NFS service properly. CC ID 05042 | System hardening through configuration management | Configuration | |
Configure the Services for Unix Server for PCNFS service properly. CC ID 05043 | System hardening through configuration management | Configuration | |
Configure the Services for Unix Perl Socket service properly. CC ID 05044 | System hardening through configuration management | Configuration | |
Configure the Services for Unix User Name Mapping service properly. CC ID 05045 | System hardening through configuration management | Configuration | |
Configure the Services for Unix Windows Cron service properly. CC ID 05046 | System hardening through configuration management | Configuration | |
Configure the Windows Media Services service properly. CC ID 05047 | System hardening through configuration management | Configuration | |
Configure the Services for Netware Service Advertising Protocol (SAP) Agent properly. CC ID 05048 | System hardening through configuration management | Configuration | |
Configure the Web Element Manager service properly. CC ID 05049 | System hardening through configuration management | Configuration | |
Configure the Remote Installation Services Single Instance Storage (SIS) Groveler service properly. CC ID 05050 | System hardening through configuration management | Configuration | |
Configure the Terminal Services Licensing service properly. CC ID 05051 | System hardening through configuration management | Configuration | |
Configure the COM+ Event System service properly. CC ID 05052 | System hardening through configuration management | Configuration | |
Configure the Event Log service properly. CC ID 05053 | System hardening through configuration management | Configuration | |
Configure the Infrared Monitor service properly. CC ID 05054 | System hardening through configuration management | Configuration | |
Configure the Services for Unix Server for NFS service properly. CC ID 05055 | System hardening through configuration management | Configuration | |
Configure the System Event Notification Service properly. CC ID 05056 | System hardening through configuration management | Configuration | |
Configure the NTLM Security Support Provider service properly. CC ID 05057 | System hardening through configuration management | Configuration | |
Configure the Performance Logs and Alerts service properly. CC ID 05058 | System hardening through configuration management | Configuration | |
Configure the Protected Storage service properly. CC ID 05059 | System hardening through configuration management | Configuration | |
Configure the QoS Admission Control (RSVP) service properly. CC ID 05060 | System hardening through configuration management | Configuration | |
Configure the Remote Procedure Call service properly. CC ID 05061 | System hardening through configuration management | Configuration | |
Configure the Removable Storage service properly. CC ID 05062 | System hardening through configuration management | Configuration | |
Configure the Server service properly. CC ID 05063 | System hardening through configuration management | Configuration | |
Configure the Security Accounts Manager service properly. CC ID 05064 | System hardening through configuration management | Configuration | |
Configure the “Network Connections” service to organizational standards. CC ID 05065 | System hardening through configuration management | Configuration | |
Configure the Logical Disk Manager service properly. CC ID 05066 | System hardening through configuration management | Configuration | |
Configure the Logical Disk Manager Administrative Service properly. CC ID 05067 | System hardening through configuration management | Configuration | |
Configure the File Replication service properly. CC ID 05068 | System hardening through configuration management | Configuration | |
Configure the Kerberos Key Distribution Center service properly. CC ID 05069 | System hardening through configuration management | Configuration | |
Configure the Intersite Messaging service properly. CC ID 05070 | System hardening through configuration management | Configuration | |
Configure the Remote Procedure Call locator service properly. CC ID 05071 | System hardening through configuration management | Configuration | |
Configure the Distributed File System service properly. CC ID 05072 | System hardening through configuration management | Configuration | |
Configure the Windows Internet Name Service service properly. CC ID 05073 | System hardening through configuration management | Configuration | |
Configure the FTP Publishing Service properly. CC ID 05074 | System hardening through configuration management | Configuration | |
Configure the Windows Search service properly. CC ID 05075 | System hardening through configuration management | Configuration | |
Configure the Microsoft Peer-to-Peer Networking Services service properly. CC ID 05076 | System hardening through configuration management | Configuration | |
Configure the Remote Shell service properly. CC ID 05077 | System hardening through configuration management | Configuration | |
Configure Simple TCP/IP services to organizational standards. CC ID 05078 | System hardening through configuration management | Configuration | |
Configure the Print Services for Unix service properly. CC ID 05079 | System hardening through configuration management | Configuration | |
Configure the File Shares service to organizational standards. CC ID 05080 | System hardening through configuration management | Configuration | |
Configure the NetMeeting service properly. CC ID 05081 | System hardening through configuration management | Configuration | |
Configure the Application Layer Gateway service properly. CC ID 05082 | System hardening through configuration management | Configuration | |
Configure the Cryptographic Services service properly. CC ID 05083 | System hardening through configuration management | Configuration | |
Configure the Help and Support Service properly. CC ID 05084 | System hardening through configuration management | Configuration | |
Configure the Human Interface Device Access service properly. CC ID 05085 | System hardening through configuration management | Configuration | |
Configure the IMAPI CD-Burning COM service properly. CC ID 05086 | System hardening through configuration management | Configuration | |
Configure the MS Software Shadow Copy Provider service properly. CC ID 05087 | System hardening through configuration management | Configuration | |
Configure the Network Location Awareness service properly. CC ID 05088 | System hardening through configuration management | Configuration | |
Configure the Portable Media Serial Number Service service properly. CC ID 05089 | System hardening through configuration management | Configuration | |
Configure the System Restore Service service properly. CC ID 05090 | System hardening through configuration management | Configuration | |
Configure the Themes service properly. CC ID 05091 | System hardening through configuration management | Configuration | |
Configure the Uninterruptible Power Supply service properly. CC ID 05092 | System hardening through configuration management | Configuration | |
Configure the Upload Manager service properly. CC ID 05093 | System hardening through configuration management | Configuration | |
Configure the Volume Shadow Copy Service properly. CC ID 05094 | System hardening through configuration management | Configuration | |
Configure the WebClient service properly. CC ID 05095 | System hardening through configuration management | Configuration | |
Configure the Windows Audio service properly. CC ID 05096 | System hardening through configuration management | Configuration | |
Configure the Windows Image Acquisition service properly. CC ID 05097 | System hardening through configuration management | Configuration | |
Configure the WMI Performance Adapter service properly. CC ID 05098 | System hardening through configuration management | Configuration | |
Enable file uploads via vsftpd service, as appropriate. CC ID 05100 | System hardening through configuration management | Configuration | |
Disable or remove sadmind unless use of sadmind is absolutely necessary. CC ID 06885 | System hardening through configuration management | Configuration | |
Configure the "SNMP version 1" setting to organizational standards. CC ID 08976 | System hardening through configuration management | Configuration | |
Configure the "xdmcp service" setting to organizational standards. CC ID 08985 | System hardening through configuration management | Configuration | |
Disable the automatic display of remote images in HTML-formatted e-mail. CC ID 04494 | System hardening through configuration management | Configuration | |
Disable Remote Apply Events unless Remote Apply Events are absolutely necessary. CC ID 04495 | System hardening through configuration management | Configuration | |
Disable Xgrid unless Xgrid is absolutely necessary. CC ID 04496 | System hardening through configuration management | Configuration | |
Configure the "Do Not Show First Use Dialog Boxes" setting for Windows Media Player properly. CC ID 05136 | System hardening through configuration management | Configuration | |
Disable Core dumps unless absolutely necessary. CC ID 01507 | System hardening through configuration management | Configuration | |
Set hard core dump size limits, as appropriate. CC ID 05990 | System hardening through configuration management | Configuration | |
Configure the "Prevent Desktop Shortcut Creation" setting for Windows Media Player properly. CC ID 05137 | System hardening through configuration management | Configuration | |
Set the Squid EUID and Squid GUID to an appropriate user and group. CC ID 05138 | System hardening through configuration management | Configuration | |
Verify groups referenced in /etc/passwd are included in /etc/group, as appropriate. CC ID 05139 | System hardening through configuration management | Configuration | |
Use of the cron.allow file should be enabled or disabled as appropriate. CC ID 06014 | System hardening through configuration management | Configuration | |
Use of the at.allow file should be enabled or disabled as appropriate. CC ID 06015 | System hardening through configuration management | Configuration | |
Enable or disable the Dynamic DNS feature of the DHCP Server as appropriate. CC ID 06039 | System hardening through configuration management | Configuration | |
Enable or disable each user's Screen saver software, as necessary. CC ID 06050 | System hardening through configuration management | Configuration | |
Disable any unnecessary scripting languages, as necessary. CC ID 12137 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain the interactive logon settings. CC ID 01739 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the system to refrain from completing authentication methods when a security breach is detected. CC ID 13790 | System hardening through configuration management | Configuration | |
Allow logon to privileged accounts, as appropriate. CC ID 05281 | System hardening through configuration management | Configuration | |
Verify the logon accounts include an appropriate GECOS identifier, as appropriate. CC ID 05280 | System hardening through configuration management | Configuration | |
Configure the "/etc/shadow" settings to organizational standards. CC ID 15332 | System hardening through configuration management | Configuration | |
Set the default su console properly. CC ID 05279 | System hardening through configuration management | Configuration | |
Set the default logon console properly. CC ID 05278 | System hardening through configuration management | Configuration | |
Enable or disable local user logon to the vsftpd service, as appropriate. CC ID 05277 | System hardening through configuration management | Configuration | |
Enable or disable anonymous root logons, as appropriate. CC ID 05276 | System hardening through configuration management | Configuration | |
Enable or disable interactive logon to non-root system accounts, as necessary. CC ID 05275 | System hardening through configuration management | Configuration | |
Enable or disable logins through the primary console device, as appropriate. CC ID 05274 | System hardening through configuration management | Configuration | |
Enable or disable logins through the named virtual console device, as appropriate. CC ID 05273 | System hardening through configuration management | Configuration | |
Enable or disable logons through the named virtual console interface, as appropriate. CC ID 05272 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Do not display last user name" setting to organizational standards. CC ID 01740 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Do not require CTRL+ALT+DEL" setting. CC ID 01741 | System hardening through configuration management | Configuration | |
Configure the system logon banner. CC ID 01742 | System hardening through configuration management | Configuration | |
Configure the system logon banner message title. CC ID 01743 | System hardening through configuration management | Configuration | |
Configure the "interactive logon: number of previous logons to cache (in case domain controller is not available" setting. CC ID 01744 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Require Domain Controller authentication to unlock workstation" setting. CC ID 01746 | System hardening through configuration management | Configuration | |
Configure the Prompt for password on resume from hibernate / suspend setting. CC ID 04356 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Smart card removal behavior" setting. CC ID 01747 | System hardening through configuration management | Configuration | |
Configure the "Recovery console: Allow automatic administrative logon" setting. CC ID 01776 | System hardening through configuration management | Configuration | |
Configure the "Recovery console: Allow floppy copy and access to all drivers and all folders" setting. CC ID 01777 | System hardening through configuration management | Configuration | |
Configure the system to require an Open Firmware password on system startup. CC ID 04479 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Require removal card" setting. CC ID 06053 | System hardening through configuration management | Configuration | |
Configure the settings of the system registry and the systems objects (for Windows OS only). CC ID 01781 | System hardening through configuration management | Configuration | |
Configure ICMP timestamp request responses properly. CC ID 05150 | System hardening through configuration management | Configuration | |
Configure the Administrators group as the default owner for all new objects. CC ID 01782 | System hardening through configuration management | Configuration | |
Configure the "System objects: Require case-insensitivity for non-Windows systems" setting. CC ID 01783 | System hardening through configuration management | Configuration | |
Configure the "System objects: Strengthen default permissions of internal system objects" setting. CC ID 01784 | System hardening through configuration management | Configuration | |
Configure the system to suppress Dr. Watson Crash dumps. CC ID 01785 | System hardening through configuration management | Configuration | |
Disable automatic execution of the system debugger. CC ID 01786 | System hardening through configuration management | Configuration | |
Disable automatic logon. CC ID 01788 | System hardening through configuration management | Configuration | |
Disable automatic reboots after a Blue Screen of Death. CC ID 01789 | System hardening through configuration management | Configuration | |
Remove administrative shares on workstations. CC ID 01791 | System hardening through configuration management | Configuration | |
Configure the system to protect against Browser Spoofing attacks. CC ID 01792 | System hardening through configuration management | Configuration | |
Configure the system to protect against source-routing spoofing. CC ID 01793 | System hardening through configuration management | Configuration | |
Configure the system to protect the default gateway network setting. CC ID 01794 | System hardening through configuration management | Configuration | |
Configure the TCP/IP Dead Gateway Detection as appropriate. CC ID 06025 | System hardening through configuration management | Configuration | |
Configure the system to ensure ICMP routing via the shortest path first. CC ID 01795 | System hardening through configuration management | Configuration | |
Configure the system to protect against packet fragmentation. CC ID 01796 | System hardening through configuration management | Configuration | |
Configure the keep-alive times. CC ID 01797 | System hardening through configuration management | Configuration | |
Configure the system to protect against malicious Name-Release Attacks. CC ID 01798 | System hardening through configuration management | Configuration | |
Disable Internet Router Discovery Protocol. CC ID 01799 | System hardening through configuration management | Configuration | |
Configure the system to protect against SYN Flood attacks. CC ID 01800 | System hardening through configuration management | Configuration | |
Configure the TCP Maximum half-open sockets. CC ID 01801 | System hardening through configuration management | Configuration | |
Configure the TCP Maximum half-open retired sockets. CC ID 01802 | System hardening through configuration management | Configuration | |
Configure the number of dropped connect requests to a set maximum. CC ID 04272 | System hardening through configuration management | Configuration | |
Enable Internet Protocol Security to protect Kerberos RSVP communication. CC ID 01803 | System hardening through configuration management | Configuration | |
Configure the system to hide workstations from the network browser listing. CC ID 01804 | System hardening through configuration management | Configuration | |
Enable the safe DSS search mode. CC ID 01805 | System hardening through configuration management | Configuration | |
Disable WebDAV basic authentication (sp 2 only). CC ID 01806 | System hardening through configuration management | Configuration | |
Disable basic authentication over a clear channel (sp 2 only). CC ID 01807 | System hardening through configuration management | Configuration | |
Enable the usb block storage device policy (sp 2 only). CC ID 01808 | System hardening through configuration management | Configuration | |
Block the Distributed Transaction Coordinator service and set additional Distributed Transaction Coordinator parameters, if necessary. CC ID 01809 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software\Classes. CC ID 02010 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software. CC ID 02011 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software\Microsoft\NetDDE. CC ID 02012 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software\Microsoft\OS/2 Subsystem for NT. CC ID 02013 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software\Microsoft\Windows NT\CurrentVersion\AsrCommands. CC ID 02014 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib. CC ID 02015 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Group Policy. CC ID 02016 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Installer. CC ID 02017 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\Software\Microsoft\Windows\CurrentVersion\Policies. CC ID 02018 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System. CC ID 02019 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\Clone. CC ID 02020 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\ControlSet001. CC ID 02021 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\ControlSet00x. CC ID 02022 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\CurrentControlSet\Control\SecurePipeServers\WinReg. CC ID 02023 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\CurrentControlSet\Control\WMI\Security. CC ID 02024 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\CurrentControlSet\Enum. CC ID 02025 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\CurrentControlSet\Hardware Profiles. CC ID 02026 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\CurrentControlSet\Services\SNMP\Parameters\PermittedManagers. CC ID 02027 | System hardening through configuration management | Configuration | |
Set the registry permission for HKLM\System\CurrentControlSet\Services\SNMP\Parameters\ValidCommunities. CC ID 02028 | System hardening through configuration management | Configuration | |
Set the registry permission for HKU\.Default. CC ID 02029 | System hardening through configuration management | Configuration | |
Set the registry permission for HKU\.Default\Software\Microsoft\NetDDE. CC ID 02030 | System hardening through configuration management | Configuration | |
Set the registry permission for HKU\.Default\Software\Microsoft\Protected Storage System Provider. CC ID 02031 | System hardening through configuration management | Configuration | |
Set the registry permission for %SystemDrive%. CC ID 02032 | System hardening through configuration management | Configuration | |
Enable auditing for HKLM\Software and set its registry permission. CC ID 02033 | System hardening through configuration management | Configuration | |
Enable auditing for HKLM\System and set its registry permission. CC ID 02034 | System hardening through configuration management | Configuration | |
Configure the system to a set number of unacknowledged data retransmissions. CC ID 04271 | System hardening through configuration management | Configuration | |
Configure the system to remap folder types to Notepad. CC ID 04312 | System hardening through configuration management | Configuration | |
Configure the system to show hidden file types. CC ID 04313 | System hardening through configuration management | Configuration | |
Configure the "Do not process the legacy run list" setting. CC ID 04322 | System hardening through configuration management | Configuration | |
Configure the "Do not process the run once list" setting. CC ID 04323 | System hardening through configuration management | Configuration | |
Configure "Registry policy processing" to organizational standards. CC ID 04324 | System hardening through configuration management | Configuration | |
Configure the "Restrict Terminal Server users to a single remote session" setting to organizational standards. CC ID 04510 | System hardening through configuration management | Configuration | |
Configure the "Do not use temporary folders per session" setting to organizational standards. CC ID 04513 | System hardening through configuration management | Configuration | |
Configure the "Do not delete temp folder upon exit" setting to organizational standards. CC ID 04514 | System hardening through configuration management | Configuration | |
Configure the "Turn off background refresh of Group Policy" setting to organizational standards. CC ID 04520 | System hardening through configuration management | Configuration | |
Configure the "Configure Windows NTP Client" setting. CC ID 04522 | System hardening through configuration management | Configuration | |
Configure the "Disallow installation of printers using kernel-mode drivers" setting to organizational standards. CC ID 04523 | System hardening through configuration management | Configuration | |
Configure the "Prevent codec download" setting to organizational standards. CC ID 04524 | System hardening through configuration management | Configuration | |
Verify the Posix registry key does not exist. CC ID 04525 | System hardening through configuration management | Configuration | |
Configure the Recycle Bin to delete files on assets running Windows Server 2003. CC ID 04526 | System hardening through configuration management | Configuration | |
Configure the system to allow only administrators with permissions to change the security settings of Distributed Component Object Model objects. CC ID 04529 | System hardening through configuration management | Configuration | |
Configure the system to allow Distributed Component Object Model calls to be executed only under the calling user's security context. CC ID 04530 | System hardening through configuration management | Configuration | |
Configure the version string reported by the bind service properly. CC ID 05140 | System hardening through configuration management | Configuration | |
Enable or disable performing source validation by reverse path, as appropriate. CC ID 05141 | System hardening through configuration management | Configuration | |
Verify the environment variable "Os2LibPath" exists, as appropriate. CC ID 05142 | System hardening through configuration management | Configuration | |
Define the path to the Microsoft OS/2 version 1.x library properly. CC ID 05143 | System hardening through configuration management | Configuration | |
Set the "Specify intranet Microsoft update service location" properly. CC ID 05144 | System hardening through configuration management | Configuration | |
Set the path to the debugger used for Just-In-Time debugging properly. CC ID 05145 | System hardening through configuration management | Configuration | |
Set the OS/2 Subsystem location properly. CC ID 05146 | System hardening through configuration management | Configuration | |
Configure extended TCP reserved ports properly. CC ID 05147 | System hardening through configuration management | Configuration | |
Enable or disable ICMPv4 redirects, as appropriate. CC ID 05148 | System hardening through configuration management | Configuration | |
Enable or disable ICMPv6 redirects, as appropriate. CC ID 05149 | System hardening through configuration management | Configuration | |
Configure ICMP timestamp broadcast request responses properly. CC ID 05151 | System hardening through configuration management | Configuration | |
Configure Internet Control Message Protocol echo (ping) request responses properly. CC ID 05152 | System hardening through configuration management | Configuration | |
Configure ICMP netmask request responses properly. CC ID 05153 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_CLASSES_ROOT properly. CC ID 05154 | System hardening through configuration management | Configuration | |
Set the registry key HKLM\System\CurrentControlSet\Control\Session Manager\SubSystems\Os2 properly. CC ID 05155 | System hardening through configuration management | Configuration | |
Set the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AEDebug\Debugger properly. CC ID 05156 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Regfile\Shell\Open\Command properly. CC ID 05157 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography properly. CC ID 05158 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.hlp properly. CC ID 05159 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Classes\helpfile properly. CC ID 05160 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing properly. CC ID 05161 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais properly. CC ID 05162 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell properly. CC ID 05163 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Telephony properly. CC ID 05164 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability properly. CC ID 05165 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell properly. CC ID 05166 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion properly. CC ID 05167 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech properly. CC ID 05168 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC properly. CC ID 05169 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EventSystem properly. CC ID 05170 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates properly. CC ID 05171 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports properly. CC ID 05172 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Driver Signing properly. CC ID 05173 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Policies properly. CC ID 05174 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor properly. CC ID 05175 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ads\Providers\WinNT properly. CC ID 05176 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\NWCOMPAT properly. CC ID 05177 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\NDS properly. CC ID 05178 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ADs\Providers\LDAP\Extensions properly. CC ID 05179 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_USERS\.DEFAULT\Software\Microsoft\SystemCertificates\Root\ProtectedRoots properly. CC ID 05180 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager properly. CC ID 05181 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Help properly. CC ID 05182 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip properly. CC ID 05183 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Non-Driver Signing properly. CC ID 05184 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DeviceManager properly. CC ID 05185 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSrv\Security properly. CC ID 05186 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCP properly. CC ID 05187 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent properly. CC ID 05188 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security properly. CC ID 05189 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WMI\Security properly. CC ID 05190 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Security properly. CC ID 05191 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TapiSrv\Security properly. CC ID 05192 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SCardSvr\Security properly. CC ID 05193 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Samss\Security properly. CC ID 05194 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Security properly. CC ID 05195 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetDDEdsdm\Security properly. CC ID 05196 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility properly. CC ID 05197 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kdc\Security properly. CC ID 05198 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AppMgmt\Security properly. CC ID 05199 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services properly. CC ID 05200 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers properly. CC ID 05201 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network properly. CC ID 05202 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\LSA\Data properly. CC ID 05203 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\GBG properly. CC ID 05204 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Skew1 properly. CC ID 05205 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\JD properly. CC ID 05206 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control properly. CC ID 05207 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\wbem properly. CC ID 05208 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetDDE\Security properly. CC ID 05209 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Font properly. CC ID 05210 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog properly. CC ID 05211 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares properly. CC ID 05212 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Windows 3.1 Migration Status properly. CC ID 05213 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Secure properly. CC ID 05214 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups properly. CC ID 05215 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon properly. CC ID 05216 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones properly. CC ID 05217 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping properly. CC ID 05218 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPS properly. CC ID 05219 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontMapper properly. CC ID 05220 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Compatibility properly. CC ID 05221 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AEDebug properly. CC ID 05222 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx properly. CC ID 05223 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce properly. CC ID 05224 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run properly. CC ID 05225 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows properly. CC ID 05226 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Secure properly. CC ID 05227 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RPC properly. CC ID 05228 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options properly. CC ID 05229 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole properly. CC ID 05230 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ProductOptions properly. CC ID 05231 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout properly. CC ID 05232 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex properly. CC ID 05233 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName properly. CC ID 05234 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy properly. CC ID 05235 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Schedule properly. CC ID 05236 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost properly. CC ID 05237 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SecEdit properly. CC ID 05238 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList properly. CC ID 05239 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\EFS properly. CC ID 05240 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32 properly. CC ID 05241 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Classes properly. CC ID 05242 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion properly. CC ID 05243 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates properly. CC ID 05244 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows properly. CC ID 05245 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole properly. CC ID 05246 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Printers properly. CC ID 05247 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies properly. CC ID 05248 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security\XAKey properly. CC ID 05249 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UPnP Device Host properly. CC ID 05250 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings properly. CC ID 05251 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class properly. CC ID 05252 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Security properly. CC ID 05253 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNSCache properly. CC ID 05254 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ersvc\Security properly. CC ID 05255 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IRENUM\Security properly. CC ID 05256 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netbt properly. CC ID 05257 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess properly. CC ID 05259 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Scarddrv\Security properly. CC ID 05260 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Stisvc\Security properly. CC ID 05261 | System hardening through configuration management | Configuration | |
Set the registry permission for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysmonLog\Log Queries properly. CC ID 05262 | System hardening through configuration management | Configuration | |
Configure the "audit the %SystemDrive% directory" setting to organizational standards. CC ID 10099 | System hardening through configuration management | Configuration | |
Configure the "audit the HKEY_LOCAL_MACHINESOFTWARE registry key" setting to organizational standards. CC ID 10100 | System hardening through configuration management | Configuration | |
Configure the "audit the HKEY_LOCAL_MACHINESYSTEM registry key" setting to organizational standards. CC ID 10101 | System hardening through configuration management | Configuration | |
Configure the "%ProgramFiles%" directory permissions to organizational standards. CC ID 10102 | System hardening through configuration management | Configuration | |
Configure the "%ProgramFiles%Resource Kit" directory permissions to organizational standards. CC ID 10103 | System hardening through configuration management | Configuration | |
Configure the "%ProgramFiles%Resource Pro Kit" directory permissions to organizational standards. CC ID 10104 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%" directory permissions to organizational standards. CC ID 10105 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%AUTOEXEC.BAT" file permissions to organizational standards. CC ID 10106 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%BOOT.INI" file permissions to organizational standards. CC ID 10107 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%CONFIG.SYS" file permissions to organizational standards. CC ID 10108 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%Documents and Settings" file permissions to organizational standards. CC ID 10109 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%Documents and SettingsAdministrator" directory permissions to organizational standards. CC ID 10110 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%Documents and SettingsAll Users" directory permissions to organizational standards. CC ID 10111 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%Documents and SettingsAll UsersDocumentsDrWatson" directory permissions to organizational standards. CC ID 10112 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%Documents and SettingsAll UsersDocumentsDrWatsondrwtsn32.log" file permissions to organizational standards. CC ID 10113 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%Documents and SettingsDefault User" directory permissions to organizational standards. CC ID 10114 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%IO.SYS" file permissions to organizational standards. CC ID 10115 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%MSDOS.SYS" file permissions to organizational standards. CC ID 10116 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%NTBOOTDD.SYS" file permissions to organizational standards. CC ID 10117 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%NTDETECT.COM" file permissions to organizational standards. CC ID 10118 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%NTLDR" file permissions to organizational standards. CC ID 10119 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%Temp" directory permissions to organizational standards. CC ID 10120 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%My Download Files" directory permissions to organizational standards. CC ID 10121 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%System Volume Information" file permissions to organizational standards. CC ID 10122 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%" directory permissions to organizational standards. CC ID 10123 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Driver CacheI386Driver.cab" directory permissions to organizational standards. CC ID 10124 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%$NtServicePackUninstall$" directory permissions to organizational standards. CC ID 10125 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%$NtServicePackUninstall$" directory permissions to organizational standards. CC ID 10126 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%$NtUninstall*" directories permissions to organizational standards. CC ID 10127 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%CSC" directory permissions to organizational standards. CC ID 10128 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Debug" directory permissions to organizational standards. CC ID 10129 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%DebugUserMode" directory permissions to organizational standards. CC ID 10130 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot% egedit.exe" file permissions to organizational standards. CC ID 10131 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%NTDS" directory permissions to organizational standards. CC ID 10132 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Offline Web Pages" directory permissions to organizational standards. CC ID 10133 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Registration" directory permissions to organizational standards. CC ID 10134 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot% epair" directory permissions to organizational standards. CC ID 10135 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%security" directory permissions to organizational standards. CC ID 10136 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%SYSVOL" directory permissions to organizational standards. CC ID 10137 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%SYSVOLdomainPolicies" directory permissions to organizational standards. CC ID 10138 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Temp" directory permissions to organizational standards. CC ID 10139 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32" directory permissions to organizational standards. CC ID 10140 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32arp.exe" directory permissions to organizational standards. CC ID 10141 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32at.exe" file permissions to organizational standards. CC ID 10142 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32CONFIG" file permissions to organizational standards. CC ID 10143 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32CONFIGAppEvent.evt" file permissions to organizational standards. CC ID 10144 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32CONFIG*.evt" file permissions to organizational standards. CC ID 10145 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32dllcache" directory permissions to organizational standards. CC ID 10146 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32DTCLog" directory permissions to organizational standards. CC ID 10147 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32GroupPolicy" directory permissions to organizational standards. CC ID 10148 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32ias" directory permissions to organizational standards. CC ID 10149 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32Ntbackup.exe" file permissions to organizational standards. CC ID 10150 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32NTMSData" directory permissions to organizational standards. CC ID 10151 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32Rcp.exe" file permissions to organizational standards. CC ID 10152 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32Regedt32.exe" file permissions to organizational standards. CC ID 10153 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%system32ReinstallBackups" directory permissions to organizational standards. CC ID 10154 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32Rexec.exe" file permissions to organizational standards. CC ID 10155 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32Rsh.exe" file permissions to organizational standards. CC ID 10156 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32Secedit.exe" file permissions to organizational standards. CC ID 10157 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32Setup" directory permissions to organizational standards. CC ID 10158 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 epl" directory permissions to organizational standards. CC ID 10159 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 eplexport" directory permissions to organizational standards. CC ID 10160 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 eplimport" directory permissions to organizational standards. CC ID 10161 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32spoolPrinters" directory permissions to organizational standards. CC ID 10162 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Tasks" directory permissions to organizational standards. CC ID 10163 | System hardening through configuration management | Configuration | |
Configure the "%ALL%Program FilesMQSeries" directory permissions to organizational standards. CC ID 10164 | System hardening through configuration management | Configuration | |
Configure the "%ALL%Program FilesMQSeriesqmggr" directory permissions to organizational standards. CC ID 10165 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%Documents and SettingsAll UsersApplication DataMicrosoftHTML Help ACL" directory permissions to organizational standards. CC ID 10166 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%WINNTSECURITYDatabaseSECEDIT.SDB ACL" directory permissions to organizational standards. CC ID 10167 | System hardening through configuration management | Configuration | |
Configure the "HKEY_CLASSES_ROOT" registry key permissions to organizational standards. CC ID 10168 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWARE" registry key permissions to organizational standards. CC ID 10169 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasses" registry key permissions to organizational standards. CC ID 10170 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClassesRegfileShellOpenCommand" registry key permissions to organizational standards. CC ID 10171 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftNetDDE" registry key permissions to organizational standards. CC ID 10172 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftOS/2 Subsystem for NT" registry key permissions to organizational standards. CC ID 10173 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAsrCommands" registry key permissions to organizational standards. CC ID 10174 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionPerflib" registry key permissions to organizational standards. CC ID 10175 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionGroup Policy" registry key permissions to organizational standards. CC ID 10176 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInstaller" registry key permissions to organizational standards. CC ID 10177 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPolicies" registry key permissions to organizational standards. CC ID 10178 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEM" registry key permissions to organizational standards. CC ID 10179 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMclone" registry key permissions to organizational standards. CC ID 10180 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset001" registry key permissions to organizational standards. CC ID 10181 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset002" registry key permissions to organizational standards. CC ID 10182 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset003" registry key permissions to organizational standards. CC ID 10183 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset004" registry key permissions to organizational standards. CC ID 10184 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset005" registry key permissions to organizational standards. CC ID 10185 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset006" registry key permissions to organizational standards. CC ID 10186 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset007" registry key permissions to organizational standards. CC ID 10187 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset008" registry key permissions to organizational standards. CC ID 10188 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset009" registry key permissions to organizational standards. CC ID 10189 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMcontrolset010" registry key permissions to organizational standards. CC ID 10190 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurePipeServerswinreg" registry key permissions to organizational standards. CC ID 10191 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlWmiSecurity" registry key permissions to organizational standards. CC ID 10192 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnum" registry key permissions to organizational standards. CC ID 10193 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetHardware Profiles" registry key permissions to organizational standards. CC ID 10194 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSNMPParametersPermittedManagers" registry key permissions to organizational standards. CC ID 10195 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSNMPParametersValidCommunities" registry key permissions to organizational standards. CC ID 10196 | System hardening through configuration management | Configuration | |
Configure the "HKEY_USERS.DEFAULT " registry key permissions to organizational standards. CC ID 10197 | System hardening through configuration management | Configuration | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftNetDDE" registry key permissions to organizational standards. CC ID 10198 | System hardening through configuration management | Configuration | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftProtected Storage System Provider" registry key permissions to organizational standards. CC ID 10199 | System hardening through configuration management | Configuration | |
Configure the "HKEY_CLASSES_ROOT" registry key permissions to organizational standards. CC ID 10200 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 unas.exe" file permissions to organizational standards. CC ID 10222 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAEDebugDebugger" registry key to organizational standards. CC ID 10233 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%perflogs" directory permissions to organizational standards. CC ID 10266 | System hardening through configuration management | Configuration | |
Configure the "%SystemDrive%i386" directory permissions to organizational standards. CC ID 10267 | System hardening through configuration management | Configuration | |
Configure the "%ProgramFiles%Common FilesSpeechEnginesTTS" directory permissions to organizational standards. CC ID 10268 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%\_default.plf" file permissions to organizational standards. CC ID 10269 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%addins" directory permissions to organizational standards. CC ID 10270 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%appPatch" directory permissions to organizational standards. CC ID 10271 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%clock.avi" file permissions to organizational standards. CC ID 10272 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Connection Wizard" directory permissions to organizational standards. CC ID 10273 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Driver Cache" file permissions to organizational standards. CC ID 10274 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%explorer.scf" file permissions to organizational standards. CC ID 10275 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%explorer.exe" file permissions to organizational standards. CC ID 10276 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Help" directory permissions to organizational standards. CC ID 10277 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%infunregmp2.exe" file permissions to organizational standards. CC ID 10278 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Java" directory permissions to organizational standards. CC ID 10279 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%mib.bin" file permissions to organizational standards. CC ID 10280 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%msagent" directory permissions to organizational standards. CC ID 10281 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%msdfmap.ini" file permissions to organizational standards. CC ID 10282 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%mui" directory permissions to organizational standards. CC ID 10283 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%security emplates" directory permissions to organizational standards. CC ID 10284 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%speech" directory permissions to organizational standards. CC ID 10285 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%system.ini" file permissions to organizational standards. CC ID 10286 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%systemsetup.inf" file permissions to organizational standards. CC ID 10287 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%systemstdole.tlb" file permissions to organizational standards. CC ID 10288 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot% wain_32" directory permissions to organizational standards. CC ID 10289 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32cacls.exe" directory permissions to organizational standards. CC ID 10290 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32attrib.exe" directory permissions to organizational standards. CC ID 10291 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32CatRoot" directory permissions to organizational standards. CC ID 10292 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32configsystemprofile" directory permissions to organizational standards. CC ID 10293 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32debug.exe" file permissions to organizational standards. CC ID 10294 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32dhcp" directory permissions to organizational standards. CC ID 10295 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32drivers" directory permissions to organizational standards. CC ID 10296 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32eventtriggers.exe" file permissions to organizational standards. CC ID 10297 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32edlin.exe" file permissions to organizational standards. CC ID 10298 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32eventcreate.exe" file permissions to organizational standards. CC ID 10299 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32Export" directory permissions to organizational standards. CC ID 10300 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32ipconfig.exe" file permissions to organizational standards. CC ID 10301 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32\nslookup.exe" file permissions to organizational standards CC ID 10302 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 etstat.exe" file permissions to organizational standards. CC ID 10303 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 btstat.exe" file permissions to organizational standards. CC ID 10304 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32ftp.exe" file permissions to organizational standards. CC ID 10305 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32LogFiles" directory permissions to organizational standards. CC ID 10306 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32mshta.exe" file permissions to organizational standards. CC ID 10307 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32mui" directory permissions to organizational standards. CC ID 10308 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 et.exe" file permissions to organizational standards. CC ID 10309 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 etsh.exe" file permissions to organizational standards. CC ID 10310 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 et1.exe" file permissions to organizational standards. CC ID 10311 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 eg.exe" file permissions to organizational standards. CC ID 10312 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 egini.exe" file permissions to organizational standards. CC ID 10313 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 egsvr32.exe" file permissions to organizational standards. CC ID 10314 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 oute.exe" file permissions to organizational standards. CC ID 10315 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32sc.exe" file permissions to organizational standards. CC ID 10316 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32ShellExt" directory permissions to organizational standards. CC ID 10317 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32subst.exe" file permissions to organizational standards. CC ID 10318 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32systeminfo.exe" file permissions to organizational standards. CC ID 10319 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 elnet.exe" file permissions to organizational standards. CC ID 10320 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 ftp.exe" file permissions to organizational standards. CC ID 10321 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32wbem" directory permissions to organizational standards. CC ID 10322 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32 lntsvr.exe" file permissions to organizational standards. CC ID 10323 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32wbemmof" directory permissions to organizational standards. CC ID 10324 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32wbem epository" directory permissions to organizational standards. CC ID 10325 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32wbemlogs" directory permissions to organizational standards. CC ID 10326 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptography" registry key permissions to organizational standards. CC ID 10327 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasses.hlp" registry key permissions to organizational standards. CC ID 10328 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREClasseshelpfile" registry key permissions to organizational standards. CC ID 10329 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftTracing" registry key permissions to organizational standards. CC ID 10330 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyCalais" registry key permissions to organizational standards. CC ID 10331 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionShell" registry key permissions to organizational standards. CC ID 10332 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionTelephony" registry key permissions to organizational standards. CC ID 10333 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionReliability" registry key permissions to organizational standards. CC ID 10334 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerUser Shell" registry key permissions to organizational standards. CC ID 10335 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion" registry key permissions to organizational standards. CC ID 10336 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSpeech" registry key permissions to organizational standards. CC ID 10337 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftMSDTC" registry key permissions to organizational standards. CC ID 10338 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftEventSystem" registry key permissions to organizational standards. CC ID 10339 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftEnterpriseCertificates" registry key permissions to organizational standards. CC ID 10340 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionPorts" registry key permissions to organizational standards. CC ID 10341 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftDriver Signing" registry key permissions to organizational standards. CC ID 10342 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREPolicies" registry key permissions to organizational standards. CC ID 10343 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor" registry key permissions to organizational standards. CC ID 10344 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftAdsProvidersWinNT" registry key permissions to organizational standards. CC ID 10345 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersNWCOMPAT" registry key permissions to organizational standards. CC ID 10346 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersNDS" registry key permissions to organizational standards. CC ID 10347 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftADsProvidersLDAPExtensions" registry key permissions to organizational standards. CC ID 10348 | System hardening through configuration management | Configuration | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftSystemCertificatesRootProtectedRoots" registry key permissions to organizational standards. CC ID 10349 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession Manager" registry key permissions to organizational standards. CC ID 10350 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsHelp" registry key permissions to organizational standards. CC ID 10351 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpip" registry key permissions to organizational standards. CC ID 10352 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftNon-Driver Signing" registry key permissions to organizational standards. CC ID 10353 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftDeviceManager" registry key permissions to organizational standards. CC ID 10354 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesClipSrvSecurity" registry key permissions to organizational standards. CC ID 10355 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesDHCP" registry key permissions to organizational standards. CC ID 10356 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlServiceCurrent" registry key permissions to organizational standards. CC ID 10357 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLogSecurity" registry key permissions to organizational standards. CC ID 10358 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWMISecurity" registry key permissions to organizational standards. CC ID 10359 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeSecurity" registry key permissions to organizational standards. CC ID 10360 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTapiSrvSecurity" registry key permissions to organizational standards. CC ID 10361 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSCardSvrSecurity" registry key permissions to organizational standards. CC ID 10362 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSamssSecurity" registry key permissions to organizational standards. CC ID 10363 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesRpcSsSecurity" registry key permissions to organizational standards. CC ID 10364 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNetDDEdsdmSecurity" registry key permissions to organizational standards. CC ID 10365 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAccessibility" registry key permissions to organizational standards. CC ID 10366 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServiceskdcSecurity" registry key permissions to organizational standards. CC ID 10367 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesAppMgmtSecurity" registry key permissions to organizational standards. CC ID 10368 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices" registry key permissions to organizational standards. CC ID 10369 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurePipeServers" registry key permissions to organizational standards. CC ID 10370 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlNetwork" registry key permissions to organizational standards. CC ID 10371 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAData" registry key permissions to organizational standards. CC ID 10372 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAGBG" registry key permissions to organizational standards. CC ID 10373 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSASkew1" registry key permissions to organizational standards. CC ID 10374 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSAJD" registry key permissions to organizational standards. CC ID 10375 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControl" registry key permissions to organizational standards. CC ID 10376 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftwbem" registry key permissions to organizational standards. CC ID 10377 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNetDDESecurity" registry key permissions to organizational standards. CC ID 10378 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionFont" registry key permissions to organizational standards. CC ID 10379 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLog" registry key permissions to organizational standards. CC ID 10380 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerShares" registry key permissions to organizational standards. CC ID 10381 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREWindows 3.1 Migration Status" registry key permissions to organizational standards. CC ID 10382 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWARESecure" registry key permissions to organizational standards. CC ID 10383 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREProgram Groups" registry key permissions to organizational standards. CC ID 10384 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon" registry key permissions to organizational standards. CC ID 10385 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTime Zones" registry key permissions to organizational standards. CC ID 10386 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIniFileMapping" registry key permissions to organizational standards. CC ID 10387 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUPS" registry key permissions to organizational standards. CC ID 10388 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionFontMapper" registry key permissions to organizational standards. CC ID 10389 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionCompatibility" registry key permissions to organizational standards. CC ID 10390 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionAEDebug" registry key permissions to organizational standards. CC ID 10391 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunOnceEx" registry key permissions to organizational standards. CC ID 10392 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunOnce" registry key permissions to organizational standards. CC ID 10393 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun" registry key permissions to organizational standards. CC ID 10394 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows" registry key permissions to organizational standards. CC ID 10395 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecure" registry key permissions to organizational standards. CC ID 10396 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftRPC" registry key permissions to organizational standards. CC ID 10397 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options" registry key permissions to organizational standards. CC ID 10398 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSetupRecoveryConsole" registry key permissions to organizational standards. CC ID 10399 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlProductOptions" registry key permissions to organizational standards. CC ID 10400 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlKeyboard Layout" registry key permissions to organizational standards. CC ID 10401 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlContentIndex" registry key permissions to organizational standards. CC ID 10402 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlComputerName" registry key permissions to organizational standards. CC ID 10403 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionGroup Policy" registry key permissions to organizational standards. CC ID 10404 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSchedule" registry key permissions to organizational standards. CC ID 10405 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSvchost" registry key permissions to organizational standards. CC ID 10406 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSecEdit" registry key permissions to organizational standards. CC ID 10407 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionProfileList" registry key permissions to organizational standards. CC ID 10408 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionEFS" registry key permissions to organizational standards. CC ID 10409 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionDrivers32" registry key permissions to organizational standards. CC ID 10410 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionClasses" registry key permissions to organizational standards. CC ID 10411 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion" registry key permissions to organizational standards. CC ID 10412 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftSystemCertificates" registry key permissions to organizational standards. CC ID 10413 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows" registry key permissions to organizational standards. CC ID 10414 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%Web" directory permissions to organizational standards. CC ID 10415 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle" registry key permissions to organizational standards. CC ID 10416 | System hardening through configuration management | Configuration | |
Configure the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlPrintPrinters" registry key permissions to organizational standards. CC ID 10417 | System hardening through configuration management | Configuration | |
Configure the "HKEY_USERS.DEFAULTSoftwareMicrosoftWindowsCurrentVersionPolicies" registry key permissions to organizational standards. CC ID 10418 | System hardening through configuration management | Configuration | |
Apply the appropriate warning message to systems. CC ID 01596 | System hardening through configuration management | Configuration | |
Create a warning message for standard logon services. CC ID 01597 | System hardening through configuration management | Configuration | |
Create a warning message for graphical logons. CC ID 01598 | System hardening through configuration management | Configuration | |
Create a warning message for terminal session logons. CC ID 06564 | System hardening through configuration management | Configuration | |
Create a warning message for FTP daemon. CC ID 01599 | System hardening through configuration management | Configuration | |
Create a warning message for telnet daemon. CC ID 01600 | System hardening through configuration management | Configuration | |
Create a power on warning message. CC ID 01601 | System hardening through configuration management | Configuration | |
Enable the Kerberos TGT expiration warning, as appropriate. CC ID 05263 | System hardening through configuration management | Configuration | |
Configure the sendmail greeting properly. CC ID 05264 | System hardening through configuration management | Configuration | |
Set the Electrically-Erasable Programmable Read-Only Memory warning message properly. CC ID 05265 | System hardening through configuration management | Configuration | |
Set the warning messages switchpoint distance to an appropriate value. CC ID 05266 | System hardening through configuration management | Configuration | |
Enable logon authentication management techniques. CC ID 00553 | System hardening through configuration management | Configuration | |
Configure the system to log all access attempts to all systems. CC ID 00554 | System hardening through configuration management | Configuration | |
Include the date and time that access was granted in the system record. CC ID 15174 | System hardening through configuration management | Establish/Maintain Documentation | |
Include the access level granted in the system record. CC ID 15173 | System hardening through configuration management | Establish/Maintain Documentation | |
Include when access is withdrawn in the system record. CC ID 15172 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure devices and users to re-authenticate, as necessary. CC ID 10609 | System hardening through configuration management | Configuration | |
Restrict logons by specified source addresses. CC ID 16394 | System hardening through configuration management | Technical Security | |
Configure the "Lockout Enabled" setting to organizational standards. CC ID 09859 | System hardening through configuration management | Configuration | |
Prohibit the use of cached authenticators and credentials after a defined period of time. CC ID 10610 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain authenticators. CC ID 15305 | System hardening through configuration management | Technical Security | |
Establish, implement, and maintain an authenticator standard. CC ID 01702 | System hardening through configuration management | Establish/Maintain Documentation | |
Disallow personal data in authenticators. CC ID 13864 | System hardening through configuration management | Technical Security | |
Establish, implement, and maintain an authenticator management system. CC ID 12031 | System hardening through configuration management | Establish/Maintain Documentation | |
Establish, implement, and maintain a repository of authenticators. CC ID 16372 | System hardening through configuration management | Data and Information Management | |
Establish, implement, and maintain authenticator procedures. CC ID 12002 | System hardening through configuration management | Establish/Maintain Documentation | |
Restrict access to authentication files to authorized personnel, as necessary. CC ID 12127 | System hardening through configuration management | Technical Security | |
Configure authenticators to comply with organizational standards. CC ID 06412 | System hardening through configuration management | Configuration | |
Configure the system to require new users to change their authenticator on first use. CC ID 05268 | System hardening through configuration management | Configuration | |
Configure authenticators so that group authenticators or shared authenticators are prohibited. CC ID 00519 | System hardening through configuration management | Configuration | |
Configure the system to prevent unencrypted authenticator use. CC ID 04457 | System hardening through configuration management | Configuration | |
Disable store passwords using reversible encryption. CC ID 01708 | System hardening through configuration management | Configuration | |
Configure the system to encrypt authenticators. CC ID 06735 | System hardening through configuration management | Configuration | |
Configure the system to mask authenticators. CC ID 02037 | System hardening through configuration management | Configuration | |
Configure the authenticator policy to ban the use of usernames or user identifiers in authenticators. CC ID 05992 | System hardening through configuration management | Configuration | |
Configure the "minimum number of digits required for new passwords" setting to organizational standards. CC ID 08717 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "minimum number of upper case characters required for new passwords" setting to organizational standards. CC ID 08718 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the system to refrain from specifying the type of information used as password hints. CC ID 13783 | System hardening through configuration management | Configuration | |
Configure the "minimum number of lower case characters required for new passwords" setting to organizational standards. CC ID 08719 | System hardening through configuration management | Establish/Maintain Documentation | |
Disable machine account password changes. CC ID 01737 | System hardening through configuration management | Configuration | |
Configure the "minimum number of special characters required for new passwords" setting to organizational standards. CC ID 08720 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "require new passwords to differ from old ones by the appropriate minimum number of characters" setting to organizational standards. CC ID 08722 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "password reuse" setting to organizational standards. CC ID 08724 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Disable Remember Password" setting. CC ID 05270 | System hardening through configuration management | Configuration | |
Configure the "Minimum password age" to organizational standards. CC ID 01703 | System hardening through configuration management | Configuration | |
Configure the LILO/GRUB password. CC ID 01576 | System hardening through configuration management | Configuration | |
Configure the system to use Apple's Keychain Access to store passwords and certificates. CC ID 04481 | System hardening through configuration management | Configuration | |
Change the default password to Apple's Keychain. CC ID 04482 | System hardening through configuration management | Configuration | |
Configure Apple's Keychain items to ask for the Keychain password. CC ID 04483 | System hardening through configuration management | Configuration | |
Configure the Syskey Encryption Key and associated password. CC ID 05978 | System hardening through configuration management | Configuration | |
Configure the "Accounts: Limit local account use of blank passwords to console logon only" setting. CC ID 04505 | System hardening through configuration management | Configuration | |
Configure the "System cryptography: Force strong key protection for user keys stored in the computer" setting. CC ID 04534 | System hardening through configuration management | Configuration | |
Configure interactive logon for accounts that do not have assigned authenticators in accordance with organizational standards. CC ID 05267 | System hardening through configuration management | Configuration | |
Enable or disable remote connections from accounts with empty authenticators, as appropriate. CC ID 05269 | System hardening through configuration management | Configuration | |
Configure the "Send LanMan compatible password" setting. CC ID 05271 | System hardening through configuration management | Configuration | |
Configure the authenticator policy to ban or allow authenticators as words found in dictionaries, as appropriate. CC ID 05993 | System hardening through configuration management | Configuration | |
Set the most number of characters required for the BitLocker Startup PIN correctly. CC ID 06054 | System hardening through configuration management | Configuration | |
Set the default folder for BitLocker recovery passwords correctly. CC ID 06055 | System hardening through configuration management | Configuration | |
Notify affected parties to keep authenticators confidential. CC ID 06787 | System hardening through configuration management | Behavior | |
Discourage affected parties from recording authenticators. CC ID 06788 | System hardening through configuration management | Behavior | |
Configure the "shadow password for all accounts in /etc/passwd" setting to organizational standards. CC ID 08721 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "password hashing algorithm" setting to organizational standards. CC ID 08723 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Disable password strength validation for Peer Grouping" setting to organizational standards. CC ID 10866 | System hardening through configuration management | Configuration | |
Configure the "Set the interval between synchronization retries for Password Synchronization" setting to organizational standards. CC ID 11185 | System hardening through configuration management | Configuration | |
Configure the "Set the number of synchronization retries for servers running Password Synchronization" setting to organizational standards. CC ID 11187 | System hardening through configuration management | Configuration | |
Configure the "Turn off password security in Input Panel" setting to organizational standards. CC ID 11296 | System hardening through configuration management | Configuration | |
Configure the "Turn on the Windows to NIS password synchronization for users that have been migrated to Active Directory" setting to organizational standards. CC ID 11355 | System hardening through configuration management | Configuration | |
Configure the authenticator display screen to organizational standards. CC ID 13794 | System hardening through configuration management | Configuration | |
Configure the authenticator field to disallow memorized secrets found in the memorized secret list. CC ID 13808 | System hardening through configuration management | Configuration | |
Configure the authenticator display screen to display the memorized secret as an option. CC ID 13806 | System hardening through configuration management | Configuration | |
Disseminate and communicate with the end user when a memorized secret entered into an authenticator field matches one found in the memorized secret list. CC ID 13807 | System hardening through configuration management | Communicate | |
Configure the memorized secret verifiers to refrain from allowing anonymous users to access memorized secret hints. CC ID 13823 | System hardening through configuration management | Configuration | |
Configure the system to allow paste functionality for the authenticator field. CC ID 13819 | System hardening through configuration management | Configuration | |
Configure the system to require successful authentication before an authenticator for a user account is changed. CC ID 13821 | System hardening through configuration management | Configuration | |
Protect authenticators or authentication factors from unauthorized modification and disclosure. CC ID 15317 | System hardening through configuration management | Technical Security | |
Obscure authentication information during the login process. CC ID 15316 | System hardening through configuration management | Configuration | |
Change authenticators, as necessary. CC ID 15315 | System hardening through configuration management | Configuration | |
Implement safeguards to protect authenticators from unauthorized access. CC ID 15310 | System hardening through configuration management | Technical Security | |
Change all default authenticators. CC ID 15309 [{default password} {default account} Review whether management has the following: A process to change or disable default user accounts and passwords. App A Objective 6.20.e Management should have an effective process to administer logical security access rights for the network, operating systems, applications, databases, and network devices, which should include the following: - Assigning users and devices the access required to perform required functions. - Updating access rights based on personnel or system changes. - Reviewing users' access rights at an appropriate frequency based on the risk to the application or system. - Designing appropriate acceptable-use policies and requiring users to agree to them. - Controlling privileged access. - Changing or disabling default user accounts and passwords. II.C.15 Logical Security] | System hardening through configuration management | Configuration | |
Configure each system's security alerts to organizational standards. CC ID 12113 | System hardening through configuration management | Technical Security | |
Configure the system to issue a security alert when an administrator account is created. CC ID 12122 | System hardening through configuration management | Configuration | |
Configure the system security parameters to prevent system misuse or information misappropriation. CC ID 00881 | System hardening through configuration management | Configuration | |
Configure Hypertext Transfer Protocol headers in accordance with organizational standards. CC ID 16851 | System hardening through configuration management | Configuration | |
Configure Hypertext Transfer Protocol security headers in accordance with organizational standards. CC ID 16488 | System hardening through configuration management | Configuration | |
Configure "Enable Structured Exception Handling Overwrite Protection (SEHOP)" to organizational standards. CC ID 15385 | System hardening through configuration management | Configuration | |
Configure Microsoft Attack Surface Reduction rules in accordance with organizational standards. CC ID 16478 | System hardening through configuration management | Configuration | |
Configure "Remote host allows delegation of non-exportable credentials" to organizational standards. CC ID 15379 | System hardening through configuration management | Configuration | |
Configure "Configure enhanced anti-spoofing" to organizational standards. CC ID 15376 | System hardening through configuration management | Configuration | |
Configure "Block user from showing account details on sign-in" to organizational standards. CC ID 15374 | System hardening through configuration management | Configuration | |
Configure "Configure Attack Surface Reduction rules" to organizational standards. CC ID 15370 | System hardening through configuration management | Configuration | |
Configure "Turn on e-mail scanning" to organizational standards. CC ID 15361 | System hardening through configuration management | Configuration | |
Configure "Prevent users and apps from accessing dangerous websites" to organizational standards. CC ID 15359 | System hardening through configuration management | Configuration | |
Configure "Enumeration policy for external devices incompatible with Kernel DMA Protection" to organizational standards. CC ID 15352 | System hardening through configuration management | Configuration | |
Configure "Prevent Internet Explorer security prompt for Windows Installer scripts" to organizational standards. CC ID 15351 | System hardening through configuration management | Configuration | |
Store state information from applications and software separately. CC ID 14767 | System hardening through configuration management | Configuration | |
Configure the "aufs storage" to organizational standards. CC ID 14461 | System hardening through configuration management | Configuration | |
Configure the "AppArmor Profile" to organizational standards. CC ID 14496 | System hardening through configuration management | Configuration | |
Configure the "device" argument to organizational standards. CC ID 14536 | System hardening through configuration management | Configuration | |
Configure the "Docker" group ownership to organizational standards. CC ID 14495 | System hardening through configuration management | Configuration | |
Configure the "Docker" user ownership to organizational standards. CC ID 14505 | System hardening through configuration management | Configuration | |
Configure "Allow upload of User Activities" to organizational standards. CC ID 15338 | System hardening through configuration management | Configuration | |
Configure the system to restrict Core dumps to a protected directory. CC ID 01513 | System hardening through configuration management | Configuration | |
Configure the system to enable Stack protection. CC ID 01514 | System hardening through configuration management | Configuration | |
Configure the system to restrict NFS client requests to privileged ports. CC ID 01515 | System hardening through configuration management | Configuration | |
Configure the system to use better TCP Sequence Numbers. CC ID 01516 | System hardening through configuration management | Configuration | |
Configure the system to a default secure level. CC ID 01519 | System hardening through configuration management | Configuration | |
Configure the system to block users from viewing un-owned processes. CC ID 01520 | System hardening through configuration management | Configuration | |
Configure the system to block users from viewing processes in other groups. CC ID 01521 | System hardening through configuration management | Configuration | |
Add the "nosuid" option to /etc/rmmount.conf. CC ID 01532 | System hardening through configuration management | Configuration | |
Configure the system to block non-privileged mountd requests. CC ID 01533 | System hardening through configuration management | Configuration | |
Use host-based or Internet Protocol-based export lists for mountd. CC ID 06887 | System hardening through configuration management | Configuration | |
Add the "nodev" option to the appropriate partitions in /etc/fstab. CC ID 01534 | System hardening through configuration management | Configuration | |
Add the "nosuid" option and "nodev" option for removable storage media in the /etc/fstab file. CC ID 01535 | System hardening through configuration management | Configuration | |
Configure the sticky bit on world-writable directories. CC ID 01540 | System hardening through configuration management | Configuration | |
Verify system files are not world-writable. CC ID 01546 | System hardening through configuration management | Technical Security | |
Verify backup directories containing patches are not accessible. CC ID 01547 | System hardening through configuration management | Technical Security | |
Run hp_checkperms. CC ID 01548 | System hardening through configuration management | Configuration | |
Run fix-modes. CC ID 01549 | System hardening through configuration management | Configuration | |
Convert the system to "Trusted Mode", if possible. CC ID 01550 | System hardening through configuration management | Configuration | |
Configure the sadmind service to a higher Security level. CC ID 01551 | System hardening through configuration management | Configuration | |
Use host-based or Internet Protocol-based export lists for sadmind. CC ID 06886 | System hardening through configuration management | Configuration | |
Configure all.rhosts files to be readable only by their owners. CC ID 01557 | System hardening through configuration management | Configuration | |
Set the symlink /etc/hosts.equiv file to /dev/null. CC ID 01558 | System hardening through configuration management | Configuration | |
Configure the default locking Screen saver timeout to a predetermined time period. CC ID 01570 | System hardening through configuration management | Configuration | |
Configure the Security Center (Domain PCs only). CC ID 01967 | System hardening through configuration management | Configuration | |
Configure the system to immediately protect the computer after the Screen saver is activated by setting the time before the Screen saver grace period expires to a predefined amount. CC ID 04276 | System hardening through configuration management | Configuration | |
Configure the system to require a password before it unlocks the Screen saver software. CC ID 04443 | System hardening through configuration management | Configuration | |
Enable the safe DLL search mode. CC ID 04273 | System hardening through configuration management | Configuration | |
Configure the computer to stop generating 8.3 filename formats. CC ID 04274 | System hardening through configuration management | Configuration | |
Configure the system to use certificate rules for software restriction policies. CC ID 04266 | System hardening through configuration management | Configuration | |
Configure the "Do not allow drive redirection" setting. CC ID 04316 | System hardening through configuration management | Configuration | |
Configure the "Turn off the 'Publish to Web' task for files and folders" setting. CC ID 04328 | System hardening through configuration management | Configuration | |
Configure the "Turn off Internet download for Web publishing and online ordering wizards" setting. CC ID 04329 | System hardening through configuration management | Configuration | |
Configure the "Turn off Search Companion content file updates" setting. CC ID 04331 | System hardening through configuration management | Configuration | |
Configure the "Turn off printing over HTTP" setting. CC ID 04332 | System hardening through configuration management | Configuration | |
Configure the "Turn off downloading of print drivers over HTTP" setting. CC ID 04333 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Update device driver searching" setting. CC ID 04334 | System hardening through configuration management | Configuration | |
Configure the "Display Error Notification" setting to organizational standards. CC ID 04335 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows error reporting" setting to organizational standards. CC ID 04336 | System hardening through configuration management | Configuration | |
Configure the "Disable software update shell notifications on program launch" setting. CC ID 04339 | System hardening through configuration management | Configuration | |
Configure the "Make proxy settings per-machine (rather than per-user)" setting. CC ID 04341 | System hardening through configuration management | Configuration | |
Configure the "Security Zones: Do not allow users to add/delete sites" setting. CC ID 04342 | System hardening through configuration management | Configuration | |
Configure the "Security Zones: Do not allow users to change policies" setting. CC ID 04343 | System hardening through configuration management | Configuration | |
Configure the "Security Zones: Use only machine settings" setting. CC ID 04344 | System hardening through configuration management | Configuration | |
Configure the "Allow software to run or install even if the signature is invalid" setting. CC ID 04346 | System hardening through configuration management | Configuration | |
Configure the "internet explorer processes (scripted window security restrictions)" setting. CC ID 04350 | System hardening through configuration management | Configuration | |
Configure the "internet explorer processes (zone elevation protection)" setting. CC ID 04351 | System hardening through configuration management | Configuration | |
Configure the "Prevent access to registry editing tools" setting. CC ID 04355 | System hardening through configuration management | Configuration | |
Configure the "Do not preserve zone information in file attachments" setting. CC ID 04357 | System hardening through configuration management | Configuration | |
Configure the "Hide mechanisms to remove zone information" setting. CC ID 04358 | System hardening through configuration management | Configuration | |
Configure the "Notify antivirus programs when opening attachments" setting. CC ID 04359 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook Express" setting. CC ID 04360 | System hardening through configuration management | Configuration | |
Configure the "Disable Changing Automatic Configuration settings" setting. CC ID 04361 | System hardening through configuration management | Configuration | |
Configure the "Disable changing certificate settings" setting. CC ID 04362 | System hardening through configuration management | Configuration | |
Configure the "Disable changing connection settings" setting. CC ID 04363 | System hardening through configuration management | Configuration | |
Configure the "Disable changing proxy settings" setting. CC ID 04364 | System hardening through configuration management | Configuration | |
Configure the "Turn on the auto-complete feature for user names and passwords on forms" setting. CC ID 04365 | System hardening through configuration management | Configuration | |
Configure the NetWare bindery contexts. CC ID 04444 | System hardening through configuration management | Configuration | |
Configure the NetWare console's SECURE.NCF settings. CC ID 04445 | System hardening through configuration management | Configuration | |
Configure the CPU Hog Timeout setting. CC ID 04446 | System hardening through configuration management | Configuration | |
Configure the "Check Equivalent to Me" setting. CC ID 04463 | System hardening through configuration management | Configuration | |
Configure the /etc/sshd_config file. CC ID 04475 | System hardening through configuration management | Configuration | |
Configure the .Mac preferences. CC ID 04484 | System hardening through configuration management | Configuration | |
Configure the Fast User Switching setting. CC ID 04485 | System hardening through configuration management | Configuration | |
Configure the Recent Items List (servers, applications, documents) setting. CC ID 04486 | System hardening through configuration management | Configuration | |
Configure Apple's Dock preferences. CC ID 04487 | System hardening through configuration management | Configuration | |
Configure the "ulimit" to organizational standards. CC ID 14499 | System hardening through configuration management | Configuration | |
Configure the Energy Saver preferences. CC ID 04488 | System hardening through configuration management | Configuration | |
Configure the local system search preferences to directories that do not contain restricted data or restricted information. CC ID 04492 | System hardening through configuration management | Configuration | |
Digitally sign and encrypt e-mail, as necessary. CC ID 04493 | System hardening through configuration management | Technical Security | |
Manage temporary files, as necessary. CC ID 04847 | System hardening through configuration management | Technical Security | |
Configure the computer-wide, rather than per-user, use of Microsoft Spynet Reporting for Windows Defender properly. CC ID 05282 | System hardening through configuration management | Configuration | |
Enable or disable the ability of users to perform interactive startups, as appropriate. CC ID 05283 | System hardening through configuration management | Configuration | |
Set the /etc/passwd file's NIS file inclusions properly. CC ID 05284 | System hardening through configuration management | Configuration | |
Configure the "Turn off Help Ratings" setting. CC ID 05285 | System hardening through configuration management | Configuration | |
Configure the "Decoy Admin Account Not Disabled" policy properly. CC ID 05286 | System hardening through configuration management | Configuration | |
Configure the "Additional restrictions for anonymous connections" policy properly. CC ID 05287 | System hardening through configuration management | Configuration | |
Configure the "Anonymous access to the registry" policy properly. CC ID 05288 | System hardening through configuration management | Configuration | |
Configure the File System Checker and Popups setting. CC ID 05289 | System hardening through configuration management | Configuration | |
Configure the System File Checker setting. CC ID 05290 | System hardening through configuration management | Configuration | |
Configure the System File Checker Progress Meter setting. CC ID 05291 | System hardening through configuration management | Configuration | |
Configure the Protect Kernel object attributes properly. CC ID 05292 | System hardening through configuration management | Configuration | |
Configure the "Deleted Cached Copies of Roaming Profiles" policy properly. CC ID 05293 | System hardening through configuration management | Configuration | |
Verify that the X*.hosts file lists all authorized X-clients. CC ID 05294 | System hardening through configuration management | Configuration | |
Verify all files are owned by an existing account and group. CC ID 05295 | System hardening through configuration management | Configuration | |
Verify programs executed through the aliases file are owned by an appropriate user or group. CC ID 05296 | System hardening through configuration management | Configuration | |
Verify programs executed through the aliases file are stored in a directory with an appropriate owner. CC ID 05297 | System hardening through configuration management | Configuration | |
Verify the at directory is owned by an appropriate user or group. CC ID 05298 | System hardening through configuration management | Configuration | |
Verify the at.allow file is owned by an appropriate user or group. CC ID 05299 | System hardening through configuration management | Configuration | |
Verify the at.deny file is owned by an appropriate user or group. CC ID 05300 | System hardening through configuration management | Configuration | |
Verify the crontab directories are owned by an appropriate user or group. CC ID 05302 | System hardening through configuration management | Configuration | |
Verify the cron.allow file is owned by an appropriate user or group. CC ID 05303 | System hardening through configuration management | Configuration | |
Verify the cron.deny file is owned by an appropriate user or group. CC ID 05304 | System hardening through configuration management | Configuration | |
Verify crontab files are owned by an appropriate user or group. CC ID 05305 | System hardening through configuration management | Configuration | |
Verify the /etc/resolv.conf file is owned by an appropriate user or group. CC ID 05306 | System hardening through configuration management | Configuration | |
Verify the /etc/named.boot file is owned by an appropriate user or group. CC ID 05307 | System hardening through configuration management | Configuration | |
Verify the /etc/named.conf file is owned by an appropriate user or group. CC ID 05308 | System hardening through configuration management | Configuration | |
Verify the /var/named/chroot/etc/named.conf file is owned by an appropriate user or group. CC ID 05309 | System hardening through configuration management | Configuration | |
Verify home directories are owned by an appropriate user or group. CC ID 05310 | System hardening through configuration management | Configuration | |
Verify the inetd.conf file is owned by an appropriate user or group. CC ID 05311 | System hardening through configuration management | Configuration | |
Verify /etc/exports are owned by an appropriate user or group. CC ID 05312 | System hardening through configuration management | Configuration | |
Verify exported files and exported directories are owned by an appropriate user or group. CC ID 05313 | System hardening through configuration management | Configuration | |
Restrict the exporting of files and directories, as necessary. CC ID 16315 | System hardening through configuration management | Technical Security | |
Verify the /etc/services file is owned by an appropriate user or group. CC ID 05314 | System hardening through configuration management | Configuration | |
Verify the /etc/notrouter file is owned by an appropriate user or group. CC ID 05315 | System hardening through configuration management | Configuration | |
Verify the /etc/samba/smb.conf file is owned by an appropriate user or group. CC ID 05316 | System hardening through configuration management | Configuration | |
Verify the smbpasswd file and smbpasswd executable are owned by an appropriate user or group. CC ID 05317 | System hardening through configuration management | Configuration | |
Verify the aliases file is owned by an appropriate user or group. CC ID 05318 | System hardening through configuration management | Configuration | |
Verify the log file configured to capture critical sendmail messages is owned by an appropriate user or group. CC ID 05319 | System hardening through configuration management | Log Management | |
Verify Shell files are owned by an appropriate user or group. CC ID 05320 | System hardening through configuration management | Configuration | |
Verify the snmpd.conf file is owned by an appropriate user or group. CC ID 05321 | System hardening through configuration management | Configuration | |
Verify the /etc/syslog.conf file is owned by an appropriate user or group. CC ID 05322 | System hardening through configuration management | Configuration | |
Verify the traceroute executable is owned by an appropriate user or group. CC ID 05323 | System hardening through configuration management | Configuration | |
Verify the /usr/lib/sendmail file is owned by an appropriate user or group. CC ID 05324 | System hardening through configuration management | Technical Security | |
Verify the /etc/passwd file is owned by an appropriate user or group. CC ID 05325 | System hardening through configuration management | Configuration | |
Verify the /etc/shadow file is owned by an appropriate user or group. CC ID 05326 | System hardening through configuration management | Configuration | |
Verify the /etc/security/audit/config file is owned by an appropriate user or group. CC ID 05327 | System hardening through configuration management | Configuration | |
Verify the /etc/securit/audit/events file is owned by an appropriate user or group. CC ID 05328 | System hardening through configuration management | Configuration | |
Verify the /etc/security/audit/objects file is owned by an appropriate user or group. CC ID 05329 | System hardening through configuration management | Configuration | |
Verify the /usr/lib/trcload file is owned by an appropriate user or group. CC ID 05330 | System hardening through configuration management | Configuration | |
Verify the /usr/lib/semutil file is owned by an appropriate user or group. CC ID 05331 | System hardening through configuration management | Configuration | |
Verify system files are owned by an appropriate user or group. CC ID 05332 | System hardening through configuration management | Configuration | |
Verify the default/skeleton dot files are owned by an appropriate user or group. CC ID 05333 | System hardening through configuration management | Configuration | |
Verify the global initialization files are owned by an appropriate user or group. CC ID 05334 | System hardening through configuration management | Configuration | |
Verify the /etc/rc.config.d/auditing file is owned by an appropriate user or group. CC ID 05335 | System hardening through configuration management | Configuration | |
Verify the /etc/init.d file is owned by an appropriate user or group. CC ID 05336 | System hardening through configuration management | Configuration | |
Verify the /etc/hosts.lpd file is owned by an appropriate user or group. CC ID 05337 | System hardening through configuration management | Configuration | |
Verify the /etc/auto.master file is owned by an appropriate user or group. CC ID 05338 | System hardening through configuration management | Configuration | |
Verify the /etc/auto.misc file is owned by an appropriate user or group. CC ID 05339 | System hardening through configuration management | Configuration | |
Verify the /etc/auto.net file is owned by an appropriate user or group. CC ID 05340 | System hardening through configuration management | Configuration | |
Verify the boot/grub/grub.conf file is owned by an appropriate user or group. CC ID 05341 | System hardening through configuration management | Configuration | |
Verify the /etc/lilo.conf file is owned by an appropriate user or group. CC ID 05342 | System hardening through configuration management | Configuration | |
Verify the /etc/login.access file is owned by an appropriate user or group. CC ID 05343 | System hardening through configuration management | Configuration | |
Verify the /etc/security/access.conf file is owned by an appropriate user or group. CC ID 05344 | System hardening through configuration management | Configuration | |
Verify the /etc/sysctl.conf file is owned by an appropriate user or group. CC ID 05345 | System hardening through configuration management | Configuration | |
Configure the "secure_redirects" setting to organizational standards. CC ID 09941 | System hardening through configuration management | Configuration | |
Configure the "icmp_ignore_bogus_error_responses" setting to organizational standards. CC ID 09942 | System hardening through configuration management | Configuration | |
Configure the "rp_filter" setting to organizational standards. CC ID 09943 | System hardening through configuration management | Configuration | |
Verify the /etc/securetty file is owned by an appropriate user or group. CC ID 05346 | System hardening through configuration management | Configuration | |
Verify the /etc/audit/auditd.conf file is owned by an appropriate user or group. CC ID 05347 | System hardening through configuration management | Configuration | |
Verify the audit.rules file is owned by an appropriate user or group. CC ID 05348 | System hardening through configuration management | Configuration | |
Verify the /etc/group file is owned by an appropriate user or group. CC ID 05349 | System hardening through configuration management | Configuration | |
Verify the /etc/gshadow file is owned by an appropriate user or group. CC ID 05350 | System hardening through configuration management | Configuration | |
Verify the /usr/sbin/userhelper file is owned by an appropriate user or group. CC ID 05351 | System hardening through configuration management | Configuration | |
Verify all syslog log files are owned by an appropriate user or group. CC ID 05352 | System hardening through configuration management | Configuration | |
Verify the /etc/anacrontab file is owned by an appropriate user or group. CC ID 05353 | System hardening through configuration management | Configuration | |
Verify the /etc/pki/tls/ldap file is owned by an appropriate user or group. CC ID 05354 | System hardening through configuration management | Configuration | |
Verify the /etc/pki/tls/ldap/serverkey.pem file is owned by an appropriate user or group. CC ID 05355 | System hardening through configuration management | Configuration | |
Verify the /etc/pki/tls/CA/cacert.pem file is owned by an appropriate user or group. CC ID 05356 | System hardening through configuration management | Configuration | |
Verify the /etc/pki/tls/ldap/servercert.pem file is owned by an appropriate user or group. CC ID 05357 | System hardening through configuration management | Configuration | |
Verify the var/lib/ldap/* files are owned by an appropriate user or group. CC ID 05358 | System hardening through configuration management | Configuration | |
Verify the /etc/httpd/conf/* files are owned by an appropriate user or group. CC ID 05359 | System hardening through configuration management | Configuration | |
Verify the /etc/auto_* file is owned by an appropriate user. CC ID 05360 | System hardening through configuration management | Configuration | |
Verify the /etc/rmmount.conf file is owned by an appropriate user or group. CC ID 05361 | System hardening through configuration management | Configuration | |
Verify the /var/log/pamlog log is owned by an appropriate user or group. CC ID 05362 | System hardening through configuration management | Configuration | |
Verify the /etc/security/audit_control file is owned by an appropriate user or group. CC ID 05363 | System hardening through configuration management | Configuration | |
Verify the /etc/security/audit_class file is owned by an appropriate user or group. CC ID 05364 | System hardening through configuration management | Configuration | |
Verify the /etc/security/audit_event file is owned by an appropriate user or group. CC ID 05365 | System hardening through configuration management | Configuration | |
Verify the ASET userlist file is owned by an appropriate user or group. CC ID 05366 | System hardening through configuration management | Configuration | |
Verify the /var directory is owned by an appropriate user. CC ID 05367 | System hardening through configuration management | Configuration | |
Verify the /var/log directory is owned by an appropriate user. CC ID 05368 | System hardening through configuration management | Configuration | |
Verify the /var/adm directory is owned by an appropriate user. CC ID 05369 | System hardening through configuration management | Configuration | |
Restrict the debug level daemon logging file owner and daemon debug group owner. CC ID 05370 | System hardening through configuration management | Configuration | |
Restrict the Cron log file owner and Cron group owner. CC ID 05371 | System hardening through configuration management | Configuration | |
Restrict the system accounting file owner and system accounting group owner. CC ID 05372 | System hardening through configuration management | Configuration | |
Restrict audit log file ownership and audit group ownership. CC ID 05373 | System hardening through configuration management | Configuration | |
Set the X server timeout properly. CC ID 05374 | System hardening through configuration management | Configuration | |
Configure each user's authentication mechanism (system attribute) properly. CC ID 05375 | System hardening through configuration management | Configuration | |
Enable or disable SeLinux, as appropriate. CC ID 05376 | System hardening through configuration management | Configuration | |
Set the SELinux state properly. CC ID 05377 | System hardening through configuration management | Configuration | |
Set the SELinux policy properly. CC ID 05378 | System hardening through configuration management | Configuration | |
Configure Dovecot properly. CC ID 05379 | System hardening through configuration management | Configuration | |
Configure the "Prohibit Access of the Windows Connect Now Wizards" setting. CC ID 05380 | System hardening through configuration management | Configuration | |
Configure the "Allow remote access to the PnP interface" setting. CC ID 05381 | System hardening through configuration management | Configuration | |
Configure the "Do not create system restore point when new device driver installed" setting. CC ID 05382 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Access to All Windows Update Feature" setting. CC ID 05383 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Automatic Root Certificates Update" setting. CC ID 05384 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Event Views 'Events.asp' Links" setting. CC ID 05385 | System hardening through configuration management | Configuration | |
Configure "Turn Off Handwriting Recognition Error Reporting" to organizational standards. CC ID 05386 | System hardening through configuration management | Configuration | |
Configure the "Turn off Help and Support Center 'Did You Know?' content" setting. CC ID 05387 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Help and Support Center Microsoft Knowledge Base Search" setting. CC ID 05388 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Internet File Association Service" setting. CC ID 05389 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Registration if URL Connection is Referring to Microsoft.com" setting. CC ID 05390 | System hardening through configuration management | Configuration | |
Configure the "Turn off the 'Order Prints' Picture task" setting. CC ID 05391 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Windows Movie Maker Online Web Links" setting. CC ID 05392 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Windows Movie Maker Saving to Online Video Hosting Provider" setting. CC ID 05393 | System hardening through configuration management | Configuration | |
Configure the "Don't Display the Getting Started Welcome Screen at Logon" setting. CC ID 05394 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Startup Sound" setting. CC ID 05395 | System hardening through configuration management | Configuration | |
Configure the "Allow only Vista or later connections" setting. CC ID 05396 | System hardening through configuration management | Configuration | |
Configure the "Turn on bandwidth optimization" setting. CC ID 05397 | System hardening through configuration management | Configuration | |
Configure the "Prevent IIS Installation" setting. CC ID 05398 | System hardening through configuration management | Configuration | |
Configure the "Turn off Active Help" setting. CC ID 05399 | System hardening through configuration management | Configuration | |
Configure the "Turn off Untrusted Content" setting. CC ID 05400 | System hardening through configuration management | Configuration | |
Configure the "Turn off downloading of enclosures" setting. CC ID 05401 | System hardening through configuration management | Configuration | |
Configure "Allow indexing of encrypted files" to organizational standards. CC ID 05402 | System hardening through configuration management | Configuration | |
Configure the "Prevent indexing uncached Exchange folders" setting. CC ID 05403 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Calendar" setting. CC ID 05404 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Defender" setting. CC ID 05405 | System hardening through configuration management | Configuration | |
Configure the "Turn off Heap termination on corruption" setting to organizational standards. CC ID 05406 | System hardening through configuration management | Configuration | |
Configure the "Turn off shell protocol protected mode" setting to organizational standards. CC ID 05407 | System hardening through configuration management | Configuration | |
Configure the "Prohibit non-administrators from applying vendor signed updates" setting. CC ID 05408 | System hardening through configuration management | Configuration | |
Configure the "Report when logon server was not available during user logon" setting. CC ID 05409 | System hardening through configuration management | Configuration | |
Configure the "Turn off the communication features" setting. CC ID 05410 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Mail application" setting. CC ID 05411 | System hardening through configuration management | Configuration | |
Configure the "Prevent Windows Media DRM Internet Access" setting. CC ID 05412 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Meeting Space" setting. CC ID 05413 | System hardening through configuration management | Configuration | |
Configure the "Turn on Windows Meeting Space auditing" setting. CC ID 05414 | System hardening through configuration management | Configuration | |
Configure the "Disable unpacking and installation of gadgets that are not digitally signed" setting. CC ID 05415 | System hardening through configuration management | Configuration | |
Configure the "Override the More Gadgets Link" setting. CC ID 05416 | System hardening through configuration management | Configuration | |
Configure the "Turn Off User Installed Windows Sidebar Gadgets" setting. CC ID 05417 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Digital Locker to run" setting. CC ID 05418 | System hardening through configuration management | Configuration | |
Configure the "Turn off Downloading of Game Information" setting. CC ID 05419 | System hardening through configuration management | Configuration | |
Configure "Turn on Responder (RSPNDR) driver" to organizational standards. CC ID 05420 | System hardening through configuration management | Configuration | |
Verify ExecShield has been randomly placed in Virtual Memory regions. CC ID 05436 | System hardening through configuration management | Configuration | |
Enable the ExecShield, as appropriate. CC ID 05421 | System hardening through configuration management | Configuration | |
Configure Kernel support for the XD/NX processor feature, as appropriate. CC ID 05422 | System hardening through configuration management | Configuration | |
Configure the XD/NX processor feature in the BIOS, as appropriate. CC ID 05423 | System hardening through configuration management | Configuration | |
Configure the Shell for the bin account properly. CC ID 05424 | System hardening through configuration management | Configuration | |
Configure the Shell for the nuucp account properly. CC ID 05425 | System hardening through configuration management | Configuration | |
Configure the Shell for the smmsp account properly. CC ID 05426 | System hardening through configuration management | Configuration | |
Configure the Shell for the listen account properly. CC ID 05427 | System hardening through configuration management | Configuration | |
Configure the Shell for the gdm account properly. CC ID 05428 | System hardening through configuration management | Configuration | |
Configure the Shell for the webservd account properly. CC ID 05429 | System hardening through configuration management | Configuration | |
Configure the Shell for the nobody account properly. CC ID 05430 | System hardening through configuration management | Configuration | |
Configure the Shell for the noaccess account properly. CC ID 05431 | System hardening through configuration management | Configuration | |
Configure the Shell for the nobody4 account properly. CC ID 05432 | System hardening through configuration management | Configuration | |
Configure the Shell for the adm account properly. CC ID 05433 | System hardening through configuration management | Configuration | |
Configure the Shell for the lp account properly. CC ID 05434 | System hardening through configuration management | Configuration | |
Configure the Shell for the uucp account properly. CC ID 05435 | System hardening through configuration management | Configuration | |
Set the noexec_user_stack parameter properly. CC ID 05437 | System hardening through configuration management | Configuration | |
Set the no_exec_user_stack_log parameter properly. CC ID 05438 | System hardening through configuration management | Configuration | |
Set the noexec_user_stack flag on the user stack properly. CC ID 05439 | System hardening through configuration management | Configuration | |
Set the TCP max connection limit properly. CC ID 05440 | System hardening through configuration management | Configuration | |
Set the TCP abort interval properly. CC ID 05441 | System hardening through configuration management | Configuration | |
Enable or disable the GNOME screenlock, as appropriate. CC ID 05442 | System hardening through configuration management | Configuration | |
Set the ARP cache cleanup interval properly. CC ID 05443 | System hardening through configuration management | Configuration | |
Set the ARP IRE scan rate properly. CC ID 05444 | System hardening through configuration management | Configuration | |
Disable proxy ARP on all interfaces. CC ID 06570 | System hardening through configuration management | Configuration | |
Set the FileSpaceSwitch variable to an appropriate value. CC ID 05445 | System hardening through configuration management | Configuration | |
Set the wakeup switchpoint frequency to an appropriate time interval. CC ID 05446 | System hardening through configuration management | Configuration | |
Enable or disable the setuid option on removable storage media, as appropriate. CC ID 05447 | System hardening through configuration management | Configuration | |
Configure TCP/IP PMTU Discovery, as appropriate. CC ID 05991 | System hardening through configuration management | Configuration | |
Configure Secure Shell to enable or disable empty passwords, as appropriate. CC ID 06016 | System hardening through configuration management | Configuration | |
Configure each user's Screen Saver Executable Name. CC ID 06027 | System hardening through configuration management | Configuration | |
Configure the NIS+ server to operate at an appropriate security level. CC ID 06038 | System hardening through configuration management | Configuration | |
Configure the "restrict guest access to system log" policy, as appropriate. CC ID 06047 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Open XML file types" setting, as appropriate. CC ID 06048 | System hardening through configuration management | Configuration | |
Enable or disable user-initiated system crashes via the CTRL+SCROLL LOCK+SCROLL LOCK sequence for keyboards. CC ID 06051 | System hardening through configuration management | Configuration | |
Configure the "Syskey mode" to organizational standards. CC ID 06052 | System hardening through configuration management | Configuration | |
Configure the Trusted Platform Module (TPM) platform validation profile, as appropriate. CC ID 06056 | System hardening through configuration management | Configuration | |
Configure the "Allow Remote Shell Access" setting, as appropriate. CC ID 06057 | System hardening through configuration management | Configuration | |
Configure the "Prevent the computer from joining a homegroup" setting, as appropriate. CC ID 06058 | System hardening through configuration management | Configuration | |
Enable or disable the authenticator requirement after waking, as appropriate. CC ID 06059 | System hardening through configuration management | Configuration | |
Enable or disable the standby states, as appropriate. CC ID 06060 | System hardening through configuration management | Configuration | |
Configure the Trusted Platform Module startup options properly. CC ID 06061 | System hardening through configuration management | Configuration | |
Configure the system to purge Policy Caches. CC ID 06569 | System hardening through configuration management | Configuration | |
Separate authenticator files and application system data on different file systems. CC ID 06790 | System hardening through configuration management | Configuration | |
Configure Application Programming Interfaces to limit or shut down interactivity based upon a rate limit. CC ID 06811 | System hardening through configuration management | Configuration | |
Configure the "all world-writable directories" user ownership to organizational standards. CC ID 08714 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "all rsyslog log" files group ownership to organizational standards. CC ID 08715 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "all rsyslog log" files user ownership to organizational standards. CC ID 08716 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Executable stack" setting to organizational standards. CC ID 08969 | System hardening through configuration management | Configuration | |
Configure the "smbpasswd executable" user ownership to organizational standards. CC ID 08975 | System hardening through configuration management | Configuration | |
Configure the "traceroute executable" group ownership to organizational standards. CC ID 08980 | System hardening through configuration management | Configuration | |
Configure the "traceroute executable" user ownership to organizational standards. CC ID 08981 | System hardening through configuration management | Configuration | |
Configure the "Apache configuration" directory group ownership to organizational standards. CC ID 08991 | System hardening through configuration management | Configuration | |
Configure the "Apache configuration" directory user ownership to organizational standards. CC ID 08992 | System hardening through configuration management | Configuration | |
Configure the "/var/log/httpd/" file group ownership to organizational standards. CC ID 09027 | System hardening through configuration management | Configuration | |
Configure the "/etc/httpd/conf.d" file group ownership to organizational standards. CC ID 09028 | System hardening through configuration management | Configuration | |
Configure the "/etc/httpd/conf/passwd" file group ownership to organizational standards. CC ID 09029 | System hardening through configuration management | Configuration | |
Configure the "/usr/sbin/apachectl" file group ownership to organizational standards. CC ID 09030 | System hardening through configuration management | Configuration | |
Configure the "/usr/sbin/httpd" file group ownership to organizational standards. CC ID 09031 | System hardening through configuration management | Configuration | |
Configure the "/var/www/html" file group ownership to organizational standards. CC ID 09032 | System hardening through configuration management | Configuration | |
Configure the "log files" the "/var/log/httpd/" directory user ownership to organizational standards. CC ID 09034 | System hardening through configuration management | Configuration | |
Configure the "/etc/httpd/conf.d" file ownership to organizational standards. CC ID 09035 | System hardening through configuration management | Configuration | |
Configure the "/etc/httpd/conf/passwd" file ownership to organizational standards. CC ID 09036 | System hardening through configuration management | Configuration | |
Configure the "/usr/sbin/apachectl" file ownership to organizational standards. CC ID 09037 | System hardening through configuration management | Configuration | |
Configure the "/usr/sbin/httpd" file ownership to organizational standards. CC ID 09038 | System hardening through configuration management | Configuration | |
Configure the "/var/www/html" file ownership to organizational standards. CC ID 09039 | System hardening through configuration management | Configuration | |
Configure the "httpd.conf" file user ownership to organizational standards. CC ID 09055 | System hardening through configuration management | Configuration | |
Configure the "httpd.conf" group ownership to organizational standards. CC ID 09056 | System hardening through configuration management | Configuration | |
Configure the "htpasswd" file user ownership to organizational standards. CC ID 09058 | System hardening through configuration management | Configuration | |
Configure the "htpasswd" file group ownership to organizational standards. CC ID 09059 | System hardening through configuration management | Configuration | |
Configure the "files specified by CustomLog" user ownership to organizational standards. CC ID 09074 | System hardening through configuration management | Configuration | |
Configure the "files specified by CustomLog" group ownership to organizational standards. CC ID 09075 | System hardening through configuration management | Configuration | |
Configure the "files specified by ErrorLog" user ownership to organizational standards. CC ID 09076 | System hardening through configuration management | Configuration | |
Configure the "files specified by ErrorLog" group ownership to organizational standards. CC ID 09077 | System hardening through configuration management | Configuration | |
Configure the "directories specified by ScriptAlias" user ownership to organizational standards. CC ID 09079 | System hardening through configuration management | Configuration | |
Configure the "directories specified by ScriptAlias" group ownership to organizational standards. CC ID 09080 | System hardening through configuration management | Configuration | |
Configure the "directories specified by ScriptAliasMatch" user ownership to organizational standards. CC ID 09082 | System hardening through configuration management | Configuration | |
Configure the "directories specified by ScriptAliasMatch" group ownership to organizational standards. CC ID 09083 | System hardening through configuration management | Configuration | |
Configure the "directories specified by DocumentRoot" user ownership to organizational standards. CC ID 09085 | System hardening through configuration management | Configuration | |
Configure the "directories specified by DocumentRoot" group ownership to organizational standards. CC ID 09086 | System hardening through configuration management | Configuration | |
Configure the "directories specified by Alias" user ownership to organizational standards. CC ID 09088 | System hardening through configuration management | Configuration | |
Configure the "directories specified by Alias" group ownership to organizational standards. CC ID 09089 | System hardening through configuration management | Configuration | |
Configure the "directories specified by ServerRoot" user ownership to organizational standards. CC ID 09091 | System hardening through configuration management | Configuration | |
Configure the "directories specified by ServerRoot" group ownership to organizational standards. CC ID 09092 | System hardening through configuration management | Configuration | |
Configure the "apache /bin" directory user ownership to organizational standards. CC ID 09094 | System hardening through configuration management | Configuration | |
Configure the "apache /bin" directory group ownership to organizational standards. CC ID 09095 | System hardening through configuration management | Configuration | |
Configure the "apache /logs" directory user ownership to organizational standards. CC ID 09097 | System hardening through configuration management | Configuration | |
Configure the "apache /logs" directory group ownership to organizational standards. CC ID 09098 | System hardening through configuration management | Configuration | |
Configure the "apache /htdocs" directory user ownership to organizational standards. CC ID 09100 | System hardening through configuration management | Configuration | |
Configure the "apache /htdocs" directory group ownership to organizational standards. CC ID 09101 | System hardening through configuration management | Configuration | |
Configure the "apache /cgi-bin" directory group ownership to organizational standards. CC ID 09104 | System hardening through configuration management | Configuration | |
Configure the "User-specific directories" setting to organizational standards. CC ID 09123 | System hardening through configuration management | Configuration | |
Configure the "apache process ID" file user ownership to organizational standards. CC ID 09125 | System hardening through configuration management | Configuration | |
Configure the "apache process ID" file group ownership to organizational standards. CC ID 09126 | System hardening through configuration management | Configuration | |
Configure the "apache scoreboard" file user ownership to organizational standards. CC ID 09128 | System hardening through configuration management | Configuration | |
Configure the "apache scoreboard" file group ownership to organizational standards. CC ID 09129 | System hardening through configuration management | Configuration | |
Configure the "Ownership of the asymmetric keys" setting to organizational standards. CC ID 09289 | System hardening through configuration management | Configuration | |
Configure the "SQLServer2005ReportServerUser" registry key permissions to organizational standards. CC ID 09326 | System hardening through configuration management | Configuration | |
Configure the "SQLServerADHelperUser" registry key permissions to organizational standards. CC ID 09329 | System hardening through configuration management | Configuration | |
Configure the "Tomcat home" directory user ownership to organizational standards. CC ID 09772 | System hardening through configuration management | Configuration | |
Configure the "group" setting for the "Tomcat installation" to organizational standards. CC ID 09773 | System hardening through configuration management | Configuration | |
Configure the "tomcat conf/" directory user ownership to organizational standards. CC ID 09774 | System hardening through configuration management | Configuration | |
Configure the "tomcat conf/" directory group ownership to organizational standards. CC ID 09775 | System hardening through configuration management | Configuration | |
Configure the "tomcat-users.xml" file user ownership to organizational standards. CC ID 09776 | System hardening through configuration management | Configuration | |
Configure the "tomcat-users.xml" file group ownership to organizational standards. CC ID 09777 | System hardening through configuration management | Configuration | |
Configure the "group membership" setting for "Tomcat" to organizational standards. CC ID 09793 | System hardening through configuration management | Configuration | |
Configure the "Tomcat home" directory group ownership to organizational standards. CC ID 09798 | System hardening through configuration management | Configuration | |
Configure the "Tomcat home/conf/" directory user ownership to organizational standards. CC ID 09800 | System hardening through configuration management | Configuration | |
Configure the "Tomcat home/conf/" directory group ownership to organizational standards. CC ID 09801 | System hardening through configuration management | Configuration | |
Configure the "system" files permissions to organizational standards. CC ID 09922 | System hardening through configuration management | Configuration | |
Configure the "size limit" setting for the "application log" to organizational standards. CC ID 10063 | System hardening through configuration management | Configuration | |
Configure the "restrict guest access to security log" setting to organizational standards. CC ID 10064 | System hardening through configuration management | Configuration | |
Configure the "size limit" setting for the "system log" to organizational standards. CC ID 10065 | System hardening through configuration management | Configuration | |
Configure the "Automatic Update service" setting to organizational standards. CC ID 10066 | System hardening through configuration management | Configuration | |
Configure the "Safe DLL Search Mode" setting to organizational standards. CC ID 10067 | System hardening through configuration management | Configuration | |
Configure the "screensaver" setting to organizational standards. CC ID 10068 | System hardening through configuration management | Configuration | |
Configure the "screensaver" setting for the "default" user to organizational standards. CC ID 10069 | System hardening through configuration management | Configuration | |
Configure the "Enable User Control Over Installs" setting to organizational standards. CC ID 10070 | System hardening through configuration management | Configuration | |
Configure the "Enable User to Browser for Source While Elevated" setting to organizational standards. CC ID 10071 | System hardening through configuration management | Configuration | |
Configure the "Enable User to Use Media Source While Elevated" setting to organizational standards. CC ID 10072 | System hardening through configuration management | Configuration | |
Configure the "Allow Administrator to Install from Terminal Services Session" setting to organizational standards. CC ID 10073 | System hardening through configuration management | Configuration | |
Configure the "Enable User to Patch Elevated Products" setting to organizational standards. CC ID 10074 | System hardening through configuration management | Configuration | |
Configure the "Cache Transforms in Secure Location" setting to organizational standards. CC ID 10075 | System hardening through configuration management | Configuration | |
Configure the "Disable Media Player for automatic updates" setting to organizational standards. CC ID 10076 | System hardening through configuration management | Configuration | |
Configure the "Internet access for Windows Messenger" setting to organizational standards. CC ID 10077 | System hardening through configuration management | Configuration | |
Configure the "Do Not Automatically Start Windows Messenger" setting to organizational standards. CC ID 10078 | System hardening through configuration management | Configuration | |
Configure the "Hide Property Pages" setting for the "task scheduler" to organizational standards. CC ID 10079 | System hardening through configuration management | Configuration | |
Configure the "Prohibit New Task Creation" setting for the "task scheduler" to organizational standards. CC ID 10080 | System hardening through configuration management | Configuration | |
Configure "Set time limit for disconnected sessions" to organizational standards. CC ID 10081 | System hardening through configuration management | Configuration | |
Configure the "Set time limit for idle sessions" setting to organizational standards. CC ID 10082 | System hardening through configuration management | Configuration | |
Configure the "Enable Keep-Alive Messages" setting to organizational standards. CC ID 10083 | System hardening through configuration management | Configuration | |
Configure the "Automatic Updates detection frequency" setting to organizational standards. CC ID 10084 | System hardening through configuration management | Configuration | |
Configure the "TCPMaxPortsExhausted" setting to organizational standards. CC ID 10085 | System hardening through configuration management | Configuration | |
Configure the "built-in Administrator" account to organizational standards. CC ID 10086 | System hardening through configuration management | Configuration | |
Configure the "Prevent System Maintenance of Computer Account Password" setting to organizational standards. CC ID 10087 | System hardening through configuration management | Configuration | |
Configure the "Digitally Sign Client Communication (When Possible)" setting to organizational standards. CC ID 10088 | System hardening through configuration management | Configuration | |
Configure the "number of SYN-ACK retransmissions sent when attempting to respond to a SYN request" setting to organizational standards. CC ID 10089 | System hardening through configuration management | Configuration | |
Configure the "warning level" setting for the "audit log" to organizational standards. CC ID 10090 | System hardening through configuration management | Configuration | |
Configure the "Change Password" setting for the "Ctrl+Alt+Del dialog" to organizational standards. CC ID 10091 | System hardening through configuration management | Configuration | |
Configure the "account description" setting for the "built-in Administrator" account to organizational standards. CC ID 10092 | System hardening through configuration management | Configuration | |
Configure the "Decoy Admin Account Not Disabled" setting to organizational standards. CC ID 10201 | System hardening through configuration management | Configuration | |
Configure the "when maximum log size is reached" setting for the "Application log" to organizational standards. CC ID 10202 | System hardening through configuration management | Configuration | |
Configure the "password filtering DLL" setting to organizational standards. CC ID 10203 | System hardening through configuration management | Configuration | |
Configure the "Anonymous access to the registry" setting to organizational standards. CC ID 10204 | System hardening through configuration management | Configuration | |
Configure the "Automatic Execution" setting for the "System Debugger" to organizational standards. CC ID 10205 | System hardening through configuration management | Configuration | |
Configure the "CD-ROM Autorun" setting to organizational standards. CC ID 10206 | System hardening through configuration management | Configuration | |
Configure the "ResetBrowser Frames" setting to organizational standards. CC ID 10207 | System hardening through configuration management | Configuration | |
Configure the "Dr. Watson Crash Dumps" setting to organizational standards. CC ID 10208 | System hardening through configuration management | Configuration | |
Configure the "File System Checker and Popups" setting to organizational standards. CC ID 10209 | System hardening through configuration management | Configuration | |
Configure the "System File Checker" setting to organizational standards. CC ID 10210 | System hardening through configuration management | Configuration | |
Configure the "System File Checker Progress Meter" setting to organizational standards. CC ID 10211 | System hardening through configuration management | Configuration | |
Configure the "number of TCP/IP Maximum Half-open Sockets" setting to organizational standards. CC ID 10212 | System hardening through configuration management | Configuration | |
Configure the "number of TCP/IP Maximum Retried Half-open Sockets" setting to organizational standards. CC ID 10213 | System hardening through configuration management | Configuration | |
Configure the "Protect Kernel object attributes" setting to organizational standards. CC ID 10214 | System hardening through configuration management | Configuration | |
Configure the "Unsigned Non-Driver Installation Behavior" setting to organizational standards. CC ID 10215 | System hardening through configuration management | Configuration | |
Configure the "Automatically Log Off Users When Logon Time Expires (local)" setting to organizational standards. CC ID 10216 | System hardening through configuration management | Configuration | |
Configure the "Local volumes" setting to organizational standards. CC ID 10217 | System hardening through configuration management | Configuration | |
Configure the "Unused USB Ports" setting to organizational standards. CC ID 10218 | System hardening through configuration management | Configuration | |
Configure the "Set Safe for Scripting" setting to organizational standards. CC ID 10219 | System hardening through configuration management | Configuration | |
Configure the "Use of the Recycle Bin on file deletion" setting to organizational standards. CC ID 10220 | System hardening through configuration management | Configuration | |
Configure the "Membership in the Power Users group" setting to organizational standards. CC ID 10224 | System hardening through configuration management | Configuration | |
Configure the "AutoBackupLogFiles" setting for the "security log" to organizational standards. CC ID 10225 | System hardening through configuration management | Configuration | |
Configure the "AutoBackupLogFiles" setting for the "application log" to organizational standards. CC ID 10226 | System hardening through configuration management | Configuration | |
Configure the "AutoBackupLogFiles" setting for the "system log" to organizational standards. CC ID 10227 | System hardening through configuration management | Configuration | |
Configure the "Syskey Encryption Key location and password method" setting to organizational standards. CC ID 10228 | System hardening through configuration management | Configuration | |
Configure the "Os2LibPath environmental variable" setting to organizational standards. CC ID 10229 | System hardening through configuration management | Configuration | |
Configure the "path to the Microsoft OS/2 version 1.x library" setting to organizational standards. CC ID 10230 | System hardening through configuration management | Configuration | |
Configure the "location of the OS/2 subsystem" setting to organizational standards. CC ID 10231 | System hardening through configuration management | Configuration | |
Configure the "location of the POSIX subsystem" setting to organizational standards. CC ID 10232 | System hardening through configuration management | Configuration | |
Configure the "path to the debugger used for Just-In-Time debugging" setting to organizational standards. CC ID 10234 | System hardening through configuration management | Configuration | |
Configure the "Distributed Component Object Model (DCOM)" setting to organizational standards. CC ID 10235 | System hardening through configuration management | Configuration | |
Configure the "The "encryption algorithm" setting for "EFS"" setting to organizational standards. CC ID 10236 | System hardening through configuration management | Configuration | |
Configure the "Interix Subsystem Startup service startup type" setting to organizational standards. CC ID 10238 | System hardening through configuration management | Configuration | |
Configure the "Services for Unix Perl Socket service startup type" setting to organizational standards. CC ID 10247 | System hardening through configuration management | Configuration | |
Configure the "Services for Unix Windows Cron service startup type" setting to organizational standards. CC ID 10248 | System hardening through configuration management | Configuration | |
Configure the "fDisableCdm" setting to organizational standards. CC ID 10259 | System hardening through configuration management | Configuration | |
Configure the "fDisableClip" setting to organizational standards. CC ID 10260 | System hardening through configuration management | Configuration | |
Configure the "Inheritance of the shadow setting" setting to organizational standards. CC ID 10261 | System hardening through configuration management | Configuration | |
Configure the "remote control configuration" setting to organizational standards. CC ID 10262 | System hardening through configuration management | Configuration | |
Configure the "fDisableCam" setting to organizational standards. CC ID 10263 | System hardening through configuration management | Configuration | |
Configure the "fDisableCcm" setting to organizational standards. CC ID 10264 | System hardening through configuration management | Configuration | |
Configure the "fDisableLPT" setting to organizational standards. CC ID 10265 | System hardening through configuration management | Configuration | |
Configure the "ActiveX installation policy for sites in Trusted zones" setting to organizational standards. CC ID 10691 | System hardening through configuration management | Configuration | |
Configure the "Add the Administrators security group to roaming user profiles" setting to organizational standards. CC ID 10694 | System hardening through configuration management | Configuration | |
Configure the "Administratively assigned offline files" setting to organizational standards. CC ID 10695 | System hardening through configuration management | Configuration | |
Configure the "Apply policy to removable media" setting to organizational standards. CC ID 10756 | System hardening through configuration management | Configuration | |
Configure the "Baseline file cache maximum size" setting to organizational standards. CC ID 10763 | System hardening through configuration management | Configuration | |
Configure the "Check for New Signatures Before Scheduled Scans" setting to organizational standards. CC ID 10770 | System hardening through configuration management | Configuration | |
Configure the "Check published state" setting to organizational standards. CC ID 10771 | System hardening through configuration management | Configuration | |
Configure the "Communities" setting to organizational standards. CC ID 10772 | System hardening through configuration management | Configuration | |
Configure the "Computer location" setting to organizational standards. CC ID 10773 | System hardening through configuration management | Configuration | |
Configure the "Background Sync" setting to organizational standards. CC ID 10775 | System hardening through configuration management | Configuration | |
Configure the "Corporate Windows Error Reporting" setting to organizational standards. CC ID 10777 | System hardening through configuration management | Configuration | |
Configure the "Corrupted File Recovery Behavior" setting to organizational standards. CC ID 10778 | System hardening through configuration management | Configuration | |
Configure the "Default consent" setting to organizational standards. CC ID 10780 | System hardening through configuration management | Configuration | |
Configure the "list of IEEE 1667 silos usable on your computer" setting to organizational standards. CC ID 10792 | System hardening through configuration management | Configuration | |
Configure the "Microsoft SpyNet Reporting" setting to organizational standards. CC ID 10794 | System hardening through configuration management | Configuration | |
Configure the "MSI Corrupted File Recovery Behavior" setting to organizational standards. CC ID 10795 | System hardening through configuration management | Configuration | |
Configure the "Reliability WMI Providers" setting to organizational standards. CC ID 10804 | System hardening through configuration management | Configuration | |
Configure the "Report Archive" setting to organizational standards. CC ID 10805 | System hardening through configuration management | Configuration | |
Configure the "Report Queue" setting to organizational standards. CC ID 10806 | System hardening through configuration management | Configuration | |
Configure the "root certificate clean up" setting to organizational standards. CC ID 10807 | System hardening through configuration management | Configuration | |
Configure the "Security Policy for Scripted Diagnostics" setting to organizational standards. CC ID 10816 | System hardening through configuration management | Configuration | |
Configure the "list of blocked TPM commands" setting to organizational standards. CC ID 10822 | System hardening through configuration management | Configuration | |
Configure the "refresh interval for Server Manager" setting to organizational standards. CC ID 10823 | System hardening through configuration management | Configuration | |
Configure the "server address, refresh interval, and issuer certificate authority of a target Subscription Manager" setting to organizational standards. CC ID 10824 | System hardening through configuration management | Configuration | |
Configure the "Customize consent settings" setting to organizational standards. CC ID 10837 | System hardening through configuration management | Configuration | |
Configure the "Default behavior for AutoRun" setting to organizational standards. CC ID 10839 | System hardening through configuration management | Configuration | |
Configure the "Define Activation Security Check exemptions" setting to organizational standards. CC ID 10841 | System hardening through configuration management | Configuration | |
Configure the "Define host name-to-Kerberos realm mappings" setting to organizational standards. CC ID 10842 | System hardening through configuration management | Configuration | |
Configure the "Define interoperable Kerberos V5 realm settings" setting to organizational standards. CC ID 10843 | System hardening through configuration management | Configuration | |
Configure the "Delay Restart for scheduled installations" setting to organizational standards. CC ID 10844 | System hardening through configuration management | Configuration | |
Configure the "Delete cached copies of roaming profiles" setting to organizational standards. CC ID 10845 | System hardening through configuration management | Configuration | |
Configure the "Delete user profiles older than a specified number of days on system restart" setting to organizational standards. CC ID 10847 | System hardening through configuration management | Configuration | |
Configure the "Diagnostics: Configure scenario retention" setting to organizational standards. CC ID 10857 | System hardening through configuration management | Configuration | |
Configure the "Directory pruning interval" setting to organizational standards. CC ID 10858 | System hardening through configuration management | Configuration | |
Configure the "Directory pruning priority" setting to organizational standards. CC ID 10859 | System hardening through configuration management | Configuration | |
Configure the "Directory pruning retry" setting to organizational standards. CC ID 10860 | System hardening through configuration management | Configuration | |
Configure the "Disk Diagnostic: Configure custom alert text" setting to organizational standards. CC ID 10882 | System hardening through configuration management | Configuration | |
Configure the "Display Shutdown Event Tracker" setting to organizational standards. CC ID 10888 | System hardening through configuration management | Configuration | |
Configure the "Display string when smart card is blocked" setting to organizational standards. CC ID 10889 | System hardening through configuration management | Configuration | |
Configure the "Do not automatically encrypt files moved to encrypted folders" setting to organizational standards. CC ID 10924 | System hardening through configuration management | Configuration | |
Configure the "Do not check for user ownership of Roaming Profile Folders" setting to organizational standards. CC ID 10925 | System hardening through configuration management | Configuration | |
Configure the "Do not process incoming mailslot messages used for domain controller location based on NetBIOS domain names" setting to organizational standards. CC ID 10932 | System hardening through configuration management | Configuration | |
Configure the "Do not send additional data" machine setting should be configured correctly. to organizational standards. CC ID 10934 | System hardening through configuration management | Configuration | |
Configure the "Domain Controller Address Type Returned" setting to organizational standards. CC ID 10939 | System hardening through configuration management | Configuration | |
Configure the "Domain Location Determination URL" setting to organizational standards. CC ID 10940 | System hardening through configuration management | Configuration | |
Configure the "Don't set the always do this checkbox" setting to organizational standards. CC ID 10941 | System hardening through configuration management | Configuration | |
Configure the "Download missing COM components" setting to organizational standards. CC ID 10942 | System hardening through configuration management | Configuration | |
Configure the "Dynamic Update" setting to organizational standards. CC ID 10944 | System hardening through configuration management | Configuration | |
Configure the "Enable client-side targeting" setting to organizational standards. CC ID 10946 | System hardening through configuration management | Configuration | |
Configure the "Enable NTFS pagefile encryption" setting to organizational standards. CC ID 10948 | System hardening through configuration management | Configuration | |
Configure the "Enable Persistent Time Stamp" setting to organizational standards. CC ID 10949 | System hardening through configuration management | Configuration | |
Configure the "Enable Transparent Caching" setting to organizational standards. CC ID 10950 | System hardening through configuration management | Configuration | |
Configure the "Enable Windows NTP Client" setting to organizational standards. CC ID 10951 | System hardening through configuration management | Configuration | |
Configure the "Enable Windows NTP Server" setting to organizational standards. CC ID 10952 | System hardening through configuration management | Configuration | |
Configure the "Encrypt the Offline Files cache" setting to organizational standards. CC ID 10955 | System hardening through configuration management | Configuration | |
Configure the "Enforce upgrade component rules" setting to organizational standards. CC ID 10958 | System hardening through configuration management | Configuration | |
Configure the "Events.asp program" setting to organizational standards. CC ID 10959 | System hardening through configuration management | Configuration | |
Configure the "Events.asp program command line parameters" setting to organizational standards. CC ID 10960 | System hardening through configuration management | Configuration | |
Configure the "Events.asp URL" setting to organizational standards. CC ID 10961 | System hardening through configuration management | Configuration | |
Configure the "Exclude credential providers" setting to organizational standards. CC ID 10962 | System hardening through configuration management | Configuration | |
Configure the "Exclude files from being cached" setting to organizational standards. CC ID 10963 | System hardening through configuration management | Configuration | |
Configure the "Final DC Discovery Retry Setting for Background Callers" setting to organizational standards. CC ID 10968 | System hardening through configuration management | Configuration | |
Configure the "For tablet pen input, don't show the Input Panel icon" setting to organizational standards. CC ID 10973 | System hardening through configuration management | Configuration | |
Configure the "For touch input, don't show the Input Panel icon" setting to organizational standards. CC ID 10974 | System hardening through configuration management | Configuration | |
Configure the "Force Rediscovery Interval" setting to organizational standards. CC ID 10975 | System hardening through configuration management | Configuration | |
Configure the "Force selected system UI language to overwrite the user UI language" setting to organizational standards. CC ID 10976 | System hardening through configuration management | Configuration | |
Configure the "Force the reading of all certificates from the smart card" setting to organizational standards. CC ID 10977 | System hardening through configuration management | Configuration | |
Configure the "ForwarderResourceUsage" setting to organizational standards. CC ID 10978 | System hardening through configuration management | Configuration | |
Configure the "Global Configuration Settings" setting to organizational standards. CC ID 10979 | System hardening through configuration management | Configuration | |
Configure the "Hash Publication for BranchCache" setting to organizational standards. CC ID 10986 | System hardening through configuration management | Configuration | |
Configure the "Hide entry points for Fast User Switching" setting to organizational standards. CC ID 10987 | System hardening through configuration management | Configuration | |
Configure the "Hide notifications about RD Licensing problems that affect the RD Session Host server" setting to organizational standards. CC ID 10988 | System hardening through configuration management | Configuration | |
Configure the "Hide previous versions list for local files" setting to organizational standards. CC ID 10989 | System hardening through configuration management | Configuration | |
Configure the "Hide previous versions of files on backup location" setting to organizational standards. CC ID 10991 | System hardening through configuration management | Configuration | |
Configure the "Ignore custom consent settings" setting to organizational standards. CC ID 10992 | System hardening through configuration management | Configuration | |
Configure the "Ignore Delegation Failure" setting to organizational standards. CC ID 10993 | System hardening through configuration management | Configuration | |
Configure the "Ignore the default list of blocked TPM commands" setting to organizational standards. CC ID 10994 | System hardening through configuration management | Configuration | |
Configure the "Ignore the local list of blocked TPM commands" setting to organizational standards. CC ID 10995 | System hardening through configuration management | Configuration | |
Configure the "Include rarely used Chinese, Kanji, or Hanja characters" setting to organizational standards. CC ID 10996 | System hardening through configuration management | Configuration | |
Configure the "Initial DC Discovery Retry Setting for Background Callers" setting to organizational standards. CC ID 10997 | System hardening through configuration management | Configuration | |
Configure the "IP-HTTPS State" setting to organizational standards. CC ID 11000 | System hardening through configuration management | Configuration | |
Configure the "ISATAP Router Name" setting to organizational standards. CC ID 11001 | System hardening through configuration management | Configuration | |
Configure the "ISATAP State" setting to organizational standards. CC ID 11002 | System hardening through configuration management | Configuration | |
Configure the "License server security group" setting to organizational standards. CC ID 11005 | System hardening through configuration management | Configuration | |
Configure the "List of applications to be excluded" setting to organizational standards. CC ID 11023 | System hardening through configuration management | Configuration | |
Configure the "Lock Enhanced Storage when the computer is locked" setting to organizational standards. CC ID 11025 | System hardening through configuration management | Configuration | |
Configure the "Make Parental Controls control panel visible on a Domain" setting to organizational standards. CC ID 11039 | System hardening through configuration management | Configuration | |
Configure the "MaxConcurrentUsers" setting to organizational standards. CC ID 11040 | System hardening through configuration management | Configuration | |
Configure the "Maximum DC Discovery Retry Interval Setting for Background Callers" setting to organizational standards. CC ID 11041 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with Support Provider" setting to organizational standards. CC ID 11045 | System hardening through configuration management | Configuration | |
Configure the "Negative DC Discovery Cache Setting" setting to organizational standards. CC ID 11047 | System hardening through configuration management | Configuration | |
Configure the "Non-conforming packets" setting to organizational standards. CC ID 11053 | System hardening through configuration management | Configuration | |
Configure the "Notify blocked drivers" setting to organizational standards. CC ID 11054 | System hardening through configuration management | Configuration | |
Configure the "Notify user of successful smart card driver installation" setting to organizational standards. CC ID 11055 | System hardening through configuration management | Configuration | |
Configure the "Permitted Managers" setting to organizational standards. CC ID 11062 | System hardening through configuration management | Configuration | |
Configure the "Positive Periodic DC Cache Refresh for Background Callers" setting to organizational standards. CC ID 11063 | System hardening through configuration management | Configuration | |
Configure the "Positive Periodic DC Cache Refresh for Non-Background Callers" setting to organizational standards. CC ID 11064 | System hardening through configuration management | Configuration | |
Configure the "Prioritize all digitally signed drivers equally during the driver ranking and selection process" setting to organizational standards. CC ID 11098 | System hardening through configuration management | Configuration | |
Configure the "Prompt for credentials on the client computer" setting to organizational standards. CC ID 11108 | System hardening through configuration management | Configuration | |
Configure the "Propagation of extended error information" setting to organizational standards. CC ID 11110 | System hardening through configuration management | Configuration | |
Configure the "Register PTR Records" setting to organizational standards. CC ID 11121 | System hardening through configuration management | Configuration | |
Configure the "Registration Refresh Interval" setting to organizational standards. CC ID 11122 | System hardening through configuration management | Configuration | |
Configure the "Remove Program Compatibility Property Page" setting to organizational standards. CC ID 11128 | System hardening through configuration management | Configuration | |
Configure the "Remove users ability to invoke machine policy refresh" setting to organizational standards. CC ID 11129 | System hardening through configuration management | Configuration | |
Configure the "Remove Windows Security item from Start menu" setting to organizational standards. CC ID 11130 | System hardening through configuration management | Configuration | |
Configure the "Re-prompt for restart with scheduled installations" setting to organizational standards. CC ID 11131 | System hardening through configuration management | Configuration | |
Configure the "Require secure RPC communication" setting to organizational standards. CC ID 11134 | System hardening through configuration management | Configuration | |
Configure the "Require strict KDC validation" setting to organizational standards. CC ID 11135 | System hardening through configuration management | Configuration | |
Configure the "Reverse the subject name stored in a certificate when displaying" setting to organizational standards. CC ID 11148 | System hardening through configuration management | Configuration | |
Configure the "RPC Troubleshooting State Information" setting to organizational standards. CC ID 11150 | System hardening through configuration management | Configuration | |
Configure the "Run shutdown scripts visible" setting to organizational standards. CC ID 11152 | System hardening through configuration management | Configuration | |
Configure the "Run startup scripts asynchronously" setting to organizational standards. CC ID 11153 | System hardening through configuration management | Configuration | |
Configure the "Run startup scripts visible" setting to organizational standards. CC ID 11154 | System hardening through configuration management | Configuration | |
Configure the "Scavenge Interval" setting to organizational standards. CC ID 11158 | System hardening through configuration management | Configuration | |
Configure the "Server Authentication Certificate Template" setting to organizational standards. CC ID 11170 | System hardening through configuration management | Configuration | |
Configure the "Set BranchCache Distributed Cache mode" setting to organizational standards. CC ID 11172 | System hardening through configuration management | Configuration | |
Configure the "Set BranchCache Hosted Cache mode" setting to organizational standards. CC ID 11173 | System hardening through configuration management | Configuration | |
Configure the "Set compression algorithm for RDP data" setting to organizational standards. CC ID 11174 | System hardening through configuration management | Configuration | |
Configure the "Set percentage of disk space used for client computer cache" setting to organizational standards. CC ID 11177 | System hardening through configuration management | Configuration | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Global" to organizational standards. CC ID 11178 | System hardening through configuration management | Configuration | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Site Local" to organizational standards. CC ID 11180 | System hardening through configuration management | Configuration | |
Configure the "Set the Email IDs to which notifications are to be sent" setting to organizational standards. CC ID 11184 | System hardening through configuration management | Configuration | |
Configure the "Set the map update interval for NIS subordinate servers" setting to organizational standards. CC ID 11186 | System hardening through configuration management | Configuration | |
Configure the "Set the Seed Server" setting for "IPv6 Global" to organizational standards. CC ID 11189 | System hardening through configuration management | Configuration | |
Configure the "Set the Seed Server" setting for "IPv6 Site Local" to organizational standards. CC ID 11191 | System hardening through configuration management | Configuration | |
Configure the "Set the SMTP Server used to send notifications" setting to organizational standards. CC ID 11192 | System hardening through configuration management | Configuration | |
Configure the "Set timer resolution" setting to organizational standards. CC ID 11196 | System hardening through configuration management | Configuration | |
Configure the "Sets how often a DFS Client discovers DC's" setting to organizational standards. CC ID 11199 | System hardening through configuration management | Configuration | |
Configure the "Short name creation options" setting to organizational standards. CC ID 11200 | System hardening through configuration management | Configuration | |
Configure the "Site Name" setting to organizational standards. CC ID 11201 | System hardening through configuration management | Configuration | |
Configure the "Specify a default color" setting to organizational standards. CC ID 11208 | System hardening through configuration management | Configuration | |
Configure the "Specify idle Timeout" setting to organizational standards. CC ID 11210 | System hardening through configuration management | Configuration | |
Configure the "Specify maximum amount of memory in MB per Shell" setting to organizational standards. CC ID 11211 | System hardening through configuration management | Configuration | |
Configure the "Specify maximum number of processes per Shell" setting to organizational standards. CC ID 11212 | System hardening through configuration management | Configuration | |
Configure the "Specify Shell Timeout" setting to organizational standards. CC ID 11216 | System hardening through configuration management | Configuration | |
Configure the "Specify Windows installation file location" setting to organizational standards. CC ID 11225 | System hardening through configuration management | Configuration | |
Configure the "Specify Windows Service Pack installation file location" setting to organizational standards. CC ID 11226 | System hardening through configuration management | Configuration | |
Configure the "SSL Cipher Suite Order" setting to organizational standards. CC ID 11227 | System hardening through configuration management | Configuration | |
Configure the "Switch to the Simplified Chinese (PRC) gestures" setting to organizational standards. CC ID 11230 | System hardening through configuration management | Configuration | |
Configure the "Sysvol share compatibility" setting to organizational standards. CC ID 11231 | System hardening through configuration management | Configuration | |
Configure the "Tag Windows Customer Experience Improvement data with Study Identifier" setting to organizational standards. CC ID 11232 | System hardening through configuration management | Configuration | |
Configure the "Teredo Client Port" setting to organizational standards. CC ID 11236 | System hardening through configuration management | Configuration | |
Configure the "Teredo Default Qualified" setting to organizational standards. CC ID 11237 | System hardening through configuration management | Configuration | |
Configure the "Teredo Refresh Rate" setting to organizational standards. CC ID 11238 | System hardening through configuration management | Configuration | |
Configure the "Teredo Server Name" setting to organizational standards. CC ID 11239 | System hardening through configuration management | Configuration | |
Configure the "Teredo State" setting to organizational standards. CC ID 11240 | System hardening through configuration management | Configuration | |
Configure the "Time (in seconds) to force reboot" setting to organizational standards. CC ID 11242 | System hardening through configuration management | Configuration | |
Configure the "Time (in seconds) to force reboot when required for policy changes to take effect" setting to organizational standards. CC ID 11243 | System hardening through configuration management | Configuration | |
Configure the "Timeout for fast user switching events" setting to organizational standards. CC ID 11244 | System hardening through configuration management | Configuration | |
Configure the "Traps for public community" setting to organizational standards. CC ID 11246 | System hardening through configuration management | Configuration | |
Configure the "Trusted Hosts" setting to organizational standards. CC ID 11249 | System hardening through configuration management | Configuration | |
Configure the "Try Next Closest Site" setting to organizational standards. CC ID 11250 | System hardening through configuration management | Configuration | |
Configure the "TTL Set in the A and PTR records" setting to organizational standards. CC ID 11251 | System hardening through configuration management | Configuration | |
Configure the "Turn on Accounting for WSRM" setting to organizational standards. CC ID 11333 | System hardening through configuration management | Configuration | |
Configure the "Turn on BranchCache" setting to organizational standards. CC ID 11334 | System hardening through configuration management | Configuration | |
Configure the "Turn on certificate propagation from smart card" setting to organizational standards. CC ID 11335 | System hardening through configuration management | Configuration | |
Configure the "Turn On Compatibility HTTP Listener" setting to organizational standards. CC ID 11336 | System hardening through configuration management | Configuration | |
Configure the "Turn On Compatibility HTTPS Listener" setting to organizational standards. CC ID 11337 | System hardening through configuration management | Configuration | |
Configure the "Turn on definition updates through both WSUS and the Microsoft Malware Protection Center" setting to organizational standards. CC ID 11338 | System hardening through configuration management | Configuration | |
Configure the "Turn on definition updates through both WSUS and Windows Update" setting to organizational standards. CC ID 11339 | System hardening through configuration management | Configuration | |
Configure the "Turn on economical application of administratively assigned Offline Files" setting to organizational standards. CC ID 11342 | System hardening through configuration management | Configuration | |
Configure the "Turn on Mapper I/O (LLTDIO) driver" setting to organizational standards. CC ID 11346 | System hardening through configuration management | Configuration | |
Configure the "Turn on recommended updates via Automatic Updates" setting to organizational standards. CC ID 11347 | System hardening through configuration management | Configuration | |
Configure the "Turn on root certificate propagation from smart card" setting to organizational standards. CC ID 11349 | System hardening through configuration management | Configuration | |
Configure the "Turn on Software Notifications" setting to organizational standards. CC ID 11352 | System hardening through configuration management | Configuration | |
Configure the "Turn on TPM backup to Active Directory Domain Services" setting to organizational standards. CC ID 11356 | System hardening through configuration management | Configuration | |
Configure the "Use forest search order" setting for "Key Distribution Center (KDC) searches" to organizational standards. CC ID 11359 | System hardening through configuration management | Configuration | |
Configure the "Use forest search order" setting for "Kerberos client searches" to organizational standards. CC ID 11360 | System hardening through configuration management | Configuration | |
Configure the "Use IP Address Redirection" setting to organizational standards. CC ID 11361 | System hardening through configuration management | Configuration | |
Configure the "Use localized subfolder names when redirecting Start Menu and My Documents" setting to organizational standards. CC ID 11362 | System hardening through configuration management | Configuration | |
Configure the "Use mandatory profiles on the RD Session Host server" setting to organizational standards. CC ID 11363 | System hardening through configuration management | Configuration | |
Configure the "Verbose vs normal status messages" setting to organizational standards. CC ID 11368 | System hardening through configuration management | Configuration | |
Configure the "Verify old and new Folder Redirection targets point to the same share before redirecting" setting to organizational standards. CC ID 11369 | System hardening through configuration management | Configuration | |
Configure the "Windows Scaling Heuristics State" setting to organizational standards. CC ID 11372 | System hardening through configuration management | Configuration | |
Configure the "Obtain Software Package Updates with apt-get" setting to organizational standards. CC ID 11375 | System hardening through configuration management | Configuration | |
Configure the "display a banner before authentication" setting for "LightDM" to organizational standards. CC ID 11385 | System hardening through configuration management | Configuration | |
Configure the "shadow" group to organizational standards. CC ID 11386 | System hardening through configuration management | Configuration | |
Configure the "AppArmor" setting to organizational standards. CC ID 11387 | System hardening through configuration management | Configuration | |
Configure knowledge-based authentication tools in accordance with organizational standards. CC ID 13740 | System hardening through configuration management | Configuration | |
Configure the session timeout for the knowledge-based authentication tool used for the identity proofing process according to organizational standards. CC ID 13754 | System hardening through configuration management | Configuration | |
Configure the knowledge-based authentication tool to restart after a session timeout. CC ID 13753 | System hardening through configuration management | Configuration | |
Configure the number of attempts allowed to complete the knowledge-based authentication in the knowledge-based authentication tool. CC ID 13751 | System hardening through configuration management | Configuration | |
Disable or configure the e-mail server, as necessary. CC ID 06563 | System hardening through configuration management | Configuration | |
Configure e-mail servers to enable receiver-side verification. CC ID 12223 | System hardening through configuration management | Configuration | |
Configure the e-mail server to prevent it from listening to external interfaces. CC ID 01561 | System hardening through configuration management | Configuration | |
Configure the "Local-Only Mode" setting for the "Mail Transfer Agent" to organizational standards. CC ID 09940 | System hardening through configuration management | Configuration | |
Configure the system account settings and the permission settings in accordance with the organizational standards. CC ID 01538 | System hardening through configuration management | Configuration | |
Configure Windows User Account Control in accordance with organizational standards. CC ID 16437 | System hardening through configuration management | Configuration | |
Configure the at.allow file with the users who are permitted to use the at facility, as appropriate. CC ID 06005 | System hardening through configuration management | Configuration | |
Configure the /etc/xinetd.conf file group permissions, as appropriate. CC ID 05994 | System hardening through configuration management | Configuration | |
Create the default adduser.conf file. CC ID 01581 | System hardening through configuration management | Configuration | |
Configure user accounts. CC ID 07036 | System hardening through configuration management | Configuration | |
Configure account expiration parameters on active accounts. CC ID 01580 | System hardening through configuration management | Configuration | |
Remove unnecessary default accounts. CC ID 01539 | System hardening through configuration management | Configuration | |
Disable all unnecessary user identifiers. CC ID 02185 | System hardening through configuration management | Configuration | |
Remove unnecessary user credentials. CC ID 16409 | System hardening through configuration management | Configuration | |
Remove the root user as appropriate. CC ID 01582 | System hardening through configuration management | Configuration | |
Disable or remove the null account. CC ID 06572 | System hardening through configuration management | Configuration | |
Change default accounts. CC ID 16468 | System hardening through configuration management | Process or Activity | |
Configure accounts with administrative privilege. CC ID 07033 | System hardening through configuration management | Configuration | |
Employ multifactor authentication for accounts with administrative privilege. CC ID 12496 | System hardening through configuration management | Technical Security | |
Disable root logons or limit the logons to the system console. CC ID 01573 | System hardening through configuration management | Configuration | |
Encrypt non-console administrative access. CC ID 00883 | System hardening through configuration management | Configuration | |
Invoke a strong encryption method before requesting an authenticator. CC ID 11986 | System hardening through configuration management | Technical Security | |
Configure the default group for the root user. CC ID 01586 | System hardening through configuration management | Configuration | |
Rename or disable the Administrator Account. CC ID 01721 | System hardening through configuration management | Configuration | |
Create a backup administrator account. CC ID 04497 | System hardening through configuration management | Configuration | |
Configure the general user ID parameters. CC ID 02186 | System hardening through configuration management | Configuration | |
Configure the Master user ID parameters inside the Site Management Complex. CC ID 02187 | System hardening through configuration management | Configuration | |
Configure the subadministrators user ID parameters. CC ID 02188 | System hardening through configuration management | Configuration | |
Configure the user account expiration date. CC ID 07101 | System hardening through configuration management | Configuration | |
Configure User Rights. CC ID 07034 | System hardening through configuration management | Configuration | |
Configure the "Access this computer from the network" User Right. CC ID 01834 | System hardening through configuration management | Configuration | |
Configure the "Act as a part of the operating system" User Right. CC ID 01835 | System hardening through configuration management | Configuration | |
Configure the "Add workstations to domain" User Right setting to organizational standards. CC ID 01836 | System hardening through configuration management | Configuration | |
Configure the "Adjust memory quotas for a process" User Right. CC ID 01837 | System hardening through configuration management | Configuration | |
Configure the "Allow log on through Terminal Services" User Right setting to organizational standards. CC ID 01838 | System hardening through configuration management | Configuration | |
Configure the "Back up files and directories" User Right. CC ID 01839 | System hardening through configuration management | Configuration | |
Configure the "Bypass traverse checking" User Right. CC ID 01840 | System hardening through configuration management | Configuration | |
Configure the "Change the system time" User Right. CC ID 01841 | System hardening through configuration management | Configuration | |
Configure the "Change the time zone" User Right. CC ID 04382 | System hardening through configuration management | Configuration | |
Configure the "Create a pagefile" User Right. CC ID 01842 | System hardening through configuration management | Configuration | |
Configure the "Create a token object" User Right. CC ID 01843 | System hardening through configuration management | Configuration | |
Configure the "Create permanent shared objects" User Right. CC ID 01844 | System hardening through configuration management | Configuration | |
Configure the "Debug programs" User Right. CC ID 01845 | System hardening through configuration management | Configuration | |
Configure the "Deny access to this computer from the network" User Right. CC ID 01846 | System hardening through configuration management | Configuration | |
Configure the "Deny log on as a batch job" User Right setting to organizational standards. CC ID 01847 | System hardening through configuration management | Configuration | |
Configure the "Deny log on as a service" User Right setting to organizational standards. CC ID 01848 | System hardening through configuration management | Configuration | |
Configure the "Deny log on locally" User Right setting to organizational standards. CC ID 01849 | System hardening through configuration management | Configuration | |
Configure the "Deny log on through Terminal Service" User Right setting to organizational standards. CC ID 01850 | System hardening through configuration management | Configuration | |
Configure the "Enable computer and user accounts to be trusted for delegation" User Right. CC ID 01851 | System hardening through configuration management | Configuration | |
Configure the "Force shutdown from a remote system" User Right. CC ID 01852 | System hardening through configuration management | Configuration | |
Configure the "Generate security audits" User Right. CC ID 01853 | System hardening through configuration management | Configuration | |
Configure the "Increase scheduling priority" User Right. CC ID 01854 | System hardening through configuration management | Configuration | |
Configure the "Load and unload device drivers" User Right. CC ID 01855 | System hardening through configuration management | Configuration | |
Configure the "Lock pages in memory" User Right. CC ID 01856 | System hardening through configuration management | Configuration | |
Configure the "Lock Inactive User Accounts" setting to organizational standards. CC ID 09921 | System hardening through configuration management | Configuration | |
Configure the "Log on as a batch job" User Right. CC ID 01857 | System hardening through configuration management | Configuration | |
Configure the "Log on as a service" User Right. CC ID 01858 | System hardening through configuration management | Configuration | |
Configure the "Allow log on locally" User Right setting to organizational standards. CC ID 01859 | System hardening through configuration management | Configuration | |
Configure the "Manage auditing and security log" User Right. CC ID 01860 | System hardening through configuration management | Configuration | |
Configure the "Modify firmware environment values" User Right. CC ID 01861 | System hardening through configuration management | Configuration | |
Configure the "Perform volume maintenance tasks" User Right. CC ID 01862 | System hardening through configuration management | Configuration | |
Configure the "Profile single process" User Right. CC ID 01863 | System hardening through configuration management | Configuration | |
Configure the "Profile system performance" User Right. CC ID 01864 | System hardening through configuration management | Configuration | |
Configure the "Remove computer from docking station" User Right. CC ID 01865 | System hardening through configuration management | Configuration | |
Configure the "Replace a process level token" User Right. CC ID 01866 | System hardening through configuration management | Configuration | |
Configure the "Restore files and directories" User Right. CC ID 01867 | System hardening through configuration management | Configuration | |
Configure the "Shut down the system" User Right. CC ID 01868 | System hardening through configuration management | Configuration | |
Configure the "Synchronize directory service data" User Right setting to organizational standards. CC ID 01869 | System hardening through configuration management | Configuration | |
Configure the "Take ownership of files or other objects" User Right. CC ID 01870 | System hardening through configuration management | Configuration | |
Configure the "Create global objects" User Right. CC ID 04383 | System hardening through configuration management | Configuration | |
Configure the "Create symbolic links" User Right. CC ID 04384 | System hardening through configuration management | Configuration | |
Configure the "Impersonate a client after authentication" User Right. CC ID 04385 | System hardening through configuration management | Configuration | |
Configure the "Increase a process working set" User Right. CC ID 04386 | System hardening through configuration management | Configuration | |
Configure file permissions and directory permissions to organizational standards. CC ID 07035 | System hardening through configuration management | Configuration | |
Configure "SYSVOL" to organizational standards. CC ID 15398 | System hardening through configuration management | Configuration | |
Configure the Cron log file permissions, as appropriate. CC ID 05998 | System hardening through configuration management | Configuration | |
Configure the "docker.service" file ownership to organizational standards. CC ID 14477 | System hardening through configuration management | Configuration | |
Establish and verify the file permissions for the passwd files, the shadow files, and the group files. CC ID 01537 | System hardening through configuration management | Technical Security | |
Verify uneven file permissions and uneven directory permissions do not occur, except on the WWW directory. CC ID 02159 | System hardening through configuration management | Configuration | |
Configure the "/dev/kmem" file permissions to organizational standards. CC ID 05449 | System hardening through configuration management | Configuration | |
Configure the "/dev/mem" file permissions to organizational standards. CC ID 05450 | System hardening through configuration management | Configuration | |
Configure the "/dev/null" file permissions to organizational standards. CC ID 05451 | System hardening through configuration management | Configuration | |
Configure the "resolv.conf" file permissions to organizational standards. CC ID 05452 | System hardening through configuration management | Configuration | |
Configure the "/etc/named.conf" file permissions to organizational standards. CC ID 05453 | System hardening through configuration management | Configuration | |
Configure the "/etc/group" file permissions to organizational standards. CC ID 05454 | System hardening through configuration management | Configuration | |
Set the /etc/exports file file permissions properly. CC ID 05455 | System hardening through configuration management | Configuration | |
Set the /usr/bin/at file file permissions properly. CC ID 05456 | System hardening through configuration management | Configuration | |
Configure the "/usr/bin/rdist" file permissions to organizational standards. CC ID 05457 | System hardening through configuration management | Configuration | |
Configure the "/usr/sbin/sync" file permissions to organizational standards. CC ID 05458 | System hardening through configuration management | Configuration | |
Configure the "aliases" file permissions to organizational standards. CC ID 05460 | System hardening through configuration management | Configuration | |
Set the file permissions for log file that is configured to capture critical sendmail messages properly. CC ID 05461 | System hardening through configuration management | Log Management | |
Set the file permissions for all files executed through /etc/aliases file entries properly. CC ID 05462 | System hardening through configuration management | Configuration | |
Configure the "/bin/csh" file permissions to organizational standards. CC ID 05463 | System hardening through configuration management | Configuration | |
Configure the "/bin/jsh" file permissions to organizational standards. CC ID 05464 | System hardening through configuration management | Configuration | |
Configure the "/bin/ksh" file permissions to organizational standards. CC ID 05465 | System hardening through configuration management | Configuration | |
Configure the "/bin/sh" file permissions to organizational standards. CC ID 05466 | System hardening through configuration management | Configuration | |
Configure the "/bin/bash" file permissions to organizational standards. CC ID 05467 | System hardening through configuration management | Configuration | |
Configure the "/sbin/csh" file permissions to organizational standards. CC ID 05468 | System hardening through configuration management | Configuration | |
Configure the "/sbin/jsh" file permissions to organizational standards. CC ID 05469 | System hardening through configuration management | Configuration | |
Configure the "/sbin/ksh" file permissions to organizational standards. CC ID 05470 | System hardening through configuration management | Configuration | |
Configure the "/sbin/sh" file permissions to organizational standards. CC ID 05471 | System hardening through configuration management | Configuration | |
Configure the "/sbin/bash" file permissions to organizational standards. CC ID 05472 | System hardening through configuration management | Configuration | |
Configure the "/usr/bin/csh" file permissions to organizational standards. CC ID 05473 | System hardening through configuration management | Configuration | |
Configure the "/usr/bin/jsh" file permissions to organizational standards. CC ID 05474 | System hardening through configuration management | Configuration | |
Configure the "/usr/bin/ksh" file permissions to organizational standards. CC ID 05475 | System hardening through configuration management | Configuration | |
Configure the "/usr/bin/sh" file permissions to organizational standards. CC ID 05476 | System hardening through configuration management | Configuration | |
Configure the "/usr/bin/bash" file permissions to organizational standards. CC ID 05477 | System hardening through configuration management | Configuration | |
Configure the "snmpd.conf" file permissions to organizational standards. CC ID 05478 | System hardening through configuration management | Configuration | |
Configure the "/tmp" file permissions to organizational standards. CC ID 05479 | System hardening through configuration management | Configuration | |
Configure the "/usr/tmp" file permissions to organizational standards. CC ID 05480 | System hardening through configuration management | Configuration | |
Configure the ".Xauthority" file permissions to organizational standards. CC ID 05481 | System hardening through configuration management | Configuration | |
Configure the "/etc/aliases" file permissions to organizational standards. CC ID 05482 | System hardening through configuration management | Configuration | |
Configure the "/etc/csh" file permissions to organizational standards. CC ID 05483 | System hardening through configuration management | Configuration | |
Configure the "/etc/default/docker" file permissions to organizational standards. CC ID 14487 | System hardening through configuration management | Configuration | |
Configure the "/etc/default/docker" file ownership to organizational standards. CC ID 14484 | System hardening through configuration management | Configuration | |
Configure the "/etc/default/*" file permissions to organizational standards. CC ID 05484 | System hardening through configuration management | Configuration | |
Configure the "/etc/docker" directory permissions to organizational standards. CC ID 14470 | System hardening through configuration management | Configuration | |
Configure the "/etc/docker" directory ownership to organizational standards. CC ID 14469 | System hardening through configuration management | Configuration | |
Set the file permissions for /etc/default/login properly. CC ID 05485 | System hardening through configuration management | Configuration | |
Configure the "/etc/gshadow" file permissions to organizational standards. CC ID 05486 | System hardening through configuration management | Configuration | |
Configure the "/etc/host.lpd" file permissions to organizational standards. CC ID 05487 | System hardening through configuration management | Configuration | |
Configure the "/etc/hostname*" file permissions to organizational standards. CC ID 05488 | System hardening through configuration management | Configuration | |
Configure the "/etc/hosts" file permissions to organizational standards. CC ID 05489 | System hardening through configuration management | Configuration | |
Set the /etc/inetd.conf file file permissions properly. CC ID 05490 | System hardening through configuration management | Configuration | |
Configure the "/etc/issue" file permissions to organizational standards. CC ID 05491 | System hardening through configuration management | Configuration | |
Configure the "/etc/jsh" file permissions to organizational standards. CC ID 05492 | System hardening through configuration management | Configuration | |
Configure the "/etc/kubernetes/pki/*.crt" file permissions to organizational standards. CC ID 14562 | System hardening through configuration management | Configuration | |
Configure the "/etc/kubernetes/pki/*.key" file permissions to organizational standards. CC ID 14557 | System hardening through configuration management | Configuration | |
Configure the "/etc/kubernetes/pki" file ownership to organizational standards. CC ID 14555 | System hardening through configuration management | Configuration | |
Configure the "/etc/ksh" file permissions to organizational standards. CC ID 05493 | System hardening through configuration management | Configuration | |
Configure the "/etc/mail/aliases" file permissions to organizational standards. CC ID 05494 | System hardening through configuration management | Configuration | |
Configure the "/etc/motd" file permissions to organizational standards. CC ID 05495 | System hardening through configuration management | Configuration | |
Configure the "/etc/netconfig" file permissions to organizational standards. CC ID 05496 | System hardening through configuration management | Configuration | |
Configure the "/etc/notrouter" file permissions to organizational standards. CC ID 05497 | System hardening through configuration management | Configuration | |
Configure the "/etc/passwd" file permissions to organizational standards. CC ID 05498 | System hardening through configuration management | Configuration | |
Configure the "/etc/security" file permissions to organizational standards. CC ID 05499 | System hardening through configuration management | Configuration | |
Configure the "/etc/services" file permissions to organizational standards. CC ID 05500 | System hardening through configuration management | Configuration | |
Configure the "/etc/sysconfig/docker" file ownership to organizational standards. CC ID 14491 | System hardening through configuration management | Configuration | |
Configure the "/etc/sh" file permissions to organizational standards. CC ID 05501 | System hardening through configuration management | Configuration | |
Configure the "/etc/sysconfig/docker" file permissions to organizational standards. CC ID 14486 | System hardening through configuration management | Configuration | |
Configure the "/etc/shadow" file permissions to organizational standards. CC ID 05502 | System hardening through configuration management | Configuration | |
Configure the "docker.socket" file ownership to organizational standards. CC ID 14472 | System hardening through configuration management | Configuration | |
Configure the "/etc/syslog.conf" file permissions to organizational standards. CC ID 05503 | System hardening through configuration management | Configuration | |
Configure the "/etc/fstab" file permissions to organizational standards. CC ID 05504 | System hardening through configuration management | Configuration | |
Configure the "docker.socket" file permissions to organizational standards. CC ID 14468 | System hardening through configuration management | Configuration | |
Configure the "/var/adm/messages" file permissions to organizational standards. CC ID 05505 | System hardening through configuration management | Configuration | |
Configure the "/var/adm/sulog" file permissions to organizational standards. CC ID 05506 | System hardening through configuration management | Configuration | |
Configure the "/var/adm/utmp" file permissions to organizational standards. CC ID 05507 | System hardening through configuration management | Configuration | |
Configure the "/var/adm/wtmp" file permissions to organizational standards. CC ID 05508 | System hardening through configuration management | Configuration | |
Configure the "/var/adm/authlog" file permissions to organizational standards. CC ID 05509 | System hardening through configuration management | Configuration | |
Configure the "/var/adm/syslog" file permissions to organizational standards. CC ID 05510 | System hardening through configuration management | Configuration | |
Configure the "/var/mail" file permissions to organizational standards. CC ID 05511 | System hardening through configuration management | Configuration | |
Configure the "/var/tmp" file permissions to organizational standards. CC ID 05512 | System hardening through configuration management | Configuration | |
Configure the "/usr/lib/pt_chmod" file permissions to organizational standards. CC ID 05513 | System hardening through configuration management | Configuration | |
Configure the "/usr/lib/embedded_us" file permissions to organizational standards. CC ID 05514 | System hardening through configuration management | Configuration | |
Configure the "/usr/kerberos/bin/rsh" file permissions to organizational standards. CC ID 05515 | System hardening through configuration management | Configuration | |
Configure the "/var/spool/mail" file permissions to organizational standards. CC ID 05516 | System hardening through configuration management | Configuration | |
Configure the "smbpasswd" file permissions to organizational standards. CC ID 05517 | System hardening through configuration management | Configuration | |
Configure the "/usr/lib/sendmail" file permissions to organizational standards. CC ID 05518 | System hardening through configuration management | Configuration | |
Set the /etc/security/audit/config file file permissions properly. CC ID 05519 | System hardening through configuration management | Configuration | |
Set the /etc/security/audit/events file file permissions properly. CC ID 05520 | System hardening through configuration management | Configuration | |
Set the /etc/security/audit/objects file file permissions properly. CC ID 05521 | System hardening through configuration management | Configuration | |
Set the /usr/lib/trcload file file permissions properly. CC ID 05522 | System hardening through configuration management | Configuration | |
Set the /usr/lib/semutil file file permissions properly. CC ID 05523 | System hardening through configuration management | Configuration | |
Set the /etc/rc.config.d/auditing file file permissions properly. CC ID 05524 | System hardening through configuration management | Configuration | |
Configure the "/etc/init.d" file permissions to organizational standards. CC ID 05525 | System hardening through configuration management | Configuration | |
Set the /etc/hosts.lpd file file permissions properly. CC ID 05526 | System hardening through configuration management | Configuration | |
Configure the "/etc/pam.conf" file permissions to organizational standards. CC ID 05527 | System hardening through configuration management | Configuration | |
Configure the "/boot/grub/grub.conf" file permissions to organizational standards. CC ID 05528 | System hardening through configuration management | Configuration | |
Configure the "/etc/grub.conf" file permissions to organizational standards. CC ID 05529 | System hardening through configuration management | Configuration | |
Configure the "/etc/lilo.conf" file permissions to organizational standards. CC ID 05530 | System hardening through configuration management | Configuration | |
Set the file permissions for /etc/login.access properly. CC ID 05531 | System hardening through configuration management | Configuration | |
Configure the "docker.service" file permissions to organizational standards. CC ID 14479 | System hardening through configuration management | Configuration | |
Configure the "/etc/security/access.conf" file permissions to organizational standards. CC ID 05532 | System hardening through configuration management | Configuration | |
Configure the "/etc/sysctl.conf" file permissions to organizational standards. CC ID 05533 | System hardening through configuration management | Configuration | |
Configure the "/etc/securetty" file permissions to organizational standards. CC ID 05534 | System hardening through configuration management | Configuration | |
Configure the "/etc/audit/auditd.conf" file permissions to organizational standards. CC ID 05535 | System hardening through configuration management | Configuration | |
Configure the "audit.rules" file permissions to organizational standards. CC ID 05536 | System hardening through configuration management | Configuration | |
Set the /usr/sbin/userhelper file file permissions properly. CC ID 05537 | System hardening through configuration management | Configuration | |
Set the file permissions for all syslog log files properly. CC ID 05538 | System hardening through configuration management | Configuration | |
Set the /etc/anacrontab file file permissions properly. CC ID 05543 | System hardening through configuration management | Configuration | |
Set the /etc/pki/tls/CA/cacert.pem file file permissions properly. CC ID 05544 | System hardening through configuration management | Configuration | |
Set the /etc/pki/tls/ldap/serverkey.pem file file permissions properly. CC ID 05545 | System hardening through configuration management | Configuration | |
Set the /etc/pki/tls/ldap/servercert.pem file file permissions properly. CC ID 05546 | System hardening through configuration management | Configuration | |
Set the /etc/pki/tls/ldap file file permissions properly. CC ID 05547 | System hardening through configuration management | Configuration | |
Set the /etc/httpd/conf file file permissions properly. CC ID 05548 | System hardening through configuration management | Configuration | |
Set the /etc/httpd/conf/* file file permissions properly. CC ID 05549 | System hardening through configuration management | Configuration | |
Set the /usr/sbin/httpd file file permissions properly. CC ID 05550 | System hardening through configuration management | Configuration | |
Set the /var/log/httpd file file permissions properly. CC ID 05551 | System hardening through configuration management | Configuration | |
Set the daemon debug log file file permissions properly. CC ID 05552 | System hardening through configuration management | Configuration | |
Set the Cron log file file permissions properly. CC ID 05553 | System hardening through configuration management | Configuration | |
Set the file permissions for system accounting properly. CC ID 05554 | System hardening through configuration management | Configuration | |
Set the /etc/dfs file file permissions properly. CC ID 05555 | System hardening through configuration management | Configuration | |
Set the /etc/fs file permissions properly. CC ID 05556 | System hardening through configuration management | Configuration | |
Set the /etc/ufs file file permissions properly. CC ID 05557 | System hardening through configuration management | Configuration | |
Set the /etc/vfstab file file permissions properly. CC ID 05558 | System hardening through configuration management | Configuration | |
Set the vold.conf file permissions properly. CC ID 05559 | System hardening through configuration management | Configuration | |
Configure the "Docker socket" file ownership to organizational standards. CC ID 14493 | System hardening through configuration management | Configuration | |
Configure the "daemon.json" file permissions to organizational standards. CC ID 14492 | System hardening through configuration management | Configuration | |
Set the ASET userlist file permissions properly. CC ID 05560 | System hardening through configuration management | Configuration | |
Set the /etc/rmmount.conf file file permissions properly. CC ID 05561 | System hardening through configuration management | Configuration | |
Configure the "Docker server certificate" file ownership to organizational standards. CC ID 14471 | System hardening through configuration management | Configuration | |
Configure the "Docker server certificate key" file permissions to organizational standards. CC ID 14485 | System hardening through configuration management | Configuration | |
Set the /etc/security/audit_control file file permissions properly. CC ID 05563 | System hardening through configuration management | Configuration | |
Configure the "daemon.json" file ownership to organizational standards. CC ID 14482 | System hardening through configuration management | Configuration | |
Configure the "Docker socket" file permissions to organizational standards. CC ID 14480 | System hardening through configuration management | Configuration | |
Set the /etc/security/audit_class file file permissions properly. CC ID 05564 | System hardening through configuration management | Configuration | |
Configure the "Docker server certificate key" file ownership to organizational standards. CC ID 14478 | System hardening through configuration management | Configuration | |
Configure the "admin.conf" file ownership to organizational standards. CC ID 14556 | System hardening through configuration management | Configuration | |
Set the /etc/security/audit_event file file permissions properly. CC ID 05565 | System hardening through configuration management | Configuration | |
Configure the "admin.conf" file permissions to organizational standards. CC ID 14554 | System hardening through configuration management | Configuration | |
Configure the "Certificate Authority" file ownership to organizational standards. CC ID 14630 | System hardening through configuration management | Configuration | |
Configure the "Docker server certificate" file permissions to organizational standards. CC ID 14476 | System hardening through configuration management | Configuration | |
Configure the "etcd" data directory ownership to organizational standards. CC ID 14620 | System hardening through configuration management | Configuration | |
Configure the "etcd" data directory permissions to organizational standards. CC ID 14618 | System hardening through configuration management | Configuration | |
Configure the "etcd.yaml" file ownership to organizational standards. CC ID 14615 | System hardening through configuration management | Configuration | |
Configure the "etcd.yaml" file permissions to organizational standards. CC ID 14609 | System hardening through configuration management | Configuration | |
Configure the file permissions for at.allow, as appropriate. CC ID 05995 | System hardening through configuration management | Configuration | |
Configure the file permissions for at.deny, as appropriate. CC ID 05996 | System hardening through configuration management | Configuration | |
Configure the file permissions for cron.allow, as appropriate. CC ID 05999 | System hardening through configuration management | Configuration | |
Configure the file permissions for cron.deny, as appropriate. CC ID 06000 | System hardening through configuration management | Configuration | |
Configure the "Certificate Authority" file permissions to organizational standards. CC ID 14623 | System hardening through configuration management | Configuration | |
Configure the file permissions for /usr/bin/at file, as appropriate. CC ID 06001 | System hardening through configuration management | Configuration | |
Configure the "kubelet --config" file ownership to organizational standards. CC ID 14632 | System hardening through configuration management | Configuration | |
Configure the file permissions for the /etc/cron.daily file, as appropriate. CC ID 06008 | System hardening through configuration management | Configuration | |
Configure the "kubelet.conf" file ownership to organizational standards. CC ID 14628 | System hardening through configuration management | Configuration | |
Configure the "kubelet --config" file permissions to organizational standards. CC ID 14625 | System hardening through configuration management | Configuration | |
Configure the file permissions for the /etc/cron.weekly file, as appropriate. CC ID 06009 | System hardening through configuration management | Configuration | |
Configure the file permissions for the /etc/cron.hourly file, as appropriate. CC ID 06010 | System hardening through configuration management | Configuration | |
Configure the "kubelet service" file permissions to organizational standards. CC ID 14660 | System hardening through configuration management | Configuration | |
Configure the "kubelet.conf" file permissions to organizational standards. CC ID 14619 | System hardening through configuration management | Configuration | |
Configure the "controller-manager.conf" file ownership to organizational standards. CC ID 14560 | System hardening through configuration management | Configuration | |
Configure the "kubeconfig" file ownership to organizational standards. CC ID 14617 | System hardening through configuration management | Configuration | |
Configure the "kubeconfig" file permissions to organizational standards. CC ID 14616 | System hardening through configuration management | Configuration | |
Configure the file permissions for the /etc/cron.monthly file, as appropriate. CC ID 06013 | System hardening through configuration management | Configuration | |
Configure the "kubelet service" file ownership to organizational standards. CC ID 14612 | System hardening through configuration management | Configuration | |
Configure the "kube-scheduler.yaml" file ownership to organizational standards. CC ID 14611 | System hardening through configuration management | Configuration | |
Configure the file permissions for all user home directories, as appropriate. CC ID 06019 | System hardening through configuration management | Configuration | |
Configure the "kube-scheduler.yaml" file permissions to organizational standards. CC ID 14603 | System hardening through configuration management | Configuration | |
Configure the "kube-controller-manager.yaml" file ownership to organizational standards. CC ID 14600 | System hardening through configuration management | Configuration | |
Configure the "kube-controller-manager.yaml" file permissions to organizational standards. CC ID 14598 | System hardening through configuration management | Configuration | |
Configure the "kube-apiserver.yaml" file ownership to organizational standards. CC ID 14597 | System hardening through configuration management | Configuration | |
Configure the "scheduler.conf" file ownership to organizational standards. CC ID 14558 | System hardening through configuration management | Configuration | |
Configure the .netrc file permissions, as necessary. CC ID 06022 | System hardening through configuration management | Configuration | |
Configure the "all rsyslog log files" permissions to organizational standards. CC ID 08748 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "controller-manager.conf" file permissions to organizational standards. CC ID 14553 | System hardening through configuration management | Configuration | |
Configure the "Container Network Interface" file ownership to organizational standards. CC ID 14552 | System hardening through configuration management | Configuration | |
Configure the "Container Network Interface" file permissions to organizational standards. CC ID 14550 | System hardening through configuration management | Configuration | |
Configure the "crontab" directory permissions to organizational standards. CC ID 08967 | System hardening through configuration management | Configuration | |
Configure the "scheduler.conf" file permissions to organizational standards. CC ID 14551 | System hardening through configuration management | Configuration | |
Configure the "crontab" file permissions to organizational standards. CC ID 08968 | System hardening through configuration management | Configuration | |
Configure the "kube-apiserver.yaml" file permissions to organizational standards. CC ID 14549 | System hardening through configuration management | Configuration | |
Configure the "traceroute executable" file permissions to organizational standards. CC ID 08979 | System hardening through configuration management | Configuration | |
Configure the "httpd.conf" file permissions to organizational standards. CC ID 09041 | System hardening through configuration management | Configuration | |
Configure the "/etc/httpd/conf/passwd" file permissions to organizational standards. CC ID 09042 | System hardening through configuration management | Configuration | |
Configure the "/usr/sbin/apachectl" file permissions to organizational standards. CC ID 09043 | System hardening through configuration management | Configuration | |
Configure the "/var/www/html" file permissions to organizational standards. CC ID 09044 | System hardening through configuration management | Configuration | |
Configure the "apache configuration" directory permissions to organizational standards. CC ID 09045 | System hardening through configuration management | Configuration | |
Configure the "htpasswd" file permissions to organizational standards. CC ID 09057 | System hardening through configuration management | Configuration | |
Configure all "files specified by CustomLogs" file permissions to organizational standards. CC ID 09073 | System hardening through configuration management | Configuration | |
Configure the "apache /bin" directory permissions to organizational standards. CC ID 09093 | System hardening through configuration management | Configuration | |
Configure the "apache /logs" directory permissions to organizational standards. CC ID 09096 | System hardening through configuration management | Configuration | |
Configure the "registry certificate" file permissions to organizational standards. CC ID 14483 | System hardening through configuration management | Configuration | |
Configure the "apache /htdocs" directory permissions to organizational standards. CC ID 09099 | System hardening through configuration management | Configuration | |
Configure the "registry certificate" file ownership to organizational standards. CC ID 14481 | System hardening through configuration management | Configuration | |
Configure the "apache /cgi-bin" directory permissions to organizational standards. CC ID 09102 | System hardening through configuration management | Configuration | |
Configure the "cgi-bin" directory permissions to organizational standards. CC ID 09103 | System hardening through configuration management | Configuration | |
Configure the "apache process ID" file permissions to organizational standards. CC ID 09124 | System hardening through configuration management | Configuration | |
Configure the "apache scoreboard" file permissions to organizational standards. CC ID 09127 | System hardening through configuration management | Configuration | |
Configure the "htpasswd.exe" file permissions to organizational standards. CC ID 09143 | System hardening through configuration management | Configuration | |
Configure the "setgid" permissions to organizational standards. CC ID 14513 | System hardening through configuration management | Configuration | |
Configure the "TLS CA certificate" file permissions to organizational standards. CC ID 14475 | System hardening through configuration management | Configuration | |
Configure the "TLS CA certificate" file ownership to organizational standards. CC ID 14473 | System hardening through configuration management | Configuration | |
Configure the "apache /config" directory permissions to organizational standards. CC ID 09144 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32wscript.exe" file permissions to organizational standards. CC ID 09145 | System hardening through configuration management | Configuration | |
Configure the "%SystemRoot%System32cscript.exe" file permissions to organizational standards. CC ID 09146 | System hardening through configuration management | Configuration | |
Configure the "apache's process ID" file permissions to organizational standards. CC ID 09148 | System hardening through configuration management | Configuration | |
Configure the "/etc/httpd/conf.d" file permissions to organizational standards. CC ID 09149 | System hardening through configuration management | Configuration | |
Configure the "setuid" permissions to organizational standards. CC ID 14509 | System hardening through configuration management | Configuration | |
Configure the "Web Root 'Images'" directory permissions to organizational standards. CC ID 09191 | System hardening through configuration management | Configuration | |
Configure the "Web Root 'scripts'" directory permissions to organizational standards. CC ID 09192 | System hardening through configuration management | Configuration | |
Configure the "Web Root 'executables'" directory permissions to organizational standards. CC ID 09193 | System hardening through configuration management | Configuration | |
Configure the "Web Root 'docs'" directory permissions to organizational standards. CC ID 09194 | System hardening through configuration management | Configuration | |
Configure the "Web Root 'home'" directory permissions to organizational standards. CC ID 09195 | System hardening through configuration management | Configuration | |
Configure the "Web Root 'include'" directory permissions to organizational standards. CC ID 09196 | System hardening through configuration management | Configuration | |
Configure the "default Logfiles" directory permissions to organizational standards. CC ID 09197 | System hardening through configuration management | Configuration | |
Configure the "Inetpub" directory permissions to organizational standards. CC ID 09221 | System hardening through configuration management | Configuration | |
Configure the "inetsrv" directory permissions to organizational standards. CC ID 09222 | System hardening through configuration management | Configuration | |
Configure the "inetsrvasp.dll" file permissions to organizational standards. CC ID 09223 | System hardening through configuration management | Configuration | |
Configure the "Web Root" directory permissions . to organizational standards CC ID 09224 | System hardening through configuration management | Configuration | |
Configure the "files located in the folder specified by the Logger component (server.xml)" file permissions to organizational standards. CC ID 09733 | System hardening through configuration management | Configuration | |
Configure the "webapps" directory permissions to organizational standards. CC ID 09734 | System hardening through configuration management | Configuration | |
Configure the "tomcat installation" directory permissions to organizational standards. CC ID 09735 | System hardening through configuration management | Configuration | |
Configure the "tomcat /bin" directory permissions to organizational standards. CC ID 09736 | System hardening through configuration management | Configuration | |
Configure the "tomcat /common" directory permissions to organizational standards. CC ID 09737 | System hardening through configuration management | Configuration | |
Configure the "tomcat /conf" directory permissions to organizational standards. CC ID 09738 | System hardening through configuration management | Configuration | |
Configure the "tomcat /logs" directory permissions to organizational standards. CC ID 09739 | System hardening through configuration management | Configuration | |
Configure the "tomcat /server" directory permissions to organizational standards. CC ID 09740 | System hardening through configuration management | Configuration | |
Configure the "tomcat /shared" directory permissions to organizational standards. CC ID 09741 | System hardening through configuration management | Configuration | |
Configure the "tomcat /webapps" directory permissions to organizational standards. CC ID 09742 | System hardening through configuration management | Configuration | |
Configure the "tomcat /work" directory permissions to organizational standards. CC ID 09743 | System hardening through configuration management | Configuration | |
Configure the "tomcat /temp" directory permissions to organizational standards. CC ID 09744 | System hardening through configuration management | Configuration | |
Configure the "tomcat-users.xml" file permissions to organizational standards. CC ID 09778 | System hardening through configuration management | Configuration | |
Configure the "Tomcat home" directory permissions to organizational standards. CC ID 09799 | System hardening through configuration management | Configuration | |
Configure the "Tomcat home/conf/" directory permissions to organizational standards. CC ID 09802 | System hardening through configuration management | Configuration | |
Configure the "SerializedSystemIni.dat" file permissions to organizational standards. CC ID 09860 | System hardening through configuration management | Configuration | |
Configure the "Keystore" file permissions to organizational standards. CC ID 09900 | System hardening through configuration management | Configuration | |
Configure the "Weblogic Server Product Installation" directory permissions to organizational standards. CC ID 09902 | System hardening through configuration management | Configuration | |
Configure the "Domain Home" directory permissions to organizational standards. CC ID 09903 | System hardening through configuration management | Configuration | |
Configure the "Middleware Home" directory permissions to organizational standards. CC ID 09907 | System hardening through configuration management | Configuration | |
Restrict at/cron to authorized users. CC ID 01572 | System hardening through configuration management | Configuration | |
Configure the system to need authentication for single user mode. CC ID 01577 | System hardening through configuration management | Configuration | |
Configure the system to block certain system accounts. CC ID 01578 | System hardening through configuration management | Configuration | |
Verify that there are no accounts with empty password fields. CC ID 01579 | System hardening through configuration management | Configuration | |
Use standards-based encryption for encryption, hashing, and signing. CC ID 01583 | System hardening through configuration management | Configuration | |
Configure the "dCOM: Machine access restrictions in Security Descriptor Definition Language (sddl)" setting. CC ID 01726 | System hardening through configuration management | Configuration | |
Configure the "dCOM: Machine launch restrictions in Security Descriptor Definition Language (sddl)" setting to organizational standards. CC ID 01727 | System hardening through configuration management | Configuration | |
Configure the root $PATH to not have any "." directories, group directories or world writable directories. CC ID 01587 | System hardening through configuration management | Configuration | |
Configure user home directories to be mode 750 or more restrictive. CC ID 01588 | System hardening through configuration management | Configuration | |
Configure user dot-files to not be group or world-writable. CC ID 01589 | System hardening through configuration management | Configuration | |
Remove .netrc files. CC ID 01590 | System hardening through configuration management | Configuration | |
Configure default UMASK for users. CC ID 01591 | System hardening through configuration management | Configuration | |
Configure the default UMASK for FTP users. CC ID 01592 | System hardening through configuration management | Configuration | |
Configure the "mesg n" as default for all users. CC ID 01593 | System hardening through configuration management | Configuration | |
Configure the system to restrict access to the root user from the su command. CC ID 01595 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain an account lockout policy. CC ID 01709 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure Restricted groups. CC ID 01928 | System hardening through configuration management | Configuration | |
Configure the run control scripts permissions. CC ID 02160 | System hardening through configuration management | Configuration | |
Configure root to be the Traceroute command owner. CC ID 02165 | System hardening through configuration management | Configuration | |
Coordinate the User ID access restrictions with the site-unique configuration file, the UOSS control file, and the Tape File Configuration Transfer file. CC ID 02192 | System hardening through configuration management | Configuration | |
Refrain from displaying user information when the system is locked. CC ID 04302 | System hardening through configuration management | Configuration | |
Configure systems to prevent dial-up passwords from being saved. CC ID 04303 | System hardening through configuration management | Configuration | |
Configure the "Always prompt client for password upon connection" setting. CC ID 04317 | System hardening through configuration management | Configuration | |
Configure the "Do not allow passwords to be saved" setting. CC ID 04320 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Admin Approval Mode for the Built-in Administrator account" setting. CC ID 04388 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" setting. CC ID 04389 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Behavior of the elevation prompt for standard users" setting. CC ID 04390 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Detect application installations and prompt for elevation" setting. CC ID 04391 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Only elevate executables that are signed and validated" setting. CC ID 04392 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Only elevate UIAccess applications that are installed in secure locations" setting. CC ID 04393 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Run all administrators in Admin Approval Mode" setting. CC ID 04394 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Switch to the secure desktop when prompting for elevation" setting. CC ID 04395 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Virtualize file and registry write failures to per-user locations" setting. CC ID 04396 | System hardening through configuration management | Configuration | |
Configure the "Enumerate administrator accounts on elevation" setting. CC ID 04403 | System hardening through configuration management | Configuration | |
Configure the "Required trusted path for credential entry" setting. CC ID 04404 | System hardening through configuration management | Configuration | |
Require proper authentication prior to accessing NetWare's eGuide. CC ID 04450 | System hardening through configuration management | Configuration | |
Disable the SAdmin account and SDebug account in NetWare. CC ID 04458 | System hardening through configuration management | Configuration | |
Configure the system to prevent helper applications from changing client rights. CC ID 04464 | System hardening through configuration management | Configuration | |
Delete authenticator hint field contents or authenticator hint field files. CC ID 04477 | System hardening through configuration management | Configuration | |
Configure the "Limit number of simultaneous connections" setting to organizational standards. CC ID 04511 | System hardening through configuration management | Configuration | |
Configure the "Do not allow local administrators to customize permissions" setting to organizational standards. CC ID 04512 | System hardening through configuration management | Configuration | |
Configure the default Distributed Component Object Model authorization level to 'connect' or higher. CC ID 04528 | System hardening through configuration management | Configuration | |
Configure the "Network access: Shares that can be accessed anonymously" setting. CC ID 04533 | System hardening through configuration management | Configuration | |
Configure domain-connected workstations to not have any local user accounts. CC ID 04535 | System hardening through configuration management | Configuration | |
Configure printers to only accept print jobs from known print spoolers. CC ID 04812 | System hardening through configuration management | Configuration | |
Configure print spoolers to accept jobs from authorized users only. CC ID 04813 | System hardening through configuration management | Configuration | |
Prevent Multi-Function Devices from connecting to networks routing restricted data, unless authorized. CC ID 04815 | System hardening through configuration management | Configuration | |
Restrict access to remote file shares. CC ID 04817 | System hardening through configuration management | Configuration | |
Configure Multi-Function Devices to prevent non-printer administrators from altering the global configuration file. CC ID 04818 | System hardening through configuration management | Configuration | |
Configure the user's .forward file to mode 600. CC ID 04848 | System hardening through configuration management | Configuration | |
Configure the GID of accounts other than root and locked system accounts properly. CC ID 05448 | System hardening through configuration management | Configuration | |
Set the smbpasswd executable permissions properly. CC ID 05459 | System hardening through configuration management | Configuration | |
Grant or reject sudo privileges to the wheel group, as appropriate. CC ID 05539 | System hardening through configuration management | Configuration | |
Set the /var/log/pamlog log permissions properly. CC ID 05562 | System hardening through configuration management | Configuration | |
Restrict the audit log permissions. CC ID 05566 | System hardening through configuration management | Configuration | |
Use the pkgchk utility to force default settings and to verify the ownership, group ownership, and access permissions for installed packages. CC ID 05567 | System hardening through configuration management | Configuration | |
Configure role-based access control (RBAC) caching elements to organizational standards. CC ID 05568 | System hardening through configuration management | Configuration | |
Verify all device files are located in an appropriate directory. CC ID 05571 | System hardening through configuration management | Records Management | |
Configure the read-only option for all NFS exports. CC ID 05572 | System hardening through configuration management | Configuration | |
Configure access controls through /etc/login.access and access.conf for non-superusers. CC ID 05573 | System hardening through configuration management | Configuration | |
Enable or disable root login via Secure Shell, as appropriate. CC ID 05574 | System hardening through configuration management | Configuration | |
Verify the ftpusers file restricts access to certain accounts. CC ID 05575 | System hardening through configuration management | Configuration | |
Enable or disable SSH host-based authentication, as appropriate. CC ID 05576 | System hardening through configuration management | Configuration | |
Configure the environmental variable path properly. CC ID 05577 | System hardening through configuration management | Configuration | |
Configure local initialization files and global initialization files to allow or deny write access to the terminal, as appropriate. CC ID 05578 | System hardening through configuration management | Configuration | |
Verify user .shosts files exist or not, as appropriate. CC ID 05579 | System hardening through configuration management | Configuration | |
Set the default umask for the bash shell properly for all users. CC ID 05580 | System hardening through configuration management | Configuration | |
Set the default umask for the csh shell properly for all users. CC ID 05581 | System hardening through configuration management | Configuration | |
Configure the system umask properly. CC ID 05582 | System hardening through configuration management | Configuration | |
Verify console device ownership is restricted to root-only, as appropriate. CC ID 05583 | System hardening through configuration management | Configuration | |
Configure the "Access credential Manager as a trusted caller" User Right properly. CC ID 05584 | System hardening through configuration management | Configuration | |
Restrict the right of modifying an Object label. CC ID 05585 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Allow UIAccess applications to prompt for elevation" setting. CC ID 05586 | System hardening through configuration management | Configuration | |
Configure the "Do Not Allow New Client Connections" policy for Terminal Services properly. CC ID 05587 | System hardening through configuration management | Configuration | |
Configure the "Remote Control Settings" policy for Terminal Services properly. CC ID 05588 | System hardening through configuration management | Configuration | |
Configure the Cron directory permissions to organizational standards. CC ID 05997 | System hardening through configuration management | Configuration | |
Configure the cron.allow file with the user group permitted to use the cron facility, as appropriate. CC ID 06002 | System hardening through configuration management | Configuration | |
Configure the cron.deny file with the user set permitted to use the cron facility, as appropriate. CC ID 06003 | System hardening through configuration management | Configuration | |
Configure the Cron directories to be owned by an appropriate user and group. CC ID 06004 | System hardening through configuration management | Configuration | |
Configure the at.deny file with the user set permitted to use the at facility, as appropriate. CC ID 06006 | System hardening through configuration management | Configuration | |
Configure the /etc/cron.monthly file to be owned by an appropriate user or group. CC ID 06007 | System hardening through configuration management | Configuration | |
Configure /etc/cron.hourly to be owned by an appropriate user or group. CC ID 06011 | System hardening through configuration management | Configuration | |
Configure /etc/cron.daily to be owned by an appropriate user or group. CC ID 06012 | System hardening through configuration management | Configuration | |
Configure the home directory for the root user, as appropriate. CC ID 06017 | System hardening through configuration management | Configuration | |
Configure the home directory for each user account, as appropriate. CC ID 06018 | System hardening through configuration management | Configuration | |
Configure the home directory permissions for the Superuser account, as appropriate. CC ID 06020 | System hardening through configuration management | Configuration | |
Configure each user home directory to be owned by an appropriate user or group. CC ID 06021 | System hardening through configuration management | Configuration | |
Configure the world-write permissions for all files, as appropriate. CC ID 06026 | System hardening through configuration management | Configuration | |
Configure and assign the correct service permissions for the SNMP Service. CC ID 06041 | System hardening through configuration management | Configuration | |
Configure the service permissions for NetMeeting, as appropriate. CC ID 06045 | System hardening through configuration management | Configuration | |
Configure the "Allow log on through Remote Desktop Services" User Right properly. CC ID 06062 | System hardening through configuration management | Configuration | |
Configure the "Deny log on through Remote Desktop Services" User Right properly. CC ID 06063 | System hardening through configuration management | Configuration | |
Remove all members found in the Windows OS Power Users Group. CC ID 06573 | System hardening through configuration management | Configuration | |
Configure the "sudo" to organizational standards. CC ID 15325 | System hardening through configuration management | Configuration | |
Require users to use the 'sudo' command when accessing the root account. CC ID 06736 | System hardening through configuration management | Configuration | |
Configure the "log all su (switch user) activity" setting to organizational standards. CC ID 08965 | System hardening through configuration management | Configuration | |
Configure the "status" of the "apache" account to organizational standards. CC ID 09018 | System hardening through configuration management | Configuration | |
Configure the "apache" account group membership to organizational standards. CC ID 09033 | System hardening through configuration management | Configuration | |
Configure the "CustomLog" files permissions to organizational standards. CC ID 09051 | System hardening through configuration management | Configuration | |
Configure the "ErrorLog" files permissions to organizational standards. CC ID 09052 | System hardening through configuration management | Configuration | |
Configure the "default webpage" for "all readable apache web document directories" to organizational standards. CC ID 09071 | System hardening through configuration management | Configuration | |
Configure the "ScriptAlias" directories permissions to organizational standards. CC ID 09078 | System hardening through configuration management | Configuration | |
Configure the "ScriptAliasMatch" directories permissions to organizational standards. CC ID 09081 | System hardening through configuration management | Configuration | |
Configure the "DocumentRoot" directories permissions to organizational standards. CC ID 09084 | System hardening through configuration management | Configuration | |
Configure the "Alias" directories permissions to organizational standards. CC ID 09087 | System hardening through configuration management | Configuration | |
Configure the "ServerRoot" directories permissions to organizational standards. CC ID 09090 | System hardening through configuration management | Configuration | |
Configure the "Enable Logging" setting for the "master home directory" to organizational standards. CC ID 09156 | System hardening through configuration management | Configuration | |
Configure the "Read" permission for the "master home directory" to organizational standards. CC ID 09157 | System hardening through configuration management | Configuration | |
Configure the "Write" permission for the "master home directory" to organizational standards. CC ID 09158 | System hardening through configuration management | Configuration | |
Configure the "Script Source Access" permission for the "master home directory" to organizational standards. CC ID 09159 | System hardening through configuration management | Configuration | |
Configure the "Directory Browsing" permission for the "master home directory" to organizational standards. CC ID 09160 | System hardening through configuration management | Configuration | |
Configure the "Log Visits" permission for the "master home directory" to organizational standards. CC ID 09161 | System hardening through configuration management | Configuration | |
Configure the "Index this resource" permission for the "master home directory" to organizational standards. CC ID 09162 | System hardening through configuration management | Configuration | |
Configure the "Execute Permissions" permission for the "master home directory" to organizational standards. CC ID 09163 | System hardening through configuration management | Configuration | |
Configure the "Anonymous Access" permission for the "master home directory" to organizational standards. CC ID 09164 | System hardening through configuration management | Configuration | |
Configure the "Basic Authentication" setting for the "master home directory" to organizational standards. CC ID 09165 | System hardening through configuration management | Configuration | |
Configure the "Integrated Windows Authentication" setting for the "master home directory" to organizational standards. CC ID 09166 | System hardening through configuration management | Configuration | |
Configure the "Read" permission" for the "website home directory" to organizational standards. CC ID 09168 | System hardening through configuration management | Configuration | |
Configure the "Write" privilege for the "website home directory" to organizational standards. CC ID 09169 | System hardening through configuration management | Configuration | |
Configure the "Script Source Access" permission for the "website home directory" to organizational standards. CC ID 09170 | System hardening through configuration management | Configuration | |
Configure the "Directory Browsing" permission for the "website home directory" to organizational standards. CC ID 09171 | System hardening through configuration management | Configuration | |
Configure the "Log Visits" permission for the "website home directory" to organizational standards. CC ID 09172 | System hardening through configuration management | Configuration | |
Configure the "Index this resource" permission for the "website home directory" to organizational standards. CC ID 09173 | System hardening through configuration management | Configuration | |
Configure the "Execute Permissions" permission to organizational standards. CC ID 09174 | System hardening through configuration management | Configuration | |
Configure the "Anonymous Access" permission for the "website home directory" to organizational standards. CC ID 09175 | System hardening through configuration management | Configuration | |
Configure the "file auditing" setting for the "\%SystemRoot%System32Inetsrv" directory to organizational standards. CC ID 09198 | System hardening through configuration management | Configuration | |
Configure the "membership" of the "IUSR" account to organizational standards. CC ID 09213 | System hardening through configuration management | Configuration | |
Configure the "IUSR" account to organizational standards. CC ID 09214 | System hardening through configuration management | Configuration | |
Configure the "file auditing" setting for the "Inetpub" directory to organizational standards. CC ID 09225 | System hardening through configuration management | Configuration | |
Configure the "file auditing" setting for the "Web Root" directory to organizational standards. CC ID 09226 | System hardening through configuration management | Configuration | |
Configure the "file auditing" setting for the "Metaback" directory to organizational standards. CC ID 09227 | System hardening through configuration management | Configuration | |
Configure the "IWAM" account to organizational standards. CC ID 09228 | System hardening through configuration management | Configuration | |
Configure the "Application object owner" accounts to organizational standards. CC ID 09257 | System hardening through configuration management | Configuration | |
Configure the "system tables" permissions to organizational standards. CC ID 09260 | System hardening through configuration management | Configuration | |
Configure the "DDL" permissions to organizational standards. CC ID 09261 | System hardening through configuration management | Configuration | |
Configure the "WITH GRANT OPTION" permissions to organizational standards. CC ID 09262 | System hardening through configuration management | Configuration | |
Configure the "Object" permissions for the "PUBLIC or GUEST" account to organizational standards. CC ID 09263 | System hardening through configuration management | Configuration | |
Configure the "restore database data or other DBMS configurations, features or objects" permissions to organizational standards. CC ID 09267 | System hardening through configuration management | Configuration | |
Configure the "SQL Server Database Service" account to organizational standards. CC ID 09273 | System hardening through configuration management | Configuration | |
Configure the "SQL Server Agent" account to organizational standards. CC ID 09274 | System hardening through configuration management | Configuration | |
Configure the "SQL Server registry keys and sub-keys" permissions to organizational standards. CC ID 09276 | System hardening through configuration management | Configuration | |
Configure the "built-in sa" account to organizational standards. CC ID 09298 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "ErrorDumpDir" directory to organizational standards. CC ID 09299 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "DefaultLog " file to organizational standards. CC ID 09300 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "ErrorLog" File to organizational standards. CC ID 09301 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "SQLPath " directory to organizational standards. CC ID 09302 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the " BackupDirectory " directory to organizational standards. CC ID 09303 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "FullTextDefaultPath " directory to organizational standards. CC ID 09304 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "WorkingDirectory " directory to organizational standards. CC ID 09305 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "SQLBinRoot " directory to organizational standards. CC ID 09306 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "SQLDataRoot " directory to organizational standards. CC ID 09307 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "SQLProgramDir " directory to organizational standards. CC ID 09308 | System hardening through configuration management | Configuration | |
Configure the "audit access" setting for the "DataDir " directory to organizational standards. CC ID 09309 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services" account to organizational standards. CC ID 09318 | System hardening through configuration management | Configuration | |
Configure the "Integration Services" account to organizational standards. CC ID 09319 | System hardening through configuration management | Configuration | |
Configure the "Reporting Services" account to organizational standards. CC ID 09320 | System hardening through configuration management | Configuration | |
Configure the "Notification Services" account to organizational standards. CC ID 09321 | System hardening through configuration management | Configuration | |
Configure the "Full Text Search" account to organizational standards. CC ID 09322 | System hardening through configuration management | Configuration | |
Configure the "SQL Server Browser" account to organizational standards. CC ID 09323 | System hardening through configuration management | Configuration | |
Configure the "SQL Server Active Directory Helper" account to organizational standards. CC ID 09324 | System hardening through configuration management | Configuration | |
Configure the "SQL Writer" account to organizational standards. CC ID 09325 | System hardening through configuration management | Configuration | |
Configure the "SQL Server MSSearch" registry key permissions to organizational standards. CC ID 09327 | System hardening through configuration management | Configuration | |
Configure the "SQL Server Agent" registry key permissions to organizational standards. CC ID 09328 | System hardening through configuration management | Configuration | |
Configure the "SQL Server RS" registry key permissions to organizational standards. CC ID 09330 | System hardening through configuration management | Configuration | |
Configure the "Reporting Services Windows Integrated Security" accounts to organizational standards. CC ID 09347 | System hardening through configuration management | Configuration | |
Configure the "permissions" of the "SQL Server Agent proxy" accounts to organizational standards. CC ID 09352 | System hardening through configuration management | Configuration | |
Configure the "default webpage" for "all readable Tomcat Apache web document" directories to organizational standards. CC ID 09729 | System hardening through configuration management | Configuration | |
Configure the "account" setting for "Tomcat" to organizational standards. CC ID 09792 | System hardening through configuration management | Configuration | |
Configure the "specified codebase" permissions to organizational standards. CC ID 09796 | System hardening through configuration management | Configuration | |
Configure the "property read permission" for the "Tomcat web application JVM" to organizational standards. CC ID 09813 | System hardening through configuration management | Configuration | |
Configure the "property write permission" for the "Tomcat web application JVM" to organizational standards. CC ID 09814 | System hardening through configuration management | Configuration | |
Configure the "status of the "Tomcat" account to organizational standards. CC ID 09815 | System hardening through configuration management | Configuration | |
Configure the "user account" for "Oracle WebLogic Server" to organizational standards. CC ID 09823 | System hardening through configuration management | Configuration | |
Configure the "Keystores" permission in "directories" to organizational standards. CC ID 09901 | System hardening through configuration management | Configuration | |
Implement a reference monitor to implement the Access Control policies. CC ID 10096 | System hardening through configuration management | Configuration | |
Configure the "Add Printer wizard - Network scan page (Managed network)" setting to organizational standards. CC ID 10692 | System hardening through configuration management | Configuration | |
Configure the "Add Printer wizard - Network scan page (Unmanaged network)" setting to organizational standards. CC ID 10693 | System hardening through configuration management | Configuration | |
Configure the "All Removable Storage classes: Deny all access" setting to organizational standards. CC ID 10696 | System hardening through configuration management | Configuration | |
Configure the "All Removable Storage: Allow direct access in remote sessions" setting to organizational standards. CC ID 10697 | System hardening through configuration management | Configuration | |
Configure the "Allowrdp files from unknown publishers" setting to organizational standards. CC ID 10698 | System hardening through configuration management | Configuration | |
Configure the "Allowrdp files from valid publishers and user's defaultrdp settings" setting to organizational standards. CC ID 10699 | System hardening through configuration management | Configuration | |
Configure the "Allow admin to install from Remote Desktop Services session" setting to organizational standards. CC ID 10700 | System hardening through configuration management | Configuration | |
Configure the "Allow administrators to override Device Installation Restriction policies" setting to organizational standards. CC ID 10701 | System hardening through configuration management | Configuration | |
Configure the "Allow Applications to Prevent Automatic Sleep (On Battery)" setting to organizational standards. CC ID 10702 | System hardening through configuration management | Configuration | |
Configure the "Allow asynchronous user Group Policy processing when logging on through Remote Desktop Services" setting to organizational standards. CC ID 10704 | System hardening through configuration management | Configuration | |
Configure the "Allow audio and video playback redirection" setting to organizational standards. CC ID 10705 | System hardening through configuration management | Configuration | |
Configure the "Allow audio recording redirection" setting to organizational standards. CC ID 10706 | System hardening through configuration management | Configuration | |
Configure the "Allow automatic configuration of listeners" setting to organizational standards. CC ID 10707 | System hardening through configuration management | Configuration | |
Configure the "Allow Automatic Sleep with Open Network Files (On Battery)" setting to organizational standards. CC ID 10708 | System hardening through configuration management | Configuration | |
Configure the "Allow Automatic Updates immediate installation" setting to organizational standards. CC ID 10710 | System hardening through configuration management | Configuration | |
Configure the "Allow BITS Peercaching" setting to organizational standards. CC ID 10711 | System hardening through configuration management | Configuration | |
Configure the "Allow certificates with no extended key usage certificate attribute" setting to organizational standards. CC ID 10712 | System hardening through configuration management | Configuration | |
Configure the "Allow Corporate redirection of Customer Experience Improvement uploads" setting to organizational standards. CC ID 10713 | System hardening through configuration management | Configuration | |
Configure the "Allow CredSSP authentication" setting for the "WinRM client" to organizational standards. CC ID 10714 | System hardening through configuration management | Configuration | |
Configure the "Allow Cross-Forest User Policy and Roaming User Profiles" setting to organizational standards. CC ID 10716 | System hardening through configuration management | Configuration | |
Configure the "Allow cryptography algorithms compatible with Windows NT 4.0" setting to organizational standards. CC ID 10717 | System hardening through configuration management | Configuration | |
Configure the "Allow Delegating Default Credentials" setting to organizational standards. CC ID 10718 | System hardening through configuration management | Configuration | |
Configure the "Allow Delegating Default Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10719 | System hardening through configuration management | Configuration | |
Configure the "Allow Delegating Fresh Credentials" setting to organizational standards. CC ID 10720 | System hardening through configuration management | Configuration | |
Configure the "Allow Delegating Fresh Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10721 | System hardening through configuration management | Configuration | |
Configure the "Allow Delegating Saved Credentials" setting to organizational standards. CC ID 10722 | System hardening through configuration management | Configuration | |
Configure the "Allow Delegating Saved Credentials with NTLM-only Server Authentication" setting to organizational standards. CC ID 10723 | System hardening through configuration management | Configuration | |
Configure the "Allow desktop composition for remote desktop sessions" setting to organizational standards. CC ID 10724 | System hardening through configuration management | Configuration | |
Configure the "Allow DNS Suffix Appending to Unqualified Multi-Label Name Queries" setting to organizational standards. CC ID 10725 | System hardening through configuration management | Configuration | |
Configure the "Allow domain users to log on using biometrics" setting to organizational standards. CC ID 10726 | System hardening through configuration management | Configuration | |
Configure the "Allow ECC certificates to be used for logon and authentication" setting to organizational standards. CC ID 10727 | System hardening through configuration management | Configuration | |
Configure the "Allow Enhanced Storage certificate provisioning" setting to organizational standards. CC ID 10728 | System hardening through configuration management | Configuration | |
Configure the "Allow installation of devices that match any of these device IDs" setting to organizational standards. CC ID 10729 | System hardening through configuration management | Configuration | |
Configure the "Allow installation of devices using drivers that match these device setup classes" setting to organizational standards. CC ID 10730 | System hardening through configuration management | Configuration | |
Configure the "Allow Integrated Unblock screen to be displayed at the time of logon" setting to organizational standards. CC ID 10731 | System hardening through configuration management | Configuration | |
Configure the "Allow local activation security check exemptions" setting to organizational standards. CC ID 10732 | System hardening through configuration management | Configuration | |
Configure the "Allow logon scripts when NetBIOS or WINS is disabled" setting to organizational standards. CC ID 10733 | System hardening through configuration management | Configuration | |
Configure the "Allow non-administrators to install drivers for these device setup classes" setting to organizational standards. CC ID 10734 | System hardening through configuration management | Configuration | |
Configure the "Allow non-administrators to receive update notifications" setting to organizational standards. CC ID 10735 | System hardening through configuration management | Configuration | |
Configure the "Allow only system backup" setting to organizational standards. CC ID 10736 | System hardening through configuration management | Configuration | |
Configure the "Allow only USB root hub connected Enhanced Storage devices" setting to organizational standards. CC ID 10737 | System hardening through configuration management | Configuration | |
Configure the "Allow or Disallow use of the Offline Files feature" setting to organizational standards. CC ID 10738 | System hardening through configuration management | Configuration | |
Configure the "Allow Print Spooler to accept client connections" setting to organizational standards. CC ID 10739 | System hardening through configuration management | Configuration | |
Configure the "Allow printers to be published" setting to organizational standards. CC ID 10740 | System hardening through configuration management | Configuration | |
Configure the "Allow pruning of published printers" setting to organizational standards. CC ID 10741 | System hardening through configuration management | Configuration | |
Configure the "Allow remote start of unlisted programs" setting to organizational standards. CC ID 10743 | System hardening through configuration management | Configuration | |
Configure the "Allow restore of system to default state" setting to organizational standards. CC ID 10744 | System hardening through configuration management | Configuration | |
Configure the "Allow signature keys valid for Logon" setting to organizational standards. CC ID 10745 | System hardening through configuration management | Configuration | |
Configure the "Allow signed updates from an intranet Microsoft update service location" setting to organizational standards. CC ID 10746 | System hardening through configuration management | Configuration | |
Configure the "Allow the Network Access Protection client to support the 802.1x Enforcement Client component" setting to organizational standards. CC ID 10747 | System hardening through configuration management | Configuration | |
Configure the "Allow time invalid certificates" setting to organizational standards. CC ID 10748 | System hardening through configuration management | Configuration | |
Configure the "Allow time zone redirection" setting to organizational standards. CC ID 10749 | System hardening through configuration management | Configuration | |
Configure the "Allow user name hint" setting to organizational standards. CC ID 10750 | System hardening through configuration management | Configuration | |
Configure the "Allow users to log on using biometrics" setting to organizational standards. CC ID 10751 | System hardening through configuration management | Configuration | |
Configure the "Always render print jobs on the server" setting to organizational standards. CC ID 10752 | System hardening through configuration management | Configuration | |
Configure the "Always use classic logon" setting to organizational standards. CC ID 10754 | System hardening through configuration management | Configuration | |
Configure the "Always use custom logon background" setting to organizational standards. CC ID 10755 | System hardening through configuration management | Configuration | |
Configure the "Apply the default user logon picture to all users" setting to organizational standards. CC ID 10757 | System hardening through configuration management | Configuration | |
Configure the "Assign a default domain for logon" setting to organizational standards. CC ID 10758 | System hardening through configuration management | Configuration | |
Configure the "CD and DVD: Deny execute access" setting to organizational standards. CC ID 10767 | System hardening through configuration management | Configuration | |
Configure the "CD and DVD: Deny read access" setting to organizational standards. CC ID 10768 | System hardening through configuration management | Configuration | |
Configure the "CD and DVD: Deny write access" setting to organizational standards. CC ID 10769 | System hardening through configuration management | Configuration | |
Configure the "Printers preference logging and tracing" setting to organizational standards. CC ID 10799 | System hardening through configuration management | Configuration | |
Configure the "Contact PDC on logon failure" setting to organizational standards. CC ID 10825 | System hardening through configuration management | Configuration | |
Configure the "Custom Classes: Deny read access" setting to organizational standards. CC ID 10835 | System hardening through configuration management | Configuration | |
Configure the "Custom Classes: Deny write access" setting to organizational standards. CC ID 10836 | System hardening through configuration management | Configuration | |
Configure the "Deny Delegating Default Credentials" setting to organizational standards. CC ID 10848 | System hardening through configuration management | Configuration | |
Configure the "Deny Delegating Fresh Credentials" setting to organizational standards. CC ID 10849 | System hardening through configuration management | Configuration | |
Configure the "Deny Delegating Saved Credentials" setting to organizational standards. CC ID 10850 | System hardening through configuration management | Configuration | |
Configure the "Disallow changing of geographic location" setting to organizational standards. CC ID 10870 | System hardening through configuration management | Configuration | |
Configure the "Disallow Interactive Users from generating Resultant Set of Policy data" setting to organizational standards. CC ID 10871 | System hardening through configuration management | Configuration | |
Configure the "Disallow Kerberos authentication" setting for the "WinRM client" to organizational standards. CC ID 10872 | System hardening through configuration management | Configuration | |
Configure the "Disallow locally attached storage as backup target" setting to organizational standards. CC ID 10874 | System hardening through configuration management | Configuration | |
Configure the "Disallow Negotiate authentication" setting for the "WinRM client" to organizational standards. CC ID 10875 | System hardening through configuration management | Configuration | |
Configure the "Disallow network as backup target" setting to organizational standards. CC ID 10877 | System hardening through configuration management | Configuration | |
Configure the "Disallow optical media as backup target" setting to organizational standards. CC ID 10878 | System hardening through configuration management | Configuration | |
Configure the "Disallow run-once backups" setting to organizational standards. CC ID 10879 | System hardening through configuration management | Configuration | |
Configure the "Disallow selection of Custom Locales" setting to organizational standards. CC ID 10880 | System hardening through configuration management | Configuration | |
Configure the "Disallow user override of locale settings" setting to organizational standards. CC ID 10881 | System hardening through configuration management | Configuration | |
Configure the "Display information about previous logons during user logon" setting to organizational standards. CC ID 10887 | System hardening through configuration management | Configuration | |
Configure the "Do not allow adding new targets via manual configuration" setting to organizational standards. CC ID 10891 | System hardening through configuration management | Configuration | |
Configure the "Do not allow additional session logins" setting to organizational standards. CC ID 10892 | System hardening through configuration management | Configuration | |
Configure the "Do not allow changes to initiator CHAP secret" setting to organizational standards. CC ID 10893 | System hardening through configuration management | Configuration | |
Configure the "Do not allow changes to initiator iqn name" setting to organizational standards. CC ID 10894 | System hardening through configuration management | Configuration | |
Configure the "Do not allow client printer redirection" setting to organizational standards. CC ID 10895 | System hardening through configuration management | Configuration | |
Configure the "Do not allow clipboard redirection" setting to organizational standards. CC ID 10896 | System hardening through configuration management | Configuration | |
Configure the "Do not allow color changes" setting to organizational standards. CC ID 10897 | System hardening through configuration management | Configuration | |
Configure the "Do not allow COM port redirection" setting to organizational standards. CC ID 10898 | System hardening through configuration management | Configuration | |
Configure the "Do not allow compression on all NTFS volumes" setting to organizational standards. CC ID 10899 | System hardening through configuration management | Configuration | |
Configure the "Do not allow connections without IPSec" setting to organizational standards. CC ID 10900 | System hardening through configuration management | Configuration | |
Configure the "Do not allow desktop composition" setting to organizational standards. CC ID 10901 | System hardening through configuration management | Configuration | |
Configure the "Do not allow encryption on all NTFS volumes" setting to organizational standards. CC ID 10902 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Flip3D invocation" setting to organizational standards. CC ID 10903 | System hardening through configuration management | Configuration | |
Configure the "Do not allow font smoothing" setting to organizational standards. CC ID 10904 | System hardening through configuration management | Configuration | |
Configure the "Do not allow LPT port redirection" setting to organizational standards. CC ID 10905 | System hardening through configuration management | Configuration | |
Configure the "Do not allow manual configuration of discovered targets" setting to organizational standards. CC ID 10906 | System hardening through configuration management | Configuration | |
Configure the "Do not allow manual configuration of iSNS servers" setting to organizational standards. CC ID 10907 | System hardening through configuration management | Configuration | |
Configure the "Do not allow manual configuration of target portals" setting to organizational standards. CC ID 10908 | System hardening through configuration management | Configuration | |
Configure the "Do not allow non-Enhanced Storage removable devices" setting to organizational standards. CC ID 10909 | System hardening through configuration management | Configuration | |
Configure the "Do not allow password authentication of Enhanced Storage devices" setting to organizational standards. CC ID 10910 | System hardening through configuration management | Configuration | |
Configure the "Do not allow sessions without mutual CHAP" setting to organizational standards. CC ID 10912 | System hardening through configuration management | Configuration | |
Configure the "Do not allow sessions without one way CHAP" setting to organizational standards. CC ID 10913 | System hardening through configuration management | Configuration | |
Configure the "Do not allow smart card device redirection" setting to organizational standards. CC ID 10914 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Snipping Tool to run" setting to organizational standards. CC ID 10915 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Sound Recorder to run" setting to organizational standards. CC ID 10916 | System hardening through configuration management | Configuration | |
Configure the "Do not allow the BITS client to use Windows Branch Cache" setting to organizational standards. CC ID 10918 | System hardening through configuration management | Configuration | |
Configure the "Do not allow the computer to act as a BITS Peercaching client" setting to organizational standards. CC ID 10919 | System hardening through configuration management | Configuration | |
Configure the "Do not allow the computer to act as a BITS Peercaching server" setting to organizational standards. CC ID 10920 | System hardening through configuration management | Configuration | |
Configure the "Do not allow window animations" setting to organizational standards. CC ID 10921 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Windows Media Center to run" setting to organizational standards. CC ID 10923 | System hardening through configuration management | Configuration | |
Configure the "Do not display Initial Configuration Tasks window automatically at logon" setting to organizational standards. CC ID 10927 | System hardening through configuration management | Configuration | |
Configure the "Do not display Manage Your Server page at logon" setting to organizational standards. CC ID 10928 | System hardening through configuration management | Configuration | |
Configure the "Do not display Server Manager automatically at logon" setting to organizational standards. CC ID 10929 | System hardening through configuration management | Configuration | |
Configure the "Do not set default client printer to be default printer in a session" setting to organizational standards. CC ID 10935 | System hardening through configuration management | Configuration | |
Configure the "Execute print drivers in isolated processes" setting to organizational standards. CC ID 10964 | System hardening through configuration management | Configuration | |
Configure the "Expected dial-up delay on logon" setting to organizational standards. CC ID 10965 | System hardening through configuration management | Configuration | |
Configure the "Extend Point and Print connection to search Windows Update" setting to organizational standards. CC ID 10966 | System hardening through configuration management | Configuration | |
Configure the "Filter duplicate logon certificates" setting to organizational standards. CC ID 10967 | System hardening through configuration management | Configuration | |
Configure the "Floppy Drives: Deny execute access" setting to organizational standards. CC ID 10969 | System hardening through configuration management | Configuration | |
Configure the "Floppy Drives: Deny read access" setting to organizational standards. CC ID 10970 | System hardening through configuration management | Configuration | |
Configure the "Floppy Drives: Deny write access" setting to organizational standards. CC ID 10971 | System hardening through configuration management | Configuration | |
Configure the "Limit the maximum number of files allowed in a BITS job" setting to organizational standards. CC ID 11020 | System hardening through configuration management | Configuration | |
Configure the "Netlogon share compatibility" setting to organizational standards. CC ID 11048 | System hardening through configuration management | Configuration | |
Configure the "Only allow local user profiles" setting to organizational standards. CC ID 11056 | System hardening through configuration management | Configuration | |
Configure the "Only use Package Point and print" setting to organizational standards. CC ID 11057 | System hardening through configuration management | Configuration | |
Configure the "Override print driver execution compatibility setting reported by print driver" setting to organizational standards. CC ID 11059 | System hardening through configuration management | Configuration | |
Configure the "Package Point and print - Approved servers" setting to organizational standards. CC ID 11061 | System hardening through configuration management | Configuration | |
Configure the "Pre-populate printer search location text" setting to organizational standards. CC ID 11065 | System hardening through configuration management | Configuration | |
Configure the "Printer browsing" setting to organizational standards. CC ID 11097 | System hardening through configuration management | Configuration | |
Configure the "Provide information about previous logons to client computers" setting to organizational standards. CC ID 11111 | System hardening through configuration management | Configuration | |
Configure the "Prune printers that are not automatically republished" setting to organizational standards. CC ID 11112 | System hardening through configuration management | Configuration | |
Configure the "Redirect only the default client printer" setting to organizational standards. CC ID 11116 | System hardening through configuration management | Configuration | |
Configure the "Removable Disks: Deny execute access" setting to organizational standards. CC ID 11123 | System hardening through configuration management | Configuration | |
Configure the "Removable Disks: Deny read access" setting to organizational standards. CC ID 11124 | System hardening through configuration management | Configuration | |
Configure the "Removable Disks: Deny write access" setting to organizational standards. CC ID 11125 | System hardening through configuration management | Configuration | |
Configure the "Run logon scripts synchronously" setting to organizational standards. CC ID 11151 | System hardening through configuration management | Configuration | |
Configure the "Run these programs at user logon" setting to organizational standards. CC ID 11155 | System hardening through configuration management | Configuration | |
Configure the "Selectively allow the evaluation of a symbolic link" setting to organizational standards. CC ID 11169 | System hardening through configuration management | Configuration | |
Configure the "Specify SHA1 thumbprints of certificates representing trustedrdp publishers" setting to organizational standards. CC ID 11215 | System hardening through configuration management | Configuration | |
Configure the "Tape Drives: Deny execute access" setting to organizational standards. CC ID 11233 | System hardening through configuration management | Configuration | |
Configure the "Tape Drives: Deny read access" setting to organizational standards. CC ID 11234 | System hardening through configuration management | Configuration | |
Configure the "Tape Drives: Deny write access" setting to organizational standards. CC ID 11235 | System hardening through configuration management | Configuration | |
Configure the "Timeout for hung logon sessions during shutdown" setting to organizational standards. CC ID 11245 | System hardening through configuration management | Configuration | |
Configure the "Troubleshooting: Allow users to access and run Troubleshooting Wizards" setting to organizational standards. CC ID 11247 | System hardening through configuration management | Configuration | |
Configure the "Troubleshooting: Allow users to access online troubleshooting content on Microsoft servers from the Troubleshooting Control Panel (via the Windows Online Troubleshooting Service - WOTS)" setting to organizational standards. CC ID 11248 | System hardening through configuration management | Configuration | |
Configure the "Turn off the "Order Prints" picture task" setting to organizational standards. CC ID 11314 | System hardening through configuration management | Configuration | |
Configure the "Use Remote Desktop Easy Print printer driver first" setting to organizational standards. CC ID 11365 | System hardening through configuration management | Configuration | |
Establish and maintain specific directory installation rules and domain controller installation rules. CC ID 01734 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Domain controller: Allow server operators to schedule tasks" setting. CC ID 01735 | System hardening through configuration management | Configuration | |
Configure the "domain member: require strong (Windows 2000 or later) session key" setting. CC ID 01738 | System hardening through configuration management | Configuration | |
Configure the "Enforce user logon restrictions" setting. CC ID 04500 | System hardening through configuration management | Configuration | |
Configure the "Maximum lifetime for service ticket" setting. CC ID 04501 | System hardening through configuration management | Configuration | |
Configure the "Maximum lifetime for user ticket" setting. CC ID 04502 | System hardening through configuration management | Configuration | |
Configure the "Maximum lifetime for user ticket renewal" setting. CC ID 04503 | System hardening through configuration management | Configuration | |
Configure the "Maximum tolerance for computer clock synchronization" setting. CC ID 04504 | System hardening through configuration management | Configuration | |
Verify the Trusted Computing Base is installed, as appropriate. CC ID 05589 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain appropriate shutdown procedures. CC ID 01778 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Shutdown: Allow system to be shut down without having to log on" setting. CC ID 01779 | System hardening through configuration management | Configuration | |
Configure the "Shutdown: Clear virtual memory pagefile" setting. CC ID 01780 | System hardening through configuration management | Configuration | |
Configure Multi-Function Devices to clear their hard drives in between jobs. CC ID 04816 | System hardening through configuration management | Configuration | |
Configure shared volumes to use the appropriate file system for the network protocols being operated (NT File System in Windows OS or Netware SS), and configure the security parameters. CC ID 01927 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\at.exe. CC ID 01929 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\attrib.exe. CC ID 01930 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\cacls.exe. CC ID 01931 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\debug.exe. CC ID 01932 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\drwatson.exe. CC ID 01933 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\drwtsn32.exe. CC ID 01934 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\edlin.exe. CC ID 01935 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\eventcreate.exe. CC ID 01936 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\eventtriggers.exe. CC ID 01937 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\ftp.exe. CC ID 01938 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\net.exe. CC ID 01939 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\net1.exe. CC ID 01940 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\netsh.exe. CC ID 01941 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\rcp.exe. CC ID 01942 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\reg.exe. CC ID 01943 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\regedit.exe. CC ID 01944 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\regedt32.exe. CC ID 01945 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\regsvr32.exe. CC ID 01946 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\rexec.exe. CC ID 01947 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\rsh.exe. CC ID 01948 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\runas.exe. CC ID 01949 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\sc.exe. CC ID 01950 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\subst.exe. CC ID 01951 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\telnet.exe. CC ID 01952 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\tftp.exe. CC ID 01953 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\tlntsvr.exe. CC ID 01954 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\. CC ID 01968 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\autoexec.bat. CC ID 01969 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\boot.ini. CC ID 01970 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\config.sys. CC ID 01971 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\io.sys. CC ID 01972 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\msdos.sys. CC ID 01973 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\ntbootdd.sys. CC ID 01974 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\ntdetect.com. CC ID 01975 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\ntldr. CC ID 01976 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Documents and Settings. CC ID 01977 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Documents and Settings\Administrator. CC ID 01978 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users. CC ID 01979 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson. CC ID 01980 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Documents and Setting\Default User. CC ID 01981 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\System Volume Information. CC ID 01982 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Temp. CC ID 01983 | System hardening through configuration management | Configuration | |
Configure the file permissions for %ProgramFiles%. CC ID 01984 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Program Files\Resource Kit. CC ID 01985 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%. CC ID 01986 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\$NTServicePackUninstall$. CC ID 01987 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\CSC. CC ID 01988 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Debug. CC ID 01989 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Debug\UserMode. CC ID 01990 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Offline Web Pages. CC ID 01991 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Registration. CC ID 01992 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Repair. CC ID 01993 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\security. CC ID 01994 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32. CC ID 01995 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\Ntbackup.exe. CC ID 01996 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\secedit.exe. CC ID 01997 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\appmgmt. CC ID 01998 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\config. CC ID 01999 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\dllcache. CC ID 02000 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\DTCLog. CC ID 02001 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\GroupPolicy. CC ID 02002 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\ias. CC ID 02003 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\NTMSData. CC ID 02004 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\reinstallbackups. CC ID 02005 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\Setup. CC ID 02006 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\spool\printers. CC ID 02007 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Tasks. CC ID 02008 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Temp. CC ID 02009 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Program Files\Resource Pro Kit. CC ID 04301 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\arp.exe. CC ID 04304 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\nbstat.exe. CC ID 04305 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\netstat.exe. CC ID 04306 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\nslookup.exe. CC ID 04307 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\regini.exe. CC ID 04308 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\route.exe. CC ID 04310 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\systeminfo.exe. CC ID 04311 | System hardening through configuration management | Configuration | |
Disable DOSFAT.NSS. CC ID 04462 | System hardening through configuration management | Configuration | |
Enable user directory data encryption. CC ID 04467 | System hardening through configuration management | Configuration | |
Verify iPrint/NDPS are not on the system volume (sys). CC ID 04468 | System hardening through configuration management | Technical Security | |
Purge files immediately after deletion. CC ID 04469 | System hardening through configuration management | Technical Security | |
Remove the SYS:Mail directory. CC ID 04470 | System hardening through configuration management | Configuration | |
Configure the largest folder size (storage capacity) restrictions for user directories. CC ID 04471 | System hardening through configuration management | Configuration | |
Verify only necessary system files are located on the server's system volume (sys) or boot volume. CC ID 04472 | System hardening through configuration management | Testing | |
Configure the file permissions for %SystemRoot%\System32\Config\AppEvent.evt. CC ID 04506 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\Config\SecEvent.evt. CC ID 04507 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\Config\SysEvent.evt. CC ID 04508 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDirectory%. CC ID 04532 | System hardening through configuration management | Configuration | |
Configure the file permissions appropriately for all shell executables. CC ID 05619 | System hardening through configuration management | Configuration | |
Configure the file permissions for the remote copy (rcp) binary properly. CC ID 05620 | System hardening through configuration management | Configuration | |
Configure the file permissions for the remote login (rlogin) binary properly. CC ID 05621 | System hardening through configuration management | Configuration | |
Configure the file permissions for the rlogind binary properly. CC ID 05622 | System hardening through configuration management | Configuration | |
Configure the file permissions for the remote shell (rsh) binary properly. CC ID 05623 | System hardening through configuration management | Configuration | |
Configure the file permissions for the rshd binary properly. CC ID 05624 | System hardening through configuration management | Configuration | |
Configure the file permissions for the tftp binary properly. CC ID 05625 | System hardening through configuration management | Configuration | |
Configure the file permissions for the tftpd binary properly. CC ID 05626 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwts32.log properly. CC ID 05627 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemDrive%\My Download Files properly. CC ID 05628 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\Driver Cache\I386\Driver.cab properly. CC ID 05629 | System hardening through configuration management | Configuration | |
Configure the permissions for the %SystemRoot%\$NtUninstall* directories properly. CC ID 05630 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemDrive%\NTDS properly. CC ID 05631 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\SYSVOL properly. CC ID 05632 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\SYSVOL\domain\Policies properly. CC ID 05633 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\repl properly. CC ID 05634 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\repl\export properly. CC ID 05635 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\repl\import properly. CC ID 05636 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %ALL% properly. CC ID 05637 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %ALL%\Program Files\MQSeries properly. CC ID 05638 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %ALL%\Program Files\MQSeries\qmggr properly. CC ID 05639 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemDrive%\Documents and Settings\All Users\Application Data\Microsoft\HTML Help ACL properly. CC ID 05640 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemDrive%\WINNT\SECURITY\Database\SECEDIT.SDB ACL properly. CC ID 05641 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemDrive%\perflogs properly. CC ID 05642 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemDrive%\i386 properly. CC ID 05643 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %ProgramFiles%\Common Files\SpeechEngines\TTS properly. CC ID 05644 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\_default.plf properly. CC ID 05645 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\addins properly. CC ID 05646 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\appPatch properly. CC ID 05647 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\clock.avi properly. CC ID 05648 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\Connection Wizard properly. CC ID 05649 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Driver Cache properly. CC ID 05650 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\explorer.scf properly. CC ID 05651 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\explorer.exe properly. CC ID 05652 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\Help properly. CC ID 05653 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\inf\unregmp2.exe properly. CC ID 05654 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\Java properly. CC ID 05655 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\mib.bin properly. CC ID 05656 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\msagent properly. CC ID 05657 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\msdfmap.ini properly. CC ID 05658 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\mui properly. CC ID 05659 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\security\templates properly. CC ID 05660 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\speech properly. CC ID 05661 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system.ini properly. CC ID 05662 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system\setup.inf properly. CC ID 05663 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system\stdole.tlb properly. CC ID 05664 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\twain_32 properly. CC ID 05665 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\CatRoot properly. CC ID 05666 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\configf\systemprofile properly. CC ID 05667 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\dhcp properly. CC ID 05668 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\drivers properly. CC ID 05669 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\Export properly. CC ID 05670 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\ipconfig.exe properly. CC ID 05671 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\LogFiles properly. CC ID 05672 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\mshta.exe properly. CC ID 05673 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\mui properly. CC ID 05674 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\ShellExt properly. CC ID 05675 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\wbem properly. CC ID 05676 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\wbem\mof properly. CC ID 05677 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\wbem\repository properly. CC ID 05678 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\wbem\logs properly. CC ID 05679 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile% properly. CC ID 05680 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Application Data properly. CC ID 05681 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft properly. CC ID 05682 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Crypto\DSSHKLMKeys properly. CC ID 05683 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Crypto\RSAHKLMKeys properly. CC ID 05684 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Dr Watson properly. CC ID 05685 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\Dr Watson\drwtsn32.log properly. CC ID 05686 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\HTML Help properly. CC ID 05687 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Application Data\Microsoft\MediaIndex properly. CC ID 05688 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\Documents\desktop.ini properly. CC ID 05689 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %AllUsersProfile%\DRM properly. CC ID 05690 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\Debug\UserMode\userenv.log properly. CC ID 05691 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Installer properly. CC ID 05692 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\Prefetch properly. CC ID 05693 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\Registration\CRMLog properly. CC ID 05694 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\ciadv.msc properly. CC ID 05695 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\Com\comexp.msc properly. CC ID 05696 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\compmgmt.msc properly. CC ID 05697 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\Config properly. CC ID 05698 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\Config\*.evt properly. CC ID 05699 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\devmgmt.msc properly. CC ID 05700 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\dfrg.msc properly. CC ID 05701 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\diskmgmt.msc properly. CC ID 05702 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\system32\eventvwr.msc properly. CC ID 05703 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\fsmgmt.msc properly. CC ID 05704 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\gpedit.msc properly. CC ID 05705 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\lusrmgr.msg properly. CC ID 05706 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\System32\MSDTC properly. CC ID 05707 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\ntmsoprq.msc properly. CC ID 05708 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\ntmsmgr.msc properly. CC ID 05709 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\perfmon.msc properly. CC ID 05710 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\RSoP.msc properly. CC ID 05711 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\secpol.msc properly. CC ID 05712 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\services.msc properly. CC ID 05713 | System hardening through configuration management | Configuration | |
Configure the file permissions for %SystemRoot%\System32\wmimgmt.msc properly. CC ID 05714 | System hardening through configuration management | Configuration | |
Configure the directory permissions for %SystemRoot%\Web properly. CC ID 05715 | System hardening through configuration management | Configuration | |
Configure the BitLocker setting appropriately for fixed disk drives and removable disk drives. CC ID 06064 | System hardening through configuration management | Configuration | |
Configure the settings for fixed disk drives, removable disk drives, and operating system disk drives. CC ID 06065 | System hardening through configuration management | Configuration | |
Configure the BitLocker identifiers. CC ID 06066 | System hardening through configuration management | Configuration | |
Configure utility and device driver software in accordance with organizational standards. CC ID 12340 | System hardening through configuration management | Configuration | |
Restrict utility programs from interfering with Information Technology operations. CC ID 13087 | System hardening through configuration management | Configuration | |
Configure appropriate Partitioning schemes. CC ID 02162 | System hardening through configuration management | Configuration | |
Verify the /home file system, /export/home file system, and /var file system each has its own partition. CC ID 02163 | System hardening through configuration management | Configuration | |
Verify the root shell environment is located outside the /usr directory in a partitioned environment. CC ID 02158 | System hardening through configuration management | Configuration | |
Verify the primary filesystem partition uses an appropriate filesystem. CC ID 05716 | System hardening through configuration management | Configuration | |
Enable the OS/2 subsystem, as appropriate. CC ID 05717 | System hardening through configuration management | Configuration | |
Configure the "nodev" option for "/tmp" setting to organizational standards. CC ID 08725 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "nodev" option for "/dev/shm" setting to organizational standards. CC ID 08726 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "/tmp filesystem partition" setting to organizational standards. CC ID 08727 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "var/log" filesystem to organizational standards. CC ID 08728 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the “var/log/audit” filesystem to organizational standards. CC ID 08729 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "nosuid" setting on the "/tmp" directory to organizational standards. CC ID 08730 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "noexec" setting on the "/tmp" directory to organizational standards. CC ID 08731 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "nosuid" setting on the "/dev/shm" directory to organizational standards. CC ID 08732 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "noexec" option for "/dev/shm" to organizational standards. CC ID 08733 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "/var/tmp filesystem partition" setting to organizational standards. CC ID 08734 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "nodev" option for "/run/shm" to organizational standards. CC ID 11376 | System hardening through configuration management | Configuration | |
Configure the "nosuid" option for "/run/shm" to organizational standards. CC ID 11377 | System hardening through configuration management | Configuration | |
Configure the "noexec" option for "/run/shm" to organizational standards. CC ID 11378 | System hardening through configuration management | Configuration | |
Configure attached printers and shared printers. CC ID 04499 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain network parameter modification procedures. CC ID 01517 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the IPsec security association lifetime to organizational standards. CC ID 16508 | System hardening through configuration management | Configuration | |
Configure route filtering to organizational standards. CC ID 16359 | System hardening through configuration management | Configuration | |
Refrain from accepting routes from unauthorized parties. CC ID 16397 | System hardening through configuration management | Technical Security | |
Configure security gateways to organizational standards. CC ID 16352 | System hardening through configuration management | Configuration | |
Configure network elements to organizational standards. CC ID 16361 | System hardening through configuration management | Configuration | |
Configure devices having access to network elements to organizational standards. CC ID 16408 | System hardening through configuration management | Configuration | |
Configure routing tables to organizational standards. CC ID 15438 | System hardening through configuration management | Configuration | |
Configure "NetBT NodeType configuration" to organizational standards. CC ID 15383 | System hardening through configuration management | Configuration | |
Configure "Allow remote server management through WinRM" to organizational standards. CC ID 15364 | System hardening through configuration management | Configuration | |
Configure "Allow network connectivity during connected-standby (on battery)" to organizational standards. CC ID 15342 | System hardening through configuration management | Configuration | |
Configure BOOTP queries to be accepted or denied by the DHCP Server, as appropriate. CC ID 06040 | System hardening through configuration management | Configuration | |
Enable TCP wrappers. CC ID 01567 | System hardening through configuration management | Configuration | |
Configure TCP wrappers. CC ID 01566 | System hardening through configuration management | Configuration | |
Configure devices to block or avoid outbound connections. CC ID 04807 | System hardening through configuration management | Configuration | |
Configure devices to deny inbound connections. CC ID 04805 | System hardening through configuration management | Configuration | |
Review and restrict network addresses and network protocols. CC ID 01518 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain a network addressing plan. CC ID 16399 | System hardening through configuration management | Establish/Maintain Documentation | |
Define the location requirements for network elements and network devices. CC ID 16379 | System hardening through configuration management | Process or Activity | |
Disable wireless access if it is not necessary. CC ID 12100 | System hardening through configuration management | Configuration | |
Configure wireless access to be restricted to authorized wireless networks. CC ID 12099 | System hardening through configuration management | Technical Security | |
Configure Network Address Translation to organizational standards. CC ID 16395 | System hardening through configuration management | Configuration | |
Enable Network Address Translation or Port Address Translation for internal networks on all network access and control points. CC ID 00545 | System hardening through configuration management | Configuration | |
Disable NIS Server Daemons unless NIS Server Daemons are absolutely necessary. CC ID 01457 | System hardening through configuration management | Configuration | |
Disable NIS Client Daemons unless NIS Client Daemons are absolutely necessary. CC ID 01458 | System hardening through configuration management | Configuration | |
Disable NIS+ daemons unless NIS+ daemons are absolutely necessary. CC ID 01459 | System hardening through configuration management | Configuration | |
Disable Kerberos server daemons unless Kerberos server daemons are absolutely necessary. CC ID 01461 | System hardening through configuration management | Configuration | |
Disable Kerberos client daemons unless Kerberos client daemons are absolutely necessary. CC ID 01462 | System hardening through configuration management | Configuration | |
Disable Kerberos-related daemons unless Kerberos-related daemons are absolutely necessary. CC ID 01463 | System hardening through configuration management | Configuration | |
Disable DHCP Server unless DHCP Server is absolutely necessary. CC ID 01482 | System hardening through configuration management | Configuration | |
Disable Domain Name Server unless Domain Name Server is absolutely necessary. CC ID 01483 | System hardening through configuration management | Configuration | |
Disable Simple Network Management Protocol unless it is absolutely necessary. CC ID 01491 | System hardening through configuration management | Configuration | |
Enable or disable tunneling, as necessary. CC ID 15235 | System hardening through configuration management | Configuration | |
Disable Internet Protocol version 6 unless it is absolutely necessary. CC ID 01493 | System hardening through configuration management | Configuration | |
Disable Simple Mail Transport Protocol unless it is absolutely necessary. CC ID 01825 | System hardening through configuration management | Configuration | |
Disable SNMP trap unless SNMP trap is absolutely necessary. CC ID 01828 | System hardening through configuration management | Configuration | |
Disable UNIX-to-UNIX Copy Program unless it is absolutely necessary. CC ID 02169 | System hardening through configuration management | Configuration | |
Disable the ugidd daemon unless the ugidd daemon is absolutely necessary. CC ID 02181 | System hardening through configuration management | Configuration | |
Disable IP Routing unless it is absolutely necessary. CC ID 02170 | System hardening through configuration management | Configuration | |
Disable Client Service for NetWare unless it is absolutely necessary. CC ID 04277 | System hardening through configuration management | Configuration | |
Disable HyperText Transfer Protocol Secure Socket Layer unless it is absolutely necessary. CC ID 04281 | System hardening through configuration management | Configuration | |
Disable network connections unless network connections are absolutely necessary. CC ID 04283 | System hardening through configuration management | Configuration | |
Disable Boot Protocol unless it is absolutely necessary. CC ID 04809 | System hardening through configuration management | Configuration | |
Disable Pre-boot eXecution Environment unless it is absolutely necessary. CC ID 04819 | System hardening through configuration management | Configuration | |
Disable Bluetooth unless Bluetooth is absolutely necessary. CC ID 04476 | System hardening through configuration management | Configuration | |
Disable Internetwork Packet Exchange/Sequenced Packet Exchange. CC ID 04800 | System hardening through configuration management | Configuration | |
Disable AppleTalk. CC ID 04799 | System hardening through configuration management | Configuration | |
Disable Network Basic Input/Output System. CC ID 01925 | System hardening through configuration management | Configuration | |
Assign or reserve static IP addresses in Dynamic Host Configuration Protocol. CC ID 04801 | System hardening through configuration management | Configuration | |
Disable wireless networking on Multi-Function Devices, unless absolutely necessary. CC ID 04821 | System hardening through configuration management | Configuration | |
Configure mountd to use a static port or a dynamic portmapper port, as appropriate. CC ID 06023 | System hardening through configuration management | Configuration | |
Configure the Avahi daemon to serve via Internet Protocol version 4, Internet Protocol version 6, as appropriate. CC ID 06024 | System hardening through configuration management | Configuration | |
Validate and check Simple Network Management Protocol using snmpwalk. CC ID 06941 | System hardening through configuration management | Configuration | |
Disable the XDMCP port. CC ID 01563 | System hardening through configuration management | Configuration | |
Prevent syslog from accepting messages from the network. CC ID 01562 | System hardening through configuration management | Configuration | |
Prevent X server from listening on port 6000/tcp. CC ID 01565 | System hardening through configuration management | Configuration | |
Configure the Intrusion Detection System and the Intrusion Prevention System to accept the organizational vulnerability scanning host or vendor's originating IP address. CC ID 01645 | System hardening through configuration management | Configuration | |
Configure the "Network access: Allow anonymous SID/Name translation" setting to organizational standards. CC ID 01717 | System hardening through configuration management | Configuration | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts" setting. CC ID 01718 | System hardening through configuration management | Configuration | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts and shares" setting. CC ID 01719 | System hardening through configuration management | Configuration | |
Enable Data Execution Protection for all applications. CC ID 01720 | System hardening through configuration management | Configuration | |
Enable digital encryption or digital signatures of secure channel data. CC ID 01736 | System hardening through configuration management | Configuration | |
Enable digital signatures of communications using the Server Message Block protocol. CC ID 01762 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network client: Send unencrypted password to connect to third-party SMB servers" setting. CC ID 01764 | System hardening through configuration management | Configuration | |
Configure the amount of idle time required before disconnecting an idle session. CC ID 01763 | System hardening through configuration management | Configuration | |
Configure the "Allow reconnection from original client only" setting to organizational standards. CC ID 04515 | System hardening through configuration management | Configuration | |
Enable the disconnect clients setting (server) or force logoff setting (client) if the account's allotted logon period expire. CC ID 01765 [{time of day access} Review whether management does the following: Sets time-of-day or terminal limitations for some applications or for more sensitive functions within an application. App A Objective 6.22.e] | System hardening through configuration management | Configuration | |
Configure the "Network access: Do not allow storage of credentials or .NET Passports for network authentication" setting. CC ID 01766 | System hardening through configuration management | Configuration | |
Configure the "Network access: Let Everyone permissions apply to anonymous users" setting. CC ID 01767 | System hardening through configuration management | Configuration | |
Configure the "Network access: Named pipes that can be accessed anonymously" setting. CC ID 01768 | System hardening through configuration management | Configuration | |
Configure the "Network access: Remotely accessible registry paths" setting. CC ID 01769 | System hardening through configuration management | Configuration | |
Configure the "Network access: Sharing and security model for local accounts" setting. CC ID 01771 | System hardening through configuration management | Configuration | |
Configure the "Network security: Do not store LAN Manager hash value on next password change" setting. CC ID 01772 | System hardening through configuration management | Configuration | |
Configure the "Network security: LAN Manager authentication level" setting. CC ID 01773 | System hardening through configuration management | Configuration | |
Configure the "Network security: LDAP client signing requirements" setting. CC ID 01774 | System hardening through configuration management | Configuration | |
Configure Lightweight Directory Access Protocol connections for security. CC ID 04451 | System hardening through configuration management | Configuration | |
Configure the least session security for NT LM Security Support Provider based clients (including secure RPC) and servers settings. CC ID 01775 | System hardening through configuration management | Configuration | |
Enable the LDAP cache manager as necessary. CC ID 01460 | System hardening through configuration management | Configuration | |
Configure firewalls in accordance with organizational standards. CC ID 01926 | System hardening through configuration management | Configuration | |
Control inbound connections to the firewall. CC ID 04397 | System hardening through configuration management | Configuration | |
Control outbound connections to the firewall. CC ID 04398 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Do not allow exceptions" setting. CC ID 04318 | System hardening through configuration management | Configuration | |
Configure the firewall to define program exceptions as necessary. CC ID 04319 | System hardening through configuration management | Configuration | |
Configure the firewall to display notifications. CC ID 04399 | System hardening through configuration management | Configuration | |
Configure the firewall to allow Unicast responses. CC ID 04400 | System hardening through configuration management | Configuration | |
Configure the firewall to apply local connection security rules. CC ID 04402 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain firewall rules in accordance with organizational standards. CC ID 16353 | System hardening through configuration management | Establish/Maintain Documentation | |
Review and approve the firewall rules, as necessary. CC ID 06745 | System hardening through configuration management | Configuration | |
Disable Internet Connection Sharing. CC ID 02035 | System hardening through configuration management | Configuration | |
Disable anonymous DDP. CC ID 02193 | System hardening through configuration management | Configuration | |
Configure the "Set client connection encryption level" setting. CC ID 04321 | System hardening through configuration management | Configuration | |
Configure the "Network access: Restrict anonymous access to named pipes and shares" setting to organizational standards. CC ID 04381 | System hardening through configuration management | Configuration | |
Configure the "Intranet Sites: Include all network paths (UNCs)" setting. CC ID 04414 | System hardening through configuration management | Configuration | |
Configure RConsoleJ in NetWare. CC ID 04460 | System hardening through configuration management | Configuration | |
Configure Secure Console in NetWare. CC ID 04461 | System hardening through configuration management | Configuration | |
Disable Universal Description, Discovery, and Integration. CC ID 04466 | System hardening through configuration management | Configuration | |
Enable encryption for connections that transfer restricted data over HyperText Transfer Protocol. CC ID 04473 | System hardening through configuration management | Configuration | |
Use HyperText Transfer Protocol Secure to protect authenticators or other restricted data or restricted information. CC ID 04474 | System hardening through configuration management | Configuration | |
Configure Windows Messenger to prevent access to the internet. CC ID 04518 | System hardening through configuration management | Configuration | |
Configure the "Always wait for the network at computer startup and logon" setting to organizational standards. CC ID 04519 | System hardening through configuration management | Configuration | |
Do not Configure anonymous File Transfer Protocol on computers located inside a defined security perimeter. CC ID 04527 | System hardening through configuration management | Configuration | |
Create an access control list on Network Access and Control Points to restrict access. CC ID 04810 | System hardening through configuration management | Configuration | |
Configure the Access Control List to restrict connections between untrusted networks and any system that holds restricted data or restricted information. CC ID 06077 | System hardening through configuration management | Configuration | |
Configure the Access Control List (ACL) so that internal network addresses cannot pass from the Internet into the Demilitarized Zone (DMZ). CC ID 06421 | System hardening through configuration management | Configuration | |
Configure the Access Control List so that outbound network traffic from protected subnets can only access IP Addresses inside the Demilitarized Zone. CC ID 06422 | System hardening through configuration management | Configuration | |
Configure Print Services to use port 9100 and/or port 515. CC ID 04811 | System hardening through configuration management | Configuration | |
Configure the SSH server in accordance with organizational standards. CC ID 04843 | System hardening through configuration management | Configuration | |
Configure permissions for SSH private host key files to organizational standards. CC ID 15331 | System hardening through configuration management | Configuration | |
Configure permissions for SSH public host key files to organizational standards. CC ID 15333 | System hardening through configuration management | Configuration | |
Disable Secure Shell version 1 and use Secure Shell version 2. CC ID 04465 | System hardening through configuration management | Configuration | |
Allow or deny inbound connections to the secure shell port, as appropriate. CC ID 05746 | System hardening through configuration management | Configuration | |
Enable or disable the emulation of the rsh command through the SSH server, as appropriate. CC ID 05747 | System hardening through configuration management | Configuration | |
Configure SSH X11 forwarding to organizational standards. CC ID 05748 | System hardening through configuration management | Configuration | |
Set the SSH authentication log retry limit. CC ID 05750 | System hardening through configuration management | Configuration | |
Configure SSH integration with .rhosts to organizational standards. CC ID 05751 | System hardening through configuration management | Configuration | |
Configure SSH integration with hosts.equiv to organizational standards. CC ID 05752 | System hardening through configuration management | Configuration | |
Enable or disable SSH Rhosts RSA Authentication, as appropriate. CC ID 05753 | System hardening through configuration management | Configuration | |
Use Secure Shell for remote logins and file transfers. CC ID 06562 | System hardening through configuration management | Configuration | |
Configure the "/etc/hosts.deny" file: Content to organizational standards. CC ID 09924 | System hardening through configuration management | Configuration | |
Configure the "hosts.deny" file permissions to organizational standards. CC ID 09925 | System hardening through configuration management | Configuration | |
Configure the "PermitEmptyPasswords" setting to organizational standards. CC ID 09926 | System hardening through configuration management | Configuration | |
Configure the "SSH IgnoreRhosts" setting to organizational standards. CC ID 09951 | System hardening through configuration management | Configuration | |
Configure the "allowed users and groups" setting for "SSH" to organizational standards. CC ID 09952 | System hardening through configuration management | Configuration | |
Configure Network Time Protocol. CC ID 04844 | System hardening through configuration management | Configuration | |
Configure multicasting. CC ID 04845 | System hardening through configuration management | Configuration | |
Set the apache2 server's ServerTokens value properly. CC ID 05720 | System hardening through configuration management | Configuration | |
Set the apache2 server's ServerSignature value properly. CC ID 05721 | System hardening through configuration management | Configuration | |
Configure "Configuration of wireless settings using Windows Connect Now" to organizational standards. CC ID 05722 | System hardening through configuration management | Configuration | |
Configure X11 forwarding via Secure Shell, as appropriate. CC ID 05723 | System hardening through configuration management | Configuration | |
Enable the NIS passwd daemon as necessary. CC ID 05725 | System hardening through configuration management | Configuration | |
Enable the NIS update daemon as necessary. CC ID 05726 | System hardening through configuration management | Configuration | |
Enable the NIS xfr daemon as necessary. CC ID 05727 | System hardening through configuration management | Configuration | |
Enable or disable strict destination multihoming, as appropriate. CC ID 05728 | System hardening through configuration management | Configuration | |
Enable or disable IPv4 strict multihoming, as appropriate. CC ID 05729 | System hardening through configuration management | Configuration | |
Enable the appropriate tunneling protocol for Internet Protocol version 6. CC ID 05730 | System hardening through configuration management | Configuration | |
Enable or disable the automatic loading of the IPv6 kernel module, as appropriate. CC ID 05731 | System hardening through configuration management | Configuration | |
Configure the router advertisements settings to organizational standards. CC ID 05732 | System hardening through configuration management | Configuration | |
Configure IPv6 privacy extensions properly. CC ID 05733 | System hardening through configuration management | Configuration | |
Set the default number of global unicast IPv6 addresses allowed per network interface properly. CC ID 05734 | System hardening through configuration management | Configuration | |
Set the default number of IPv6 router solicitations for network interfaces to send properly. CC ID 05735 | System hardening through configuration management | Configuration | |
Set the default number of IPv6 duplicate address detection solicitations for network interfaces to send per configured network address properly. CC ID 05736 | System hardening through configuration management | Configuration | |
Enable or disable IPv6 strict multihoming, as appropriate. CC ID 05737 | System hardening through configuration management | Configuration | |
Enable or disable IP routing, as appropriate. CC ID 05738 | System hardening through configuration management | Configuration | |
Enable or disable reverse source routed packets, as appropriate. CC ID 05739 | System hardening through configuration management | Configuration | |
Restrict packet forwarding, as appropriate. CC ID 05740 | System hardening through configuration management | Configuration | |
Set unestablished TCP connection queues and established TCP connection queues properly. CC ID 05741 | System hardening through configuration management | Configuration | |
Enable or disable the LDAP dynamic updates feature, as appropriate. CC ID 05742 | System hardening through configuration management | Configuration | |
Configure the "Prohibit use of Internet Connection Firewall on your DNS domain network" setting properly. CC ID 05743 | System hardening through configuration management | Configuration | |
Enable or disable printing services through inetd, as appropriate. CC ID 05744 | System hardening through configuration management | Configuration | |
Enable or disable firewall access to printing services, as appropriate. CC ID 05745 | System hardening through configuration management | Configuration | |
Set the Secure Shell largest number for authentication retries. CC ID 05749 | System hardening through configuration management | Configuration | |
Configure the "Server SPN target name validation level" properly. CC ID 06067 | System hardening through configuration management | Configuration | |
Configure the "Allow Local System NULL session fallback" setting properly. CC ID 06068 | System hardening through configuration management | Configuration | |
Configure the "Restrict NTLM" settings properly. CC ID 06069 | System hardening through configuration management | Configuration | |
Configure the "Allow Local System to use computer identity for NTLM" setting properly. CC ID 06070 | System hardening through configuration management | Configuration | |
Configure the "Configure encryption types allowed for Kerberos" setting properly. CC ID 06071 | System hardening through configuration management | Configuration | |
Configure the "Allow PKU2U authentication requests to this computer to use online identities" setting properly. CC ID 06072 | System hardening through configuration management | Configuration | |
Configure wireless communication to be encrypted using strong cryptography. CC ID 06078 | System hardening through configuration management | Configuration | |
Reserve the use of VLAN1 to in-band management. CC ID 06413 | System hardening through configuration management | Configuration | |
Disallow Internet Protocol (IP) directed broadcasts. CC ID 06571 | System hardening through configuration management | Configuration | |
Configure the "source-routed packets" setting to organizational standards. CC ID 08977 | System hardening through configuration management | Configuration | |
Disable feedback on protocol format validation errors. CC ID 10646 | System hardening through configuration management | Configuration | |
Configure the "6to4 Relay Name" setting to organizational standards. CC ID 10688 | System hardening through configuration management | Configuration | |
Configure the "6to4 Relay Name Resolution Interval" setting to organizational standards. CC ID 10689 | System hardening through configuration management | Configuration | |
Configure the "6to4 State" setting to organizational standards. CC ID 10690 | System hardening through configuration management | Configuration | |
Configure the "Automated Site Coverage by the DC Locator DNS SRV Records" setting to organizational standards. CC ID 10759 | System hardening through configuration management | Configuration | |
Configure the "Best effort service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10764 | System hardening through configuration management | Configuration | |
Configure the "Best effort service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10765 | System hardening through configuration management | Configuration | |
Configure the "Best effort service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10766 | System hardening through configuration management | Configuration | |
Configure the "BranchCache for network files" setting to organizational standards. CC ID 10776 | System hardening through configuration management | Configuration | |
Configure the "Network Options preference logging and tracing" setting to organizational standards. CC ID 10796 | System hardening through configuration management | Configuration | |
Configure the "Network Shares preference logging and tracing" setting to organizational standards. CC ID 10797 | System hardening through configuration management | Configuration | |
Configure the "slow-link mode" setting to organizational standards. CC ID 10820 | System hardening through configuration management | Configuration | |
Configure the "Controlled load service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10826 | System hardening through configuration management | Configuration | |
Configure the "Controlled load service type Layer-3 Differentiated Services Code Point (DSCP) for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10827 | System hardening through configuration management | Configuration | |
Configure the "Controlled load service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10828 | System hardening through configuration management | Configuration | |
Configure the "Corporate DNS Probe Host Address" setting to organizational standards. CC ID 10829 | System hardening through configuration management | Configuration | |
Configure the "Corporate DNS Probe Host Name" setting to organizational standards. CC ID 10830 | System hardening through configuration management | Configuration | |
Configure the "Corporate Site Prefix List" setting to organizational standards. CC ID 10831 | System hardening through configuration management | Configuration | |
Configure the "Corporate Website Probe URL" setting to organizational standards. CC ID 10832 | System hardening through configuration management | Configuration | |
Configure the "DC Locator DNS records not registered by the DCs" setting to organizational standards. CC ID 10838 | System hardening through configuration management | Configuration | |
Configure the "DNS Suffix Search List" setting to organizational standards. CC ID 10890 | System hardening through configuration management | Configuration | |
Configure the "Do not detect slow network connections" setting to organizational standards. CC ID 10926 | System hardening through configuration management | Configuration | |
Configure the "Do not show the "local access only" network icon" setting to organizational standards. CC ID 10936 | System hardening through configuration management | Configuration | |
Configure the "Dynamic Registration of the DC Locator DNS Records" setting to organizational standards. CC ID 10943 | System hardening through configuration management | Configuration | |
Configure the "Group Policy slow link detection" setting to organizational standards. CC ID 10982 | System hardening through configuration management | Configuration | |
Configure the "Guaranteed service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 10983 | System hardening through configuration management | Configuration | |
Configure the "Guaranteed service type Layer-3 Differentiated Services Code Point for packets that do not conform to the flow specification" setting to organizational standards. CC ID 10984 | System hardening through configuration management | Configuration | |
Configure the "Guaranteed service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 10985 | System hardening through configuration management | Configuration | |
Configure the "Limit the maximum network bandwidth used for Peercaching" setting to organizational standards. CC ID 11017 | System hardening through configuration management | Configuration | |
Configure the "Location of the DCs hosting a domain with single label DNS name" setting to organizational standards. CC ID 11024 | System hardening through configuration management | Configuration | |
Configure the "Minimum Idle Connection Timeout for RPC/HTTP connections" setting to organizational standards. CC ID 11046 | System hardening through configuration management | Configuration | |
Configure the "Network control service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 11049 | System hardening through configuration management | Configuration | |
Configure the "Network control service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 11050 | System hardening through configuration management | Configuration | |
Configure the "Network control service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 11051 | System hardening through configuration management | Configuration | |
Configure the "Network Projector Port Setting" setting to organizational standards. CC ID 11052 | System hardening through configuration management | Configuration | |
Configure the "Override the More Gadgets link" setting to organizational standards. CC ID 11060 | System hardening through configuration management | Configuration | |
Configure the "Prevent backing up to network location" setting to organizational standards. CC ID 11070 | System hardening through configuration management | Configuration | |
Configure the "Primary DNS Suffix" setting to organizational standards. CC ID 11094 | System hardening through configuration management | Configuration | |
Configure the "Primary DNS Suffix Devolution" setting to organizational standards. CC ID 11095 | System hardening through configuration management | Configuration | |
Configure the "Priority Set in the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11099 | System hardening through configuration management | Configuration | |
Configure the "Prohibit installation and configuration of Network Bridge on your DNS domain network" setting to organizational standards. CC ID 11102 | System hardening through configuration management | Configuration | |
Configure the "Prompt user when a slow network connection is detected" setting to organizational standards. CC ID 11109 | System hardening through configuration management | Configuration | |
Configure the "Qualitative service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that conform to the flow specification" setting to organizational standards. CC ID 11113 | System hardening through configuration management | Configuration | |
Configure the "Qualitative service type Layer-3 Differentiated Services Code Point (DSCP) value for packets that do not conform to the flow specification" setting to organizational standards. CC ID 11114 | System hardening through configuration management | Configuration | |
Configure the "Qualitative service type link layer (Layer-2) priority value" setting to organizational standards. CC ID 11115 | System hardening through configuration management | Configuration | |
Configure the "Refresh Interval of the DC Locator DNS Records" setting to organizational standards. CC ID 11119 | System hardening through configuration management | Configuration | |
Configure the "Register DNS records with connection-specific DNS suffix" setting to organizational standards. CC ID 11120 | System hardening through configuration management | Configuration | |
Configure the "Require domain users to elevate when setting a network's location" setting to organizational standards. CC ID 11133 | System hardening through configuration management | Configuration | |
Configure the "Route all traffic through the internal network" setting to organizational standards. CC ID 11149 | System hardening through configuration management | Configuration | |
Configure the "Set a support web page link" setting to organizational standards. CC ID 11171 | System hardening through configuration management | Configuration | |
Configure the "Set PNRP cloud to resolve only" setting for "IPv6 Link Local" to organizational standards. CC ID 11179 | System hardening through configuration management | Configuration | |
Configure the "Set the Seed Server" setting for "IPv6 Link Local" to organizational standards. CC ID 11190 | System hardening through configuration management | Configuration | |
Configure the "Set up a maintenance schedule to limit the maximum network bandwidth used for BITS background transfers" setting to organizational standards. CC ID 11197 | System hardening through configuration management | Configuration | |
Configure the "Set up a work schedule to limit the maximum network bandwidth used for BITS background transfers" setting to organizational standards. CC ID 11198 | System hardening through configuration management | Configuration | |
Configure the "Sites Covered by the Application Directory Partition Locator DNS SRV Records" setting to organizational standards. CC ID 11202 | System hardening through configuration management | Configuration | |
Configure the "Sites Covered by the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11203 | System hardening through configuration management | Configuration | |
Configure the "Sites Covered by the GC Locator DNS SRV Records" setting to organizational standards. CC ID 11204 | System hardening through configuration management | Configuration | |
Configure the "Slow network connection timeout for user profiles" setting to organizational standards. CC ID 11205 | System hardening through configuration management | Configuration | |
Configure the "TTL Set in the DC Locator DNS Records" setting to organizational standards. CC ID 11252 | System hardening through configuration management | Configuration | |
Configure the "Turn off Connect to a Network Projector" setting to organizational standards. CC ID 11272 | System hardening through configuration management | Configuration | |
Configure the "Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com" setting to organizational standards. CC ID 11283 | System hardening through configuration management | Configuration | |
Configure the "Turn off Microsoft Peer-to-Peer Networking Services" setting to organizational standards. CC ID 11289 | System hardening through configuration management | Configuration | |
Configure the "Turn off Multicast Bootstrap" setting for "IPv6 Link Local" to organizational standards. CC ID 11291 | System hardening through configuration management | Configuration | |
Configure the "Turn off PNRP cloud creation" setting for "IPv6 Link Local" to organizational standards. CC ID 11299 | System hardening through configuration management | Configuration | |
Configure the "Turn off Registration if URL connection is referring to Microsoft.com" setting to organizational standards. CC ID 11305 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Network Connectivity Status Indicator active tests" setting to organizational standards. CC ID 11328 | System hardening through configuration management | Configuration | |
Configure the "Weight Set in the DC Locator DNS SRV Records" setting to organizational standards. CC ID 11371 | System hardening through configuration management | Configuration | |
Configure Automated Teller Machines in accordance with organizational standards. CC ID 12542 | System hardening through configuration management | Configuration | |
Enable or disable remote print browsing, as appropriate. CC ID 05718 | System hardening through configuration management | Configuration | |
Allow or deny remote print browsing Common Unix Printing System the ability to listen for incoming printer information, as appropriate. CC ID 05719 | System hardening through configuration management | Configuration | |
Configure the time server in accordance with organizational standards. CC ID 06426 | System hardening through configuration management | Configuration | |
Configure the time server to synchronize with specifically designated hosts. CC ID 06427 | System hardening through configuration management | Configuration | |
Restrict access to time server configuration to personnel with a business need. CC ID 06858 | System hardening through configuration management | Configuration | |
Keep current the time synchronization technology. CC ID 12548 | System hardening through configuration management | Technical Security | |
Verify the organization has Emergency Power Supplies available for the systems. CC ID 01912 | System hardening through configuration management | Systems Continuity | |
Verify enough emergency power is available for a graceful shutdown if the primary power system fails. CC ID 01913 | System hardening through configuration management | Systems Continuity | |
Verify emergency power continuity procedures are in place to transfer power to a secondary source if the primary power system fails. CC ID 01914 | System hardening through configuration management | Systems Continuity | |
Enable or disable the Uninterruptible Power Supply service, as appropriate. CC ID 06037 | System hardening through configuration management | Configuration | |
Configure Private Branch Exchanges in accordance with organizational standards. CC ID 02219 | System hardening through configuration management | Configuration | |
Enable Direct Inward System Access, only when necessary. CC ID 02220 | System hardening through configuration management | Configuration | |
Configure voicemail security inside each Private Branch Exchange. CC ID 02221 | System hardening through configuration management | Configuration | |
Configure Wireless Access Points in accordance with organizational standards. CC ID 12477 | System hardening through configuration management | Configuration | |
Enable MAC address filtering for Wireless Access Points. CC ID 04592 | System hardening through configuration management | Configuration | |
Disable Service Set Identifier broadcast. CC ID 04590 | System hardening through configuration management | Configuration | |
Configure Service Set Identifiers in accordance with organizational standards. CC ID 16447 | System hardening through configuration management | Configuration | |
Configure the Wireless Access Point transmit power setting to the lowest level possible. CC ID 04593 | System hardening through configuration management | Configuration | |
Enable two-factor authentication for identifying and authenticating Wireless Local Area Network users. CC ID 04595 | System hardening through configuration management | Configuration | |
Enable an authorized version of Wi-Fi Protected Access. CC ID 04832 | System hardening through configuration management | Configuration | |
Synchronize the Wireless Access Points' clocks. CC ID 04834 | System hardening through configuration management | Configuration | |
Disable unnecessary applications, ports, and protocols on Wireless Access Points. CC ID 04835 | System hardening through configuration management | Configuration | |
Enable or disable all BIOS wireless devices, as appropriate. CC ID 05754 | System hardening through configuration management | Configuration | |
Enable or disable all wireless interfaces, as necessary. CC ID 05755 | System hardening through configuration management | Configuration | |
Include or exclude device drivers for wireless devices from the kernel, as appropriate. CC ID 05756 | System hardening through configuration management | Configuration | |
Configure mobile device settings in accordance with organizational standards. CC ID 04600 | System hardening through configuration management | Configuration | |
Configure mobile devices to enable remote wipe. CC ID 12212 | System hardening through configuration management | Configuration | |
Configure prohibiting the circumvention of security controls on mobile devices. CC ID 12335 | System hardening through configuration management | Configuration | |
Configure Apple iOS to Organizational Standards. CC ID 09986 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "VPN" setting to organizational standards. CC ID 09987 | System hardening through configuration management | Configuration | |
Configure the "Fraudulent Website Warning" setting to organizational standards. CC ID 09988 | System hardening through configuration management | Configuration | |
Configure the "With Authentication" setting to organizational standards. CC ID 09989 | System hardening through configuration management | Configuration | |
Configure the "Auto-Join" setting to organizational standards. CC ID 09990 | System hardening through configuration management | Configuration | |
Configure the "AirDrop Discoverability" setting to organizational standards. CC ID 09991 | System hardening through configuration management | Configuration | |
Configure the "Wi-Fi" setting to organizational standards. CC ID 09992 | System hardening through configuration management | Configuration | |
Configure the "Personal Hotspot" setting to organizational standards. CC ID 09994 | System hardening through configuration management | Configuration | |
Configure the "Notifications View" setting for "Access on Lock Screen" to organizational standards. CC ID 09995 | System hardening through configuration management | Configuration | |
Configure the "Find My iPhone" setting to organizational standards. CC ID 09996 | System hardening through configuration management | Configuration | |
Configure the "iPhone Unlock" setting to organizational standards. CC ID 09997 | System hardening through configuration management | Configuration | |
Configure the "Access on Lock Screen" setting to organizational standards. CC ID 09998 | System hardening through configuration management | Configuration | |
Configure the "Forget this Network" setting to organizational standards. CC ID 09999 | System hardening through configuration management | Configuration | |
Configure the "Ask to Join Networks" setting to organizational standards. CC ID 10000 | System hardening through configuration management | Configuration | |
Configure the "Fraudulent Website Warning" setting to organizational standards. CC ID 10001 | System hardening through configuration management | Configuration | |
Configure the "Credit Cards" setting to organizational standards. CC ID 10002 | System hardening through configuration management | Configuration | |
Configure the "Saved Credit Card Information" setting to organizational standards. CC ID 10003 | System hardening through configuration management | Configuration | |
Configure the "Do Not Track" setting to organizational standards. CC ID 10004 | System hardening through configuration management | Configuration | |
Configure the "With Authentication" setting to organizational standards. CC ID 10005 | System hardening through configuration management | Configuration | |
Configure the "Allow Move" setting to organizational standards. CC ID 10006 | System hardening through configuration management | Configuration | |
Configure the "Use Only in Mail" setting to organizational standards. CC ID 10007 | System hardening through configuration management | Configuration | |
Configure mobile devices to organizational standards. CC ID 04639 | System hardening through configuration management | Configuration | |
Configure mobile devices to separate organizational data from personal data. CC ID 16463 | System hardening through configuration management | Configuration | |
Configure the mobile device properties to organizational standards. CC ID 04640 | System hardening through configuration management | Configuration | |
Configure the mobile device menu items to organizational standards. CC ID 04641 | System hardening through configuration management | Configuration | |
Configure the BlackBerry handheld device driver settings. CC ID 04642 | System hardening through configuration management | Configuration | |
Verify only BlackBerry Enterprise Server e-mail software and e-mail hardware is being used. CC ID 04601 | System hardening through configuration management | Technical Security | |
Configure the BlackBerry Enterprise Server with either BlackBerry DMZ Solution or the BlackBerry firewall solution. CC ID 04602 | System hardening through configuration management | Configuration | |
Configure automatic master key generation on the BlackBerry Enterprise Server. CC ID 04608 | System hardening through configuration management | Configuration | |
Train BlackBerry handheld device users on the Bluetooth Smart Card Reader's proper usage. CC ID 04603 | System hardening through configuration management | Behavior | |
Verify metamessage software is not installed on BlackBerry handheld devices. CC ID 04604 | System hardening through configuration management | Technical Security | |
Configure e-mail messages to not display a signature line stating the message was sent from a Portable Electronic Device. CC ID 04605 | System hardening through configuration management | Configuration | |
Verify only the specific mobile device web browser software is installed. CC ID 04606 | System hardening through configuration management | Configuration | |
Update the software and master keys for mobile Personal Electronic Devices every 30 days. CC ID 04607 | System hardening through configuration management | Configuration | |
Enable content protection on mobile devices. CC ID 04609 | System hardening through configuration management | Configuration | |
Configure the application policy groups for each mobile Personal Electronic Device. CC ID 04610 | System hardening through configuration management | Configuration | |
Configure the BlackBerry Messenger policy group settings. CC ID 04611 | System hardening through configuration management | Configuration | |
Configure the Camera policy group settings. CC ID 04614 | System hardening through configuration management | Configuration | |
Configure the Bluetooth policy group settings. CC ID 04612 | System hardening through configuration management | Configuration | |
Configure the Bluetooth Smart Card Reader policy group settings. CC ID 04613 | System hardening through configuration management | Configuration | |
Configure the Browser policy group settings. CC ID 04615 | System hardening through configuration management | Configuration | |
Configure the Certificate Sync policy group settings. CC ID 04616 | System hardening through configuration management | Configuration | |
Configure the CMIME policy group settings. CC ID 04617 | System hardening through configuration management | Configuration | |
Configure the Common policy group settings. CC ID 04618 | System hardening through configuration management | Configuration | |
Configure the Desktop-only policy group settings. CC ID 04619 | System hardening through configuration management | Configuration | |
Configure the IOT Application policy group settings. CC ID 04620 | System hardening through configuration management | Configuration | |
Configure the Device-only policy group settings. CC ID 04621 | System hardening through configuration management | Configuration | |
Configure the Desktop policy group settings. CC ID 04622 | System hardening through configuration management | Configuration | |
Configure the Global items policy group settings. CC ID 04623 | System hardening through configuration management | Configuration | |
Configure the Location Based Services policy group settings. CC ID 04624 | System hardening through configuration management | Configuration | |
Configure the MDS policy group settings. CC ID 04625 | System hardening through configuration management | Configuration | |
Configure the On-Device Help policy group settings. CC ID 04626 | System hardening through configuration management | Configuration | |
Configure the Password policy group settings. CC ID 04627 | System hardening through configuration management | Configuration | |
Configure the PIM Sync policy group settings. CC ID 04628 | System hardening through configuration management | Configuration | |
Configure the Secure E-mail policy group settings. CC ID 04629 | System hardening through configuration management | Configuration | |
Configure the Memory Cleaner policy group settings. CC ID 04630 | System hardening through configuration management | Configuration | |
Configure the Security policy group settings. CC ID 04631 | System hardening through configuration management | Configuration | |
Configure the Service Exclusivity policy group settings. CC ID 04632 | System hardening through configuration management | Configuration | |
Configure the SIM Application Toolkit policy group settings. CC ID 04633 | System hardening through configuration management | Configuration | |
Configure the Smart Dialing policy group settings. CC ID 04634 | System hardening through configuration management | Configuration | |
Configure the S/MIME policy group settings. CC ID 04635 | System hardening through configuration management | Configuration | |
Configure the TCP policy group settings. CC ID 04636 | System hardening through configuration management | Configuration | |
Configure the WTLS (Application) policy group settings. CC ID 04638 | System hardening through configuration management | Configuration | |
Configure emergency and critical e-mail notifications so that they are digitally signed. CC ID 04841 | System hardening through configuration management | Configuration | |
Enable data-at-rest encryption on mobile devices. CC ID 04842 | System hardening through configuration management | Configuration | |
Disable the capability to automatically execute code on mobile devices absent user direction. CC ID 08705 | System hardening through configuration management | Configuration | |
Configure environmental sensors on mobile devices. CC ID 10667 | System hardening through configuration management | Configuration | |
Prohibit the remote activation of environmental sensors on mobile devices. CC ID 10666 | System hardening through configuration management | Configuration | |
Configure the mobile device to explicitly show when an environmental sensor is in use. CC ID 10668 | System hardening through configuration management | Configuration | |
Configure the environmental sensor to report collected data to designated personnel only. CC ID 10669 | System hardening through configuration management | Configuration | |
Configure Cisco-specific applications and service in accordance with organizational standards. CC ID 06557 | System hardening through configuration management | Configuration | |
Disable Cisco Discovery Protocol service unless the Cisco Discovery Protocol service is absolutely necessary. CC ID 06556 | System hardening through configuration management | Configuration | |
Disable configuration autoloading unless configuration autoloading is absolutely necessary. CC ID 06558 | System hardening through configuration management | Configuration | |
Disable exec on aux unless exec on aux is absolutely necessary. CC ID 06559 | System hardening through configuration management | Configuration | |
Define and configure the Cisco loopback interface. CC ID 06560 | System hardening through configuration management | Configuration | |
Configure custom Oracle-specific applications and services in accordance with organizational standards. CC ID 06565 | System hardening through configuration management | Configuration | |
Set the Oracle Listener password. CC ID 06566 | System hardening through configuration management | Configuration | |
Configure Oracle batch processes to not use passwords in parameters or variables. CC ID 06567 | System hardening through configuration management | Configuration | |
Configure the Global Positioning System settings as appropriate. CC ID 06888 | System hardening through configuration management | Configuration | |
Configure the Global Positioning System monitor carrier-to-noise density ratio to the range of 48-50 bbhrtz. CC ID 06889 | System hardening through configuration management | Configuration | |
Configure endpoint security tools in accordance with organizational standards. CC ID 07049 | System hardening through configuration management | Configuration | |
Secure endpoint security tool configuration settings from unauthorized change. CC ID 07050 | System hardening through configuration management | Configuration | |
Configure e-mail security settings in accordance with organizational standards. CC ID 07055 | System hardening through configuration management | Configuration | |
Configure e-mail to limit the number of recipients per message. CC ID 07056 | System hardening through configuration management | Configuration | |
Configure web server security settings in accordance with organizational standards. CC ID 07059 | System hardening through configuration management | Configuration | |
Configure the web server to hide the directory of files in a folder. CC ID 07060 | System hardening through configuration management | Configuration | |
Certify the system before releasing it into a production environment. CC ID 06419 | System hardening through configuration management | Configuration | |
Document the system's accreditation and residual risks. CC ID 06728 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain virtualization configuration settings. CC ID 07110 | System hardening through configuration management | Configuration | |
Implement the security features of hypervisor to protect virtual machines. CC ID 12176 | System hardening through configuration management | Configuration | |
Execute code in confined virtual machine environments. CC ID 10648 | System hardening through configuration management | Configuration | |
Configure Microsoft Office to Organizational Standards. CC ID 07147 | System hardening through configuration management | Configuration | |
Set custom Microsoft Office security options in accordance with organizational standards. CC ID 05757 | System hardening through configuration management | Configuration | |
Configure the "Disable VBA for Office applications" setting properly. CC ID 05758 | System hardening through configuration management | Configuration | |
Configure the "ActiveX Control Initialization" setting to organizational standards. CC ID 05759 | System hardening through configuration management | Configuration | |
Configure the "Online content options" setting properly. CC ID 05760 | System hardening through configuration management | Configuration | |
Configure the "VBA Macro Warning Settings" setting properly. CC ID 05761 | System hardening through configuration management | Configuration | |
Configure the "Trust access to Visual Basic Project" setting properly. CC ID 05762 | System hardening through configuration management | Configuration | |
Configure the "Configure Add-In Trust Level" setting properly. CC ID 05763 | System hardening through configuration management | Configuration | |
Configure the "Minimum encryption settings" setting properly. CC ID 05764 | System hardening through configuration management | Configuration | |
Configure the "Do not check e-mail address against address of certificates being used" setting to organizational standards. CC ID 05765 | System hardening through configuration management | Configuration | |
Configure the "Send all signed messages as clear signed messages" setting properly. CC ID 05766 | System hardening through configuration management | Configuration | |
Configure the "Request an S/MIME receipt for all S/MIME signed messages" setting properly. CC ID 05767 | System hardening through configuration management | Configuration | |
Configure the "Do not display 'Publish to GAL' button" setting properly. CC ID 05768 | System hardening through configuration management | Configuration | |
Configure the "Signature Warning" setting properly. CC ID 05769 | System hardening through configuration management | Configuration | |
Configure the "Enable Cryptography Icons" setting properly. CC ID 05770 | System hardening through configuration management | Configuration | |
Configure the "Retrieving CRLs (Certificate Revocation Lists)" setting properly. CC ID 05771 | System hardening through configuration management | Configuration | |
Configure the "Warn before printing, saving, or sending a file that contains tracked changes or comments" setting properly. CC ID 05772 | System hardening through configuration management | Configuration | |
Configure the "Underline hyperlinks" setting properly. CC ID 05773 | System hardening through configuration management | Configuration | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins" setting properly. CC ID 05774 | System hardening through configuration management | Configuration | |
Configure the "Disable all application add-ins" setting properly. CC ID 05775 | System hardening through configuration management | Configuration | |
Configure the "Required that application add-ins are signed by Trusted Publisher" setting properly. CC ID 05776 | System hardening through configuration management | Configuration | |
Configure the "Disable all trusted locations" setting properly. CC ID 05777 | System hardening through configuration management | Configuration | |
Configure the "Allow Trusted Locations not on the computer" setting properly. CC ID 05778 | System hardening through configuration management | Configuration | |
Configure the "Modal Trust Decision Only" setting properly. CC ID 05779 | System hardening through configuration management | Configuration | |
Configure the "Disable commands" setting properly. CC ID 05780 | System hardening through configuration management | Configuration | |
Configure the "Database Tools | Macro | Convert Macros to Visual Basic" setting to organizational standards. CC ID 05781 | System hardening through configuration management | Configuration | |
Configure the "Database Tools | Macro | Create Shortcut Menu from Macro" setting to organizational standards. CC ID 05782 | System hardening through configuration management | Configuration | |
Configure the "Disable shortcut keys" setting properly. CC ID 05783 | System hardening through configuration management | Configuration | |
Configure the "Default file format" setting properly. CC ID 05784 | System hardening through configuration management | Configuration | |
Configure the "Do not prompt to convert older databases" setting properly. CC ID 05785 | System hardening through configuration management | Configuration | |
Configure the "Internet and network paths as hyperlinks" setting properly. CC ID 05786 | System hardening through configuration management | Configuration | |
Configure the "Save files" setting properly. CC ID 05787 | System hardening through configuration management | Configuration | |
Configure the "Disable AutoRepublish" setting properly. CC ID 05788 | System hardening through configuration management | Configuration | |
Configure the "Autorepublish warning alert" setting properly. CC ID 05789 | System hardening through configuration management | Configuration | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Excel Open XML workbooks" setting properly. CC ID 05790 | System hardening through configuration management | Configuration | |
Configure the "Force file extension to match file type" setting properly. CC ID 05791 | System hardening through configuration management | Configuration | |
Configure the "Store macro in Personal Macro Workbook by default" setting properly. CC ID 05792 | System hardening through configuration management | Configuration | |
Configure the "Ignore other applications" setting properly. CC ID 05793 | System hardening through configuration management | Configuration | |
Configure the "Ask to update automatic links" setting properly. CC ID 05794 | System hardening through configuration management | Configuration | |
Configure the "Save any additional data necessary to maintain formulas" setting properly. CC ID 05795 | System hardening through configuration management | Configuration | |
Configure the "Load pictures from Web pages not created in Excel" setting properly. CC ID 05796 | System hardening through configuration management | Configuration | |
Configure the "Do not show data extraction options when opening corrupt workbooks" setting properly. CC ID 05797 | System hardening through configuration management | Configuration | |
Configure the "Assume structured storage format of workbook is intact when recovering data" setting to organizational standards. CC ID 05798 | System hardening through configuration management | Configuration | |
Configure the "Corrupt formula conversion (Convert unrecoverable references to: values | #REF or #NAME)" setting to organizational standards. CC ID 05799 | System hardening through configuration management | Configuration | |
Configure the "Connection File Locations" setting to organizational standards. CC ID 05800 | System hardening through configuration management | Configuration | |
Configure the "Automatic Query Refresh (Prompt for all workbooks | Do not prompt; do not allow auto refresh | Do not prompt; allow auto refresh)" setting to organizational standards. CC ID 05801 | System hardening through configuration management | Configuration | |
Configure the "Block opening of" setting properly. CC ID 05802 | System hardening through configuration management | Configuration | |
Configure the "Block saving of" setting properly. CC ID 05803 | System hardening through configuration management | Configuration | |
Configure the "Locally cache network file storages" setting to organizational standards. CC ID 05804 | System hardening through configuration management | Configuration | |
Configure the "Locally cache PivotTable reports" setting to organizational standards. CC ID 05805 | System hardening through configuration management | Configuration | |
Configure the "OLAP PivotTable User Defined Function (UDF) security setting" setting properly. CC ID 05806 | System hardening through configuration management | Configuration | |
Configure the "Recognize SmartTags" setting to organizational standards. CC ID 05807 | System hardening through configuration management | Configuration | |
Configure the "Offline Mode Status" setting properly. CC ID 05808 | System hardening through configuration management | Configuration | |
Configure the "Control behavior for Windows SharePoint Services gradual upgrade" setting properly. CC ID 05809 | System hardening through configuration management | Configuration | |
Configure the "Disable opening of solutions from the Internet security zone" setting properly. CC ID 05810 | System hardening through configuration management | Configuration | |
Configure the "Allow the use of ActiveX Custom Controls in InfoPath forms" setting properly. CC ID 05811 | System hardening through configuration management | Configuration | |
Configure the "Run forms in restricted mode if they do not specify a publish location and use only features introduced before InfoPath 2003 SP1" setting to organizational standards. CC ID 05812 | System hardening through configuration management | Configuration | |
Configure the "Allow file types as attachments to forms" setting properly. CC ID 05813 | System hardening through configuration management | Configuration | |
Configure the "Block specific file types as attachments to forms" setting properly. CC ID 05814 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from allowing unsafe file types to be attached to forms" setting properly. CC ID 05815 | System hardening through configuration management | Configuration | |
Configure the "Display a warning that a form is digitally signed" setting properly. CC ID 05816 | System hardening through configuration management | Configuration | |
Configure the "Control behavior when opening forms" setting properly. CC ID 05817 | System hardening through configuration management | Configuration | |
Configure the "Beaconing UI for forms" setting properly. CC ID 05818 | System hardening through configuration management | Configuration | |
Configure the "Disable sending form template with e-mail forms" setting properly. CC ID 05819 | System hardening through configuration management | Configuration | |
Configure the "Disable dynamic caching of the form template in InfoPath e-mail forms" setting properly. CC ID 05820 | System hardening through configuration management | Configuration | |
Configure the "Disable sending InfoPath 2003 Forms as e-mail forms" setting properly. CC ID 05821 | System hardening through configuration management | Configuration | |
Configure the "Disable e-mail forms" setting properly. CC ID 05822 | System hardening through configuration management | Configuration | |
Configure the "Disable InfoPath e-mail forms in Outlook" setting properly. CC ID 05823 | System hardening through configuration management | Configuration | |
Configure the "Information Rights Management" setting to organizational standards. CC ID 05824 | System hardening through configuration management | Configuration | |
Configure the "Custom code" setting properly. CC ID 05825 | System hardening through configuration management | Configuration | |
Configure the "E-mail forms beaconing UI" setting properly. CC ID 05826 | System hardening through configuration management | Configuration | |
Configure the "Disable user customization of Quick Access Toolbar via UI" setting properly. CC ID 05827 | System hardening through configuration management | Configuration | |
Configure the "Disable all user customization of Quick Access Toolar" setting properly. CC ID 05828 | System hardening through configuration management | Configuration | |
Configure the "Disable UI extending from documents and templates" setting properly. CC ID 05829 | System hardening through configuration management | Configuration | |
Configure the "Recognize smart tags in Excel" setting properly. CC ID 05830 | System hardening through configuration management | Configuration | |
Configure the "Disable Clip Art and Media downloads from the client and from Office Online website" setting properly. CC ID 05831 | System hardening through configuration management | Configuration | |
Configure the "Disable template downloads from the client and from Office Online website" setting properly. CC ID 05832 | System hardening through configuration management | Configuration | |
Configure the "Disable access to updates, add-ins, and patches on the Office Online website" setting properly. CC ID 05833 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from uploading document templates to the Office Online community" setting to organizational standards. CC ID 05834 | System hardening through configuration management | Configuration | |
Configure the "Disable training practice downloads from the Office Online website" setting properly. CC ID 05835 | System hardening through configuration management | Configuration | |
Configure the "Disable customer-submitted templates downloads from Office Online" setting properly. CC ID 05836 | System hardening through configuration management | Configuration | |
Configure the "Open Office documents as read/write while browsing" setting properly. CC ID 05837 | System hardening through configuration management | Configuration | |
Configure the "Rely on VML for displaying graphics in browsers" setting properly. CC ID 05838 | System hardening through configuration management | Configuration | |
Configure the "Allow PNG as an output format" setting properly. CC ID 05839 | System hardening through configuration management | Configuration | |
Configure the "Improve Proofing Tools" setting properly. CC ID 05840 | System hardening through configuration management | Configuration | |
Configure the "Disable Opt-in Wizard on first run" setting properly. CC ID 05841 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Office Online" setting to organizational standards. CC ID 05842 | System hardening through configuration management | Configuration | |
Configure the "Disable Password Caching" setting properly. CC ID 05843 | System hardening through configuration management | Configuration | |
Configure the "Disable all Trust Bar notifications for security issues" setting properly. CC ID 05844 | System hardening through configuration management | Configuration | |
Configure the "Protect document metadata" setting properly. CC ID 05845 | System hardening through configuration management | Configuration | |
Configure the "Encryption type for password protected" setting properly. CC ID 05846 | System hardening through configuration management | Configuration | |
Configure the "Load controls in Forms3" setting properly. CC ID 05847 | System hardening through configuration management | Configuration | |
Configure the "Automation Security" setting properly. CC ID 05848 | System hardening through configuration management | Configuration | |
Configure the "Prevent Word and Excel from loading managed code extensions" setting properly. CC ID 05849 | System hardening through configuration management | Configuration | |
Configure the "Disable hyperlink warnings" setting properly. CC ID 05850 | System hardening through configuration management | Configuration | |
Configure the "Disable password to open UI" setting properly. CC ID 05851 | System hardening through configuration management | Configuration | |
Configure the "Download Office Controls" setting to organizational standards. CC ID 05852 | System hardening through configuration management | Configuration | |
Configure the "Disable All ActiveX" setting properly. CC ID 05853 | System hardening through configuration management | Configuration | |
Configure the "Allow mix of policy and user locations" setting properly. CC ID 05854 | System hardening through configuration management | Configuration | |
Configure the "Disable Smart Document's use of manifests" setting properly. CC ID 05855 | System hardening through configuration management | Configuration | |
Configure the "Completely disable the Smart Documents feature in Word and Excel" setting to organizational standards. CC ID 05856 | System hardening through configuration management | Configuration | |
Configure the "Disable Internet Fax feature" setting properly. CC ID 05857 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from changing permissions on rights managed content" setting properly. CC ID 05858 | System hardening through configuration management | Configuration | |
Configure the "Allow users with earlier versions of Office to read with browsers." setting properly. CC ID 05859 | System hardening through configuration management | Configuration | |
Configure the "Always require users to connect to verify permission" setting properly. CC ID 05860 | System hardening through configuration management | Configuration | |
Configure the "Always expand groups in Office when restricting permission for documents" setting properly. CC ID 05861 | System hardening through configuration management | Configuration | |
Configure the "Never allow users to specify groups when restricting permission for documents" setting properly. CC ID 05862 | System hardening through configuration management | Configuration | |
Configure the "Disable Microsoft Passport service for content with restricted permission" setting properly. CC ID 05863 | System hardening through configuration management | Configuration | |
Configure the "Do not allow users to upgrade Information Rights Management configuration" setting to organizational standards. CC ID 05864 | System hardening through configuration management | Configuration | |
Configure the "Key Usage Filtering" setting properly. CC ID 05865 | System hardening through configuration management | Configuration | |
Configure the "EKU filtering" setting properly. CC ID 05866 | System hardening through configuration management | Configuration | |
Configure the "Legacy format signatures" setting properly. CC ID 05867 | System hardening through configuration management | Configuration | |
Configure the "Suppress Office Signing Providers" setting properly. CC ID 05868 | System hardening through configuration management | Configuration | |
Configure the "Suppress external signature services menu item" setting properly. CC ID 05869 | System hardening through configuration management | Configuration | |
Configure the "Disable Check For Solutions" setting properly. CC ID 05870 | System hardening through configuration management | Configuration | |
Configure the "Disable inclusion of document properties in PDF and XPS output" setting properly. CC ID 05871 | System hardening through configuration management | Configuration | |
Configure the "Disable Document Information Panel" setting properly. CC ID 05872 | System hardening through configuration management | Configuration | |
Configure the "Document information panel beaconing UI" setting properly. CC ID 05873 | System hardening through configuration management | Configuration | |
Configure the "Disable the Office client from polling the Office server for published links" setting properly. CC ID 05874 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats" setting properly. CC ID 05875 | System hardening through configuration management | Configuration | |
Configure the "Control Blogging" setting properly. CC ID 05876 | System hardening through configuration management | Configuration | |
Configure the "Enable Smart Resume" setting to organizational standards. CC ID 05877 | System hardening through configuration management | Configuration | |
Configure the "Do not upload media files" setting to organizational standards. CC ID 05878 | System hardening through configuration management | Configuration | |
Configure the "Disable hyperlinks to web templates in File | New and task panes" setting properly. CC ID 05879 | System hardening through configuration management | Configuration | |
Configure the "Prevent access to Web-based file storage" setting to organizational standards. CC ID 05880 | System hardening through configuration management | Configuration | |
Configure the "Do not allow attachment previewing in Outlook" setting properly. CC ID 05881 | System hardening through configuration management | Configuration | |
Configure the "Read e-mail as plain text" setting properly. CC ID 05882 | System hardening through configuration management | Configuration | |
Configure the "Read signed e-mail as plain text" setting properly. CC ID 05883 | System hardening through configuration management | Configuration | |
Configure the "Prevent publishing to Office Online" setting properly. CC ID 05884 | System hardening through configuration management | Configuration | |
Configure the "Prevent publishing to a DAV server" setting properly. CC ID 05885 | System hardening through configuration management | Configuration | |
Configure the "Restrict level of calendar details users can publish" setting properly. CC ID 05886 | System hardening through configuration management | Configuration | |
Configure the "Access to published calendars" setting properly. CC ID 05887 | System hardening through configuration management | Configuration | |
Configure the "Restrict upload method" setting properly. CC ID 05888 | System hardening through configuration management | Configuration | |
Configure the "Hide Junk Mail UI" setting properly. CC ID 05889 | System hardening through configuration management | Configuration | |
Configure the "Junk E-mail Protection Level" setting properly. CC ID 05890 | System hardening through configuration management | Configuration | |
Configure the "Trust E-mail from Contacts" setting properly. CC ID 05891 | System hardening through configuration management | Configuration | |
Configure the "Add e-mail recipients to users' Safe Senders Lists" setting properly. CC ID 05892 | System hardening through configuration management | Configuration | |
Configure the "Dial-up options" setting properly. CC ID 05893 | System hardening through configuration management | Configuration | |
Configure the "Do not allow creating, replying, or forwarding signatures for e-mail messages" setting properly. CC ID 05894 | System hardening through configuration management | Configuration | |
Configure the "Send copy of pictures with HTML messages instead of reference to Internet location" setting to organizational standards. CC ID 05895 | System hardening through configuration management | Configuration | |
Configure the "Outlook rich text options" setting properly. CC ID 05896 | System hardening through configuration management | Configuration | |
Configure the "Plain text options" setting properly. CC ID 05897 | System hardening through configuration management | Configuration | |
Configure the "Set message format" setting properly. CC ID 05898 | System hardening through configuration management | Configuration | |
Configure the "Make Outlook the default program for E-mail, Contacts, and Calendar" setting properly. CC ID 05899 | System hardening through configuration management | Configuration | |
Configure the "Do not allow folders in non-default stores to be set as folder home pages" setting properly. CC ID 05900 | System hardening through configuration management | Configuration | |
Configure the "Use Unicode format when dragging e-mail message to file system" setting properly. CC ID 05901 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Outlook object model scripts to run" setting properly. CC ID 05902 | System hardening through configuration management | Configuration | |
Configure the "set maximum level of online status on a person name (do not allow | allow everywhere except to and cc field | allow everywhere)" setting properly. CC ID 05903 | System hardening through configuration management | Configuration | |
Configure the "Display online status on a person name" setting properly. CC ID 05904 | System hardening through configuration management | Configuration | |
Configure the "Turn off Enable the Person Names Smart Tag option" setting properly. CC ID 05905 | System hardening through configuration management | Configuration | |
Configure the "Outlook security mode" setting properly. CC ID 05906 | System hardening through configuration management | Configuration | |
Configure the "Display Level 1 attachments" setting properly. CC ID 05907 | System hardening through configuration management | Configuration | |
Configure the "Allow users to demote attachments to Level 2" setting properly. CC ID 05908 | System hardening through configuration management | Configuration | |
Configure the "Do not prompt about Level 1 attachments" setting properly. CC ID 05909 | System hardening through configuration management | Configuration | |
Configure the "Allow in-place activation of embedded OLE objects" setting to organizational standards. CC ID 05910 | System hardening through configuration management | Configuration | |
Configure the "Display OLE package objects" setting properly. CC ID 05911 | System hardening through configuration management | Configuration | |
Configure the "Add file extensions to block" setting properly. CC ID 05912 | System hardening through configuration management | Configuration | |
Configure the "Remove file extensions blocked" setting properly. CC ID 05913 | System hardening through configuration management | Configuration | |
Configure the "Allow scripts in one-off Outlook forms" setting properly. CC ID 05914 | System hardening through configuration management | Configuration | |
Configure the "Set Outlook object model custom actions execution prompt" setting properly. CC ID 05915 | System hardening through configuration management | Configuration | |
Configure the "Set control itemproperty pompt" setting properly. CC ID 05916 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook object model prompt" setting properly. CC ID 05917 | System hardening through configuration management | Configuration | |
Configure the "Required Certificate Authority" setting properly. CC ID 05918 | System hardening through configuration management | Configuration | |
Configure the "S/MIME interoperability with external clients:" setting properly. CC ID 05919 | System hardening through configuration management | Configuration | |
Configure the "Always use Rich Text formatting in S/MIME messages" setting to organizational standards. CC ID 05920 | System hardening through configuration management | Configuration | |
Configure the "S/MIME password settings" setting properly. CC ID 05921 | System hardening through configuration management | Configuration | |
Configure the "Message Formats" setting properly. CC ID 05922 | System hardening through configuration management | Configuration | |
Configure the "Do not provide Continue option on Encryption warning dialog boxes" setting properly for Microsoft Office 2007. CC ID 05923 | System hardening through configuration management | Configuration | |
Configure the "Run in FIPS compliant mode" setting properly. CC ID 05925 | System hardening through configuration management | Configuration | |
Configure the "URL for S/MIME certificates" setting properly. CC ID 05926 | System hardening through configuration management | Configuration | |
Configure the "Ensure all S/MIME signed messages have a label" setting properly. CC ID 05927 | System hardening through configuration management | Configuration | |
Configure the "S/MIME receipt requests" setting properly. CC ID 05954 | System hardening through configuration management | Configuration | |
Configure the "Fortezza certificate policies" setting properly. CC ID 05928 | System hardening through configuration management | Configuration | |
Configure the "Require SuiteB algorithms for S/MIME operations" setting properly. CC ID 05929 | System hardening through configuration management | Configuration | |
Configure the "Missing CRLs" setting properly. CC ID 05930 | System hardening through configuration management | Configuration | |
Configure the "Missing root certificates" setting properly. CC ID 05931 | System hardening through configuration management | Configuration | |
Configure the "Promote Level 2 errors as errors, not warnings" setting properly. CC ID 05932 | System hardening through configuration management | Configuration | |
Configure the "Attachment Secure Temporary Folder" setting properly. CC ID 05933 | System hardening through configuration management | Configuration | |
Configure the "Display pictures and external content in HTML e-mail" setting properly. CC ID 05934 | System hardening through configuration management | Configuration | |
Configure the "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" setting properly. CC ID 05935 | System hardening through configuration management | Configuration | |
Configure the "Do not permit download of content from safe zones" setting properly. CC ID 05936 | System hardening through configuration management | Configuration | |
Configure the "Block Trusted Zones" setting properly. CC ID 05937 | System hardening through configuration management | Configuration | |
Configure the "Include Internet in Safe Zones for Automatic Picture Download" setting properly. CC ID 05938 | System hardening through configuration management | Configuration | |
Configure the "Include Intranet in Safe Zones for Automatic Picture Download" setting properly. CC ID 05939 | System hardening through configuration management | Configuration | |
Configure the "security setting for macros (always warn | never warn, disable all | warn for signed, disable unsigned | no security check)" setting properly. CC ID 05940 | System hardening through configuration management | Configuration | |
Configure the "Enable links in e-mail messages" setting properly. CC ID 05941 | System hardening through configuration management | Configuration | |
Configure the "Apply macro security settings to macros, add-ins, and SmartTags" setting properly. CC ID 05942 | System hardening through configuration management | Configuration | |
Configure the "Automatically configure profile based on Active Directory Primary SMTP address" setting properly. CC ID 05943 | System hardening through configuration management | Configuration | |
Configure the "Do not allow users to change permissions on folders" setting properly. CC ID 05944 | System hardening through configuration management | Configuration | |
Configure the "Enable RPC encryption" setting properly. CC ID 05945 | System hardening through configuration management | Configuration | |
Configure the "Authentication with Exchange server" setting properly. CC ID 05946 | System hardening through configuration management | Configuration | |
Configure the "Synchronize Outlook RSS Feeds with Common Feed List" setting properly. CC ID 05947 | System hardening through configuration management | Configuration | |
Configure the "Turn off RSS feature" setting properly. CC ID 05948 | System hardening through configuration management | Configuration | |
Configure the "Automatically download enclosures" setting to organizational standards. CC ID 05949 | System hardening through configuration management | Configuration | |
Configure the "Download full text of articles as HTML attachments" setting properly. CC ID 05950 | System hardening through configuration management | Configuration | |
Configure the "Automatically download attachments" setting properly. CC ID 05951 | System hardening through configuration management | Configuration | |
Configure the "Do not include Internet Calendar integration in Outlook" setting properly. CC ID 05952 | System hardening through configuration management | Configuration | |
Configure the "Disable user entries to server list" setting properly. CC ID 05953 | System hardening through configuration management | Configuration | |
Configure the "Do not expand distribution lists" setting properly. CC ID 05955 | System hardening through configuration management | Configuration | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft PowerPoint Open XML presentations" setting properly. CC ID 05956 | System hardening through configuration management | Configuration | |
Configure the "Run programs" setting properly. CC ID 05957 | System hardening through configuration management | Configuration | |
Configure the "Make hidden markup visible" setting properly. CC ID 05958 | System hardening through configuration management | Configuration | |
Configure the "Unblock automatic download of linked images" setting properly. CC ID 05959 | System hardening through configuration management | Configuration | |
Configure the "Disable Slide Update" setting to organizational standards. CC ID 05960 | System hardening through configuration management | Configuration | |
Configure the "Hidden text" setting properly. CC ID 05961 | System hardening through configuration management | Configuration | |
Configure the "Update automatic links at Open" setting properly. CC ID 05962 | System hardening through configuration management | Configuration | |
Configure the "Save smart tags in e-mail" setting to organizational standards. CC ID 05963 | System hardening through configuration management | Configuration | |
Configure the "Determine where to force encrypted macros to be scanned in Microsoft Word Open XML documents" setting properly. CC ID 05964 | System hardening through configuration management | Configuration | |
Configure the "InfoPath APTCA Assembly Whitelist" setting properly. CC ID 05965 | System hardening through configuration management | Configuration | |
Configure the "Windows Internet Explorer Feature Control Opt-In" setting properly. CC ID 05966 | System hardening through configuration management | Configuration | |
Configure the "Disable Package Repair" setting to organizational standards. CC ID 05967 | System hardening through configuration management | Configuration | |
Configure the "Disable user name and password" setting properly. CC ID 05968 | System hardening through configuration management | Configuration | |
Configure the "Bind to object" setting properly. CC ID 05969 | System hardening through configuration management | Configuration | |
Configure the "Saved from URL" setting properly. CC ID 05970 | System hardening through configuration management | Configuration | |
Configure the "Navigate URL" setting properly. CC ID 05971 | System hardening through configuration management | Configuration | |
Configure the "Block popups" setting properly. CC ID 05972 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from customizing attachment security settings" setting properly. CC ID 05973 | System hardening through configuration management | Configuration | |
Configure the "Macro Security Level" setting properly. CC ID 05974 | System hardening through configuration management | Configuration | |
Configure the "Trust all installed add-ins and templates" setting properly. CC ID 05975 | System hardening through configuration management | Configuration | |
Configure the "Store random number to improve merge accuracy" setting properly. CC ID 05976 | System hardening through configuration management | Configuration | |
Configure the "Prevent Users from Changing Office Encryption Settings" setting properly. CC ID 05977 | System hardening through configuration management | Configuration | |
Configure Universal settings for Microsoft Office in accordance with organizational standards. CC ID 07211 | System hardening through configuration management | Configuration | |
Configure the "Disable VBA for Office applications" to organizational standards. CC ID 07212 | System hardening through configuration management | Configuration | |
Configure the "Navigate URL" to organizational standards. CC ID 07213 | System hardening through configuration management | Configuration | |
Configure the "Block popups" to organizational standards. CC ID 07214 | System hardening through configuration management | Configuration | |
Configure the "Bind to object" to organizational standards. CC ID 07215 | System hardening through configuration management | Configuration | |
Configure the "Disable Package Repair" to organizational standards. CC ID 07216 | System hardening through configuration management | Configuration | |
Configure the "Disable user name and password" to organizational standards. CC ID 07217 | System hardening through configuration management | Configuration | |
Configure the "Saved from URL" to organizational standards. CC ID 07218 | System hardening through configuration management | Configuration | |
Configure the "Allow mix of policy and user locations" to organizational standards. CC ID 07284 | System hardening through configuration management | Configuration | |
Configure the "ActiveX Control Initialization" to organizational standards. CC ID 07285 | System hardening through configuration management | Configuration | |
Configure the "Allow users with earlier versions of Office to read with browsers." to organizational standards CC ID 07287 | System hardening through configuration management | Configuration | |
Configure the "Always expand groups in Office when restricting permission for documents" to organizational standards. CC ID 07288 | System hardening through configuration management | Configuration | |
Configure the "Allow PNG as an output format" to organizational standards. CC ID 07289 | System hardening through configuration management | Configuration | |
Configure the "Automatically receive small updates to improve reliability" to organizational standards. CC ID 07290 | System hardening through configuration management | Configuration | |
Configure the "Always require users to connect to verify permission" to organizational standards. CC ID 07291 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2007 through the Compatibility Pack for the 2007 Office system and PowerPoint 2007 Converter" to organizational standards. CC ID 07292 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats new to Word 2007 through the Compatibility Pack for the 2007 Office system and Word 2007 Open XML/Word 97-2003 Format Converter" to organizational standards. CC ID 07294 | System hardening through configuration management | Configuration | |
Configure the "Block updates from the Office Update Site from applying" to organizational standards. CC ID 07295 | System hardening through configuration management | Configuration | |
Configure the "Control Blogging" to organizational standards. CC ID 07296 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats new to Excel 2007 through the Compatibility Pack for the 2007 Office system and Excel 2007 Converter" to organizational standards. CC ID 07297 | System hardening through configuration management | Configuration | |
Configure the "Disable All ActiveX" to organizational standards. CC ID 07298 | System hardening through configuration management | Configuration | |
Configure the "Disable all Trust Bar notifications for security issues" to organizational standards. CC ID 07299 | System hardening through configuration management | Configuration | |
Configure the "Disable access to updates, add-ins, and patches on the Office Online website" to organizational standards. CC ID 07300 | System hardening through configuration management | Configuration | |
Configure the "Disable Check For Solutions" to organizational standards. CC ID 07301 | System hardening through configuration management | Configuration | |
Configure the "Disable Clip Art and Media downloads from the client and from Office Online website" to organizational standards. CC ID 07302 | System hardening through configuration management | Configuration | |
Configure the "Disable all user customization of Quick Access Toolbar" to organizational standards. CC ID 07303 | System hardening through configuration management | Configuration | |
Configure the "Disable Document Information Panel" to organizational standards. CC ID 07304 | System hardening through configuration management | Configuration | |
Configure the "Disable hyperlink warnings" to organizational standards. CC ID 07305 | System hardening through configuration management | Configuration | |
Configure the "Disable customer-submitted templates downloads from Office Online" to organizational standards. CC ID 07306 | System hardening through configuration management | Configuration | |
Configure the "Disable inclusion of document properties in PDF and XPS output" to organizational standards. CC ID 07307 | System hardening through configuration management | Configuration | |
Configure the "Disable Internet Fax feature" to organizational standards. CC ID 07308 | System hardening through configuration management | Configuration | |
Configure the "Disable hyperlinks to web templates in File | New and task panes" to organizational standards. CC ID 07309 | System hardening through configuration management | Configuration | |
Configure the "Disable password to open UI" to organizational standards. CC ID 07311 | System hardening through configuration management | Configuration | |
Configure the "Disable Microsoft Passport service for content with restricted permission" to organizational standards. CC ID 07312 | System hardening through configuration management | Configuration | |
Configure the "Disable Smart Document's use of manifests" to organizational standards. CC ID 07313 | System hardening through configuration management | Configuration | |
Configure the "Disable template downloads from the client and from Office Online website" to organizational standards. CC ID 07314 | System hardening through configuration management | Configuration | |
Configure the "Automation Security" to organizational standards. CC ID 07315 | System hardening through configuration management | Configuration | |
Configure the "Disable training practice downloads from the Office Online website" to organizational standards. CC ID 07316 | System hardening through configuration management | Configuration | |
Configure the "Disable Update Diagnostic" to organizational standards. CC ID 07317 | System hardening through configuration management | Configuration | |
Configure the "Disable UI extending from documents and templates" to organizational standards. CC ID 07318 | System hardening through configuration management | Configuration | |
Configure the "Disable Opt-in Wizard on first run" to organizational standards. CC ID 07319 | System hardening through configuration management | Configuration | |
Configure the "Document Information Panel Beaconing UI" to organizational standards. CC ID 07320 | System hardening through configuration management | Configuration | |
Configure the "EKU filtering" to organizational standards. CC ID 07321 | System hardening through configuration management | Configuration | |
Configure the "Encryption type for password protected Office 97-2003 files" to organizational standards. CC ID 07323 | System hardening through configuration management | Configuration | |
Configure the "Enable Customer Experience Improvement Program" to organizational standards. CC ID 07324 | System hardening through configuration management | Configuration | |
Configure the "Encryption type for password protected Office Open XML files" to organizational standards. CC ID 07325 | System hardening through configuration management | Configuration | |
Configure the "Key Usage Filtering" to organizational standards. CC ID 07326 | System hardening through configuration management | Configuration | |
Configure the "Improve Proofing Tools" to organizational standards. CC ID 07327 | System hardening through configuration management | Configuration | |
Configure the "Never allow users to specify groups when restricting permission for documents" to organizational standards. CC ID 07328 | System hardening through configuration management | Configuration | |
Configure the "Legacy format signatures" to organizational standards. CC ID 07329 | System hardening through configuration management | Configuration | |
Configure the "Load Controls in Forms3" to organizational standards. CC ID 07330 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from changing permissions on rights managed content" to organizational standards. CC ID 07331 | System hardening through configuration management | Configuration | |
Configure the "Online content options" to organizational standards. CC ID 07332 | System hardening through configuration management | Configuration | |
Configure the "Disable user customization of Quick Access Toolbar via UI" to organizational standards. CC ID 07333 | System hardening through configuration management | Configuration | |
Configure the "Protect document metadata for password protected files" to organizational standards. CC ID 07334 | System hardening through configuration management | Configuration | |
Configure the "Prevents users from uploading document templates to the Office Online community." to organizational standards CC ID 07335 | System hardening through configuration management | Configuration | |
Configure the "Recognize smart tags in Excel" to organizational standards. CC ID 07336 | System hardening through configuration management | Configuration | |
Configure the "Rely on VML for displaying graphics in browsers" to organizational standards. CC ID 07337 | System hardening through configuration management | Configuration | |
Configure the "Protect document metadata for rights managed Office Open XML Files" to organizational standards. CC ID 07338 | System hardening through configuration management | Configuration | |
Configure the "Suppress Office Signing Providers" to organizational standards. CC ID 07339 | System hardening through configuration management | Configuration | |
Configure the "Suppress external signature services menu item" to organizational standards. CC ID 07340 | System hardening through configuration management | Configuration | |
Configure the "Disable the Office client from polling the Office server for published links" to organizational standards. CC ID 07361 | System hardening through configuration management | Configuration | |
Configure the "Open Office documents as read/write while browsing" to organizational standards. CC ID 07380 | System hardening through configuration management | Configuration | |
Configure the "Specify CNG salt length" to organizational standards. CC ID 07905 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #6" to organizational standards. CC ID 07919 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #9" to organizational standards. CC ID 07920 | System hardening through configuration management | Configuration | |
Configure the "Disable template downloads from the client and from Office.com" to organizational standards. CC ID 07942 | System hardening through configuration management | Configuration | |
Configure the "Disable customer-submitted templates downloads from Office.com" to organizational standards. CC ID 07949 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #15" to organizational standards. CC ID 07953 | System hardening through configuration management | Configuration | |
Configure the "Prevents users from uploading document templates to the Office.com Community." to organizational standards CC ID 08017 | System hardening through configuration management | Configuration | |
Configure the "Disable training practice downloads from Office.com" to organizational standards. CC ID 08027 | System hardening through configuration management | Configuration | |
Configure the "Disable Clip Art and Media downloads from the client and from Office.com" to organizational standards. CC ID 08049 | System hardening through configuration management | Configuration | |
Configure the "Allow Trusted Locations on the network" to organizational standards. CC ID 08053 | System hardening through configuration management | Configuration | |
Configure the "Turn off all user customizations" to organizational standards. CC ID 08084 | System hardening through configuration management | Configuration | |
Configure the "Disable access to updates, add-ins, and patches on Office.com" to organizational standards. CC ID 08137 | System hardening through configuration management | Configuration | |
Configure Microsoft InfoPath settings for Microsoft Office in accordance with organizational standards. CC ID 07219 | System hardening through configuration management | Configuration | |
Configure the "InfoPath APTCA Assembly allowable list" to organizational standards. CC ID 07220 | System hardening through configuration management | Configuration | |
Configure the "InfoPath APTCA Assembly Allowable List Enforcement" to organizational standards. CC ID 07221 | System hardening through configuration management | Configuration | |
Configure the "Allow file types as attachments to forms" to organizational standards. CC ID 07260 | System hardening through configuration management | Configuration | |
Configure the "Beaconing UI for forms opened in InfoPath" to organizational standards. CC ID 07262 | System hardening through configuration management | Configuration | |
Configure the "Control behavior for Windows SharePoint Services gradual upgrade" to organizational standards. CC ID 07264 | System hardening through configuration management | Configuration | |
Configure the "Control behavior when opening forms in the Intranet security zone" to organizational standards. CC ID 07266 | System hardening through configuration management | Configuration | |
Configure the "Custom code" to organizational standards. CC ID 07267 | System hardening through configuration management | Configuration | |
Configure the "Beaconing UI for forms opened in InfoPath Editor ActiveX" to organizational standards. CC ID 07268 | System hardening through configuration management | Configuration | |
Configure the "Control behavior when opening InfoPath e-mail forms containing code or script" to organizational standards. CC ID 07269 | System hardening through configuration management | Configuration | |
Configure the "Disable dynamic caching of the form template in InfoPath e-mail forms" to organizational standards. CC ID 07270 | System hardening through configuration management | Configuration | |
Configure the "Disable e-mail forms from the Full Trust security zone" to organizational standards. CC ID 07271 | System hardening through configuration management | Configuration | |
Configure the "Control behavior when opening forms in the Trusted Site security zone" to organizational standards. CC ID 07272 | System hardening through configuration management | Configuration | |
Configure the "Control behavior when opening forms in the Internet security zone" to organizational standards. CC ID 07273 | System hardening through configuration management | Configuration | |
Configure the "Disable e-mail forms from the Intranet security zone" to organizational standards. CC ID 07274 | System hardening through configuration management | Configuration | |
Configure the "Block specific file types as attachments to forms" to organizational standards. CC ID 07276 | System hardening through configuration management | Configuration | |
Configure the "Disable e-mail forms from the Internet security zone" to organizational standards. CC ID 07277 | System hardening through configuration management | Configuration | |
Configure the "Disable fully trusted solutions full access to computer" to organizational standards. CC ID 07278 | System hardening through configuration management | Configuration | |
Configure the "Disable sending form template with e-mail forms" to organizational standards. CC ID 07279 | System hardening through configuration management | Configuration | |
Configure the "Disable InfoPath e-mail forms in Outlook" to organizational standards. CC ID 07280 | System hardening through configuration management | Configuration | |
Configure the "Email Forms Beaconing UI" to organizational standards. CC ID 07281 | System hardening through configuration management | Configuration | |
Configure the "Disable e-mail forms running in restricted security level" to organizational standards. CC ID 07282 | System hardening through configuration management | Configuration | |
Configure the "Disable sending InfoPath 2003 Forms as e-mail forms" to organizational standards. CC ID 07283 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from allowing unsafe file types to be attached to forms" to organizational standards. CC ID 07286 | System hardening through configuration management | Configuration | |
Configure the "Information Rights Management" to organizational standards. CC ID 07293 | System hardening through configuration management | Configuration | |
Configure the "Disable opening of solutions from the Internet security zone" to organizational standards. CC ID 07310 | System hardening through configuration management | Configuration | |
Configure the "Offline Mode status" to organizational standards. CC ID 07322 | System hardening through configuration management | Configuration | |
Configure Microsoft Access settings for Microsoft Office in accordance with organizational standards. CC ID 07222 | System hardening through configuration management | Configuration | |
Configure the "Disable all application add-ins" to organizational standards. CC ID 07223 | System hardening through configuration management | Configuration | |
Configure the "Allow Trusted Locations not on the computer" to organizational standards. CC ID 07224 | System hardening through configuration management | Configuration | |
Configure the "Disable commands" to organizational standards. CC ID 07225 | System hardening through configuration management | Configuration | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins" to organizational standards. CC ID 07226 | System hardening through configuration management | Configuration | |
Configure the "Disable all trusted locations" to organizational standards. CC ID 07227 | System hardening through configuration management | Configuration | |
Configure the "Disable shortcut keys" to organizational standards. CC ID 07228 | System hardening through configuration management | Configuration | |
Configure the "Do not prompt to convert older databases" to organizational standards. CC ID 07229 | System hardening through configuration management | Configuration | |
Configure the "Modal Trust Decision Only" to organizational standards. CC ID 07230 | System hardening through configuration management | Configuration | |
Configure the "Default file format" to organizational standards. CC ID 07231 | System hardening through configuration management | Configuration | |
Configure the "Require that application add-ins are signed by Trusted Publisher" to organizational standards. CC ID 07233 | System hardening through configuration management | Configuration | |
Configure the "VBA Macro Warning Settings" to organizational standards. CC ID 07234 | System hardening through configuration management | Configuration | |
Configure the "Underline hyperlinks" to organizational standards. CC ID 07235 | System hardening through configuration management | Configuration | |
Configure Microsoft Excel settings for Microsoft Office in accordance with organizational standards. CC ID 07232 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Binary file types" to organizational standards. CC ID 07236 | System hardening through configuration management | Configuration | |
Configure the "AutoRepublish Warning Alert" to organizational standards. CC ID 07237 | System hardening through configuration management | Configuration | |
Configure the "Block opening of DIF and SYLK file types" to organizational standards. CC ID 07238 | System hardening through configuration management | Configuration | |
Configure the "Ask to update automatic links" to organizational standards. CC ID 07239 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Open XML file types" to organizational standards. CC ID 07240 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Xll file type" to organizational standards. CC ID 07241 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Xml file types" to organizational standards. CC ID 07242 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Text file types" to organizational standards. CC ID 07243 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Binary file types" to organizational standards. CC ID 07244 | System hardening through configuration management | Configuration | |
Configure the "Block saving DIF and SYLK file types" to organizational standards. CC ID 07245 | System hardening through configuration management | Configuration | |
Configure the "Block opening of files created by pre-release versions of Excel 2007" to organizational standards. CC ID 07246 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Text file types" to organizational standards. CC ID 07247 | System hardening through configuration management | Configuration | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Excel Open XML workbooks" to organizational standards. CC ID 07248 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Html and Xmlss file types" to organizational standards. CC ID 07249 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Binary 12 file types" to organizational standards. CC ID 07250 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Open XML file types" to organizational standards. CC ID 07251 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Binary12 file types" to organizational standards. CC ID 07252 | System hardening through configuration management | Configuration | |
Configure the "Disable AutoRepublish" to organizational standards. CC ID 07253 | System hardening through configuration management | Configuration | |
Configure the "Do not show data extraction options when opening corrupt workbooks" to organizational standards. CC ID 07254 | System hardening through configuration management | Configuration | |
Configure the "Internet and network paths as hyperlinks" to organizational standards. CC ID 07255 | System hardening through configuration management | Configuration | |
Configure the "Load pictures from Web pages not created in Excel" to organizational standards. CC ID 07256 | System hardening through configuration management | Configuration | |
Configure the "Save any additional data necessary to maintain formulas" to organizational standards. CC ID 07257 | System hardening through configuration management | Configuration | |
Configure the "Store macro in Personal Macro Workbook by default" to organizational standards. CC ID 07258 | System hardening through configuration management | Configuration | |
Configure the "Save Excel files as" to organizational standards. CC ID 07259 | System hardening through configuration management | Configuration | |
Configure the "Trust access to Visual Basic Project" to organizational standards. CC ID 07261 | System hardening through configuration management | Configuration | |
Configure the "Force file extension to match file type" to organizational standards. CC ID 07263 | System hardening through configuration management | Configuration | |
Configure the "Ignore other applications" to organizational standards. CC ID 07265 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Html and Xmlss file types" to organizational standards. CC ID 07275 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #10" to organizational standards. CC ID 07927 | System hardening through configuration management | Configuration | |
Configure the "Configure CNG cipher chaining mode" to organizational standards. CC ID 07934 | System hardening through configuration management | Configuration | |
Configure the "Disable Trust Bar Notification for unsigned application add-ins and block them" to organizational standards. CC ID 07938 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #20" to organizational standards. CC ID 07947 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #18" to organizational standards. CC ID 07961 | System hardening through configuration management | Configuration | |
Configure the "Do not show AutoRepublish warning alert" to organizational standards. CC ID 07970 | System hardening through configuration management | Configuration | |
Configure the "Turn off Protected View for attachments opened from Outlook" to organizational standards. CC ID 07973 | System hardening through configuration management | Configuration | |
Configure the "Turn off Trusted Documents on the network" to organizational standards. CC ID 07980 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #11" to organizational standards. CC ID 08006 | System hardening through configuration management | Configuration | |
Configure the "Perform file validation on pivot caches" to organizational standards. CC ID 08022 | System hardening through configuration management | Configuration | |
Configure the "Scan encrypted macros in Excel Open XML workbooks" to organizational standards. CC ID 08102 | System hardening through configuration management | Configuration | |
Configure the "Open files on local Intranet UNC in Protected View" to organizational standards. CC ID 08110 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Office query files" to organizational standards. CC ID 08205 | System hardening through configuration management | Configuration | |
Configure the "Excel 97-2003 workbooks and templates" to organizational standards. CC ID 08236 | System hardening through configuration management | Configuration | |
Configure the "Excel 95-97 workbooks and templates" to organizational standards. CC ID 08255 | System hardening through configuration management | Configuration | |
Configure the "XML files" to organizational standards. CC ID 08262 | System hardening through configuration management | Configuration | |
Configure the "Excel 3 worksheets" to organizational standards. CC ID 08270 | System hardening through configuration management | Configuration | |
Configure the "Dif and Sylk files" to organizational standards. CC ID 08284 | System hardening through configuration management | Configuration | |
Configure the "dBase III / IV files" to organizational standards. CC ID 08300 | System hardening through configuration management | Configuration | |
Configure the "Excel 2 macrosheets and add-in files" to organizational standards. CC ID 08303 | System hardening through configuration management | Configuration | |
Configure the "Excel 2007 and later binary workbooks" to organizational standards. CC ID 08305 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Office Open XML converters for Excel" to organizational standards. CC ID 08308 | System hardening through configuration management | Configuration | |
Configure the "Web pages and Excel 2003 XML spreadsheets" to organizational standards. CC ID 08314 | System hardening through configuration management | Configuration | |
Configure the "Excel 4 workbooks" to organizational standards. CC ID 08315 | System hardening through configuration management | Configuration | |
Configure the "Excel 2007 and later workbooks and templates" to organizational standards. CC ID 08317 | System hardening through configuration management | Configuration | |
Configure the "Excel 95 workbooks" to organizational standards. CC ID 08319 | System hardening through configuration management | Configuration | |
Configure the "Other data source files" to organizational standards. CC ID 08321 | System hardening through configuration management | Configuration | |
Configure the "Excel 2007 and later macro-enabled workbooks and templates" to organizational standards. CC ID 08323 | System hardening through configuration management | Configuration | |
Configure the "Legacy converters for Excel" to organizational standards. CC ID 08325 | System hardening through configuration management | Configuration | |
Configure the "Excel 2 worksheets" to organizational standards. CC ID 08326 | System hardening through configuration management | Configuration | |
Configure the "Offline cube files" to organizational standards. CC ID 08327 | System hardening through configuration management | Configuration | |
Configure the "Excel 4 macrosheets and add-in files" to organizational standards. CC ID 08329 | System hardening through configuration management | Configuration | |
Configure the "Excel 2007 and later add-in files" to organizational standards. CC ID 08330 | System hardening through configuration management | Configuration | |
Configure the "Excel 3 macrosheets and add-in files" to organizational standards. CC ID 08332 | System hardening through configuration management | Configuration | |
Configure the "OpenDocument Spreadsheet files" to organizational standards. CC ID 08335 | System hardening through configuration management | Configuration | |
Configure the "Excel add-in files" to organizational standards. CC ID 08337 | System hardening through configuration management | Configuration | |
Configure the "Text files" to organizational standards. CC ID 08339 | System hardening through configuration management | Configuration | |
Configure the "Excel 97-2003 add-in files" to organizational standards. CC ID 08344 | System hardening through configuration management | Configuration | |
Configure the "Excel 4 worksheets" to organizational standards. CC ID 08345 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Office data connection files" to organizational standards. CC ID 08346 | System hardening through configuration management | Configuration | |
Configure Microsoft Outlook settings for Microsoft Office in accordance with organizational standards. CC ID 07341 | System hardening through configuration management | Configuration | |
Configure the "Add file extensions to block as Level 1" to organizational standards. CC ID 07342 | System hardening through configuration management | Configuration | |
Configure the "Access to published calendars" to organizational standards. CC ID 07343 | System hardening through configuration management | Configuration | |
Configure the "Add e-mail recipients to users' Safe Senders Lists" to organizational standards. CC ID 07344 | System hardening through configuration management | Configuration | |
Configure the "Allow access to e-mail attachments" to organizational standards. CC ID 07345 | System hardening through configuration management | Configuration | |
Configure the "Allow Active X One Off Forms" to organizational standards. CC ID 07346 | System hardening through configuration management | Configuration | |
Configure the "Add file extensions to block as Level 2" to organizational standards. CC ID 07347 | System hardening through configuration management | Configuration | |
Configure the "Allow users to demote attachments to Level 2" to organizational standards. CC ID 07348 | System hardening through configuration management | Configuration | |
Configure the "Apply macro security settings to macros, add-ins, and SmartTags" to organizational standards. CC ID 07349 | System hardening through configuration management | Configuration | |
Configure the "Allow scripts in one-off Outlook forms" to organizational standards. CC ID 07350 | System hardening through configuration management | Configuration | |
Configure the "Authentication with Exchange Server" to organizational standards. CC ID 07351 | System hardening through configuration management | Configuration | |
Configure the "Attachment Secure Temporary Folder" to organizational standards. CC ID 07352 | System hardening through configuration management | Configuration | |
Configure the "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" to organizational standards. CC ID 07353 | System hardening through configuration management | Configuration | |
Configure the "Automatically configure profile based on Active Directory Primary SMTP address" to organizational standards. CC ID 07354 | System hardening through configuration management | Configuration | |
Configure the "Block Trusted Zones" to organizational standards. CC ID 07355 | System hardening through configuration management | Configuration | |
Configure the "Configure Add-In Trust Level" to organizational standards. CC ID 07356 | System hardening through configuration management | Configuration | |
Configure the "Automatically download attachments" to organizational standards. CC ID 07357 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" to organizational standards. CC ID 07358 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook object model prompt when accessing address information via UserProperties.Find" to organizational standards. CC ID 07359 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook object model prompt when executing Save As" to organizational standards. CC ID 07360 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook object model prompt when responding to meeting and task requests" to organizational standards. CC ID 07362 | System hardening through configuration management | Configuration | |
Configure the "Dial-up options" to organizational standards. CC ID 07363 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook object model prompt when sending mail" to organizational standards. CC ID 07364 | System hardening through configuration management | Configuration | |
Configure the "Configure trusted add-ins" to organizational standards. CC ID 07365 | System hardening through configuration management | Configuration | |
Configure the "Disable user entries to server list" to organizational standards. CC ID 07366 | System hardening through configuration management | Configuration | |
Configure the "Disable Remember Password" to organizational standards. CC ID 07367 | System hardening through configuration management | Configuration | |
Configure the "Display Level 1 attachments" to organizational standards. CC ID 07368 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook object model prompt when reading address information" to organizational standards. CC ID 07369 | System hardening through configuration management | Configuration | |
Configure the "Do not allow attachment previewing in Outlook" to organizational standards. CC ID 07370 | System hardening through configuration management | Configuration | |
Configure the "Do not allow creating, replying, or forwarding signatures for e-mail messages" to organizational standards. CC ID 07371 | System hardening through configuration management | Configuration | |
Configure the "Configure Outlook object model prompt when accessing an address book" to organizational standards. CC ID 07372 | System hardening through configuration management | Configuration | |
Configure the "Do not allow folders in non-default stores to be set as folder home pages" to organizational standards. CC ID 07373 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Outlook object model scripts to run for public folders" to organizational standards. CC ID 07374 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Outlook object model scripts to run for shared folders" to organizational standards. CC ID 07375 | System hardening through configuration management | Configuration | |
Configure the "Do not automatically sign replies" to organizational standards. CC ID 07376 | System hardening through configuration management | Configuration | |
Configure the "Do not check e-mail address against address of certificates being used" to organizational standards. CC ID 07377 | System hardening through configuration management | Configuration | |
Configure the "Do not allow users to change permissions on folders" to organizational standards. CC ID 07378 | System hardening through configuration management | Configuration | |
Configure the "Do not expand distribution lists" to organizational standards. CC ID 07379 | System hardening through configuration management | Configuration | |
Configure the "Do not display 'Publish to GAL' button" to organizational standards. CC ID 07381 | System hardening through configuration management | Configuration | |
Configure the "Do not prompt about Level 1 attachments when closing an item" to organizational standards. CC ID 07382 | System hardening through configuration management | Configuration | |
Configure the "Do not permit download of content from safe zones" to organizational standards. CC ID 07383 | System hardening through configuration management | Configuration | |
Configure the "Download full text of articles as HTML attachments" to organizational standards. CC ID 07384 | System hardening through configuration management | Configuration | |
Configure the "Do not prompt about Level 1 attachments when sending an item" to organizational standards. CC ID 07385 | System hardening through configuration management | Configuration | |
Configure the "Do not provide Continue option on Encryption warning dialog boxes" to organizational standards. CC ID 07386 | System hardening through configuration management | Configuration | |
Configure the "Enable RPC encryption" to organizational standards. CC ID 07387 | System hardening through configuration management | Configuration | |
Configure the "Encrypt all e-mail messages" to organizational standards. CC ID 07388 | System hardening through configuration management | Configuration | |
Configure the "Enable links in e-mail messages" to organizational standards. CC ID 07389 | System hardening through configuration management | Configuration | |
Configure the "Display pictures and external content in HTML e-mail" to organizational standards. CC ID 07390 | System hardening through configuration management | Configuration | |
Configure the "Hide Junk Mail UI" to organizational standards. CC ID 07391 | System hardening through configuration management | Configuration | |
Configure the "Ensure all S/MIME signed messages have a label" to organizational standards. CC ID 07392 | System hardening through configuration management | Configuration | |
Configure the "Include Intranet in Safe Zones for Automatic Picture Download" to organizational standards. CC ID 07393 | System hardening through configuration management | Configuration | |
Configure the "Include Internet in Safe Zones for Automatic Picture Download" to organizational standards. CC ID 07394 | System hardening through configuration management | Configuration | |
Configure the "Message Formats" to organizational standards. CC ID 07395 | System hardening through configuration management | Configuration | |
Configure the "Junk E-mail protection level" to organizational standards. CC ID 07396 | System hardening through configuration management | Configuration | |
Configure the "Make Outlook the default program for E-mail, Contacts, and Calendar" to organizational standards. CC ID 07397 | System hardening through configuration management | Configuration | |
Configure the "Do not include Internet Calendar integration in Outlook" to organizational standards. CC ID 07398 | System hardening through configuration management | Configuration | |
Configure the "Missing CRLs" to organizational standards. CC ID 07399 | System hardening through configuration management | Configuration | |
Configure the "Display online status on a person name" to organizational standards. CC ID 07400 | System hardening through configuration management | Configuration | |
Configure the "Outlook Rich Text options" to organizational standards. CC ID 07401 | System hardening through configuration management | Configuration | |
Configure the "Outlook Security Mode" to organizational standards. CC ID 07402 | System hardening through configuration management | Configuration | |
Configure the "Plain text options" to organizational standards. CC ID 07403 | System hardening through configuration management | Configuration | |
Configure the "Prevent publishing to a DAV server" to organizational standards. CC ID 07404 | System hardening through configuration management | Configuration | |
Configure the "Prevent publishing to Office Online" to organizational standards. CC ID 07405 | System hardening through configuration management | Configuration | |
Configure the "Promote Level 2 errors as errors, not warnings" to organizational standards. CC ID 07406 | System hardening through configuration management | Configuration | |
Configure the "Prevent users from customizing attachment security settings" to organizational standards. CC ID 07407 | System hardening through configuration management | Configuration | |
Configure the "Prompt user to choose security settings if default settings fail" to organizational standards. CC ID 07408 | System hardening through configuration management | Configuration | |
Configure the "Remove file extensions blocked as Level 1" to organizational standards. CC ID 07409 | System hardening through configuration management | Configuration | |
Configure the "Remove file extensions blocked as Level 2" to organizational standards. CC ID 07410 | System hardening through configuration management | Configuration | |
Configure the "Read e-mail as plain text" to organizational standards. CC ID 07411 | System hardening through configuration management | Configuration | |
Configure the "Read signed e-mail as plain text" to organizational standards. CC ID 07412 | System hardening through configuration management | Configuration | |
Configure the "Request an S/MIME receipt for all S/MIME signed messages" to organizational standards. CC ID 07413 | System hardening through configuration management | Configuration | |
Configure the "Restrict level of calendar details users can publish" to organizational standards. CC ID 07414 | System hardening through configuration management | Configuration | |
Configure the "Require SuiteB algorithms for S/MIME operations" to organizational standards. CC ID 07415 | System hardening through configuration management | Configuration | |
Configure the "Minimum encryption settings" to organizational standards. CC ID 07416 | System hardening through configuration management | Configuration | |
Configure the "Retrieving CRLs (Certificate Revocation Lists)" to organizational standards. CC ID 07417 | System hardening through configuration management | Configuration | |
Configure the "Run in FIPS compliant mode" to organizational standards. CC ID 07418 | System hardening through configuration management | Configuration | |
Configure the "Missing root certificates" to organizational standards. CC ID 07419 | System hardening through configuration management | Configuration | |
Configure the "S/MIME password settings" to organizational standards. CC ID 07420 | System hardening through configuration management | Configuration | |
Configure the "S/MIME receipt requests" to organizational standards. CC ID 07421 | System hardening through configuration management | Configuration | |
Configure the "S/MIME interoperability with external clients:" to organizational standards. CC ID 07422 | System hardening through configuration management | Configuration | |
Configure the "Send all signed messages as clear signed messages" to organizational standards. CC ID 07423 | System hardening through configuration management | Configuration | |
Configure the "Security setting for macros" to organizational standards. CC ID 07424 | System hardening through configuration management | Configuration | |
Configure the "Set control ItemProperty prompt" to organizational standards. CC ID 07425 | System hardening through configuration management | Configuration | |
Configure the "Set maximum level of online status on a person name" to organizational standards. CC ID 07426 | System hardening through configuration management | Configuration | |
Configure the "Set message format" to organizational standards. CC ID 07427 | System hardening through configuration management | Configuration | |
Configure the "Sign all e-mail messages" to organizational standards. CC ID 07428 | System hardening through configuration management | Configuration | |
Configure the "Fortezza certificate policies" to organizational standards. CC ID 07429 | System hardening through configuration management | Configuration | |
Configure the "Synchronize Outlook RSS Feeds with Common Feed List" to organizational standards. CC ID 07430 | System hardening through configuration management | Configuration | |
Configure the "Trust E-mail from Contacts" to organizational standards. CC ID 07431 | System hardening through configuration management | Configuration | |
Configure the "Signature Warning" to organizational standards. CC ID 07432 | System hardening through configuration management | Configuration | |
Configure the "Turn off RSS feature" to organizational standards. CC ID 07466 | System hardening through configuration management | Configuration | |
Configure the "Restrict upload method" to organizational standards. CC ID 07473 | System hardening through configuration management | Configuration | |
Configure the "Required Certificate Authority" to organizational standards. CC ID 07493 | System hardening through configuration management | Configuration | |
Configure the "Turn off Enable the Person Names Smart Tag option" to organizational standards. CC ID 07499 | System hardening through configuration management | Configuration | |
Configure the "Use Unicode format when dragging e-mail message to file system" to organizational standards. CC ID 07506 | System hardening through configuration management | Configuration | |
Configure the "URL for S/MIME certificates" to organizational standards. CC ID 07520 | System hardening through configuration management | Configuration | |
Configure the "Set Outlook object model Custom Actions execution prompt" to organizational standards. CC ID 07539 | System hardening through configuration management | Configuration | |
Configure the "Prevent publishing to Office.com" to organizational standards. CC ID 08243 | System hardening through configuration management | Configuration | |
Configure the "Do not allow signatures for e-mail messages" to organizational standards. CC ID 08318 | System hardening through configuration management | Configuration | |
Configure Microsoft PowerPoint settings for Microsoft Office in accordance with organizational standards. CC ID 07433 | System hardening through configuration management | Configuration | |
Configure the "Block saving of GraphicFilters" to organizational standards. CC ID 07456 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Converters" to organizational standards. CC ID 07458 | System hardening through configuration management | Configuration | |
Configure the "Save files in this format" to organizational standards. CC ID 07461 | System hardening through configuration management | Configuration | |
Configure the "Disable Slide Update" to organizational standards. CC ID 07464 | System hardening through configuration management | Configuration | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft PowerPoint Open XML presentations" to organizational standards. CC ID 07467 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Html file types" to organizational standards. CC ID 07474 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Outlines" to organizational standards. CC ID 07485 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Outlines" to organizational standards. CC ID 07490 | System hardening through configuration management | Configuration | |
Configure the "Make hidden markup visible" to organizational standards. CC ID 07511 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2007" to organizational standards. CC ID 07516 | System hardening through configuration management | Configuration | |
Configure the "Run Programs" to organizational standards. CC ID 07518 | System hardening through configuration management | Configuration | |
Configure the "Unblock automatic download of linked images" to organizational standards. CC ID 07519 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Open Xml files types" to organizational standards. CC ID 07531 | System hardening through configuration management | Configuration | |
Configure the "Web Pages" to organizational standards. CC ID 07914 | System hardening through configuration management | Configuration | |
Configure the "Turn off trusted documents" to organizational standards. CC ID 07925 | System hardening through configuration management | Configuration | |
Configure the "Set CNG password spin count" to organizational standards. CC ID 07946 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #16" to organizational standards. CC ID 07956 | System hardening through configuration management | Configuration | |
Configure the "Outline files" to organizational standards. CC ID 07958 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #3" to organizational standards. CC ID 07966 | System hardening through configuration management | Configuration | |
Configure the "Scan encrypted macros in PowerPoint Open XML presentations" to organizational standards. CC ID 07967 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #4" to organizational standards. CC ID 07978 | System hardening through configuration management | Configuration | |
Configure the "Set maximum number of trusted documents" to organizational standards. CC ID 08005 | System hardening through configuration management | Configuration | |
Configure the "Legacy converters for PowerPoint" to organizational standards. CC ID 08009 | System hardening through configuration management | Configuration | |
Configure the "Set document behavior if file validation fails" to organizational standards. CC ID 08025 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Office Open XML converters for PowerPoint" to organizational standards. CC ID 08030 | System hardening through configuration management | Configuration | |
Configure the "PowerPoint beta converters" to organizational standards. CC ID 08047 | System hardening through configuration management | Configuration | |
Configure the "OpenDocument Presentation files" to organizational standards. CC ID 08051 | System hardening through configuration management | Configuration | |
Configure the "Use new key on password change" to organizational standards. CC ID 08052 | System hardening through configuration management | Configuration | |
Configure the "Graphic Filters" to organizational standards. CC ID 08060 | System hardening through configuration management | Configuration | |
Configure the "PowerPoint 2007 and later presentations, shows, templates, themes and add-in files" to organizational standards. CC ID 08099 | System hardening through configuration management | Configuration | |
Configure the "PowerPoint 97-2003 presentations, shows, templates and add-in files" to organizational standards. CC ID 08106 | System hardening through configuration management | Configuration | |
Configure the "PowerPoint beta files" to organizational standards. CC ID 08121 | System hardening through configuration management | Configuration | |
Configure the "Set default file block behavior" to organizational standards. CC ID 08142 | System hardening through configuration management | Configuration | |
Configure Microsoft Word settings for Microsoft Office in accordance with organizational standards. CC ID 07438 | System hardening through configuration management | Configuration | |
Configure the "Block opening of files before version" to organizational standards. CC ID 07462 | System hardening through configuration management | Configuration | |
Configure the "Block open Converters" to organizational standards. CC ID 07468 | System hardening through configuration management | Configuration | |
Configure the "Update automatic links at Open" to organizational standards. CC ID 07483 | System hardening through configuration management | Configuration | |
Configure the "Warn before printing, saving or sending a file that contains tracked changes or comments" to organizational standards. CC ID 07494 | System hardening through configuration management | Configuration | |
Configure the "Block saving of RTF file types" to organizational standards. CC ID 07501 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Converters" to organizational standards. CC ID 07504 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Word 2003 XML file types" to organizational standards. CC ID 07507 | System hardening through configuration management | Configuration | |
Configure the "Block opening of RTF file types" to organizational standards. CC ID 07510 | System hardening through configuration management | Configuration | |
Configure the "Block opening of HTML file types" to organizational standards. CC ID 07512 | System hardening through configuration management | Configuration | |
Configure the "Hidden text" to organizational standards. CC ID 07513 | System hardening through configuration management | Configuration | |
Configure the "Determine whether to force encrypted macros to be scanned in Microsoft Word Open XML documents" to organizational standards. CC ID 07533 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats new to Word 2007" to organizational standards. CC ID 07541 | System hardening through configuration management | Configuration | |
Configure the "Block opening of Internal file types" to organizational standards. CC ID 07552 | System hardening through configuration management | Configuration | |
Configure the "Block saving of Word 2003 XML file types" to organizational standards. CC ID 07567 | System hardening through configuration management | Configuration | |
Configure the "RTF files" to organizational standards. CC ID 07911 | System hardening through configuration management | Configuration | |
Configure the "Set maximum number of trust records to preserve" to organizational standards. CC ID 07912 | System hardening through configuration management | Configuration | |
Configure the "Specify CNG hash algorithm" to organizational standards. CC ID 07913 | System hardening through configuration management | Configuration | |
Configure the "VBA Macro Notification Settings" to organizational standards. CC ID 07926 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #2" to organizational standards. CC ID 07933 | System hardening through configuration management | Configuration | |
Configure the "Do not open files in unsafe locations in Protected View" to organizational standards. CC ID 07939 | System hardening through configuration management | Configuration | |
Configure the "Set parameters for CNG context" to organizational standards. CC ID 07948 | System hardening through configuration management | Configuration | |
Configure the "Store random number to improve merge accuracy" to organizational standards. CC ID 07972 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #19" to organizational standards. CC ID 07975 | System hardening through configuration management | Configuration | |
Configure the "Legacy converters for Word" to organizational standards. CC ID 07985 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #5" to organizational standards. CC ID 07987 | System hardening through configuration management | Configuration | |
Configure the "Word 6.0 binary documents and templates" to organizational standards. CC ID 07995 | System hardening through configuration management | Configuration | |
Configure the "Word 2000 binary documents and templates" to organizational standards. CC ID 08012 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #13" to organizational standards. CC ID 08013 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #17" to organizational standards. CC ID 08015 | System hardening through configuration management | Configuration | |
Configure the "Word 97 binary documents and templates" to organizational standards. CC ID 08024 | System hardening through configuration management | Configuration | |
Configure the "Do not open files from the Internet zone in Protected View" to organizational standards. CC ID 08029 | System hardening through configuration management | Configuration | |
Configure the "Turn off file validation" to organizational standards. CC ID 08048 | System hardening through configuration management | Configuration | |
Configure the "Office Open XML converters for Word" to organizational standards. CC ID 08055 | System hardening through configuration management | Configuration | |
Configure the "Word 95 binary documents and templates" to organizational standards. CC ID 08065 | System hardening through configuration management | Configuration | |
Configure the "Word beta converters" to organizational standards. CC ID 08080 | System hardening through configuration management | Configuration | |
Configure the "Word 2007 and later binary documents and templates" to organizational standards. CC ID 08082 | System hardening through configuration management | Configuration | |
Configure the "Word beta files" to organizational standards. CC ID 08092 | System hardening through configuration management | Configuration | |
Configure the "Word 2003 binary documents and templates" to organizational standards. CC ID 08093 | System hardening through configuration management | Configuration | |
Configure the "Word XP binary documents and templates" to organizational standards. CC ID 08095 | System hardening through configuration management | Configuration | |
Configure the "Word 2007 and later documents and templates" to organizational standards. CC ID 08097 | System hardening through configuration management | Configuration | |
Configure the "Word 2 and earlier binary documents and templates" to organizational standards. CC ID 08112 | System hardening through configuration management | Configuration | |
Configure the "Plain text files" to organizational standards. CC ID 08125 | System hardening through configuration management | Configuration | |
Configure the "Word 2003 and plain XML documents" to organizational standards. CC ID 08134 | System hardening through configuration management | Configuration | |
Configure the "OpenDocument Text files" to organizational standards. CC ID 08141 | System hardening through configuration management | Configuration | |
Configure the "Scan encrypted macros in Word Open XML documents" to organizational standards. CC ID 08147 | System hardening through configuration management | Configuration | |
Configure Microsoft OneNote settings for Microsoft Office in accordance with organizational standards. CC ID 07908 | System hardening through configuration management | Configuration | |
Configure the "Specify encryption compatibility" to organizational standards. CC ID 07909 | System hardening through configuration management | Configuration | |
Configure the "Specify CNG random number generator algorithm" to organizational standards. CC ID 07916 | System hardening through configuration management | Configuration | |
Configure the "Set CNG cipher algorithm" to organizational standards. CC ID 07944 | System hardening through configuration management | Configuration | |
Configure the "Set CNG cipher key length" to organizational standards. CC ID 07974 | System hardening through configuration management | Configuration | |
Configure User Interface settings for Microsoft Office in accordance with organizational standards. CC ID 07923 | System hardening through configuration management | Configuration | |
Configure Signing settings for Microsoft Office in accordance with organizational standards. CC ID 07929 | System hardening through configuration management | Configuration | |
Configure Email Form settings for Microsoft Office in accordance with organizational standards. CC ID 07930 | System hardening through configuration management | Configuration | |
Configure Security settings for Microsoft Office in accordance with organizational standards. CC ID 07932 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #8" to organizational standards. CC ID 07935 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #12" to organizational standards. CC ID 07940 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #20" to organizational standards. CC ID 07943 | System hardening through configuration management | Configuration | |
Configure the "Check the XAdES portions of a digital signature" to organizational standards. CC ID 07955 | System hardening through configuration management | Configuration | |
Configure the "Check OLE objects" to organizational standards. CC ID 07957 | System hardening through configuration management | Configuration | |
Configure the "Consistent Mime Handling" to organizational standards. CC ID 07959 | System hardening through configuration management | Configuration | |
Configure the "Protection From Zone Elevation" to organizational standards. CC ID 07964 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #14" to organizational standards. CC ID 07965 | System hardening through configuration management | Configuration | |
Configure the "Turn off Data Execution Prevention" to organizational standards. CC ID 07968 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #12" to organizational standards. CC ID 07976 | System hardening through configuration management | Configuration | |
Configure the "Set password hash format as ISO-compliant" to organizational standards. CC ID 07977 | System hardening through configuration management | Configuration | |
Configure the "Prompt to allow fatally corrupt files to open instead of blocking them" to organizational standards. CC ID 07982 | System hardening through configuration management | Configuration | |
Configure the "Encrypt document properties" to organizational standards. CC ID 07991 | System hardening through configuration management | Configuration | |
Configure the "Prevent Word and Excel from loading managed code extensions" to organizational standards. CC ID 07999 | System hardening through configuration management | Configuration | |
Configure the "Apply macro security settings to macros, add-ins and additional actions" to organizational standards. CC ID 08002 | System hardening through configuration management | Configuration | |
Configure the "Add-on Management" to organizational standards. CC ID 08007 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #7" to organizational standards. CC ID 08008 | System hardening through configuration management | Configuration | |
Configure the "Trusted Location #1" to organizational standards. CC ID 08016 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #13" to organizational standards. CC ID 08023 | System hardening through configuration management | Configuration | |
Configure the "S/MIME receipt requests behavior" to organizational standards. CC ID 08026 | System hardening through configuration management | Configuration | |
Configure the "Do not include XAdES reference object in the manifest" to organizational standards. CC ID 08031 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #11" to organizational standards. CC ID 08032 | System hardening through configuration management | Configuration | |
Configure the "Windows Internet Explorer Feature Control Opt-In" to organizational standards. CC ID 08033 | System hardening through configuration management | Configuration | |
Configure the "Allow hyperlinks in suspected phishing e-mail messages" to organizational standards. CC ID 08034 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #5" to organizational standards. CC ID 08038 | System hardening through configuration management | Configuration | |
Configure the "Specify minimum XAdES level for digital signature generation" to organizational standards. CC ID 08040 | System hardening through configuration management | Configuration | |
Configure the "Check OWC data source providers" to organizational standards. CC ID 08041 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #10" to organizational standards. CC ID 08044 | System hardening through configuration management | Configuration | |
Configure the "Set password rules domain timeout" to organizational standards. CC ID 08045 | System hardening through configuration management | Configuration | |
Configure the "Object Caching Protection" to organizational standards. CC ID 08046 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #18" to organizational standards. CC ID 08056 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #8" to organizational standards. CC ID 08057 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #3" to organizational standards. CC ID 08059 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #6" to organizational standards. CC ID 08063 | System hardening through configuration management | Configuration | |
Configure the "Replies or forwards to signed/encrypted messages are signed/encrypted" to organizational standards. CC ID 08064 | System hardening through configuration management | Configuration | |
Configure the "Set timestamp server timeout" to organizational standards. CC ID 08068 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #16" to organizational standards. CC ID 08071 | System hardening through configuration management | Configuration | |
Configure the "Previous-version file formats" to organizational standards. CC ID 08072 | System hardening through configuration management | Configuration | |
Configure the "Turn off PDF encryption setting UI" to organizational standards. CC ID 08074 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #2" to organizational standards. CC ID 08075 | System hardening through configuration management | Configuration | |
Configure the "Restrict File Download" to organizational standards. CC ID 08076 | System hardening through configuration management | Configuration | |
Configure the "Require OCSP at signature generation time" to organizational standards. CC ID 08077 | System hardening through configuration management | Configuration | |
Configure the "Disable Password Caching" to organizational standards. CC ID 08079 | System hardening through configuration management | Configuration | |
Configure the "Message when Outlook cannot find the digital ID to decode a message" to organizational standards. CC ID 08083 | System hardening through configuration management | Configuration | |
Configure the "Enable Cryptography Icons" to organizational standards. CC ID 08086 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #14" to organizational standards. CC ID 08091 | System hardening through configuration management | Configuration | |
Configure the "Disable 'Remember password' for Internet e-mail accounts" to organizational standards. CC ID 08096 | System hardening through configuration management | Configuration | |
Configure the "Suppress hyperlink warnings" to organizational standards. CC ID 08100 | System hardening through configuration management | Configuration | |
Configure the "Use Protected View for attachments received from internal senders" to organizational standards. CC ID 08104 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #9" to organizational standards. CC ID 08108 | System hardening through configuration management | Configuration | |
Configure the "Display OLE package objects" to organizational standards. CC ID 08109 | System hardening through configuration management | Configuration | |
Configure the "Configure time stamping hashing algorithm" to organizational standards. CC ID 08111 | System hardening through configuration management | Configuration | |
Configure the "Scripted Window Security Restrictions" to organizational standards. CC ID 08113 | System hardening through configuration management | Configuration | |
Configure the "Set password rules level" to organizational standards. CC ID 08117 | System hardening through configuration management | Configuration | |
Configure the "Information Bar" to organizational standards. CC ID 08118 | System hardening through configuration management | Configuration | |
Configure the "Mime Sniffing Safety Feature" to organizational standards. CC ID 08119 | System hardening through configuration management | Configuration | |
Configure the "Publisher Automation Security Level" to organizational standards. CC ID 08123 | System hardening through configuration management | Configuration | |
Configure the "Check Excel RTD servers" to organizational standards. CC ID 08127 | System hardening through configuration management | Configuration | |
Configure the "Path to shared Workgroup information file for secured MDB files" to organizational standards. CC ID 08128 | System hardening through configuration management | Configuration | |
Configure the "Check ActiveX objects" to organizational standards. CC ID 08131 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #15" to organizational standards. CC ID 08132 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #19" to organizational standards. CC ID 08135 | System hardening through configuration management | Configuration | |
Configure the "Always use TNEF formatting in S/MIME messages" to organizational standards. CC ID 08136 | System hardening through configuration management | Configuration | |
Configure the "Restrict ActiveX Install" to organizational standards. CC ID 08138 | System hardening through configuration management | Configuration | |
Configure the "Set signature verification level" to organizational standards. CC ID 08140 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #17" to organizational standards. CC ID 08143 | System hardening through configuration management | Configuration | |
Configure the "Do not allow expired certificates when validating signatures" to organizational standards. CC ID 08144 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #4" to organizational standards. CC ID 08145 | System hardening through configuration management | Configuration | |
Configure the "Requested XAdES level for signature generation" to organizational standards. CC ID 08146 | System hardening through configuration management | Configuration | |
Configure the "Specify timestamp server name" to organizational standards. CC ID 08148 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #7" to organizational standards. CC ID 08149 | System hardening through configuration management | Configuration | |
Configure the "Select digital signature hashing algorithm" to organizational standards. CC ID 08150 | System hardening through configuration management | Configuration | |
Configure the "Local Machine Zone Lockdown Security" to organizational standards. CC ID 08151 | System hardening through configuration management | Configuration | |
Configure the "Graphics filter import" to organizational standards. CC ID 08152 | System hardening through configuration management | Configuration | |
Configure the "Unsafe Location #1" to organizational standards. CC ID 08153 | System hardening through configuration management | Configuration | |
Configure the "Security Level" to organizational standards. CC ID 08157 | System hardening through configuration management | Configuration | |
Configure the "Turn off error reporting for files that fail file validation" to organizational standards. CC ID 08159 | System hardening through configuration management | Configuration | |
Configure the "Block application add-ins loading" to organizational standards. CC ID 08160 | System hardening through configuration management | Configuration | |
Configure the "Allow the use of ActiveX Custom Controls in InfoPath forms" to organizational standards. CC ID 08171 | System hardening through configuration management | Configuration | |
Configure the "Control behavior for Microsoft SharePoint Foundation gradual upgrade" to organizational standards. CC ID 08181 | System hardening through configuration management | Configuration | |
Configure the "Block cross-domain data form retrieval" to organizational standards. CC ID 08238 | System hardening through configuration management | Configuration | |
Configure the "Display a warning that a form is digitally signed" to organizational standards. CC ID 08307 | System hardening through configuration management | Configuration | |
Configure the "Beaconing UI for forms opened in InfoPath Filler ActiveX" to organizational standards. CC ID 08333 | System hardening through configuration management | Configuration | |
Configure the "Disable opening forms with managed code from the Internet security zone" to organizational standards. CC ID 08340 | System hardening through configuration management | Configuration | |
Configure Restricted Permissions settings for Microsoft Office in accordance with organizational standards. CC ID 07937 | System hardening through configuration management | Configuration | |
Configure Account settings for Microsoft Office in accordance with organizational standards. CC ID 07951 | System hardening through configuration management | Configuration | |
Configure Add-In settings for Microsoft Office in accordance with organizational standards. CC ID 07962 | System hardening through configuration management | Configuration | |
Configure the "Do not allow on-demand activity synchronization" to organizational standards. CC ID 07963 | System hardening through configuration management | Configuration | |
Configure the "Do not show social network info-bars" to organizational standards. CC ID 07988 | System hardening through configuration management | Configuration | |
Configure the "Turn off Outlook Social Connector" to organizational standards. CC ID 07989 | System hardening through configuration management | Configuration | |
Configure the "Set GAL contact synchronization interval" to organizational standards. CC ID 08039 | System hardening through configuration management | Configuration | |
Configure the "Do not download photos from Active Directory" to organizational standards. CC ID 08043 | System hardening through configuration management | Configuration | |
Configure the "Specify activity feed synchronization interval" to organizational standards. CC ID 08058 | System hardening through configuration management | Configuration | |
Configure the "Block social network contact synchronization" to organizational standards. CC ID 08062 | System hardening through configuration management | Configuration | |
Configure the "Block network activity synchronization" to organizational standards. CC ID 08103 | System hardening through configuration management | Configuration | |
Configure the "Block specific social network providers" to organizational standards. CC ID 08114 | System hardening through configuration management | Configuration | |
Configure the "Specify list of social network providers to load" to organizational standards. CC ID 08122 | System hardening through configuration management | Configuration | |
Configure the "Block Global Address List synchronization" to organizational standards. CC ID 08139 | System hardening through configuration management | Configuration | |
Configure the "Prevent social network connectivity" to organizational standards. CC ID 08156 | System hardening through configuration management | Configuration | |
Configure File Format Converter settings for Microsoft Office in accordance with organizational standards. CC ID 07983 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats new to Excel 2010 through the Compatibility Pack for Office 2010 and Excel 2010 Converter" to organizational standards. CC ID 07984 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats new to Word 2010 through the Compatibility Pack for Office 2010 and Word 2010 Open XML/Word 97-2003 Format Converter" to organizational standards. CC ID 08004 | System hardening through configuration management | Configuration | |
Configure the "Block opening of pre-release versions of file formats new to PowerPoint 2010 through the Compatibility Pack for Office 2010 and PowerPoint 2010 Converter" to organizational standards. CC ID 08124 | System hardening through configuration management | Configuration | |
Configure Microsoft Project settings for Microsoft Office in accordance with organizational standards. CC ID 08036 | System hardening through configuration management | Configuration | |
Configure the "Enable untrusted intranet zone access to Project server" to organizational standards. CC ID 08037 | System hardening through configuration management | Configuration | |
Configure Meeting Workspace settings for Microsoft Office in accordance with organizational standards. CC ID 08050 | System hardening through configuration management | Configuration | |
Configure Miscellaneous settings for Microsoft Office in accordance with organizational standards. CC ID 08054 | System hardening through configuration management | Configuration | |
Configure the "OLAP PivotTable User Defined Function (UDF) security setting" to organizational standards. CC ID 08133 | System hardening through configuration management | Configuration | |
Configure the "Do not expand Contact Groups" to organizational standards. CC ID 08343 | System hardening through configuration management | Configuration | |
Configure Data Backup and Recovery settings for Microsoft Office in accordance with organizational standards. CC ID 08098 | System hardening through configuration management | Configuration | |
Configure Privacy settings for Microsoft Office in accordance with organizational standards. CC ID 08101 | System hardening through configuration management | Configuration | |
Configure Server Settings settings for Microsoft Office in accordance with organizational standards. CC ID 08154 | System hardening through configuration management | Configuration | |
Configure the "Disable the Office client from polling the SharePoint Server for published links" to organizational standards. CC ID 08155 | System hardening through configuration management | Configuration | |
Configure Smart Documents settings for Microsoft Office in accordance with organizational standards. CC ID 08158 | System hardening through configuration management | Configuration | |
Configure Fax settings for Microsoft Office in accordance with organizational standards. CC ID 08310 | System hardening through configuration management | Configuration | |
Configure the "Date Format" setting to organizational standards. CC ID 09400 | System hardening through configuration management | Configuration | |
Configure the "Do not allow printing to Journal Note Writer" setting to organizational standards. CC ID 10911 | System hardening through configuration management | Configuration | |
Configure the "Do not allow Windows Journal to be run" setting to organizational standards. CC ID 10922 | System hardening through configuration management | Configuration | |
Configure Services settings to organizational standards. CC ID 07434 | System hardening through configuration management | Configuration | |
Configure Active Directory in accordance with organizational standards. CC ID 16434 | System hardening through configuration management | Configuration | |
Configure SID filtering in accordance with organizational standards. CC ID 16435 | System hardening through configuration management | Configuration | |
Configure AWS Config to organizational standards. CC ID 15440 | System hardening through configuration management | Configuration | |
Configure "Configure Authenticated Proxy usage for the Connected User Experience and Telemetry service" to organizational standards. CC ID 15343 | System hardening through configuration management | Configuration | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_X64" to organizational standards CC ID 07435 | System hardening through configuration management | Configuration | |
Configure the "namespace" to organizational standards. CC ID 14654 | System hardening through configuration management | Configuration | |
Configure the "Smart Card" to organizational standards. CC ID 07436 | System hardening through configuration management | Configuration | |
Configure the "File Server Storage Reports Manager" to organizational standards. CC ID 07437 | System hardening through configuration management | Configuration | |
Configure the "IP Helper" to organizational standards. CC ID 07439 | System hardening through configuration management | Configuration | |
Configure the "ipc" argument to organizational standards. CC ID 14524 | System hardening through configuration management | Configuration | |
Configure the "AD RMS Logging Service" to organizational standards. CC ID 07440 | System hardening through configuration management | Configuration | |
Configure the "Windows Time" to organizational standards. CC ID 07441 | System hardening through configuration management | Configuration | |
Configure the "Protected Storage" to organizational standards. CC ID 07442 | System hardening through configuration management | Configuration | |
Configure the "Windows License Monitoring Service" to organizational standards. CC ID 07443 | System hardening through configuration management | Configuration | |
Configure the "Portable Device Enumerator Service" to organizational standards. CC ID 07444 | System hardening through configuration management | Configuration | |
Configure the "Software Licensing" to organizational standards. CC ID 07445 | System hardening through configuration management | Configuration | |
Configure the "Offline Files" to organizational standards. CC ID 07446 | System hardening through configuration management | Configuration | |
Configure the "Peer Networking Identity Manager" to organizational standards. CC ID 07447 | System hardening through configuration management | Configuration | |
Configure the "Human Interface Device Access" to organizational standards. CC ID 07448 | System hardening through configuration management | Configuration | |
Configure the "Link-Layer Topology Discovery Mapper" to organizational standards. CC ID 07449 | System hardening through configuration management | Configuration | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_I64" to organizational standards CC ID 07450 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall" to organizational standards. CC ID 07451 | System hardening through configuration management | Configuration | |
Configure the "networkpolicy" to organizational standards. CC ID 14655 | System hardening through configuration management | Configuration | |
Configure the "Net.Tcp Port Sharing Service" to organizational standards. CC ID 07452 | System hardening through configuration management | Configuration | |
Configure the "pid" argument to organizational standards. CC ID 14532 | System hardening through configuration management | Configuration | |
Configure the "Secondary Logon" to organizational standards. CC ID 07453 | System hardening through configuration management | Configuration | |
Configure the "Remote Access Connection Manager" to organizational standards. CC ID 07454 | System hardening through configuration management | Configuration | |
Configure the "Function Discovery Provider Host" to organizational standards. CC ID 07455 | System hardening through configuration management | Configuration | |
Configure the "Windows Process Activation Service" to organizational standards. CC ID 07457 | System hardening through configuration management | Configuration | |
Configure the "Task Scheduler" to organizational standards. CC ID 07459 | System hardening through configuration management | Configuration | |
Configure the "Intersite Messaging" to organizational standards. CC ID 07460 | System hardening through configuration management | Configuration | |
Configure the "Special Administration Console Helper" to organizational standards. CC ID 07463 | System hardening through configuration management | Configuration | |
Configure the "Security Accounts Manager" to organizational standards. CC ID 07465 | System hardening through configuration management | Configuration | |
Configure the "Kerberos Key Distribution Center" to organizational standards. CC ID 07469 | System hardening through configuration management | Configuration | |
Configure the "COM+ System Application" to organizational standards. CC ID 07470 | System hardening through configuration management | Configuration | |
Configure the "RPC Endpoint Mapper" to organizational standards. CC ID 07471 | System hardening through configuration management | Configuration | |
Configure the "UPnP Device Host" to organizational standards. CC ID 07472 | System hardening through configuration management | Configuration | |
Configure the "DHCP Client" to organizational standards. CC ID 07475 | System hardening through configuration management | Configuration | |
Configure the "Extensible Authentication Protocol" to organizational standards. CC ID 07476 | System hardening through configuration management | Configuration | |
Configure the "SNMP Service" to organizational standards. CC ID 07477 | System hardening through configuration management | Configuration | |
Configure the "Message Queuing Down Level Clients" to organizational standards. CC ID 07478 | System hardening through configuration management | Configuration | |
Configure the "TPM Base Services" to organizational standards. CC ID 07479 | System hardening through configuration management | Configuration | |
Configure the "Windows Deployment Services server" to organizational standards. CC ID 07480 | System hardening through configuration management | Configuration | |
Configure the "Microsoft iSNS Server" to organizational standards. CC ID 07481 | System hardening through configuration management | Configuration | |
Configure the "Multimedia Class Scheduler" to organizational standards. CC ID 07482 | System hardening through configuration management | Configuration | |
Configure the "uts" argument to organizational standards. CC ID 14526 | System hardening through configuration management | Configuration | |
Configure the "Performance Counter DLL Host" to organizational standards. CC ID 07484 | System hardening through configuration management | Configuration | |
Configure the "pids-limit" argument to organizational standards. CC ID 14537 | System hardening through configuration management | Configuration | |
Configure the "Windows Search" to organizational standards. CC ID 07486 | System hardening through configuration management | Configuration | |
Configure the "DFS Replication" to organizational standards. CC ID 07487 | System hardening through configuration management | Configuration | |
Configure the "Superfetch" to organizational standards. CC ID 07488 | System hardening through configuration management | Configuration | |
Configure the "Power" to organizational standards. CC ID 07489 | System hardening through configuration management | Configuration | |
Configure the "Remote Access Quarantine Agent" to organizational standards. CC ID 07491 | System hardening through configuration management | Configuration | |
Configure the "Windows Audio" to organizational standards. CC ID 07492 | System hardening through configuration management | Configuration | |
Configure the "Windows Event Log" to organizational standards. CC ID 07495 | System hardening through configuration management | Configuration | |
Configure the "Performance Logs & Alerts" to organizational standards. CC ID 07496 | System hardening through configuration management | Configuration | |
Configure the "File Replication" to organizational standards. CC ID 07497 | System hardening through configuration management | Configuration | |
Configure the "Encrypting File System (EFS)" to organizational standards. CC ID 07498 | System hardening through configuration management | Configuration | |
Configure the "userns" argument to organizational standards. CC ID 14530 | System hardening through configuration management | Configuration | |
Configure the "Quality Windows Audio Video Experience" to organizational standards. CC ID 07500 | System hardening through configuration management | Configuration | |
Configure the "TCP/IP NetBIOS Helper" to organizational standards. CC ID 07502 | System hardening through configuration management | Configuration | |
Configure the "Windows System Resource Manager" to organizational standards. CC ID 07503 | System hardening through configuration management | Configuration | |
Configure the "Interactive Services Detection" to organizational standards. CC ID 07505 | System hardening through configuration management | Configuration | |
Configure the "Software Protection" to organizational standards. CC ID 07508 | System hardening through configuration management | Configuration | |
Configure the "ASP .NET State Service" to organizational standards CC ID 07509 | System hardening through configuration management | Configuration | |
Configure the "Distributed Transaction Coordinator" to organizational standards. CC ID 07514 | System hardening through configuration management | Configuration | |
Configure the "Telnet" to organizational standards. CC ID 07515 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Image Management Service" to organizational standards. CC ID 07517 | System hardening through configuration management | Configuration | |
Configure the "Server" to organizational standards. CC ID 07521 | System hardening through configuration management | Configuration | |
Configure the "Group Policy Client" to organizational standards. CC ID 07522 | System hardening through configuration management | Configuration | |
Configure the "Desktop Window Manager Session Manager" to organizational standards. CC ID 07523 | System hardening through configuration management | Configuration | |
Configure the "Windows Management Instrumentation" to organizational standards. CC ID 07524 | System hardening through configuration management | Configuration | |
Configure the "World Wide Web Publishing Service" to organizational standards. CC ID 07525 | System hardening through configuration management | Configuration | |
Configure the "Function Discovery Resource Publication" to organizational standards. CC ID 07526 | System hardening through configuration management | Configuration | |
Configure the "Simple Mail Transport Protocol (SMTP)" to organizational standards. CC ID 07527 | System hardening through configuration management | Configuration | |
Configure the "Resultant Set of Policy Provider" to organizational standards. CC ID 07528 | System hardening through configuration management | Configuration | |
Configure the "WMI Performance Adapter" to organizational standards. CC ID 07529 | System hardening through configuration management | Configuration | |
Configure the "Disk Defragmenter" to organizational standards. CC ID 07530 | System hardening through configuration management | Configuration | |
Configure the "IIS Admin Service" to organizational standards. CC ID 07532 | System hardening through configuration management | Configuration | |
Configure the "Volume Shadow Copy" to organizational standards. CC ID 07534 | System hardening through configuration management | Configuration | |
Configure the "Network Location Awareness" to organizational standards. CC ID 07535 | System hardening through configuration management | Configuration | |
Configure the "Windows Presentation Foundation Font Cache 3.0.0.0" to organizational standards. CC ID 07536 | System hardening through configuration management | Configuration | |
Configure the "WinHTTP Web Proxy Auto-Discovery Service" to organizational standards. CC ID 07537 | System hardening through configuration management | Configuration | |
Configure the "Network List Service" to organizational standards. CC ID 07538 | System hardening through configuration management | Configuration | |
Configure the "Application Experience" to organizational standards. CC ID 07540 | System hardening through configuration management | Configuration | |
Configure the "Active Directory Web Services" to organizational standards. CC ID 07542 | System hardening through configuration management | Configuration | |
Configure the "SSDP Discovery" to organizational standards. CC ID 07543 | System hardening through configuration management | Configuration | |
Configure the "TCP/IP Print Server" to organizational standards. CC ID 07544 | System hardening through configuration management | Configuration | |
Configure "Netlogon" to organizational standards. CC ID 07545 | System hardening through configuration management | Configuration | |
Configure the "Windows Error Reporting Service" to organizational standards. CC ID 07546 | System hardening through configuration management | Configuration | |
Configure the "IKE and AuthIP IPsec Keying Modules" to organizational standards. CC ID 07547 | System hardening through configuration management | Configuration | |
Configure the "DFS Namespace" to organizational standards. CC ID 07548 | System hardening through configuration management | Configuration | |
Configure the "SQL Server VSS Writer" to organizational standards. CC ID 07549 | System hardening through configuration management | Configuration | |
Configure the "Network Policy Server" to organizational standards. CC ID 07550 | System hardening through configuration management | Configuration | |
Configure the "Windows Driver Foundation - User-mode Driver Framework" to organizational standards. CC ID 07551 | System hardening through configuration management | Configuration | |
Configure the "Server For NIS" to organizational standards. CC ID 07553 | System hardening through configuration management | Configuration | |
Configure the "User Profile Service" to organizational standards. CC ID 07554 [Review whether applications in use provide the following capabilities: Have user and group profiles to manage user access for applications if they are not part of a centralized identity access management system. App A Objective 6.27.b] | System hardening through configuration management | Configuration | |
Configure the "SNMP Trap" to organizational standards. CC ID 07555 | System hardening through configuration management | Configuration | |
Configure the "Net.Tcp Listener Adapter" to organizational standards. CC ID 07556 | System hardening through configuration management | Configuration | |
Configure the "Network Access Protection Agent" to organizational standards. CC ID 07557 | System hardening through configuration management | Configuration | |
Configure the "Remote Access Auto Connection Manager" to organizational standards. CC ID 07558 | System hardening through configuration management | Configuration | |
Configure the "Server for NFS" to organizational standards. CC ID 07559 | System hardening through configuration management | Configuration | |
Configure the "Credential Manager" to organizational standards. CC ID 07560 | System hardening through configuration management | Configuration | |
Configure the "Workstation" to organizational standards. CC ID 07561 | System hardening through configuration management | Configuration | |
Configure the "PNRP Machine Name Publication Service" to organizational standards. CC ID 07562 | System hardening through configuration management | Configuration | |
Configure the "Print Spooler" to organizational standards. CC ID 07563 | System hardening through configuration management | Configuration | |
Configure the "Windows Internet Name Service (WINS)" to organizational standards. CC ID 07564 | System hardening through configuration management | Configuration | |
Configure the "Net.Msmq Listener Adapter" to organizational standards. CC ID 07565 | System hardening through configuration management | Configuration | |
Configure the "COM+ Event System" to organizational standards. CC ID 07566 | System hardening through configuration management | Configuration | |
Configure the "Windows Update" to organizational standards. CC ID 07568 | System hardening through configuration management | Configuration | |
Configure the "Windows Installer" to organizational standards. CC ID 07569 | System hardening through configuration management | Configuration | |
Configure the "Windows Color System" to organizational standards. CC ID 07570 | System hardening through configuration management | Configuration | |
Configure the "Microsoft .NET Framework NGEN v2.0.50727_X86" to organizational standards CC ID 07571 | System hardening through configuration management | Configuration | |
Configure the "Block Level Backup Engine Service" to organizational standards. CC ID 07572 | System hardening through configuration management | Configuration | |
Configure the "Windows CardSpace" to organizational standards. CC ID 07573 | System hardening through configuration management | Configuration | |
Configure the "webclient" to organizational standards. CC ID 07574 | System hardening through configuration management | Configuration | |
Configure the "Diagnostic Service Host" to organizational standards. CC ID 07575 | System hardening through configuration management | Configuration | |
Configure the "Active Directory Certificate Services" to organizational standards. CC ID 07576 | System hardening through configuration management | Configuration | |
Configure the "File Server Resource Manager" to organizational standards. CC ID 07577 | System hardening through configuration management | Configuration | |
Configure the "Secure Socket Tunneling Protocol Service" to organizational standards. CC ID 07578 | System hardening through configuration management | Configuration | |
Configure the "Cluster Service" to organizational standards. CC ID 07579 | System hardening through configuration management | Configuration | |
Configure the "Application Management" to organizational standards. CC ID 07580 | System hardening through configuration management | Configuration | |
Configure the "Remote Procedure Call (RPC) Locator" to organizational standards. CC ID 07581 | System hardening through configuration management | Configuration | |
Configure the "Thread Ordering Server" to organizational standards. CC ID 07582 | System hardening through configuration management | Configuration | |
Configure the "FTP Publishing Service" to organizational standards. CC ID 07583 | System hardening through configuration management | Configuration | |
Configure the "System Event Notification Service" to organizational standards. CC ID 07584 | System hardening through configuration management | Configuration | |
Configure the "Remote Procedure Call (RPC)" to organizational standards. CC ID 07585 | System hardening through configuration management | Configuration | |
Configure the "Net.Pipe Listener Adapter" to organizational standards. CC ID 07586 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Licensing" to organizational standards. CC ID 07587 | System hardening through configuration management | Configuration | |
Configure the "Message Queuing Triggers" to organizational standards. CC ID 07588 | System hardening through configuration management | Configuration | |
Configure the "Windows Modules Installer" to organizational standards. CC ID 07589 | System hardening through configuration management | Configuration | |
Configure the "Application Layer Gateway Service" to organizational standards. CC ID 07590 | System hardening through configuration management | Configuration | |
Configure the "DNS Server" to organizational standards. CC ID 07591 | System hardening through configuration management | Configuration | |
Configure the "Web Management Service" to organizational standards. CC ID 07592 | System hardening through configuration management | Configuration | |
Configure the "Windows Remote Management (WS-Management)" to organizational standards. CC ID 07593 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Gateway" to organizational standards. CC ID 07594 | System hardening through configuration management | Configuration | |
Configure the "Network Connections" to organizational standards. CC ID 07595 | System hardening through configuration management | Configuration | |
Configure the "Background Intelligent Transfer Service" to organizational standards. CC ID 07596 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Session Broker" to organizational standards. CC ID 07597 | System hardening through configuration management | Configuration | |
Configure the "Removable Storage" to organizational standards. CC ID 07598 | System hardening through configuration management | Configuration | |
Configure the "KtmRm for Distributed Transaction Coordinator" to organizational standards. CC ID 07614 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Software Shadow Copy Provider" to organizational standards. CC ID 07615 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Services" to organizational standards. CC ID 07616 | System hardening through configuration management | Configuration | |
Configure the "Peer Name Resolution Protocol" to organizational standards. CC ID 07617 | System hardening through configuration management | Configuration | |
Configure the "Online Responder Service" to organizational standards. CC ID 07618 | System hardening through configuration management | Configuration | |
Configure the "Message Queuing" to organizational standards. CC ID 07619 | System hardening through configuration management | Configuration | |
Configure the "Telephony" to organizational standards. CC ID 07620 | System hardening through configuration management | Configuration | |
Configure the "Plug and Play" to organizational standards. CC ID 07624 | System hardening through configuration management | Configuration | |
Configure the "DHCP Server" to organizational standards. CC ID 07627 | System hardening through configuration management | Configuration | |
Configure the "Remote Registry" to organizational standards. CC ID 07628 | System hardening through configuration management | Configuration | |
Configure the "Cryptographic Services" to organizational standards. CC ID 07630 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Configuration" to organizational standards. CC ID 07631 | System hardening through configuration management | Configuration | |
Configure the "CNG Key Isolation" to organizational standards. CC ID 07634 | System hardening through configuration management | Configuration | |
Configure the "Active Directory Domain Services" to organizational standards. CC ID 07636 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Networking Management Service" to organizational standards. CC ID 07637 | System hardening through configuration management | Configuration | |
Configure the "Problem Reports and Solutions Control Panel Support" to organizational standards. CC ID 07640 | System hardening through configuration management | Configuration | |
Configure the "Certificate Propagation" to organizational standards. CC ID 07641 | System hardening through configuration management | Configuration | |
Configure the "Health Key and Certificate Management" to organizational standards. CC ID 07644 | System hardening through configuration management | Configuration | |
Configure the "DNS Client" to organizational standards. CC ID 07645 | System hardening through configuration management | Configuration | |
Configure the "Shell Hardware Detection" to organizational standards. CC ID 07647 | System hardening through configuration management | Configuration | |
Configure the "DCOM Server Process Launcher" to organizational standards. CC ID 07649 | System hardening through configuration management | Configuration | |
Configure the "Distributed Link Tracking Client" to organizational standards. CC ID 07651 | System hardening through configuration management | Configuration | |
Configure the "IPsec Policy Agent" to organizational standards. CC ID 07654 | System hardening through configuration management | Configuration | |
Configure the "Application Information" to organizational standards. CC ID 07656 | System hardening through configuration management | Configuration | |
Configure the "Windows Audio Endpoint Builder" to organizational standards. CC ID 07661 | System hardening through configuration management | Configuration | |
Configure the "SL UI Notification Service" to organizational standards. CC ID 07665 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Virtual Machine Management Service" to organizational standards. CC ID 07668 | System hardening through configuration management | Configuration | |
Configure the "Windows Internal Database (MICROSOFT**SSEE)" to organizational standards. CC ID 07670 | System hardening through configuration management | Configuration | |
Configure the "Themes" to organizational standards. CC ID 07672 | System hardening through configuration management | Configuration | |
Configure the "Base Filtering Engine" to organizational standards. CC ID 07673 | System hardening through configuration management | Configuration | |
Configure the "Simple TCP/IP Services" to organizational standards. CC ID 07674 | System hardening through configuration management | Configuration | |
Configure Transmission Control Protocol/Internet Protocol (TCP/IP) to organizational standards. CC ID 16358 | System hardening through configuration management | Configuration | |
Configure the "Fax" to organizational standards. CC ID 07675 | System hardening through configuration management | Configuration | |
Configure the "Diagnostic System Host" to organizational standards. CC ID 07686 | System hardening through configuration management | Configuration | |
Configure the "Routing and Remote Access" to organizational standards. CC ID 07692 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Fibre Channel Platform Registration Service" to organizational standards. CC ID 07696 | System hardening through configuration management | Configuration | |
Configure the "Windows Event Collector" to organizational standards. CC ID 07700 | System hardening through configuration management | Configuration | |
Configure the "Internet Connection Sharing (ICS)" to organizational standards. CC ID 07702 | System hardening through configuration management | Configuration | |
Configure the "IAS Jet Database Access" to organizational standards. CC ID 07709 | System hardening through configuration management | Configuration | |
Configure the "Wired AutoConfig" to organizational standards. CC ID 07725 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop UserMode Port Redirector" to organizational standards. CC ID 07727 | System hardening through configuration management | Configuration | |
Configure the "Application Identity" to organizational standards. CC ID 07731 | System hardening through configuration management | Configuration | |
Configure the "Network Store Interface Service" to organizational standards. CC ID 07740 | System hardening through configuration management | Configuration | |
Configure the "PnP-X IP Bus Enumerator" to organizational standards. CC ID 07761 | System hardening through configuration management | Configuration | |
Configure the "Diagnostic Policy Service" to organizational standards. CC ID 07766 | System hardening through configuration management | Configuration | |
Configure the "Virtual Disk" to organizational standards. CC ID 07767 | System hardening through configuration management | Configuration | |
Configure the "AD FS Web Agent Authentication Service" to organizational standards. CC ID 07768 | System hardening through configuration management | Configuration | |
Configure the "Microsoft iSCSI Initiator Service" to organizational standards. CC ID 07780 | System hardening through configuration management | Configuration | |
Configure the "Computer Browser" to organizational standards. CC ID 07794 | System hardening through configuration management | Configuration | |
Configure the "Smart Card Removal Policy" to organizational standards. CC ID 07795 | System hardening through configuration management | Configuration | |
Configure the "Windows Font Cache Service" to organizational standards. CC ID 07797 | System hardening through configuration management | Configuration | |
Configure the "Application Host Helper Service" to organizational standards. CC ID 07855 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Help Session Manager" to organizational standards. CC ID 08163 | System hardening through configuration management | Configuration | |
Configure the "Network DDE" to organizational standards. CC ID 08164 | System hardening through configuration management | Configuration | |
Configure the "Upload Manager" to organizational standards. CC ID 08165 | System hardening through configuration management | Configuration | |
Configure the "Event Log" to organizational standards. CC ID 08166 | System hardening through configuration management | Configuration | |
Configure the "Client for NFS" to organizational standards. CC ID 08168 | System hardening through configuration management | Configuration | |
Configure the "Fax Service" to organizational standards. CC ID 08172 | System hardening through configuration management | Configuration | |
Configure the "Virtual Disk Service" to organizational standards. CC ID 08174 | System hardening through configuration management | Configuration | |
Configure the "Uninterruptable Power Supply" to organizational standards. CC ID 08175 | System hardening through configuration management | Configuration | |
Configure the "Network DDE DSDM" to organizational standards. CC ID 08176 | System hardening through configuration management | Configuration | |
Configure the "Portable Media Serial Number Service" to organizational standards. CC ID 08177 | System hardening through configuration management | Configuration | |
Configure the "Windows Management Instrumentation Driver Extensions" to organizational standards. CC ID 08179 | System hardening through configuration management | Configuration | |
Configure the "License Logging" to organizational standards. CC ID 08180 | System hardening through configuration management | Configuration | |
Configure the "Windows Image Acquisition (WIA)" to organizational standards. CC ID 08183 | System hardening through configuration management | Configuration | |
Configure the "Terminal Server Licensing" to organizational standards. CC ID 08185 | System hardening through configuration management | Configuration | |
Configure the "Virtual Machine Additions Shared Folder Service" to organizational standards. CC ID 08189 | System hardening through configuration management | Configuration | |
Configure the "Net Logon" to organizational standards. CC ID 08191 | System hardening through configuration management | Configuration | |
Configure the "HTTP SSL" to organizational standards. CC ID 08194 | System hardening through configuration management | Configuration | |
Configure the "Alerter" to organizational standards. CC ID 08196 | System hardening through configuration management | Configuration | |
Configure the "User Name Mapping" to organizational standards. CC ID 08203 | System hardening through configuration management | Configuration | |
Configure the "Error Reporting Service" to organizational standards. CC ID 08206 | System hardening through configuration management | Configuration | |
Configure the "Windows User Mode Driver Framework" to organizational standards. CC ID 08207 | System hardening through configuration management | Configuration | |
Configure the "NetMeeting Remote Desktop Sharing" to organizational standards. CC ID 08209 | System hardening through configuration management | Configuration | |
Configure the "Terminal Services UserMode Port Redirector" to organizational standards. CC ID 08212 | System hardening through configuration management | Configuration | |
Configure the "File Replication Service" to organizational standards. CC ID 08213 | System hardening through configuration management | Configuration | |
Configure the "NT LM Security Support Provider" to organizational standards. CC ID 08223 | System hardening through configuration management | Configuration | |
Configure the "Messenger" to organizational standards. CC ID 08227 | System hardening through configuration management | Configuration | |
Configure the "Logical Disk Manager" to organizational standards. CC ID 08230 | System hardening through configuration management | Configuration | |
Configure the "Network Location Awareness (NLA)" to organizational standards. CC ID 08231 | System hardening through configuration management | Configuration | |
Configure the "Certificate Services" to organizational standards. CC ID 08232 | System hardening through configuration management | Configuration | |
Configure the "IPSEC Services" to organizational standards. CC ID 08233 | System hardening through configuration management | Configuration | |
Configure the "Terminal Services Gateway" to organizational standards. CC ID 08235 | System hardening through configuration management | Configuration | |
Configure the "Clipbook" to organizational standards. CC ID 08237 | System hardening through configuration management | Configuration | |
Configure the "Indexing Service" to organizational standards. CC ID 08239 | System hardening through configuration management | Configuration | |
Configure the "File Server for Macintosh" to organizational standards. CC ID 08242 | System hardening through configuration management | Configuration | |
Configure the "Virtual Machine Additions Service Application" to organizational standards. CC ID 08245 | System hardening through configuration management | Configuration | |
Configure the "Network Provisioning Service" to organizational standards. CC ID 08250 | System hardening through configuration management | Configuration | |
Configure the "Terminal Services" to organizational standards. CC ID 08252 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall/Internet Connection Sharing (ICS)" to organizational standards. CC ID 08254 | System hardening through configuration management | Configuration | |
Configure the ".NET Runtime Optimization Service v2.0.50727_x86" to organizational standards CC ID 08256 | System hardening through configuration management | Configuration | |
Configure the "Terminal Services Session Directory" to organizational standards. CC ID 08261 | System hardening through configuration management | Configuration | |
Configure the "Application Experience Lookup Service" to organizational standards. CC ID 08267 | System hardening through configuration management | Configuration | |
Configure the "Distributed File System" to organizational standards. CC ID 08268 | System hardening through configuration management | Configuration | |
Configure the "Help and Support" to organizational standards. CC ID 08271 | System hardening through configuration management | Configuration | |
Configure the "Automatic Updates" to organizational standards. CC ID 08273 | System hardening through configuration management | Configuration | |
Configure the "Distributed Link Tracking Server" to organizational standards. CC ID 08276 | System hardening through configuration management | Configuration | |
Configure the "IMAPI CD-Burning Service" to organizational standards. CC ID 08277 | System hardening through configuration management | Configuration | |
Configure the "Terminal Services Configuration" to organizational standards. CC ID 08287 | System hardening through configuration management | Configuration | |
Configure the "Logical Disk Manager Administrative Service" to organizational standards. CC ID 08290 | System hardening through configuration management | Configuration | |
Configure the "Wireless Configuration" to organizational standards. CC ID 08292 | System hardening through configuration management | Configuration | |
Configure the "System Event Notification" to organizational standards. CC ID 08306 | System hardening through configuration management | Configuration | |
Configure the "Internet Authentication Service" to organizational standards. CC ID 08313 | System hardening through configuration management | Configuration | |
Configure the "Terminal Services Licensing" to organizational standards. CC ID 08320 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange ADAM" to organizational standards. CC ID 08349 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Server Extension for Windows Server Backup" to organizational standards. CC ID 08351 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Search Indexer" to organizational standards. CC ID 08355 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Connection Broker" to organizational standards. CC ID 08356 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Service Host" to organizational standards. CC ID 08358 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Transport" to organizational standards. CC ID 08359 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Transport Log Search" to organizational standards. CC ID 08364 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Time Synchronization Service" to organizational standards. CC ID 08365 | System hardening through configuration management | Configuration | |
Configure the "DS Role Server" to organizational standards. CC ID 08366 | System hardening through configuration management | Configuration | |
Configure the "RemoteApp and Desktop Connection Management" to organizational standards. CC ID 08367 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Guest Shutdown Service" to organizational standards. CC ID 08368 | System hardening through configuration management | Configuration | |
Configure the "Optimize drives" to organizational standards. CC ID 08369 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Management" to organizational standards. CC ID 08371 | System hardening through configuration management | Configuration | |
Configure the "Background Tasks Infrastructure Service" to organizational standards. CC ID 08373 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Forms-Based Authentication service" to organizational standards. CC ID 08375 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange POP3" to organizational standards. CC ID 08376 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Information Store" to organizational standards. CC ID 08377 | System hardening through configuration management | Configuration | |
Configure the "LPD Service" to organizational standards. CC ID 08378 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Mailbox Assistants" to organizational standards. CC ID 08379 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Monitoring" to organizational standards. CC ID 08380 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Unified Messaging" to organizational standards. CC ID 08381 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Search (Exchange)" to organizational standards. CC ID 08384 | System hardening through configuration management | Configuration | |
Configure the "Windows All-User Install Agent" to organizational standards. CC ID 08386 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange EdgeSync Service" to organizational standards. CC ID 08388 | System hardening through configuration management | Configuration | |
Configure the "Microsoft FTP Service" to organizational standards. CC ID 08389 | System hardening through configuration management | Configuration | |
Configure the "Device Install Service" to organizational standards. CC ID 08390 | System hardening through configuration management | Configuration | |
Configure the "Device Association Service" to organizational standards. CC ID 08393 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Heartbeat Service" to organizational standards. CC ID 08400 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Speech Engine Service" to organizational standards. CC ID 08402 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Data Exchange Service" to organizational standards. CC ID 08403 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Mail Submission Service" to organizational standards. CC ID 08408 | System hardening through configuration management | Configuration | |
Configure the "Windows Presentation Foundation Font Cache 4.0.0.0" to organizational standards. CC ID 08409 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Replication Service" to organizational standards. CC ID 08414 | System hardening through configuration management | Configuration | |
Configure the "Windows Internal Database" to organizational standards. CC ID 08416 | System hardening through configuration management | Configuration | |
Configure the "Device Setup Manager" to organizational standards. CC ID 08417 | System hardening through configuration management | Configuration | |
Configure the "User Access Logging Service" to organizational standards. CC ID 08418 | System hardening through configuration management | Configuration | |
Configure the "Windows Internal Database VSS Writer" to organizational standards. CC ID 08423 | System hardening through configuration management | Configuration | |
Configure the "Remote Desktop Services UserMode Port Redirector" to organizational standards. CC ID 08424 | System hardening through configuration management | Configuration | |
Configure the "Remote Access Management service" to organizational standards. CC ID 08425 | System hardening through configuration management | Configuration | |
Configure the "Data Deduplication Volume Shadow Copy Service" to organizational standards. CC ID 08428 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Remote Desktop Virtualization Service" to organizational standards. CC ID 08440 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Anti-spam Update" to organizational standards. CC ID 08442 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange System Attendant" to organizational standards. CC ID 08448 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange File Distribution" to organizational standards. CC ID 08449 | System hardening through configuration management | Configuration | |
Configure the "Printer Extensions and Notifications" to organizational standards. CC ID 08451 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Key Distribution Service" to organizational standards. CC ID 08452 | System hardening through configuration management | Configuration | |
Configure the "Microsoft File Server Shadow Copy Agent Service" to organizational standards. CC ID 08455 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Address Book" to organizational standards. CC ID 08458 | System hardening through configuration management | Configuration | |
Configure the "Data Deduplication Service" to organizational standards. CC ID 08459 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Active Directory Topology" to organizational standards. CC ID 08465 | System hardening through configuration management | Configuration | |
Configure the "Windows Store Service (WSService)" to organizational standards. CC ID 08467 | System hardening through configuration management | Configuration | |
Configure the "Local Session Manager" to organizational standards. CC ID 08468 | System hardening through configuration management | Configuration | |
Configure the "Microsoft iSCSI Software Target" to organizational standards. CC ID 08470 | System hardening through configuration management | Configuration | |
Configure the "Network Connectivity Assistant" to organizational standards. CC ID 08474 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange IMAP4" to organizational standards. CC ID 08479 | System hardening through configuration management | Configuration | |
Configure the "Distributed Scan Server service" to organizational standards. CC ID 08482 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Protected Service Host" to organizational standards. CC ID 08488 | System hardening through configuration management | Configuration | |
Configure the "KDC Proxy Server service (KPS)" to organizational standards. CC ID 08497 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange RPC Client Access" to organizational standards. CC ID 08500 | System hardening through configuration management | Configuration | |
Configure the "Hyper-V Volume Shadow Copy Requestor" to organizational standards. CC ID 08512 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Credential Service (Exchange 2010)" to organizational standards. CC ID 08514 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Throttling" to organizational standards. CC ID 08525 | System hardening through configuration management | Configuration | |
Configure the "Spot Verifier" to organizational standards. CC ID 08538 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Mailbox Replication" to organizational standards. CC ID 08539 | System hardening through configuration management | Configuration | |
Configure the "Terminal Services Session Broker" to organizational standards. CC ID 08586 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange Credential Service (Exchange 2007)" to organizational standards. CC ID 08590 | System hardening through configuration management | Configuration | |
Configure the "Network News Transport Protocol (NNTP) service" setting to organizational standards. CC ID 10221 | System hardening through configuration management | Configuration | |
Configure the "Telephony service" setting to organizational standards. CC ID 10223 | System hardening through configuration management | Configuration | |
Configure the "ATI hotkey poller service" setting to organizational standards. CC ID 10237 | System hardening through configuration management | Configuration | |
Configure the "IP Version 6 Helper service" setting to organizational standards. CC ID 10239 | System hardening through configuration management | Configuration | |
Configure the "Client Service for Netware service" setting to organizational standards. CC ID 10240 | System hardening through configuration management | Configuration | |
Configure the "Utility Manager service" setting to organizational standards. CC ID 10241 | System hardening through configuration management | Configuration | |
Configure the "Remote Administration Service service" setting to organizational standards. CC ID 10242 | System hardening through configuration management | Configuration | |
Configure the "Microsoft POP3 Service service" setting to organizational standards. CC ID 10243 | System hardening through configuration management | Configuration | |
Configure the "Windows System Resource Manager (WSRM) service" setting to organizational standards. CC ID 10244 | System hardening through configuration management | Configuration | |
Configure the "Services for Unix Trivial FTP Daemon (TFTP) service" setting to organizational standards. CC ID 10245 | System hardening through configuration management | Configuration | |
Configure the "Services for Unix Server for PCNFS service" setting to organizational standards. CC ID 10246 | System hardening through configuration management | Configuration | |
Configure the "Print Server for Macintosh service" setting to organizational standards. CC ID 10249 | System hardening through configuration management | Configuration | |
Configure the "Remote Installation Services service" setting to organizational standards. CC ID 10250 | System hardening through configuration management | Configuration | |
Configure the "Remote Server Manager service" setting to organizational standards. CC ID 10251 | System hardening through configuration management | Configuration | |
Configure the "Remote Server Monitor service" setting to organizational standards. CC ID 10252 | System hardening through configuration management | Configuration | |
Configure the "Remote Storage Notification service" setting to organizational standards. CC ID 10253 | System hardening through configuration management | Configuration | |
Configure the "Remote Storage Server service" setting to organizational standards. CC ID 10254 | System hardening through configuration management | Configuration | |
Configure the "Windows Media Services service" setting to organizational standards. CC ID 10255 | System hardening through configuration management | Configuration | |
Configure the "Web Element Manager service" setting to organizational standards. CC ID 10256 | System hardening through configuration management | Configuration | |
Configure the "Infrared Monitor service service" setting to organizational standards. CC ID 10257 | System hardening through configuration management | Configuration | |
Configure the "QoS Admission Control (RSVP) service" setting to organizational standards. CC ID 10258 | System hardening through configuration management | Configuration | |
Configure the "Allow CredSSP authentication" setting for the "WinRM service" to organizational standards. CC ID 10715 | System hardening through configuration management | Configuration | |
Configure the "Disallow Kerberos authentication" setting for the "WinRM service" to organizational standards. CC ID 10873 | System hardening through configuration management | Configuration | |
Configure the "Disallow Negotiate authentication" setting for the "WinRM service" to organizational standards. CC ID 10876 | System hardening through configuration management | Configuration | |
Configure the "Turn off Federation Service" setting to organizational standards. CC ID 11278 | System hardening through configuration management | Configuration | |
Configure the "Turn off Internet File Association service" setting to organizational standards. CC ID 11284 | System hardening through configuration management | Configuration | |
Configure the "Turn on Smart Card Plug and Play service" setting to organizational standards. CC ID 11351 | System hardening through configuration management | Configuration | |
Configure the "rsyncd service" setting to organizational standards. CC ID 11382 | System hardening through configuration management | Configuration | |
Configure network protection settings to organizational standards. CC ID 07601 | System hardening through configuration management | Configuration | |
Configure the "CNI" plugin to organizational standards. CC ID 14659 | System hardening through configuration management | Configuration | |
Configure the "data-path-addr" argument to organizational standards. CC ID 14546 | System hardening through configuration management | Configuration | |
Configure the "advertise-addr" argument to organizational standards. CC ID 14544 | System hardening through configuration management | Configuration | |
Configure the "nftables" to organizational standards. CC ID 15320 | System hardening through configuration management | Configuration | |
Configure the "iptables" to organizational standards. CC ID 14463 | System hardening through configuration management | Configuration | |
Configure the "ip6tables" settings to organizational standards. CC ID 15322 | System hardening through configuration management | Configuration | |
Configure the "insecure registries" to organizational standards. CC ID 14455 | System hardening through configuration management | Configuration | |
Configure the "MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to organizational standards. CC ID 07602 | System hardening through configuration management | Configuration | |
Configure the "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to organizational standards. CC ID 07648 | System hardening through configuration management | Configuration | |
Configure the "net-host" argument to organizational standards. CC ID 14529 | System hardening through configuration management | Configuration | |
Configure the "firewalld" to organizational standards. CC ID 15321 | System hardening through configuration management | Configuration | |
Configure the "network bridge" to organizational standards. CC ID 14501 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Firewall state" to organizational standards. CC ID 07667 | System hardening through configuration management | Configuration | |
Configure the "MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments)" to organizational standards. CC ID 07680 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Outbound connections" to organizational standards. CC ID 07695 | System hardening through configuration management | Configuration | |
Configure the "MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic." to organizational standards CC ID 07703 | System hardening through configuration management | Configuration | |
Configure the "MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS)" to organizational standards. CC ID 07733 | System hardening through configuration management | Configuration | |
Configure the "publish" argument to organizational standards. CC ID 14500 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Inbound connections" to organizational standards. CC ID 07747 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Apply local firewall rules" to organizational standards. CC ID 07777 | System hardening through configuration management | Configuration | |
Configure the "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to organizational standards. CC ID 07801 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Firewall state" to organizational standards. CC ID 07803 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Apply local connection security rules" to organizational standards. CC ID 07805 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Apply local firewall rules" to organizational standards. CC ID 07833 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Display a notification" to organizational standards. CC ID 07836 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Outbound connections" to organizational standards. CC ID 07839 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Apply local firewall rules" to organizational standards. CC ID 07850 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Inbound connections" to organizational standards. CC ID 07851 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Outbound connections" to organizational standards. CC ID 07858 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Firewall state" to organizational standards. CC ID 07861 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Display a notification" to organizational standards. CC ID 07868 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Inbound connections" to organizational standards. CC ID 07872 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Allow unicast response" to organizational standards. CC ID 07873 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Allow unicast response" to organizational standards. CC ID 07885 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Apply local connection security rules" to organizational standards. CC ID 07890 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Allow unicast response" to organizational standards. CC ID 07893 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Apply local connection security rules" to organizational standards. CC ID 07896 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Display a notification" to organizational standards. CC ID 07902 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Protect all network connections" to organizational standards. CC ID 08161 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Allow inbound UPnP framework exceptions" to organizational standards. CC ID 08170 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Allow local program exceptions" to organizational standards. CC ID 08173 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Do not allow exceptions" to organizational standards. CC ID 08184 | System hardening through configuration management | Configuration | |
Configure the "MSS: (DisableSavePassword) Prevent the dial-up password from being saved (recommended)" to organizational standards. CC ID 08208 | System hardening through configuration management | Configuration | |
Configure the "MSS: (EnableDeadGWDetect) Allow automatic detection of dead network gateways (could lead to DoS)" to organizational standards. CC ID 08210 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Allow local port exceptions" to organizational standards. CC ID 08214 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Define inbound port exceptions" to organizational standards. CC ID 08215 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Prohibit unicast response to multicast or broadcast requests" to organizational standards. CC ID 08217 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Prohibit notifications" to organizational standards. CC ID 08249 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Allow inbound file and printer sharing exception" to organizational standards. CC ID 08275 | System hardening through configuration management | Configuration | |
Configure the "MSS: (TcpMaxConnectResponseRetransmissions) SYN-ACK retransmissions when a connection request is not acknowledged" to organizational standards. CC ID 08279 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Define inbound program exceptions" to organizational standards. CC ID 08282 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Allow ICMP exceptions" to organizational standards. CC ID 08289 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Allow inbound Remote Desktop exceptions" to organizational standards. CC ID 08295 | System hardening through configuration management | Configuration | |
Configure the "Allow unencrypted traffic" to organizational standards. CC ID 08383 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Logging: Log successful connections" to organizational standards. CC ID 08466 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Logging: Size limit (KB)" to organizational standards. CC ID 08494 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Logging: Log successful connections" to organizational standards. CC ID 08544 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Logging: Name" to organizational standards. CC ID 08595 | System hardening through configuration management | Configuration | |
Configure Account settings in accordance with organizational standards. CC ID 07603 | System hardening through configuration management | Configuration | |
Configure the "Account lockout threshold" to organizational standards. CC ID 07604 | System hardening through configuration management | Configuration | |
Configure the "Account lockout duration" to organizational standards. CC ID 07771 | System hardening through configuration management | Configuration | |
Configure the "Reset account lockout counter after" to organizational standards. CC ID 07853 | System hardening through configuration management | Configuration | |
Configure system integrity settings to organizational standards. CC ID 07605 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Switch to the secure desktop when prompting for elevation" to organizational standards. CC ID 07606 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to organizational standards. CC ID 07642 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to organizational standards. CC ID 07681 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to organizational standards. CC ID 07690 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Only elevate executables that are signed and validated" to organizational standards. CC ID 07723 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Run all administrators in Admin Approval Mode" to organizational standards. CC ID 07726 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Do not require CTRL+ALT+DEL" to organizational standards. CC ID 07775 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Admin Approval Mode for the Built-in Administrator account" to organizational standards. CC ID 07800 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Detect application installations and prompt for elevation" to organizational standards. CC ID 07815 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Virtualize file and registry write failures to per-user locations" to organizational standards. CC ID 07834 | System hardening through configuration management | Configuration | |
Configure the "User Account Control: Behavior of the elevation prompt for standard users" to organizational standards. CC ID 07874 | System hardening through configuration management | Configuration | |
Configure the "Do not process the legacy run list" to organizational standards. CC ID 08167 | System hardening through configuration management | Configuration | |
Configure the "Configure Automatic Updates" to organizational standards. CC ID 08192 | System hardening through configuration management | Configuration | |
Configure the "Reschedule Automatic Updates scheduled installations" to organizational standards. CC ID 08195 | System hardening through configuration management | Configuration | |
Configure the "No auto-restart with logged on users for scheduled automatic updates installations" to organizational standards. CC ID 08216 | System hardening through configuration management | Configuration | |
Configure the "Specify intranet Microsoft update service location" to organizational standards. CC ID 08224 | System hardening through configuration management | Configuration | |
Configure the "Devices: Unsigned driver installation behavior" to organizational standards. CC ID 08225 | System hardening through configuration management | Configuration | |
Configure the "Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box" to organizational standards. CC ID 08281 | System hardening through configuration management | Configuration | |
Configure the "Allow unmanaged devices" to organizational standards. CC ID 08391 | System hardening through configuration management | Configuration | |
Configure the "Allow all trusted apps to install" to organizational standards. CC ID 08392 | System hardening through configuration management | Configuration | |
Configure the "Turn on script execution" to organizational standards. CC ID 08411 | System hardening through configuration management | Configuration | |
Configure the "Configure registry policy processing" to organizational standards. CC ID 08426 | System hardening through configuration management | Configuration | |
Configure the "Specify the search server for device driver updates" to organizational standards. CC ID 08481 | System hardening through configuration management | Configuration | |
Configure the "Configure Windows SmartScreen" to organizational standards. CC ID 08485 | System hardening through configuration management | Configuration | |
Configure the "Detect compatibility issues for applications and drivers" to organizational standards. CC ID 08489 | System hardening through configuration management | Configuration | |
Configure the "Turn off Automatic Download of updates" to organizational standards. CC ID 08498 | System hardening through configuration management | Configuration | |
Configure the "Allow deployment operations in special profiles" to organizational standards. CC ID 08529 | System hardening through configuration management | Configuration | |
Configure the "Turn off Data Execution Prevention for Explorer" to organizational standards. CC ID 08531 | System hardening through configuration management | Configuration | |
Configure the "Specify settings for optional component installation and component repair" to organizational standards. CC ID 08550 | System hardening through configuration management | Configuration | |
Configure the "Refresh interval" to organizational standards. CC ID 08559 | System hardening through configuration management | Configuration | |
Configure the "Boot-Start Driver Initialization Policy" to organizational standards. CC ID 08571 | System hardening through configuration management | Configuration | |
Configure the "Turn off the Store application" to organizational standards. CC ID 08596 | System hardening through configuration management | Configuration | |
Configure the "Periodic Execution of File Integrity" setting to organizational standards. CC ID 09935 | System hardening through configuration management | Configuration | |
Prohibit the use of binary code or machine code from sources with limited or no warranty absent the source code. CC ID 10681 | System hardening through configuration management | Configuration | |
Do not allow processes to execute absent supervision. CC ID 10683 | System hardening through configuration management | Configuration | |
Configure the "Disk Quota policy processing" setting to organizational standards. CC ID 10884 | System hardening through configuration management | Configuration | |
Configure the "EFS recovery policy processing" setting to organizational standards. CC ID 10945 | System hardening through configuration management | Configuration | |
Configure the "Enable disk quotas" setting to organizational standards. CC ID 10947 | System hardening through configuration management | Configuration | |
Configure the "Folder Redirection policy processing" setting to organizational standards. CC ID 10972 | System hardening through configuration management | Configuration | |
Configure the "Group Policy refresh interval for computers" setting to organizational standards. CC ID 10980 | System hardening through configuration management | Configuration | |
Configure the "Group Policy refresh interval for domain controllers" setting to organizational standards. CC ID 10981 | System hardening through configuration management | Configuration | |
Configure the "Internet Explorer Maintenance policy processing" setting to organizational standards. CC ID 10998 | System hardening through configuration management | Configuration | |
Configure the "IP Security policy processing" setting to organizational standards. CC ID 10999 | System hardening through configuration management | Configuration | |
Configure the "Leave Windows Installer and Group Policy Software Installation Data" setting to organizational standards. CC ID 11004 | System hardening through configuration management | Configuration | |
Configure the "Maximum wait time for Group Policy scripts" setting to organizational standards. CC ID 11042 | System hardening through configuration management | Configuration | |
Configure the "Scripts policy processing" setting to organizational standards. CC ID 11159 | System hardening through configuration management | Configuration | |
Configure the "Security policy processing" setting to organizational standards. CC ID 11160 | System hardening through configuration management | Configuration | |
Configure the "Software Installation policy processing" setting to organizational standards. CC ID 11206 | System hardening through configuration management | Configuration | |
Configure the "Startup policy processing wait time" setting to organizational standards. CC ID 11229 | System hardening through configuration management | Configuration | |
Configure the "Turn off Local Group Policy objects processing" setting to organizational standards. CC ID 11286 | System hardening through configuration management | Configuration | |
Configure the "User Group Policy loopback processing mode" setting to organizational standards. CC ID 11367 | System hardening through configuration management | Configuration | |
Configure the "Wired policy processing" setting to organizational standards. CC ID 11373 | System hardening through configuration management | Configuration | |
Configure the "Wireless policy processing" setting to organizational standards. CC ID 11374 | System hardening through configuration management | Configuration | |
Configure Protocol Configuration settings to organizational standards. CC ID 07607 | System hardening through configuration management | Configuration | |
Configure the "MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds" to organizational standards. CC ID 07608 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network client: Send unencrypted password to third-party SMB servers" to organizational standards. CC ID 07623 | System hardening through configuration management | Configuration | |
Configure the "Network access: Remotely accessible registry paths and sub-paths" to organizational standards. CC ID 07632 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network server: Digitally sign communications (if client agrees)" to organizational standards. CC ID 07643 | System hardening through configuration management | Configuration | |
Configure the "Network access: Let Everyone permissions apply to anonymous users" to organizational standards. CC ID 07646 | System hardening through configuration management | Configuration | |
Configure the "Network security: Allow LocalSystem NULL session fallback" to organizational standards. CC ID 07650 | System hardening through configuration management | Configuration | |
Configure the "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to organizational standards. CC ID 07682 | System hardening through configuration management | Configuration | |
Configure the "Network access: Do not allow storage of passwords and credentials for network authentication" to organizational standards. CC ID 07694 | System hardening through configuration management | Configuration | |
Configure the "Network security: LAN Manager authentication level" to organizational standards. CC ID 07704 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Number of previous logons to cache (in case domain controller is not available)" to organizational standards. CC ID 07705 | System hardening through configuration management | Configuration | |
Configure the "Network access: Sharing and security model for local accounts" to organizational standards. CC ID 07712 | System hardening through configuration management | Configuration | |
Configure the "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to organizational standards. CC ID 07719 | System hardening through configuration management | Configuration | |
Configure the "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to organizational standards. CC ID 07721 | System hardening through configuration management | Configuration | |
Configure the "Domain member: Digitally encrypt secure channel data (when possible)" to organizational standards. CC ID 07728 | System hardening through configuration management | Configuration | |
Configure the "Network security: Do not store LAN Manager hash value on next password change" to organizational standards. CC ID 07732 | System hardening through configuration management | Configuration | |
Configure the "Domain member: Require strong (Windows 2000 or later) session key" to organizational standards. CC ID 07741 | System hardening through configuration management | Configuration | |
Configure the "Network access: Shares that can be accessed anonymously" to organizational standards. CC ID 07748 | System hardening through configuration management | Configuration | |
Configure the "Network access: Allow anonymous SID/Name translation" to organizational standards. CC ID 07749 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network client: Digitally sign communications (if server agrees)" to organizational standards. CC ID 07750 | System hardening through configuration management | Configuration | |
Configure the "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to organizational standards. CC ID 07754 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network client: Digitally sign communications (always)" to organizational standards. CC ID 07759 | System hardening through configuration management | Configuration | |
Configure the "Network security: LDAP client signing requirements" to organizational standards. CC ID 07760 | System hardening through configuration management | Configuration | |
Configure the "MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to organizational standards. CC ID 07772 | System hardening through configuration management | Configuration | |
Configure the "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to organizational standards. CC ID 07773 | System hardening through configuration management | Configuration | |
Configure the "Network access: Restrict anonymous access to Named Pipes and Shares" to organizational standards. CC ID 07798 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Restrict NTLM: Add remote server exceptions for NTLM authentication" to organizational standards. CC ID 07837 | System hardening through configuration management | Configuration | |
Configure the "Domain controller: LDAP server signing requirements" to organizational standards. CC ID 07857 | System hardening through configuration management | Configuration | |
Configure the "Network access: Remotely accessible registry paths" to organizational standards. CC ID 07863 | System hardening through configuration management | Configuration | |
Configure the "Set client connection encryption level" to organizational standards. CC ID 07881 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Allow inbound remote administration exception" to organizational standards. CC ID 08182 | System hardening through configuration management | Configuration | |
Configure the "MSS: (SynAttackProtect) Syn attack protection level (protects against DoS)" to organizational standards. CC ID 08198 | System hardening through configuration management | Configuration | |
Configure the "Network access: Do not allow storage of credentials or .NET Passports for network authentication" to organizational standards CC ID 08200 | System hardening through configuration management | Configuration | |
Configure the "Turn off Internet download for Web publishing and online ordering wizards" to organizational standards. CC ID 08259 | System hardening through configuration management | Configuration | |
Configure the "Maximum tolerance for computer clock synchronization" to organizational standards. CC ID 08260 | System hardening through configuration management | Configuration | |
Configure the "Maximum lifetime for user ticket" to organizational standards. CC ID 08299 | System hardening through configuration management | Configuration | |
Configure the "Maximum lifetime for service ticket" to organizational standards. CC ID 08301 | System hardening through configuration management | Configuration | |
Configure the "Set IP Stateless Autoconfiguration Limits State" to organizational standards. CC ID 08348 | System hardening through configuration management | Configuration | |
Configure the "Prohibit connection to non-domain networks when connected to domain authenticated network" to organizational standards. CC ID 08420 | System hardening through configuration management | Configuration | |
Configure the "Restrict Unauthenticated RPC clients" to organizational standards. CC ID 08437 | System hardening through configuration management | Configuration | |
Configure the "Enable RPC Endpoint Mapper Client Authentication" to organizational standards. CC ID 08526 | System hardening through configuration management | Configuration | |
Configure the "Minimize the number of simultaneous connections to the Internet or a Windows Domain" to organizational standards. CC ID 08603 | System hardening through configuration management | Configuration | |
Configure Logging settings in accordance with organizational standards. CC ID 07611 | System hardening through configuration management | Configuration | |
Configure "CloudTrail" to organizational standards. CC ID 15443 | System hardening through configuration management | Configuration | |
Configure "CloudTrail log file validation" to organizational standards. CC ID 15437 | System hardening through configuration management | Configuration | |
Configure "VPC flow logging" to organizational standards. CC ID 15436 | System hardening through configuration management | Configuration | |
Configure "object-level logging" to organizational standards. CC ID 15433 | System hardening through configuration management | Configuration | |
Configure "Turn on PowerShell Transcription" to organizational standards. CC ID 15415 | System hardening through configuration management | Configuration | |
Configure "Turn on PowerShell Script Block Logging" to organizational standards. CC ID 15413 | System hardening through configuration management | Configuration | |
Configure "Audit PNP Activity" to organizational standards. CC ID 15393 | System hardening through configuration management | Configuration | |
Configure "Include command line in process creation events" to organizational standards. CC ID 15358 | System hardening through configuration management | Configuration | |
Configure "Audit Group Membership" to organizational standards. CC ID 15341 | System hardening through configuration management | Configuration | |
Configure the "audit_backlog_limit" setting to organizational standards. CC ID 15324 | System hardening through configuration management | Configuration | |
Configure the "systemd-journald" to organizational standards. CC ID 15326 | System hardening through configuration management | Configuration | |
Provide the reference database used to verify input data in the logging capability. CC ID 15018 | System hardening through configuration management | Log Management | |
Configure the "Audit Policy: Object Access: SAM" to organizational standards. CC ID 07612 | System hardening through configuration management | Configuration | |
Configure the storage parameters for all logs. CC ID 06330 | System hardening through configuration management | Configuration | |
Configure sufficient log storage capacity and prevent the capacity from being exceeded. CC ID 01425 | System hardening through configuration management | Configuration | |
Configure the log retention method. CC ID 01715 | System hardening through configuration management | Configuration | |
Configure the log retention size. CC ID 01716 | System hardening through configuration management | Configuration | |
Configure syslogd to send logs to a Remote LogHost. CC ID 01526 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Management: User Account Management" to organizational standards. CC ID 07613 | System hardening through configuration management | Configuration | |
Configure the security parameters for all logs. CC ID 01712 [Review whether management has the following: Processes for the security and integrity of log files (e.g., encryption of log files, adequate storage capacity, secure backup and disposal of logs, logging to a separate computer, use of read-only media, controlled log parameters, and restricted access to log files). App A Objective 6.35.b Review whether management has the following: Processes for the security and integrity of log files (e.g., encryption of log files, adequate storage capacity, secure backup and disposal of logs, logging to a separate computer, use of read-only media, controlled log parameters, and restricted access to log files). App A Objective 6.35.b] | System hardening through configuration management | Configuration | |
Configure the log so that it cannot be disabled. CC ID 00595 | System hardening through configuration management | Configuration | |
Configure the event log size capacity limits for the application log, the security log, and the system log. CC ID 01713 | System hardening through configuration management | Configuration | |
Configure the application log, the security log, and the system log to restrict guest access. CC ID 01714 | System hardening through configuration management | Configuration | |
Configure the "mss: (warninglevel) percentage threshold for the security event log at which the system will generate a warning" setting. CC ID 04275 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: System: System Integrity" to organizational standards. CC ID 07652 | System hardening through configuration management | Configuration | |
Configure the detailed data elements to be captured for all logs so that events are identified by type, location, subject, user, what data was accessed, etc. CC ID 06331 | System hardening through configuration management | Configuration | |
Configure the log to capture the user's identification. CC ID 01334 | System hardening through configuration management | Configuration | |
Configure the log to capture a date and time stamp. CC ID 01336 | System hardening through configuration management | Configuration | |
Configure the log to uniquely identify each asset. CC ID 01339 | System hardening through configuration management | Configuration | |
Configure the log to capture the type of each event. CC ID 06423 | System hardening through configuration management | Configuration | |
Configure the log to capture each event's success or failure indication. CC ID 06424 | System hardening through configuration management | Configuration | |
Configure all logs to capture auditable events or actionable events. CC ID 06332 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: File Share" to organizational standards. CC ID 07655 | System hardening through configuration management | Configuration | |
Configure the log to capture the amount of data uploaded and downloaded. CC ID 16494 | System hardening through configuration management | Log Management | |
Configure the log to capture startups and shutdowns. CC ID 16491 | System hardening through configuration management | Log Management | |
Configure the log to capture user queries and searches. CC ID 16479 | System hardening through configuration management | Log Management | |
Configure the log to capture Internet Protocol addresses. CC ID 16495 | System hardening through configuration management | Log Management | |
Configure the log to capture error messages. CC ID 16477 | System hardening through configuration management | Log Management | |
Configure the log to capture system failures. CC ID 16475 | System hardening through configuration management | Log Management | |
Configure the log to capture account lockouts. CC ID 16470 | System hardening through configuration management | Configuration | |
Configure the log to capture execution events. CC ID 16469 | System hardening through configuration management | Configuration | |
Configure the log to capture AWS Organizations changes. CC ID 15445 | System hardening through configuration management | Configuration | |
Configure the log to capture Identity and Access Management policy changes. CC ID 15442 | System hardening through configuration management | Configuration | |
Configure the log to capture management console sign-in without multi-factor authentication. CC ID 15441 | System hardening through configuration management | Configuration | |
Configure the log to capture route table changes. CC ID 15439 | System hardening through configuration management | Configuration | |
Configure the log to capture virtual private cloud changes. CC ID 15435 | System hardening through configuration management | Configuration | |
Configure the log to capture changes to encryption keys. CC ID 15432 | System hardening through configuration management | Configuration | |
Configure the log to capture unauthorized API calls. CC ID 15429 | System hardening through configuration management | Configuration | |
Configure the log to capture changes to network gateways. CC ID 15421 | System hardening through configuration management | Configuration | |
Configure the log to capture all spoofed addresses. CC ID 01313 | System hardening through configuration management | Configuration | |
Configure inetd tracing. CC ID 01523 | System hardening through configuration management | Configuration | |
Configure the system to capture messages sent to the syslog AUTH facility. CC ID 01525 | System hardening through configuration management | Configuration | |
Configure Cron logging. CC ID 01528 | System hardening through configuration management | Configuration | |
Configure the kernel level auditing setting. CC ID 01530 | System hardening through configuration management | Configuration | |
Configure the "audit successful file system mounts" setting to organizational standards. CC ID 09923 | System hardening through configuration management | Configuration | |
Configure system accounting/system events. CC ID 01529 | System hardening through configuration management | Configuration | |
Configure the privilege use auditing setting. CC ID 01699 | System hardening through configuration management | Configuration | |
Configure the log to record the Denial of Access that results from an excessive number of unsuccessful logon attempts. CC ID 01919 | System hardening through configuration management | Configuration | |
Configure the Audit Process Tracking setting. CC ID 01700 | System hardening through configuration management | Configuration | |
Configure the EEPROM security-mode accesses and EEPROM log-failed accesses. CC ID 01575 | System hardening through configuration management | Configuration | |
Configure the log to capture user identifier, address, port blocking or blacklisting. CC ID 01918 | System hardening through configuration management | Configuration | |
Enable directory service access events, as appropriate. CC ID 05616 | System hardening through configuration management | Configuration | |
Configure the log to capture failed transactions. CC ID 06334 | System hardening through configuration management | Configuration | |
Configure the log to capture successful transactions. CC ID 06335 | System hardening through configuration management | Configuration | |
Audit non attributable events (na class). CC ID 05604 | System hardening through configuration management | Configuration | |
Configure the log to capture configuration changes. CC ID 06881 | System hardening through configuration management | Configuration | |
Log, monitor, and review all changes to time settings on critical systems. CC ID 11608 | System hardening through configuration management | Configuration | |
Configure the log to capture user account additions, modifications, and deletions. CC ID 16482 | System hardening through configuration management | Log Management | |
Configure the log to capture all changes to certificates. CC ID 05595 | System hardening through configuration management | Configuration | |
Configure the "inetd logging" setting to organizational standards. CC ID 08970 | System hardening through configuration management | Configuration | |
Configure the "audit sudoers" setting to organizational standards. CC ID 09950 | System hardening through configuration management | Configuration | |
Configure the event log settings for specific Operating System functions. CC ID 06337 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Registry" to organizational standards. CC ID 07658 | System hardening through configuration management | Configuration | |
Configure the "Audit: Audit the use of Backup and Restore privilege" setting. CC ID 01724 | System hardening through configuration management | Configuration | |
Configure the "Audit: Shut down the system immediately if unable to log security audits" setting. CC ID 01725 | System hardening through configuration management | Configuration | |
Configure "Audit account management" to organizational standards. CC ID 02039 | System hardening through configuration management | Configuration | |
Configure the "Audit: Force audit policy subcategory settings (Windows Vista or later)" setting. CC ID 04387 | System hardening through configuration management | Configuration | |
Configure console logging. CC ID 04454 | System hardening through configuration management | Configuration | |
Configure boot error logging. CC ID 04455 | System hardening through configuration management | Configuration | |
Disable the "Audit password" setting in NetWare. CC ID 04456 | System hardening through configuration management | Configuration | |
Configure the "Disable Logging" setting. CC ID 05590 | System hardening through configuration management | Configuration | |
Enable BIN mode auditing. CC ID 05591 | System hardening through configuration management | Configuration | |
Enable or disable the BSM auditing setting, as appropriate. CC ID 05592 | System hardening through configuration management | Configuration | |
Set the X server audit level appropriately. CC ID 05600 | System hardening through configuration management | Configuration | |
Configure the "Turn on session logging" properly. CC ID 05618 | System hardening through configuration management | Configuration | |
Configure Sendmail with the appropriate logging levels. CC ID 06028 | System hardening through configuration management | Configuration | |
Enable or disable auditing in the runcontrol scripts, as appropriate. CC ID 06029 | System hardening through configuration management | Configuration | |
Enable or disable auditing for user accounts, as appropriate. CC ID 06030 | System hardening through configuration management | Configuration | |
Enable or disable auditing at boot time, as appropriate. CC ID 06031 | System hardening through configuration management | Configuration | |
Enable or disable the auditing of chgrp usage, as appropriate. CC ID 06033 | System hardening through configuration management | Configuration | |
Enable or disable the auditing of mkgroup usage, as appropriate. CC ID 06034 | System hardening through configuration management | Configuration | |
Enable or disable the auditing of rmgroup usage, as appropriate. CC ID 06035 | System hardening through configuration management | Configuration | |
Enable or disable the auditing of the exit function, as appropriate. CC ID 06036 | System hardening through configuration management | Configuration | |
Generate an alert when an audit log failure occurs. CC ID 06737 | System hardening through configuration management | Configuration | |
Configure additional log settings. CC ID 06333 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: Logoff" to organizational standards. CC ID 07662 | System hardening through configuration management | Configuration | |
Configure additional logging for the FTP daemon. CC ID 01524 | System hardening through configuration management | Configuration | |
Configure the log to send alerts for each auditable events success or failure. CC ID 01337 | System hardening through configuration management | Log Management | |
Configure additional log file parameters appropriately. CC ID 06338 | System hardening through configuration management | Configuration | |
Configure the "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to organizational standards. CC ID 07664 | System hardening through configuration management | Configuration | |
Create the /var/adm/loginlog file. CC ID 01527 | System hardening through configuration management | Configuration | |
Verify the audit config file contains only accounts that should be present. CC ID 05594 | System hardening through configuration management | Configuration | |
Specify the PRI audit file properly. CC ID 05597 | System hardening through configuration management | Configuration | |
Specify the SEC audit file properly. CC ID 05598 | System hardening through configuration management | Configuration | |
Verify the user audit file contains the appropriate never-audit flags. CC ID 05605 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: File System" to organizational standards. CC ID 07666 | System hardening through configuration management | Configuration | |
Configure the "Background upload of a roaming user profile's registry file while user is logged on" setting to organizational standards. CC ID 10761 | System hardening through configuration management | Configuration | |
Configure the "Backup log automatically when full" setting for the "setup log" to organizational standards. CC ID 10762 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: Logon" to organizational standards. CC ID 07669 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Logon: Kerberos Authentication Service" to organizational standards. CC ID 07679 | System hardening through configuration management | Configuration | |
Configure the "Applications preference logging and tracing" setting to organizational standards. CC ID 10774 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: IPsec Extended Mode" to organizational standards. CC ID 07683 | System hardening through configuration management | Configuration | |
Configure the "Data Sources preference logging and tracing" setting to organizational standards. CC ID 10779 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Handle Manipulation" to organizational standards. CC ID 07684 | System hardening through configuration management | Configuration | |
Configure the "Devices preference logging and tracing" setting to organizational standards. CC ID 10782 | System hardening through configuration management | Configuration | |
Configure the "Drive Maps preference logging and tracing" setting to organizational standards. CC ID 10783 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Detailed File Share" to organizational standards. CC ID 07687 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: Network Policy Server" to organizational standards. CC ID 07701 | System hardening through configuration management | Configuration | |
Configure the "Environment preference logging and tracing" setting to organizational standards. CC ID 10784 | System hardening through configuration management | Configuration | |
Configure the "Files preference logging and tracing" setting to organizational standards. CC ID 10785 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Detailed Tracking: Process Creation" to organizational standards. CC ID 07707 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: System: IPsec Driver" to organizational standards. CC ID 07708 | System hardening through configuration management | Configuration | |
Configure the "Folder Options preference logging and tracing" setting to organizational standards. CC ID 10786 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: Account Lockout" to organizational standards. CC ID 07713 | System hardening through configuration management | Configuration | |
Configure the "Folders preference logging and tracing" setting to organizational standards. CC ID 10787 | System hardening through configuration management | Configuration | |
Configure the "Ini Files preference logging and tracing" setting to organizational standards. CC ID 10788 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Kernel Object" to organizational standards. CC ID 07720 | System hardening through configuration management | Configuration | |
Configure the "Internet Settings preference logging and tracing" setting to organizational standards. CC ID 10789 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Other Object Access Events" to organizational standards. CC ID 07724 | System hardening through configuration management | Configuration | |
Configure the "Local Users and Groups preference logging and tracing" setting to organizational standards. CC ID 10793 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: DS Access: Directory Service Replication" to organizational standards. CC ID 07734 | System hardening through configuration management | Configuration | |
Configure the "Regional Options preference logging and tracing" setting to organizational standards. CC ID 10802 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Policy Change: Audit Policy Change" to organizational standards. CC ID 07735 | System hardening through configuration management | Configuration | |
Configure the "Registry preference logging and tracing" setting to organizational standards. CC ID 10803 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: DS Access: Directory Service Changes" to organizational standards. CC ID 07736 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Certification Services" to organizational standards. CC ID 07742 | System hardening through configuration management | Configuration | |
Configure the "Scheduled Tasks preference logging and tracing" setting to organizational standards. CC ID 10815 | System hardening through configuration management | Configuration | |
Configure the "Maximum Log Size (KB)" to organizational standards. CC ID 07744 | System hardening through configuration management | Configuration | |
Configure the "Services preference logging and tracing" setting to organizational standards. CC ID 10818 | System hardening through configuration management | Configuration | |
Configure the "Shortcuts preference logging and tracing" setting to organizational standards. CC ID 10819 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Detailed Tracking: DPAPI Activity" to organizational standards. CC ID 07746 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Management: Other Account Management Events" to organizational standards. CC ID 07751 | System hardening through configuration management | Configuration | |
Configure the "Start Menu preference logging and tracing" setting to organizational standards. CC ID 10821 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Management: Computer Account Management" to organizational standards. CC ID 07752 | System hardening through configuration management | Configuration | |
Configure the "Delete data from devices running Microsoft firmware when a user logs off from the computer." setting to organizational standards. CC ID 10846 | System hardening through configuration management | Configuration | |
Configure the "Disable logging via package settings" setting to organizational standards. CC ID 10864 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Privilege Use: Non Sensitive Privilege Use" to organizational standards. CC ID 07756 | System hardening through configuration management | Configuration | |
Configure the "Do not forcefully unload the users registry at user logoff" setting to organizational standards. CC ID 10930 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Application Generated" to organizational standards. CC ID 07757 | System hardening through configuration management | Configuration | |
Configure the "Do not log users on with temporary profiles" setting to organizational standards. CC ID 10931 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: DS Access: Detailed Directory Service Replication" to organizational standards. CC ID 07764 | System hardening through configuration management | Configuration | |
Configure the "Log Access" setting for the "application log" to organizational standards. CC ID 11026 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Privilege Use: Other Privilege Use Events" to organizational standards. CC ID 07776 | System hardening through configuration management | Configuration | |
Configure the "Log Access" setting for the "setup log" to organizational standards. CC ID 11027 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Logon: Kerberos Service Ticket Operations" to organizational standards. CC ID 07786 | System hardening through configuration management | Configuration | |
Configure the "Log Access" setting for the "system log" to organizational standards. CC ID 11028 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: DS Access: Directory Service Access" to organizational standards. CC ID 07790 | System hardening through configuration management | Configuration | |
Configure the "Retain old events" to organizational standards. CC ID 07791 | System hardening through configuration management | Configuration | |
Configure the "Log directory pruning retry events" setting to organizational standards. CC ID 11029 | System hardening through configuration management | Configuration | |
Configure the "Log event when quota limit exceeded" setting to organizational standards. CC ID 11030 | System hardening through configuration management | Configuration | |
Configure the "Audit: Audit the use of Backup and Restore privilege" to organizational standards. CC ID 07792 | System hardening through configuration management | Configuration | |
Configure the "Log File Path" setting for the "application log" to organizational standards. CC ID 11033 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Policy Change: MPSSVC Rule-Level Policy Change" to organizational standards. CC ID 07793 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Policy Change: Other Policy Change Events" to organizational standards. CC ID 07810 | System hardening through configuration management | Configuration | |
Configure the "Log File Path" setting for the "setup log" to organizational standards. CC ID 11034 | System hardening through configuration management | Configuration | |
Configure the "Log File Path" setting for the "system log" to organizational standards. CC ID 11035 | System hardening through configuration management | Configuration | |
Configure the "Audit: Shut down system immediately if unable to log security audits" to organizational standards. CC ID 07812 | System hardening through configuration management | Configuration | |
Configure the "Logging" setting to organizational standards. CC ID 11036 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: System: Other System Events" to organizational standards. CC ID 07817 | System hardening through configuration management | Configuration | |
Configure the "Remove "Disconnect" option from Shut Down dialog" setting to organizational standards. CC ID 11126 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Management: Application Group Management" to organizational standards. CC ID 07819 | System hardening through configuration management | Configuration | |
Configure the "Remove browse dialog box for new source" setting to organizational standards. CC ID 11127 | System hardening through configuration management | Configuration | |
Configure the "MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning" to organizational standards. CC ID 07820 | System hardening through configuration management | Configuration | |
Configure the "Restricts the UI language Windows uses for all logged users" setting to organizational standards. CC ID 11147 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Logon: Other Account Logon Events" to organizational standards. CC ID 07825 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Management: Distribution Group Management" to organizational standards. CC ID 07828 | System hardening through configuration management | Configuration | |
Configure the "Set roaming profile path for all users logging onto this computer" setting to organizational standards. CC ID 11182 | System hardening through configuration management | Configuration | |
Configure the "Audit: Audit the access of global system objects" to organizational standards. CC ID 07831 | System hardening through configuration management | Configuration | |
Configure the "Set the Time interval in minutes for logging accounting data" setting to organizational standards. CC ID 11193 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: Special Logon" to organizational standards. CC ID 07835 | System hardening through configuration management | Configuration | |
Configure the "Turn off Resultant Set of Policy logging" setting to organizational standards. CC ID 11307 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Detailed Tracking: RPC Events" to organizational standards. CC ID 07840 | System hardening through configuration management | Configuration | |
Configure the "Turn on extensive logging for Active Directory Domain Services domain controllers that are running Server for NIS" setting to organizational standards. CC ID 11343 | System hardening through configuration management | Configuration | |
Configure the "Turn on extensive logging for Password Synchronization" setting to organizational standards. CC ID 11344 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Policy Change: Authentication Policy Change" to organizational standards. CC ID 07846 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Detailed Tracking: Process Termination" to organizational standards. CC ID 07849 | System hardening through configuration management | Configuration | |
Configure the "Turn on logging" setting to organizational standards. CC ID 11345 | System hardening through configuration management | Configuration | |
Configure the "Turn on session logging" setting to organizational standards. CC ID 11350 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: IPsec Quick Mode" to organizational standards. CC ID 07852 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Filtering Platform Packet Drop" to organizational standards. CC ID 07856 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Filtering Platform Connection" to organizational standards. CC ID 07864 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Policy Change: Authorization Policy Change" to organizational standards. CC ID 07875 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Management: Security Group Management" to organizational standards. CC ID 07880 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Privilege Use: Sensitive Privilege Use" to organizational standards. CC ID 07887 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: IPsec Main Mode" to organizational standards. CC ID 07888 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Account Logon: Credential Validation" to organizational standards. CC ID 07892 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Policy Change: Filtering Platform Policy Change" to organizational standards. CC ID 07895 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Logon-Logoff: Other Logon/Logoff Events" to organizational standards. CC ID 07899 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: System: Security State Change" to organizational standards. CC ID 07903 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: System: Security System Extension" to organizational standards. CC ID 07904 | System hardening through configuration management | Configuration | |
Configure the "Audit account logon events" to organizational standards. CC ID 08188 | System hardening through configuration management | Configuration | |
Configure the "Retention method for security log" to organizational standards. CC ID 08197 | System hardening through configuration management | Configuration | |
Configure the "Retention method for system log" to organizational standards. CC ID 08211 | System hardening through configuration management | Configuration | |
Configure the "Audit logon events" to organizational standards. CC ID 08221 | System hardening through configuration management | Configuration | |
Configure the "Retention method for application log" to organizational standards. CC ID 08226 | System hardening through configuration management | Configuration | |
Configure the "Retain security log" to organizational standards. CC ID 08241 | System hardening through configuration management | Configuration | |
Configure the "Audit system events" to organizational standards. CC ID 08244 | System hardening through configuration management | Configuration | |
Configure the "Retain application log" to organizational standards. CC ID 08246 | System hardening through configuration management | Configuration | |
Configure the "Prevent local guests group from accessing application log" to organizational standards. CC ID 08248 | System hardening through configuration management | Configuration | |
Configure the "Maximum security log size" to organizational standards. CC ID 08251 | System hardening through configuration management | Configuration | |
Configure the "Retain system log" to organizational standards. CC ID 08258 | System hardening through configuration management | Configuration | |
Configure the "Audit privilege use" to organizational standards. CC ID 08266 | System hardening through configuration management | Configuration | |
Configure the "Audit policy change" to organizational standards. CC ID 08272 | System hardening through configuration management | Configuration | |
Configure the "Audit object access" to organizational standards. CC ID 08278 | System hardening through configuration management | Configuration | |
Configure the "Audit process tracking" to organizational standards. CC ID 08283 | System hardening through configuration management | Configuration | |
Configure the "Maximum system log size" to organizational standards. CC ID 08286 | System hardening through configuration management | Configuration | |
Configure the "Maximum application log size" to organizational standards. CC ID 08296 | System hardening through configuration management | Configuration | |
Configure the "Prevent local guests group from accessing security log" to organizational standards. CC ID 08297 | System hardening through configuration management | Configuration | |
Configure the "Audit directory service access" to organizational standards. CC ID 08304 | System hardening through configuration management | Configuration | |
Configure the "Audit account management" to organizational standards. CC ID 08316 | System hardening through configuration management | Configuration | |
Configure the "Prevent local guests group from accessing system log" to organizational standards. CC ID 08336 | System hardening through configuration management | Configuration | |
Configure the "Specify the maximum log file size (KB)" to organizational standards. CC ID 08352 | System hardening through configuration management | Configuration | |
Configure the "Message tracking logging - Mailbox" to organizational standards. CC ID 08360 | System hardening through configuration management | Configuration | |
Configure the "Turn on Connectivity logging" to organizational standards. CC ID 08398 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Logging: Size limit (KB)" to organizational standards. CC ID 08405 | System hardening through configuration management | Configuration | |
Configure the "Control Event Log behavior when the log file reaches its maximum size" to organizational standards. CC ID 08444 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Logging: Log dropped packets" to organizational standards. CC ID 08445 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Logging: Log dropped packets" to organizational standards. CC ID 08454 | System hardening through configuration management | Configuration | |
Configure the "Configure Protocol logging" to organizational standards. CC ID 08463 | System hardening through configuration management | Configuration | |
Configure the "Message tracking logging - Transport" to organizational standards. CC ID 08477 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Logging: Log dropped packets" to organizational standards. CC ID 08501 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Removable Storage" to organizational standards. CC ID 08504 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Domain: Logging: Name" to organizational standards. CC ID 08543 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Logging: Log successful connections" to organizational standards. CC ID 08545 | System hardening through configuration management | Configuration | |
Configure the "Audit Policy: Object Access: Central Access Policy Staging" to organizational standards. CC ID 08558 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Public: Logging: Name" to organizational standards. CC ID 08565 | System hardening through configuration management | Configuration | |
Configure the "Windows Firewall: Private: Logging: Size limit (KB)" to organizational standards. CC ID 08606 | System hardening through configuration management | Configuration | |
Configure the "kernel arguments" setting for "auditing early in the boot process" to organizational standards. CC ID 08749 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record date and time modification events" setting for "auditing" to organizational standards. CC ID 08750 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record user/group information modification events" setting for "auditing" to organizational standards. CC ID 08751 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record changes to the system network environment" setting for "auditing" to organizational standards. CC ID 08752 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record changes to the system's mandatory access controls" setting for "auditing" to organizational standards. CC ID 08753 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record logon and logout events" setting for "auditing" to organizational standards. CC ID 08754 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record process and session initiation events" setting for "auditing" to organizational standards. CC ID 08755 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record changes to discretionary access control permissions" setting for "auditing" to organizational standards. CC ID 08756 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record unauthorized attempts to access files" setting for "auditing" to organizational standards. CC ID 08757 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record use of privileged commands" setting for "auditing" to organizational standards. CC ID 08758 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record data export to media events" setting for "auditing" to organizational standards. CC ID 08759 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record file and program deletion events" setting for "auditing" to organizational standards. CC ID 08760 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record administrator and security personnel action events" setting for "auditing" to organizational standards. CC ID 08761 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "record kernel module loading and unloading events" setting for "auditing" to organizational standards. CC ID 08762 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Ensure auditd configuration is immutable" setting for "auditing" to organizational standards. CC ID 08763 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "audit file ownership changes" setting to organizational standards. CC ID 08966 | System hardening through configuration management | Audits and Risk Management | |
Configure the "audit change user functions" setting to organizational standards. CC ID 08982 | System hardening through configuration management | Configuration | |
Configure the "audit the use of chmod command" setting to organizational standards. CC ID 08983 | System hardening through configuration management | Configuration | |
Configure the "audit the chown command" setting to organizational standards. CC ID 08984 | System hardening through configuration management | Configuration | |
Configure the "Collect Session Initiation Information" setting to organizational standards. CC ID 09948 | System hardening through configuration management | Configuration | |
Configure the "Collect Discretionary Access Control Permission Modification Events" setting to organizational standards. CC ID 09949 | System hardening through configuration management | Configuration | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Fault Tolerant Heap" to organizational standards. CC ID 10808 | System hardening through configuration management | Configuration | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Boot Performance Diagnostics" to organizational standards. CC ID 10809 | System hardening through configuration management | Configuration | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Memory Leak Diagnosis" to organizational standards. CC ID 10810 | System hardening through configuration management | Configuration | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Resource Exhaustion Detection and Resolution" to organizational standards. CC ID 10811 | System hardening through configuration management | Configuration | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Shutdown Performance Diagnostics" to organizational standards. CC ID 10812 | System hardening through configuration management | Configuration | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows Standby/Resume Performance Diagnostics" to organizational standards. CC ID 10813 | System hardening through configuration management | Configuration | |
Configure the "Scenario Execution Level" setting for "Diagnostic Policy Service (DPS)" for "Windows System Responsiveness Diagnostics" to organizational standards. CC ID 10814 | System hardening through configuration management | Configuration | |
Configure the "Default quota limit and warning level" setting to organizational standards. CC ID 10840 | System hardening through configuration management | Configuration | |
Configure the "Detect application failures caused by deprecated COM objects" setting to organizational standards. CC ID 10851 | System hardening through configuration management | Configuration | |
Configure the "Detect application failures caused by deprecated Windows DLLs" setting to organizational standards. CC ID 10852 | System hardening through configuration management | Configuration | |
Configure the "Detect application install failures" setting to organizational standards. CC ID 10853 | System hardening through configuration management | Configuration | |
Configure the "Detect application installers that need to be run as administrator" setting to organizational standards. CC ID 10854 | System hardening through configuration management | Configuration | |
Configure the "Detect applications unable to launch installers under UAC" setting to organizational standards. CC ID 10855 | System hardening through configuration management | Configuration | |
Configure the "Diagnostics: Configure scenario execution level" setting to organizational standards. CC ID 10856 | System hardening through configuration management | Configuration | |
Configure the "Disk Diagnostic: Configure execution level" setting to organizational standards. CC ID 10883 | System hardening through configuration management | Configuration | |
Configure the "Log event when quota warning level exceeded" setting to organizational standards. CC ID 11031 | System hardening through configuration management | Configuration | |
Configure the "Log File Debug Output Level" setting to organizational standards. CC ID 11032 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Support Diagnostic Tool: Configure execution level" setting to organizational standards. CC ID 11043 | System hardening through configuration management | Configuration | |
Configure the "Primary DNS Suffix Devolution Level" setting to organizational standards. CC ID 11096 | System hardening through configuration management | Configuration | |
Configure the "Require user authentication for remote connections by using Network Level Authentication" setting to organizational standards. CC ID 11138 | System hardening through configuration management | Configuration | |
Configure the "Specify channel binding token hardening level" setting to organizational standards. CC ID 11209 | System hardening through configuration management | Configuration | |
Configure the "Update Security Level" setting to organizational standards. CC ID 11357 | System hardening through configuration management | Configuration | |
Configure the "Update Top Level Domain Zones" setting to organizational standards. CC ID 11358 | System hardening through configuration management | Configuration | |
Configure Key, Certificate, Password, Authentication and Identity Management settings in accordance with organizational standards. CC ID 07621 | System hardening through configuration management | Configuration | |
Configure Kerberos pre-authentication to organizational standards. CC ID 16480 | System hardening through configuration management | Configuration | |
Configure time-based user access restrictions in accordance with organizational standards. CC ID 16436 | System hardening through configuration management | Configuration | |
Configure "MFA Delete" to organizational standards. CC ID 15430 | System hardening through configuration management | Configuration | |
Configure Identity and Access Management policies to organizational standards. CC ID 15422 | System hardening through configuration management | Configuration | |
Configure the Identity and Access Management Access analyzer to organizational standards. CC ID 15420 | System hardening through configuration management | Configuration | |
Configure "Support device authentication using certificate" to organizational standards. CC ID 15410 | System hardening through configuration management | Configuration | |
Install LAPS AdmPwd GPO Extension, as necessary. CC ID 15409 | System hardening through configuration management | Configuration | |
Configure "Require pin for pairing" to organizational standards. CC ID 15395 | System hardening through configuration management | Configuration | |
Configure "Do not allow password expiration time longer than required by policy" to organizational standards. CC ID 15390 | System hardening through configuration management | Configuration | |
Configure "Enable Local Admin Password Management" to organizational standards. CC ID 15387 | System hardening through configuration management | Configuration | |
Configure "Allow Microsoft accounts to be optional" to organizational standards. CC ID 15368 | System hardening through configuration management | Configuration | |
Configure "Turn off picture password sign-in" to organizational standards. CC ID 15347 | System hardening through configuration management | Configuration | |
Configure "Enable insecure guest logons" to organizational standards. CC ID 15344 | System hardening through configuration management | Configuration | |
Configure the "cert-expiry" argument to organizational standards. CC ID 14541 | System hardening through configuration management | Configuration | |
Configure "client certificate authentication" to organizational standards. CC ID 14608 | System hardening through configuration management | Configuration | |
Configure the "client certificate bundles" to organizational standards. CC ID 14518 | System hardening through configuration management | Configuration | |
Configure the "external-server-cert" argument to organizational standards. CC ID 14522 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Restrict NTLM: Incoming NTLM traffic" to organizational standards. CC ID 07622 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Allow PKU2U authentication requests to this computer to use online identities" to organizational standards. CC ID 07638 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Require Domain Controller authentication to unlock workstation" to organizational standards. CC ID 07639 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers" to organizational standards. CC ID 07663 | System hardening through configuration management | Configuration | |
Configure the "Maximum password age" to organizational standards. CC ID 07688 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Restrict NTLM: Add server exceptions in this domain" to organizational standards. CC ID 07693 | System hardening through configuration management | Configuration | |
Configure "Accounts: Limit local account use of blank passwords to console logon only" to organizational standards. CC ID 07697 | System hardening through configuration management | Configuration | |
Configure the "Minimum password length" to organizational standards. CC ID 07711 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network server: Server SPN target name validation level" to organizational standards. CC ID 07714 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Restrict NTLM: Audit Incoming NTLM Traffic" to organizational standards. CC ID 07730 | System hardening through configuration management | Configuration | |
Configure the "Domain member: Maximum machine account password age" to organizational standards. CC ID 07737 | System hardening through configuration management | Configuration | |
Configure the "Password must meet complexity requirements" to organizational standards. CC ID 07743 | System hardening through configuration management | Configuration | |
Configure the "Service Account Tokens" to organizational standards. CC ID 14646 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Require smart card" to organizational standards. CC ID 07753 | System hardening through configuration management | Configuration | |
Configure the "System cryptography: Force strong key protection for user keys stored on the computer" to organizational standards. CC ID 07763 | System hardening through configuration management | Configuration | |
Configure the "rotate" argument to organizational standards. CC ID 14548 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Restrict NTLM: Audit NTLM authentication in this domain" to organizational standards. CC ID 07769 | System hardening through configuration management | Configuration | |
Configure the "Domain controller: Refuse machine account password changes" to organizational standards. CC ID 07827 | System hardening through configuration management | Configuration | |
Configure the "Store passwords using reversible encryption" to organizational standards. CC ID 07829 | System hardening through configuration management | Configuration | |
Configure the "Network security: Allow Local System to use computer identity for NTLM" to organizational standards. CC ID 07830 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Prompt user to change password before expiration" to organizational standards. CC ID 07844 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Restrict NTLM: NTLM authentication in this domain" to organizational standards. CC ID 07859 | System hardening through configuration management | Configuration | |
Configure the "Enforce password history" to organizational standards. CC ID 07877 | System hardening through configuration management | Configuration | |
Configure the "Domain member: Disable machine account password changes" to organizational standards. CC ID 07883 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Smart card removal behavior" to organizational standards. CC ID 07884 | System hardening through configuration management | Configuration | |
Configure the "Logon options" to organizational standards. CC ID 07917 | System hardening through configuration management | Configuration | |
Configure the "Prevent ignoring certificate errors" to organizational standards. CC ID 07924 | System hardening through configuration management | Configuration | |
Configure the "Turn off Encryption Support" to organizational standards. CC ID 08028 | System hardening through configuration management | Configuration | |
Configure the "Disable changing certificate settings" to organizational standards. CC ID 08042 | System hardening through configuration management | Configuration | |
Configure the "Check for server certificate revocation" to organizational standards. CC ID 08120 | System hardening through configuration management | Configuration | |
Configure the "Do not allow passwords to be saved" to organizational standards. CC ID 08178 | System hardening through configuration management | Configuration | |
Configure the "RPC Endpoint Mapper Client Authentication" to organizational standards. CC ID 08202 | System hardening through configuration management | Configuration | |
Configure the "Restrictions for Unauthenticated RPC clients" to organizational standards. CC ID 08240 | System hardening through configuration management | Configuration | |
Configure the "Maximum lifetime for user ticket renewal" to organizational standards. CC ID 08257 | System hardening through configuration management | Configuration | |
Configure the "System objects: Default owner for objects created by members of the Administrators group" to organizational standards. CC ID 08269 | System hardening through configuration management | Configuration | |
Configure the "Enforce user logon restrictions" to organizational standards. CC ID 08274 | System hardening through configuration management | Configuration | |
Configure the "Require a Password When a Computer Wakes (Plugged In)" to organizational standards. CC ID 08404 | System hardening through configuration management | Configuration | |
Configure the "Configure login authentication for POP3" to organizational standards. CC ID 08413 | System hardening through configuration management | Configuration | |
Configure the "Turn on PIN sign-in" to organizational standards. CC ID 08415 | System hardening through configuration management | Configuration | |
Configure the "Interactive logon: Machine account lockout threshold" to organizational standards. CC ID 08419 | System hardening through configuration management | Configuration | |
Configure the "Allow the use of biometrics" to organizational standards. CC ID 08435 | System hardening through configuration management | Configuration | |
Configure the "Configure login authentication for IMAP4" to organizational standards. CC ID 08443 | System hardening through configuration management | Configuration | |
Configure the "Allow simple passwords" to organizational standards. CC ID 08476 | System hardening through configuration management | Configuration | |
Configure the "Require a Password When a Computer Wakes (On Battery)" to organizational standards. CC ID 08487 | System hardening through configuration management | Configuration | |
Configure the "Require password" to organizational standards. CC ID 08511 | System hardening through configuration management | Configuration | |
Configure the "Time without user input before password must be re-entered" to organizational standards. CC ID 08518 | System hardening through configuration management | Configuration | |
Configure the "Allow basic authentication" to organizational standards. CC ID 08522 | System hardening through configuration management | Configuration | |
Configure the "External send connector authentication: Domain Security" to organizational standards. CC ID 08527 | System hardening through configuration management | Configuration | |
Configure the "External send connector authentication: Ignore Start TLS" to organizational standards. CC ID 08530 | System hardening through configuration management | Configuration | |
Configure the "Turn on Basic feed authentication over HTTP" to organizational standards. CC ID 08548 | System hardening through configuration management | Configuration | |
Configure the "Number of attempts allowed" to organizational standards. CC ID 08569 | System hardening through configuration management | Configuration | |
Configure the "Password Expiration" to organizational standards. CC ID 08576 | System hardening through configuration management | Configuration | |
Configure the "External send connector authentication: DNS Routing" to organizational standards. CC ID 08579 | System hardening through configuration management | Configuration | |
Configure the "Require alphanumeric password" to organizational standards. CC ID 08582 | System hardening through configuration management | Configuration | |
Configure the "Allow access to voicemail without requiring a PIN" to organizational standards. CC ID 08585 | System hardening through configuration management | Configuration | |
Configure the "Require Client Certificates" to organizational standards. CC ID 08597 | System hardening through configuration management | Configuration | |
Configure the "Disallow Digest authentication" to organizational standards. CC ID 08602 | System hardening through configuration management | Configuration | |
Configure the "Accounts: Block Microsoft accounts" to organizational standards. CC ID 08613 | System hardening through configuration management | Configuration | |
Configure Encryption settings in accordance with organizational standards. CC ID 07625 | System hardening through configuration management | Configuration | |
Configure "Elastic Block Store volume encryption" to organizational standards. CC ID 15434 | System hardening through configuration management | Configuration | |
Configure "Encryption Oracle Remediation" to organizational standards. CC ID 15366 | System hardening through configuration management | Configuration | |
Configure the "encryption provider" to organizational standards. CC ID 14591 | System hardening through configuration management | Configuration | |
Configure the "Microsoft network server: Digitally sign communications (always)" to organizational standards. CC ID 07626 | System hardening through configuration management | Configuration | |
Configure the "Domain member: Digitally encrypt or sign secure channel data (always)" to organizational standards. CC ID 07657 | System hardening through configuration management | Configuration | |
Configure the "Domain member: Digitally sign secure channel data (when possible)" to organizational standards. CC ID 07678 | System hardening through configuration management | Configuration | |
Configure the "Network Security: Configure encryption types allowed for Kerberos" to organizational standards. CC ID 07799 | System hardening through configuration management | Configuration | |
Configure the "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to organizational standards. CC ID 07822 | System hardening through configuration management | Configuration | |
Configure the "Configure use of smart cards on fixed data drives" to organizational standards. CC ID 08361 | System hardening through configuration management | Configuration | |
Configure the "Enforce drive encryption type on removable data drives" to organizational standards. CC ID 08363 | System hardening through configuration management | Configuration | |
Configure the "Configure TPM platform validation profile for BIOS-based firmware configurations" to organizational standards. CC ID 08370 | System hardening through configuration management | Configuration | |
Configure the "Configure use of passwords for removable data drives" to organizational standards. CC ID 08394 | System hardening through configuration management | Configuration | |
Configure the "Configure use of hardware-based encryption for removable data drives" to organizational standards. CC ID 08401 | System hardening through configuration management | Configuration | |
Configure the "Require additional authentication at startup" to organizational standards. CC ID 08422 | System hardening through configuration management | Configuration | |
Configure the "Deny write access to fixed drives not protected by BitLocker" to organizational standards. CC ID 08429 | System hardening through configuration management | Configuration | |
Configure the "Configure startup mode" to organizational standards. CC ID 08430 | System hardening through configuration management | Configuration | |
Configure the "Require client MAPI encryption" to organizational standards. CC ID 08446 | System hardening through configuration management | Configuration | |
Configure the "Configure dial plan security" to organizational standards. CC ID 08453 | System hardening through configuration management | Configuration | |
Configure the "Allow access to BitLocker-protected removable data drives from earlier versions of Windows" to organizational standards. CC ID 08457 | System hardening through configuration management | Configuration | |
Configure the "Enforce drive encryption type on fixed data drives" to organizational standards. CC ID 08460 | System hardening through configuration management | Configuration | |
Configure the "Allow Secure Boot for integrity validation" to organizational standards. CC ID 08461 | System hardening through configuration management | Configuration | |
Configure the "Configure use of passwords for operating system drives" to organizational standards. CC ID 08478 | System hardening through configuration management | Configuration | |
Configure the "Choose how BitLocker-protected removable drives can be recovered" to organizational standards. CC ID 08484 | System hardening through configuration management | Configuration | |
Configure the "Validate smart card certificate usage rule compliance" to organizational standards. CC ID 08492 | System hardening through configuration management | Configuration | |
Configure the "Allow enhanced PINs for startup" to organizational standards. CC ID 08495 | System hardening through configuration management | Configuration | |
Configure the "Choose how BitLocker-protected operating system drives can be recovered" to organizational standards. CC ID 08499 | System hardening through configuration management | Configuration | |
Configure the "Allow access to BitLocker-protected fixed data drives from earlier versions of Windows" to organizational standards. CC ID 08505 | System hardening through configuration management | Configuration | |
Configure the "Choose how BitLocker-protected fixed drives can be recovered" to organizational standards. CC ID 08509 | System hardening through configuration management | Configuration | |
Configure the "Configure use of passwords for fixed data drives" to organizational standards. CC ID 08513 | System hardening through configuration management | Configuration | |
Configure the "Choose drive encryption method and cipher strength" to organizational standards. CC ID 08537 | System hardening through configuration management | Configuration | |
Configure the "Choose default folder for recovery password" to organizational standards. CC ID 08541 | System hardening through configuration management | Configuration | |
Configure the "Prevent memory overwrite on restart" to organizational standards. CC ID 08542 | System hardening through configuration management | Configuration | |
Configure the "Deny write access to removable drives not protected by BitLocker" to organizational standards. CC ID 08549 | System hardening through configuration management | Configuration | |
Configure the "opt encrypted" flag to organizational standards. CC ID 14534 | System hardening through configuration management | Configuration | |
Configure the "Provide the unique identifiers for your organization" to organizational standards. CC ID 08552 | System hardening through configuration management | Configuration | |
Configure the "Enable use of BitLocker authentication requiring preboot keyboard input on slates" to organizational standards. CC ID 08556 | System hardening through configuration management | Configuration | |
Configure the "Require encryption on device" to organizational standards. CC ID 08563 | System hardening through configuration management | Configuration | |
Configure the "Enable S/MIME for OWA 2007" to organizational standards. CC ID 08564 | System hardening through configuration management | Configuration | |
Configure the "Control use of BitLocker on removable drives" to organizational standards. CC ID 08566 | System hardening through configuration management | Configuration | |
Configure the "Configure use of hardware-based encryption for fixed data drives" to organizational standards. CC ID 08568 | System hardening through configuration management | Configuration | |
Configure the "Configure use of smart cards on removable data drives" to organizational standards. CC ID 08570 | System hardening through configuration management | Configuration | |
Configure the "Enforce drive encryption type on operating system drives" to organizational standards. CC ID 08573 | System hardening through configuration management | Configuration | |
Configure the "Disallow standard users from changing the PIN or password" to organizational standards. CC ID 08574 | System hardening through configuration management | Configuration | |
Configure the "Use enhanced Boot Configuration Data validation profile" to organizational standards. CC ID 08578 | System hardening through configuration management | Configuration | |
Configure the "Allow network unlock at startup" to organizational standards. CC ID 08588 | System hardening through configuration management | Configuration | |
Configure the "Enable S/MIME for OWA 2010" to organizational standards. CC ID 08592 | System hardening through configuration management | Configuration | |
Configure the "Configure minimum PIN length for startup" to organizational standards. CC ID 08594 | System hardening through configuration management | Configuration | |
Configure the "Configure TPM platform validation profile" to organizational standards. CC ID 08598 | System hardening through configuration management | Configuration | |
Configure the "Configure use of hardware-based encryption for operating system drives" to organizational standards. CC ID 08601 | System hardening through configuration management | Configuration | |
Configure the "Reset platform validation data after BitLocker recovery" to organizational standards. CC ID 08607 | System hardening through configuration management | Configuration | |
Configure the "Configure TPM platform validation profile for native UEFI firmware configurations" to organizational standards. CC ID 08614 | System hardening through configuration management | Configuration | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives" setting to organizational standards. CC ID 10039 | System hardening through configuration management | Configuration | |
Configure the "Save BitLocker recovery information to AD DS for fixed data drives" setting to organizational standards. CC ID 10040 | System hardening through configuration management | Configuration | |
Configure the "Omit recovery options from the BitLocker setup wizard" setting to organizational standards. CC ID 10041 | System hardening through configuration management | Configuration | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for operating system drives" setting to organizational standards. CC ID 10042 | System hardening through configuration management | Configuration | |
Configure the "Save BitLocker recovery information to AD DS for operating system drives" setting to organizational standards. CC ID 10043 | System hardening through configuration management | Configuration | |
Configure the "Allow BitLocker without a compatible TPM" setting to organizational standards. CC ID 10044 | System hardening through configuration management | Configuration | |
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for removable data drives" setting to organizational standards. CC ID 10045 | System hardening through configuration management | Configuration | |
Configure the "Save BitLocker recovery information to AD DS for removable data drives" setting to organizational standards. CC ID 10046 | System hardening through configuration management | Configuration | |
Configure File Retention, Impact Level, and Classification Settings settings in accordance with organizational standards. CC ID 07715 | System hardening through configuration management | Configuration | |
Configure the "Classification of files based on Discoverability" to organizational standards. CC ID 07716 | System hardening through configuration management | Configuration | |
Configure the "Classification of files based on Intellectual Property" to organizational standards. CC ID 07765 | System hardening through configuration management | Configuration | |
Configure the "Classification of files based on Confidentiality" to organizational standards. CC ID 07782 | System hardening through configuration management | Configuration | |
Configure the "Classification of files based on PHI" to organizational standards. CC ID 07785 | System hardening through configuration management | Configuration | |
Configure the "Classification of files based on Impact Level" to organizational standards. CC ID 07789 | System hardening through configuration management | Configuration | |
Configure the "Classification of files based on Retention" to organizational standards. CC ID 07860 | System hardening through configuration management | Configuration | |
Configure the "Classification of files based on PII" to organizational standards. CC ID 07865 | System hardening through configuration management | Configuration | |
Configure System settings in accordance with organizational standards. CC ID 07806 | System hardening through configuration management | Configuration | |
Configure the "System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)" to organizational standards CC ID 07807 | System hardening through configuration management | Configuration | |
Configure the "Accounts: Rename guest account" to organizational standards. CC ID 07816 | System hardening through configuration management | Configuration | |
Configure the "Accounts: Rename administrator account" to organizational standards. CC ID 07843 | System hardening through configuration management | Configuration | |
Configure the "Accounts: Guest account status" to organizational standards. CC ID 07971 | System hardening through configuration management | Configuration | |
Configure the "Accounts: Administrator account status" to organizational standards. CC ID 07996 | System hardening through configuration management | Configuration | |
Configure the "Prompt for password on resume from hibernate / suspend" to organizational standards. CC ID 08342 | System hardening through configuration management | Configuration | |
Configure Virus and Malware Protection settings in accordance with organizational standards. CC ID 07906 | System hardening through configuration management | Configuration | |
Configure "Turn on behavior monitoring" to organizational standards. CC ID 15407 | System hardening through configuration management | Configuration | |
Configure "Turn off real-time protection" to organizational standards. CC ID 15406 | System hardening through configuration management | Configuration | |
Configure "Scan all downloaded files and attachments" to organizational standards. CC ID 15404 | System hardening through configuration management | Configuration | |
Configure "Scan removable drives" to organizational standards. CC ID 15401 | System hardening through configuration management | Configuration | |
Configure "Configure Attack Surface Reduction rules: Set the state for each ASR rule" to organizational standards. CC ID 15392 | System hardening through configuration management | Configuration | |
Configure "Join Microsoft MAPS" to organizational standards. CC ID 15384 | System hardening through configuration management | Configuration | |
Configure "Configure detection for potentially unwanted applications" to organizational standards. CC ID 15375 | System hardening through configuration management | Configuration | |
Configure "Turn off Microsoft Defender AntiVirus" to organizational standards. CC ID 15371 | System hardening through configuration management | Configuration | |
Configure "Enable file hash computation feature" to organizational standards. CC ID 15340 | System hardening through configuration management | Configuration | |
Configure the "Internet Explorer Processes" to organizational standards. CC ID 07907 | System hardening through configuration management | Configuration | |
Configure the "Turn on the auto-complete feature for user names and passwords on forms" to organizational standards. CC ID 07941 | System hardening through configuration management | Configuration | |
Configure the "Automatic prompting for file downloads" to organizational standards. CC ID 07950 | System hardening through configuration management | Configuration | |
Configure the "Use SmartScreen Filter" to organizational standards. CC ID 07952 | System hardening through configuration management | Configuration | |
Configure the "Run ActiveX controls and plugins" to organizational standards. CC ID 07954 | System hardening through configuration management | Configuration | |
Configure the "Java permissions" to organizational standards. CC ID 07969 | System hardening through configuration management | Configuration | |
Configure the "Use Pop-up Blocker" to organizational standards. CC ID 07990 | System hardening through configuration management | Configuration | |
Configure the "Prevent Bypassing SmartScreen Filter Warnings" to organizational standards. CC ID 07994 | System hardening through configuration management | Configuration | |
Configure the "Allow cut, copy or paste operations from the clipboard via script" to organizational standards. CC ID 07997 | System hardening through configuration management | Configuration | |
Configure the "Allow software to run or install even if the signature is invalid" to organizational standards. CC ID 08019 | System hardening through configuration management | Configuration | |
Configure the "Do not allow users to enable or disable add-ons" to organizational standards. CC ID 08035 | System hardening through configuration management | Configuration | |
Configure the "Disable AutoComplete for forms" to organizational standards. CC ID 08066 | System hardening through configuration management | Configuration | |
Configure the "Download unsigned ActiveX controls" to organizational standards. CC ID 08073 | System hardening through configuration management | Configuration | |
Configure the "Scripting of Java applets" to organizational standards. CC ID 08105 | System hardening through configuration management | Configuration | |
Configure the "Allow only approved domains to use ActiveX controls without prompt" to organizational standards. CC ID 08374 | System hardening through configuration management | Configuration | |
Configure the "Prevent per-user installation of ActiveX controls" to organizational standards. CC ID 08382 | System hardening through configuration management | Configuration | |
Configure the "Turn on Cross-Site Scripting Filter" to organizational standards. CC ID 08395 | System hardening through configuration management | Configuration | |
Configure the "Turn on certificate address mismatch warning" to organizational standards. CC ID 08410 | System hardening through configuration management | Configuration | |
Configure the "Show security warning for potentially unsafe files" to organizational standards. CC ID 08412 | System hardening through configuration management | Configuration | |
Configure the "Turn on Protected Mode" to organizational standards. CC ID 08471 | System hardening through configuration management | Configuration | |
Configure the "Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled" to organizational standards. CC ID 08510 | System hardening through configuration management | Configuration | |
Configure the "Check for signatures on downloaded programs" to organizational standards. CC ID 08584 | System hardening through configuration management | Configuration | |
Configure the "Specify use of ActiveX Installer Service for installation of ActiveX controls" to organizational standards. CC ID 08587 | System hardening through configuration management | Configuration | |
Configure the "Prevent changing the URL for checking updates to Internet Explorer and Internet Tools" to organizational standards. CC ID 08589 | System hardening through configuration management | Configuration | |
Configure the "Enable MIME Sniffing" to organizational standards. CC ID 08591 | System hardening through configuration management | Configuration | |
Configure "Prevent downloading of enclosures" to organizational standards. CC ID 08612 | System hardening through configuration management | Configuration | |
Configure User Notification settings in accordance with organizational standards. CC ID 08201 | System hardening through configuration management | Configuration | |
Configure the "Display Error Notification" to organizational standards. CC ID 08280 | System hardening through configuration management | Configuration | |
Configure the "Customize Warning Messages" to organizational standards. CC ID 08599 | System hardening through configuration management | Configuration | |
Configure Windows Components settings in accordance with organizational standards. CC ID 08263 | System hardening through configuration management | Configuration | |
Configure the "Notify antivirus programs when opening attachments" to organizational standards. CC ID 08264 | System hardening through configuration management | Configuration | |
Configure the "Do not preserve zone information in file attachments" to organizational standards. CC ID 08309 | System hardening through configuration management | Configuration | |
Configure the "Remove CD Burning features" to organizational standards. CC ID 08324 | System hardening through configuration management | Configuration | |
Configure the "Remove Security tab" to organizational standards. CC ID 08328 | System hardening through configuration management | Configuration | |
Configure the "Hide mechanisms to remove zone information" to organizational standards. CC ID 08338 | System hardening through configuration management | Configuration | |
Configure the "Prevent Codec Download" to organizational standards. CC ID 08554 | System hardening through configuration management | Configuration | |
Configure File System settings in accordance with organizational standards. CC ID 08294 | System hardening through configuration management | Configuration | |
Configure Control Panel settings in accordance with organizational standards. CC ID 08311 | System hardening through configuration management | Configuration | |
Configure the "Screen saver timeout" to organizational standards. CC ID 08312 | System hardening through configuration management | Configuration | |
Configure the "Enable screen saver" to organizational standards. CC ID 08322 | System hardening through configuration management | Configuration | |
Configure the "Force specific screen saver" to organizational standards. CC ID 08334 | System hardening through configuration management | Configuration | |
Configure the "Password protect the screen saver" to organizational standards. CC ID 08341 | System hardening through configuration management | Configuration | |
Configure the "Prevent changing screen saver" to organizational standards. CC ID 08560 | System hardening through configuration management | Configuration | |
Configure Capacity and Performance Management settings in accordance with organizational standards. CC ID 08353 | System hardening through configuration management | Configuration | |
Configure the "Maximum receive size - organization level" to organizational standards. CC ID 08354 | System hardening through configuration management | Configuration | |
Configure the "Maximum send size - connector level" to organizational standards. CC ID 08399 | System hardening through configuration management | Configuration | |
Configure the "Maximum number of recipients - organization level" to organizational standards. CC ID 08431 | System hardening through configuration management | Configuration | |
Configure the "Enable Sender ID agent" to organizational standards. CC ID 08450 | System hardening through configuration management | Configuration | |
Configure the "Maximum receive size - connector level" to organizational standards. CC ID 08480 | System hardening through configuration management | Configuration | |
Configure the "Maximum send size - organization level" to organizational standards. CC ID 08483 | System hardening through configuration management | Configuration | |
Configure the "Mount database at startup" to organizational standards. CC ID 08493 | System hardening through configuration management | Configuration | |
Configure the "Enable Sender reputation" to organizational standards. CC ID 08503 | System hardening through configuration management | Configuration | |
Configure the "Mailbox quotas: Issue warning at" to organizational standards. CC ID 08508 | System hardening through configuration management | Configuration | |
Configure the "Mailbox quotas: Prohibit send and receive at" to organizational standards. CC ID 08532 | System hardening through configuration management | Configuration | |
Configure the "Mailbox quotas: Prohibit send at" to organizational standards. CC ID 08610 | System hardening through configuration management | Configuration | |
Configure Personal Information Handling settings in accordance with organizational standards. CC ID 08396 | System hardening through configuration management | Configuration | |
Configure the "Enable OOF messages to remote domains" to organizational standards. CC ID 08397 | System hardening through configuration management | Configuration | |
Configure the "Enable automatic forwards to remote domains" to organizational standards. CC ID 08462 | System hardening through configuration management | Configuration | |
Configure the "Enable non-delivery reports to remote domains" to organizational standards. CC ID 08506 | System hardening through configuration management | Configuration | |
Configure Data Backup and Recovery settings in accordance with organizational standards. CC ID 08406 | System hardening through configuration management | Configuration | |
Configure the "Retain deleted items for the specified number of days" to organizational standards. CC ID 08407 | System hardening through configuration management | Configuration | |
Configure the "Do not permanently delete items until the database has been backed up" to organizational standards. CC ID 08490 | System hardening through configuration management | Configuration | |
Configure the "Keep deleted mailboxes for the specified number of days" to organizational standards. CC ID 08600 | System hardening through configuration management | Configuration | |
Configure Nonrepudiation Configuration settings in accordance with organizational standards. CC ID 08432 | System hardening through configuration management | Configuration | |
Configure the "Configure Sender Filtering" to organizational standards. CC ID 08433 | System hardening through configuration management | Configuration | |
Configure the "Turn on Administrator Audit Logging" to organizational standards. CC ID 08528 | System hardening through configuration management | Configuration | |
Configure Device Installation settings in accordance with organizational standards. CC ID 08438 | System hardening through configuration management | Configuration | |
Configure the "Prevent installation of devices using drivers that match these device setup classes" to organizational standards. CC ID 08439 | System hardening through configuration management | Configuration | |
Configure the "device installation time-out" setting to organizational standards. CC ID 10781 | System hardening through configuration management | Configuration | |
Configure the "list of Enhanced Storage devices usable on your computer" setting to organizational standards. CC ID 10791 | System hardening through configuration management | Configuration | |
Configure the "Display a custom message title when device installation is prevented by a policy setting" setting to organizational standards. CC ID 10885 | System hardening through configuration management | Configuration | |
Configure the "Do not send a Windows error report when a generic driver is installed on a device" setting to organizational standards. CC ID 10933 | System hardening through configuration management | Configuration | |
Configure the "Prevent creation of a system restore point during device activity that would normally prompt creation of a restore point" setting to organizational standards. CC ID 11072 | System hardening through configuration management | Configuration | |
Configure the "Prevent device metadata retrieval from the Internet" setting to organizational standards. CC ID 11073 | System hardening through configuration management | Configuration | |
Configure the "Prevent installation of devices not described by other policy settings" setting to organizational standards. CC ID 11078 | System hardening through configuration management | Configuration | |
Configure the "Prevent installation of devices that match any of these device IDs" setting to organizational standards. CC ID 11079 | System hardening through configuration management | Configuration | |
Configure the "Prevent installation of removable devices" setting to organizational standards. CC ID 11080 | System hardening through configuration management | Configuration | |
Configure the "Prevent Windows from sending an error report when a device driver requests additional software during installation" setting to organizational standards. CC ID 11093 | System hardening through configuration management | Configuration | |
Configure the "Require a PIN to access data on devices running Microsoft firmware" setting to organizational standards. CC ID 11132 | System hardening through configuration management | Configuration | |
Configure the "Specify search order for device driver source locations" setting to organizational standards. CC ID 11214 | System hardening through configuration management | Configuration | |
Configure the "Turn off "Found New Hardware" balloons during device installation" setting to organizational standards. CC ID 11253 | System hardening through configuration management | Configuration | |
Configure the "Turn off Autoplay for non-volume devices" setting to organizational standards. CC ID 11268 | System hardening through configuration management | Configuration | |
Configure the "Turn off Windows Update device driver search prompt" setting to organizational standards. CC ID 11332 | System hardening through configuration management | Configuration | |
Configure Security settings in accordance with organizational standards. CC ID 08469 | System hardening through configuration management | Configuration | |
Configure the "Enable automatic replies to remote domains" to organizational standards. CC ID 08534 | System hardening through configuration management | Configuration | |
Configure Power Management settings in accordance with organizational standards. CC ID 08515 | System hardening through configuration management | Configuration | |
Configure the "Allow Standby States (S1-S3) When Sleeping (Plugged In)" to organizational standards. CC ID 08516 | System hardening through configuration management | Configuration | |
Configure the "Allow Standby States (S1-S3) When Sleeping (On Battery)" to organizational standards. CC ID 08581 | System hardening through configuration management | Configuration | |
Configure the "Allow Applications to Prevent Automatic Sleep (Plugged In)" setting to organizational standards. CC ID 10703 | System hardening through configuration management | Configuration | |
Configure the "Allow Automatic Sleep with Open Network Files (Plugged In)" setting to organizational standards. CC ID 10709 | System hardening through configuration management | Configuration | |
Configure the "Allow remote access to the Plug and Play interface" setting to organizational standards. CC ID 10742 | System hardening through configuration management | Configuration | |
Configure the "Power Options preference logging and tracing" setting to organizational standards. CC ID 10798 | System hardening through configuration management | Configuration | |
Configure the "Critical Battery Notification Action" setting to organizational standards. CC ID 10833 | System hardening through configuration management | Configuration | |
Configure the "Critical Battery Notification Level" setting to organizational standards. CC ID 10834 | System hardening through configuration management | Configuration | |
Configure the "Do not allow supported Plug and Play device redirection" setting to organizational standards. CC ID 10917 | System hardening through configuration management | Configuration | |
Configure the "Do not turn off system power after a Windows system shutdown has occurred." setting to organizational standards. CC ID 10937 | System hardening through configuration management | Configuration | |
Configure the "Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates" setting to organizational standards. CC ID 10954 | System hardening through configuration management | Configuration | |
Configure the "Low Battery Notification Action" setting to organizational standards. CC ID 11037 | System hardening through configuration management | Configuration | |
Configure the "Low Battery Notification Level" setting to organizational standards. CC ID 11038 | System hardening through configuration management | Configuration | |
Configure the "Reduce Display Brightness (On Battery)" setting to organizational standards. CC ID 11117 | System hardening through configuration management | Configuration | |
Configure the "Reduce Display Brightness (Plugged In)" setting to organizational standards. CC ID 11118 | System hardening through configuration management | Configuration | |
Configure the "Reserve Battery Notification Level" setting to organizational standards. CC ID 11139 | System hardening through configuration management | Configuration | |
Configure Powershell to organizational standards. CC ID 15233 | System hardening through configuration management | Configuration | |
Configure the "Run Windows PowerShell scripts first at computer startup, shutdown" setting to organizational standards. CC ID 11156 | System hardening through configuration management | Configuration | |
Configure the "Run Windows PowerShell scripts first at user logon, logoff" setting to organizational standards. CC ID 11157 | System hardening through configuration management | Configuration | |
Configure the "Select an Active Power Plan" setting to organizational standards. CC ID 11161 | System hardening through configuration management | Configuration | |
Configure the "Select the Lid Switch Action (On Battery)" setting to organizational standards. CC ID 11162 | System hardening through configuration management | Configuration | |
Configure the "Select the Lid Switch Action (Plugged In)" setting to organizational standards. CC ID 11163 | System hardening through configuration management | Configuration | |
Configure the "Select the Power Button Action (On Battery)" setting to organizational standards. CC ID 11165 | System hardening through configuration management | Configuration | |
Configure the "Select the Power Button Action (Plugged In)" setting to organizational standards. CC ID 11166 | System hardening through configuration management | Configuration | |
Configure the "Select the Sleep Button Action (On Battery)" setting to organizational standards. CC ID 11167 | System hardening through configuration management | Configuration | |
Configure the "Select the Sleep Button Action (Plugged In)" setting to organizational standards. CC ID 11168 | System hardening through configuration management | Configuration | |
Configure the "Specify a Custom Active Power Plan" setting to organizational standards. CC ID 11207 | System hardening through configuration management | Configuration | |
Configure the "Specify the Display Dim Brightness (On Battery)" setting to organizational standards. CC ID 11217 | System hardening through configuration management | Configuration | |
Configure the "Specify the Display Dim Brightness (Plugged In)" setting to organizational standards. CC ID 11218 | System hardening through configuration management | Configuration | |
Configure the "Specify the System Hibernate Timeout (On Battery)" setting to organizational standards. CC ID 11219 | System hardening through configuration management | Configuration | |
Configure the "Specify the System Hibernate Timeout (Plugged In)" setting to organizational standards. CC ID 11220 | System hardening through configuration management | Configuration | |
Configure the "Specify the System Sleep Timeout (On Battery)" setting to organizational standards. CC ID 11221 | System hardening through configuration management | Configuration | |
Configure the "Specify the System Sleep Timeout (Plugged In)" setting to organizational standards. CC ID 11222 | System hardening through configuration management | Configuration | |
Configure the "Specify the Unattended Sleep Timeout (On Battery)" setting to organizational standards. CC ID 11223 | System hardening through configuration management | Configuration | |
Configure the "Specify the Unattended Sleep Timeout (Plugged In)" setting to organizational standards. CC ID 11224 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Adaptive Display Timeout (On Battery)" setting to organizational standards. CC ID 11259 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Adaptive Display Timeout (Plugged In)" setting to organizational standards. CC ID 11260 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Cache Power Mode" setting to organizational standards. CC ID 11270 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Hybrid Sleep (On Battery)" setting to organizational standards. CC ID 11281 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Hybrid Sleep (Plugged In)" setting to organizational standards. CC ID 11282 | System hardening through configuration management | Configuration | |
Configure the "Turn Off Low Battery User Notification" setting to organizational standards. CC ID 11288 | System hardening through configuration management | Configuration | |
Configure the "Turn Off the Hard Disk (On Battery)" setting to organizational standards. CC ID 11318 | System hardening through configuration management | Configuration | |
Configure the "Turn Off the Hard Disk (Plugged In)" setting to organizational standards. CC ID 11319 | System hardening through configuration management | Configuration | |
Configure the "Turn On Desktop Background Slideshow (On Battery)" setting to organizational standards. CC ID 11340 | System hardening through configuration management | Configuration | |
Configure the "Turn On Desktop Background Slideshow (Plugged In)" setting to organizational standards. CC ID 11341 | System hardening through configuration management | Configuration | |
Configure the "Turn on the Ability for Applications to Prevent Sleep Transitions (On Battery)" setting to organizational standards. CC ID 11353 | System hardening through configuration management | Configuration | |
Configure the "Turn on the Ability for Applications to Prevent Sleep Transitions (Plugged In)" setting to organizational standards. CC ID 11354 | System hardening through configuration management | Configuration | |
Configure Patch Management settings in accordance with organizational standards. CC ID 08519 | System hardening through configuration management | Configuration | |
Configure "Select when Preview Builds and Feature Updates are received" to organizational standards. CC ID 15399 | System hardening through configuration management | Configuration | |
Configure "Select when Quality Updates are received" to organizational standards. CC ID 15355 | System hardening through configuration management | Configuration | |
Configure the "Check for missing Windows Updates" to organizational standards. CC ID 08520 | System hardening through configuration management | Configuration | |
Configure Start Menu and Task Bar settings in accordance with organizational standards. CC ID 08615 | System hardening through configuration management | Configuration | |
Configure the "Turn off toast notifications on the lock screen" to organizational standards. CC ID 08616 | System hardening through configuration management | Configuration | |
Configure "Turn off notifications network usage" to organizational standards. CC ID 15337 | System hardening through configuration management | Configuration | |
Configure the proxy server to organizational standards. CC ID 12115 | System hardening through configuration management | Configuration | |
Configure the proxy server to log Transmission Control Protocol sessions. CC ID 12123 | System hardening through configuration management | Configuration | |
Configure Red Hat Enterprise Linux to Organizational Standards. CC ID 08713 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "GPG Key for package manager" setting to organizational standards. CC ID 08764 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Support for cramfs filesystems" setting to organizational standards. CC ID 08765 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Support for freevxfs filesystems" setting to organizational standards. CC ID 08766 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Support for hfs filesystems" setting to organizational standards. CC ID 08767 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Support for hfsplus filesystems" setting to organizational standards. CC ID 08768 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Support for jffs2 filesystems" setting to organizational standards. CC ID 08769 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Support for squashfs filesystems" setting to organizational standards. CC ID 08770 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Support for udf filesystems" setting to organizational standards. CC ID 08771 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "NIS file inclusions" setting for the"/etc/group" file to organizational standards. CC ID 08772 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "NIS file inclusions" setting for the"/etc/shadow" file to organizational standards. CC ID 08773 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "setuid" attribute for "all files" to organizational standards. CC ID 08774 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "setgid" attribute for "all files" to organizational standards. CC ID 08775 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "gnome desktop screensaver" setting for "all users" to organizational standards. CC ID 08776 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "screen blanking function of the gnome desktop screensaver" as a "mandatory setting" for "all users" to organizational standards. CC ID 08777 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "device files with the unlabeled SELinux type" setting for "system includes" to organizational standards. CC ID 08778 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "system should act as a network sniffer" setting to organizational standards. CC ID 08779 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "default policy" setting for "iptables INPUT table" to organizational standards. CC ID 08780 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "DCCP" setting to organizational standards. CC ID 08781 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the Stream Control Transmission Protocol setting to organizational standards. CC ID 08782 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "RDS" setting to organizational standards. CC ID 08783 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "TIPC" setting to organizational standards. CC ID 08784 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Bluetooth kernel modules" setting to organizational standards. CC ID 08785 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Zeroconf networking" setting to organizational standards. CC ID 08786 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "at daemon" setting to organizational standards. CC ID 08787 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "SSH 'keep alive' message count" setting to organizational standards. CC ID 08788 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "set environment options for SSH" setting to organizational standards. CC ID 08789 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the Secure Shell setting to organizational standards. CC ID 08790 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "sendmail" setting to organizational standards. CC ID 08791 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Postfix network listening" setting to organizational standards. CC ID 08792 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "require LDAP servers to use TLS for SSL communications" setting for "LDAP client" to organizational standards. CC ID 08793 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Client SMB packet signing" setting for "smbclient" to organizational standards. CC ID 08794 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Client SMB packet signing" setting for "mount.cifs" to organizational standards. CC ID 08795 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "'wheel' group" setting to organizational standards. CC ID 08796 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "Access to the root account via su should be restricted to the wheel group" setting to organizational standards. CC ID 08797 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "retry value" setting to organizational standards. CC ID 08798 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "rsyslog service" setting to organizational standards. CC ID 08799 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "send to a remote log host" setting for "Rsyslog logs" to organizational standards. CC ID 08800 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "accept remote messages" setting for "Rsyslog" to organizational standards. CC ID 08801 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "irda service" setting to organizational standards. CC ID 08802 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "avahi service" firewall setting to organizational standards. CC ID 08803 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "rawdevices service" setting to organizational standards. CC ID 08804 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "login_defs" variable in "libuser.conf" for "libuser library" to organizational standards. CC ID 08805 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "User accounts may or may not be inactivated a specified number of days after account expiration" setting to organizational standards. CC ID 08806 | System hardening through configuration management | Establish/Maintain Documentation | |
Configure the "duplicate UIDs" setting to organizational standards. CC ID 09930 | System hardening through configuration management | Configuration | |
Configure the "duplicate GIDs" setting to organizational standards. CC ID 09931 | System hardening through configuration management | Configuration | |
Configure the "duplicate group names" setting to organizational standards. CC ID 09932 | System hardening through configuration management | Configuration | |
Configure the "Connection to the Red Hat Network RPM Repositories" setting to organizational standards. CC ID 09933 | System hardening through configuration management | Configuration | |
Configure the "Obtain Software Package Updates with yum" setting to organizational standards. CC ID 09934 | System hardening through configuration management | Configuration | |
Configure the "Check for Unconfined Daemons" setting to organizational standards. CC ID 09936 | System hardening through configuration management | Configuration | |
Configure the "/etc/hosts.allow" file to organizational standards. CC ID 09944 | System hardening through configuration management | Configuration | |
Configure the "disable system when on audit log is full" setting to organizational standards. CC ID 09945 | System hardening through configuration management | Configuration | |
Configure the "max_log_file" setting to organizational standards. CC ID 15323 | System hardening through configuration management | Configuration | |
Configure the "max_log_file_action" setting to organizational standards. CC ID 09946 | System hardening through configuration management | Configuration | |
Configure the "audit processes that start prior to auditd" setting to organizational standards. CC ID 09947 | System hardening through configuration management | Configuration | |
Configure the "Password Creation Requirement" settings for "pam_cracklib" to organizational standards. CC ID 09953 | System hardening through configuration management | Configuration | |
Configure the "System Accounts" setting to organizational standards. CC ID 09954 | System hardening through configuration management | Configuration | |
Configure the "Verify That Reserved UIDs Are Assigned to System Accounts" setting to organizational standards. CC ID 09955 | System hardening through configuration management | Configuration | |
Configure the "Check for Duplicate User Names" setting to organizational standards. CC ID 09956 | System hardening through configuration management | Configuration | |
Configure the "User .forward" files to organizational standards. CC ID 09957 | System hardening through configuration management | Configuration | |
Configure Polycom HDX to Organizational Standards. CC ID 08986 | System hardening through configuration management | Configuration | |
Configure the "echo cancellation" setting to organizational standards. CC ID 09359 | System hardening through configuration management | Configuration | |
Configure the "keyboard noise reduction" setting to organizational standards. CC ID 09360 | System hardening through configuration management | Configuration | |
Configure the "live music mode" setting to organizational standards. CC ID 09361 | System hardening through configuration management | Configuration | |
Configure the "VCR audio out always on" setting to organizational standards. CC ID 09362 | System hardening through configuration management | Configuration | |
Configure the "user alert tone" setting to organizational standards. CC ID 09363 | System hardening through configuration management | Configuration | |
Configure the "incoming call ring tone" setting to organizational standards. CC ID 09364 | System hardening through configuration management | Configuration | |
Configure the "keypad audio confirmation" setting to organizational standards. CC ID 09365 | System hardening through configuration management | Configuration | |
Configure the "allow Microsoft Exchange calendar integration" setting to organizational standards. CC ID 09366 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange calendar domain" setting to organizational standards. CC ID 09367 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange calendar password" setting to organizational standards. CC ID 09368 | System hardening through configuration management | Configuration | |
Configure the "mailbox to be monitored by Microsoft Exchange calendar service" setting to organizational standards. CC ID 09369 | System hardening through configuration management | Configuration | |
Configure the "Microsoft Exchange calendar server address" setting to organizational standards. CC ID 09370 | System hardening through configuration management | Configuration | |
Configure the "allow Microsoft Exchange calendar service to display private meetings" setting to organizational standards. CC ID 09371 | System hardening through configuration management | Configuration | |
Configure the "number of minutes before the meeting to display a reminder" setting to organizational standards. CC ID 09372 | System hardening through configuration management | Configuration | |
Configure the "play a sound along with the text reminder when the system is not in a call" setting to organizational standards. CC ID 09373 | System hardening through configuration management | Configuration | |
Configure the "backlight compensation" setting to organizational standards. CC ID 09374 | System hardening through configuration management | Configuration | |
Configure the "camera pan direction" setting to organizational standards. CC ID 09375 | System hardening through configuration management | Configuration | |
Configure the "camera presets" setting to organizational standards. CC ID 09376 | System hardening through configuration management | Configuration | |
Configure the "camera video input type" setting to organizational standards. CC ID 09377 | System hardening through configuration management | Configuration | |
Configure the "camera input aspect ratio" setting to organizational standards. CC ID 09378 | System hardening through configuration management | Configuration | |
Configure the "camera input name" setting to organizational standards. CC ID 09379 | System hardening through configuration management | Configuration | |
Configure the "camera input video quality type" setting to organizational standards. CC ID 09380 | System hardening through configuration management | Configuration | |
Configure the "primary camera" setting to organizational standards. CC ID 09381 | System hardening through configuration management | Configuration | |
Configure the "camera quality preference" setting to organizational standards. CC ID 09382 | System hardening through configuration management | Configuration | |
Configure the "camera power frequency" setting to organizational standards. CC ID 09383 | System hardening through configuration management | Configuration | |
Configure the "allow camera tracking" setting to organizational standards. CC ID 09384 | System hardening through configuration management | Configuration | |
Configure the "foreground source for Polycom people on content" setting to organizational standards. CC ID 09385 | System hardening through configuration management | Configuration | |
Configure the "background source for Polycom people on content" setting to organizational standards. CC ID 09386 | System hardening through configuration management | Configuration | |
Configure the "country name for the system" setting to organizational standards. CC ID 09387 | System hardening through configuration management | Configuration | |
Configure the "language for the system local GUI" setting to organizational standards. CC ID 09388 | System hardening through configuration management | Configuration | |
Configure the "NTP" setting to organizational standards. CC ID 09389 | System hardening through configuration management | Configuration | |
Configure the "primary NTP server" setting to organizational standards. CC ID 09390 | System hardening through configuration management | Configuration | |
Configure the "secondary NTP server" setting to organizational standards. CC ID 09391 | System hardening through configuration management | Configuration | |
Configure the "system day" setting to organizational standards. CC ID 09392 | System hardening through configuration management | Configuration | |
Configure the "system month" setting to organizational standards. CC ID 09393 | System hardening through configuration management | Configuration | |
Configure the "system year" setting to organizational standards. CC ID 09394 | System hardening through configuration management | Configuration | |
Configure the "system hour" setting to organizational standards. CC ID 09395 | System hardening through configuration management | Configuration | |
Configure the "system minutes" setting to organizational standards. CC ID 09396 | System hardening through configuration management | Configuration | |
Configure the "system AM or PM" setting to organizational standards. CC ID 09397 | System hardening through configuration management | Configuration | |
Configure the "system time zone" setting to organizational standards. CC ID 09398 | System hardening through configuration management | Configuration | |
Configure the "automatically adjust for daylight savings time" setting to organizational standards. CC ID 09399 | System hardening through configuration management | Configuration | |
Configure the "time format" setting to organizational standards. CC ID 09401 | System hardening through configuration management | Configuration | |
Configure the "LDAP authentication type" setting to organizational standards. CC ID 09402 | System hardening through configuration management | Configuration | |
Configure the "LDAP SSL encryption state" setting to organizational standards. CC ID 09403 | System hardening through configuration management | Configuration | |
Configure the "LDAP base DN" setting to organizational standards. CC ID 09404 | System hardening through configuration management | Configuration | |
Configure the "LDAP NTLM domain" setting to organizational standards. CC ID 09405 | System hardening through configuration management | Configuration | |
Configure the "LDAP bind DN" setting to organizational standards. CC ID 09406 | System hardening through configuration management | Configuration | |
Configure the "LDAP password" setting to organizational standards. CC ID 09407 | System hardening through configuration management | Configuration | |
Configure the "LDAP server address" setting to organizational standards. CC ID 09408 | System hardening through configuration management | Configuration | |
Configure the "LDAP server port" setting to organizational standards. CC ID 09409 | System hardening through configuration management | Configuration | |
Configure the "LDAP user name" setting to organizational standards. CC ID 09410 | System hardening through configuration management | Configuration | |
Configure the "allow access to a Polycom Global Directory Server" setting to organizational standards. CC ID 09411 | System hardening through configuration management | Configuration | |
Configure the "server address of a Polycom Global Directory Server" setting to organizational standards. CC ID 09412 | System hardening through configuration management | Configuration | |
Configure the "maximum international call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09413 | System hardening through configuration management | Configuration | |
Configure the "maximum internet call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09414 | System hardening through configuration management | Configuration | |
Configure the "maximum ISDN transmit call speed for a Polycom Global Directory Server" setting to organizational standards. CC ID 09415 | System hardening through configuration management | Configuration | |
Configure the "display the system address in a Polycom Global Directory Server" setting to organizational standards. CC ID 09416 | System hardening through configuration management | Configuration | |
Configure the "retrieval and display of contacts from a Microsoft Lync (Office Communications/OCS) Server" setting to organizational standards. CC ID 09417 | System hardening through configuration management | Configuration | |
Configure the "prompt the user to add a local address book entry for a far site upon call disconnection" setting to organizational standards. CC ID 09418 | System hardening through configuration management | Configuration | |
Configure the "prompt the user before allowing a local address book entry to be deleted" setting to organizational standards. CC ID 09419 | System hardening through configuration management | Configuration | |
Configure the "preview of local address book entries" setting to organizational standards. CC ID 09420 | System hardening through configuration management | Configuration | |
Configure the "content video adjustment" setting to organizational standards. CC ID 09421 | System hardening through configuration management | Configuration | |
Configure the "people video adjustment" setting to organizational standards. CC ID 09422 | System hardening through configuration management | Configuration | |
Configure the "display type" setting to organizational standards. CC ID 09423 | System hardening through configuration management | Configuration | |
Configure the "display aspect ratio" setting to organizational standards. CC ID 09424 | System hardening through configuration management | Configuration | |
Configure the "display resolution" setting to organizational standards. CC ID 09425 | System hardening through configuration management | Configuration | |
Configure the "splash screen on the content monitor" setting to organizational standards. CC ID 09426 | System hardening through configuration management | Configuration | |
Configure the "VCR/DVD record source" setting to organizational standards. CC ID 09427 | System hardening through configuration management | Configuration | |
Configure the "screen saver text" setting to organizational standards. CC ID 09428 | System hardening through configuration management | Configuration | |
Configure the "picture in picture (PIP) placement" setting to organizational standards. CC ID 09429 | System hardening through configuration management | Configuration | |
Configure the "how to display the time in a call" setting to organizational standards. CC ID 09430 | System hardening through configuration management | Configuration | |
Configure the "far site name display time in a call" setting to organizational standards. CC ID 09431 | System hardening through configuration management | Configuration | |
Configure the "allow display of the system name on the home screen" setting to organizational standards. CC ID 09432 | System hardening through configuration management | Configuration | |
Configure the "allow display of the system date time on the home screen" setting to organizational standards. CC ID 09433 | System hardening through configuration management | Configuration | |
Configure the "allow display of the system IPv4 address on the home screen" setting to organizational standards. CC ID 09434 | System hardening through configuration management | Configuration | |
Configure the "allow display of the system H.323 extension (E.164) on the home screen" setting to organizational standards CC ID 09435 | System hardening through configuration management | Configuration | |
Configure the "allow display of the system do not disturb control on the home screen" setting to organizational standards. CC ID 09436 | System hardening through configuration management | Configuration | |
Configure the "allow display of the system SIP address on the home screen" setting to organizational standards. CC ID 09437 | System hardening through configuration management | Configuration | |
Configure the "allow display of the system call quality menu on the home screen" setting to organizational standards. CC ID 09438 | System hardening through configuration management | Configuration | |
Configure the "output upon screen saver activation for monitor 1" setting to organizational standards. CC ID 09439 | System hardening through configuration management | Configuration | |
Configure the "output upon screen saver activation for monitor 2" setting to organizational standards. CC ID 09440 | System hardening through configuration management | Configuration | |
Configure the "QoS type" setting to organizational standards. CC ID 09441 | System hardening through configuration management | Configuration | |
Configure the "value for DiffServ for video" setting to organizational standards. CC ID 09442 | System hardening through configuration management | Configuration | |
Configure the "value for DiffServ for audio" setting to organizational standards. CC ID 09443 | System hardening through configuration management | Configuration | |
Configure the "value for DiffServ for fecc" setting to organizational standards. CC ID 09444 | System hardening through configuration management | Configuration | |
Configure the "value for IP Precedence for video" setting to organizational standards. CC ID 09445 | System hardening through configuration management | Configuration | |
Configure the "value for IP Precedence for audio" setting to organizational standards. CC ID 09446 | System hardening through configuration management | Configuration | |
Configure the "value for IP Precedence for fecc" setting to organizational standards. CC ID 09447 | System hardening through configuration management | Configuration | |
Configure the "SIP transport protocol" setting to organizational standards. CC ID 09448 | System hardening through configuration management | Configuration | |
Configure the "SIP registrar server" setting to organizational standards. CC ID 09449 | System hardening through configuration management | Configuration | |
Configure the "SIP proxy server" setting to organizational standards. CC ID 09450 | System hardening through configuration management | Configuration | |
Configure the "SIP password" setting to organizational standards. CC ID 09451 | System hardening through configuration management | Configuration | |
Configure the "allow EAP/802.1X" setting to organizational standards. CC ID 09452 | System hardening through configuration management | Configuration | |
Configure the "allow 802.1p/Q" setting to organizational standards. CC ID 09453 | System hardening through configuration management | Configuration | |
Configure the "fixed ports" setting to organizational standards. CC ID 09454 | System hardening through configuration management | Configuration | |
Configure the "Transmission Control Protocol ports" setting to organizational standards. CC ID 09455 | System hardening through configuration management | Configuration | |
Configure the "UDP ports" setting to organizational standards. CC ID 09456 | System hardening through configuration management | Configuration | |
Configure the "system hostname" setting to organizational standards. CC ID 09457 | System hardening through configuration management | Configuration | |
Configure the "H.323" setting to organizational standards CC ID 09458 | System hardening through configuration management | Configuration | |
Configure the "allow display of the H.323 extension (E.164) on the local GUI" setting to organizational standards CC ID 09459 | System hardening through configuration management | Configuration | |
Configure the "H.323 extension (E.164)" setting to organizational standards CC ID 09460 | System hardening through configuration management | Configuration | |
Configure the "maximum IP call speed to place calls" setting to organizational standards. CC ID 09461 | System hardening through configuration management | Configuration | |
Configure the "maximum IP call speed to receive calls" setting to organizational standards. CC ID 09462 | System hardening through configuration management | Configuration | |
Configure the "use Polycom PathNavigator" setting to organizational standards. CC ID 09463 | System hardening through configuration management | Configuration | |
Configure the "gatekeeper" setting to organizational standards. CC ID 09464 | System hardening through configuration management | Configuration | |
Configure the "gatekeeper authentication" setting to organizational standards. CC ID 09465 | System hardening through configuration management | Configuration | |
Configure the "gatekeeper authentication user name" setting to organizational standards. CC ID 09466 | System hardening through configuration management | Configuration | |
Configure the "gatekeeper authentication password" setting to organizational standards. CC ID 09467 | System hardening through configuration management | Configuration | |
Configure the "primary gatekeeper address" setting to organizational standards. CC ID 09468 | System hardening through configuration management | Configuration | |
Configure the "IP gateway" setting to organizational standards. CC ID 09469 | System hardening through configuration management | Configuration | |
Configure the "ISDN gateway" setting to organizational standards. CC ID 09470 | System hardening through configuration management | Configuration | |
Configure the "gateway country code" setting to organizational standards. CC ID 09471 | System hardening through configuration management | Configuration | |
Configure the "gateway area code" setting to organizational standards. CC ID 09472 | System hardening through configuration management | Configuration | |
Configure the "gateway number" setting to organizational standards. CC ID 09473 | System hardening through configuration management | Configuration | |
Configure the "gateway extension number" setting to organizational standards. CC ID 09474 | System hardening through configuration management | Configuration | |
Configure the "gateway dial prefix" setting to organizational standards. CC ID 09475 | System hardening through configuration management | Configuration | |
Configure the "gateway dial suffix" setting to organizational standards. CC ID 09476 | System hardening through configuration management | Configuration | |
Configure the "gateway number type" setting to organizational standards. CC ID 09477 | System hardening through configuration management | Configuration | |
Configure the "number of digits in the DID gateway number (if set to number+extension)" setting to organizational standards. CC ID 09478 | System hardening through configuration management | Configuration | |
Configure the "gateway dial speed" setting to organizational standards. CC ID 09479 | System hardening through configuration management | Configuration | |
Configure the "MTU mode assignment type" setting to organizational standards. CC ID 09480 | System hardening through configuration management | Configuration | |
Configure the "MTU size manually" setting to organizational standards. CC ID 09481 | System hardening through configuration management | Configuration | |
Configure the "Polycom Video Error Concealment (PVEC)" setting to organizational standards. CC ID 09482 | System hardening through configuration management | Configuration | |
Configure the "RSVP" setting to organizational standards. CC ID 09483 | System hardening through configuration management | Configuration | |
Configure the "dynamic bandwidth" setting to organizational standards. CC ID 09484 | System hardening through configuration management | Configuration | |
Configure the "maximum transmit bandwidth" setting to organizational standards. CC ID 09485 | System hardening through configuration management | Configuration | |
Configure the "maximum receive bandwidth" setting to organizational standards. CC ID 09486 | System hardening through configuration management | Configuration | |
Configure the "NAT configuration type" setting to organizational standards. CC ID 09487 | System hardening through configuration management | Configuration | |
Configure the "NAT public WAN address" setting to organizational standards. CC ID 09488 | System hardening through configuration management | Configuration | |
Configure the "NAT to be H.323 compatible" setting to organizational standards CC ID 09489 | System hardening through configuration management | Configuration | |
Configure the "which NAT address to be displayed in the Polycom Global Directory Server" setting to organizational standards. CC ID 09490 | System hardening through configuration management | Configuration | |
Configure the "ISDN interface" setting to organizational standards. CC ID 09491 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI switch type" setting to organizational standards. CC ID 09492 | System hardening through configuration management | Configuration | |
Configure the "all ISDN BRI lines" setting to organizational standards. CC ID 09493 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI line 1" setting to organizational standards. CC ID 09494 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI line 2" setting to organizational standards. CC ID 09495 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI line 3" setting to organizational standards. CC ID 09496 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI line 4" setting to organizational standards. CC ID 09497 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI country code" setting to organizational standards. CC ID 09498 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI area code" setting to organizational standards. CC ID 09499 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI number 1a" setting to organizational standards. CC ID 09500 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI number 1b" setting to organizational standards. CC ID 09501 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI number 2a" setting to organizational standards. CC ID 09502 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI number 2b" setting to organizational standards. CC ID 09503 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI number 3a" setting to organizational standards. CC ID 09504 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI number 3b" setting to organizational standards. CC ID 09505 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI number 4a" setting to organizational standards. CC ID 09506 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI number 4b" setting to organizational standards. CC ID 09507 | System hardening through configuration management | Configuration | |
Configure the "auto BRI setting that allows SPID numbers to be assigned in NI1 or NI2" setting to organizational standards. CC ID 09508 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI SPID number 1a" setting to organizational standards. CC ID 09509 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI SPID number 1b" setting to organizational standards. CC ID 09510 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI SPID number 2a" setting to organizational standards. CC ID 09511 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI SPID number 2b" setting to organizational standards. CC ID 09512 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI SPID number 3a" setting to organizational standards. CC ID 09513 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI SPID number 3b" setting to organizational standards. CC ID 09514 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI SPID number 4a" setting to organizational standards. CC ID 09515 | System hardening through configuration management | Configuration | |
Configure the "ISDN BRI SPID number 4b" setting to organizational standards. CC ID 09516 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI switch type" setting to organizational standards. CC ID 09517 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI call by call value" setting to organizational standards. CC ID 09518 | System hardening through configuration management | Configuration | |
Configure the "each ISDN PRI channels" setting to organizational standards. CC ID 09519 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI T1 CSU mode type" setting to organizational standards. CC ID 09520 | System hardening through configuration management | Configuration | |
Configure the "number of ISDN PRI channels allowed to be dialed in parallel" setting to organizational standards. CC ID 09521 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI international prefix" setting to organizational standards. CC ID 09522 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI T1 line buildout for internal CSUs" setting to organizational standards. CC ID 09523 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI T1 line buildout for external CSUs" setting to organizational standards. CC ID 09524 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI line signal" setting to organizational standards. CC ID 09525 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI numbering plan" setting to organizational standards. CC ID 09526 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI outside line number" setting to organizational standards. CC ID 09527 | System hardening through configuration management | Configuration | |
Configure the "ISDN PRI number" setting to organizational standards. CC ID 09528 | System hardening through configuration management | Configuration | |
Configure the "V.35" setting to organizational standards CC ID 09529 | System hardening through configuration management | Configuration | |
Configure the "V.35 number for port 1" setting to organizational standards CC ID 09530 | System hardening through configuration management | Configuration | |
Configure the "V.35 number for port 2" setting to organizational standards CC ID 09531 | System hardening through configuration management | Configuration | |
Configure the "V.35 prefix" setting to organizational standards CC ID 09532 | System hardening through configuration management | Configuration | |
Configure the "V.35 suffix" setting to organizational standards CC ID 09533 | System hardening through configuration management | Configuration | |
Configure the "V.35 CTS" setting to organizational standards CC ID 09534 | System hardening through configuration management | Configuration | |
Configure the "V.35 DCD filter" setting to organizational standards CC ID 09535 | System hardening through configuration management | Configuration | |
Configure the "V.35 DCD" setting to organizational standards CC ID 09536 | System hardening through configuration management | Configuration | |
Configure the "V.35 DSR answer" setting to organizational standards CC ID 09537 | System hardening through configuration management | Configuration | |
Configure the "V.35 DSR" setting to organizational standards CC ID 09538 | System hardening through configuration management | Configuration | |
Configure the "V.35 DTR" setting to organizational standards CC ID 09539 | System hardening through configuration management | Configuration | |
Configure the "V.35 RT" setting to organizational standards CC ID 09540 | System hardening through configuration management | Configuration | |
Configure the "V.35 RTS" setting to organizational standards CC ID 09541 | System hardening through configuration management | Configuration | |
Configure the "V.35 ST" setting to organizational standards CC ID 09542 | System hardening through configuration management | Configuration | |
Configure the "V.35 broadcast mode" setting to organizational standards CC ID 09543 | System hardening through configuration management | Configuration | |
Configure the "RS-366 dialing" setting to organizational standards. CC ID 09544 | System hardening through configuration management | Configuration | |
Configure the "V.35 protocol used " setting to organizational standards CC ID 09545 | System hardening through configuration management | Configuration | |
Configure the "V.35 profile used " setting to organizational standards CC ID 09546 | System hardening through configuration management | Configuration | |
Configure the "V.35 H.331 audio mode" setting to organizational standards CC ID 09547 | System hardening through configuration management | Configuration | |
Configure the "V.35 H.331 dual stream" setting to organizational standards CC ID 09548 | System hardening through configuration management | Configuration | |
Configure the "V.35 H.331 frame rate" setting to organizational standards CC ID 09549 | System hardening through configuration management | Configuration | |
Configure the "V.35 H.331 video format" setting to organizational standards CC ID 09550 | System hardening through configuration management | Configuration | |
Configure the "V.35 H.331 video protocol" setting to organizational standards CC ID 09551 | System hardening through configuration management | Configuration | |
Configure the "IPv4 address assignment method" setting to organizational standards. CC ID 09552 | System hardening through configuration management | Configuration | |
Configure the "IPv4 address" setting to organizational standards. CC ID 09553 | System hardening through configuration management | Configuration | |
Configure the "default gateway" setting to organizational standards. CC ID 09554 | System hardening through configuration management | Configuration | |
Configure the "IPv4 subnet mask" setting to organizational standards. CC ID 09555 | System hardening through configuration management | Configuration | |
Configure IPv6 extension headers to organizational standards. CC ID 16398 | System hardening through configuration management | Configuration | |
Configure the "IPv6 address assignment method" setting to organizational standards. CC ID 09556 | System hardening through configuration management | Configuration | |
Configure the "IPv6 link-local address" setting to organizational standards. CC ID 09557 | System hardening through configuration management | Configuration | |
Configure the "IPv6 site-local address" setting to organizational standards. CC ID 09558 | System hardening through configuration management | Configuration | |
Configure the "IPv6 global address" setting to organizational standards. CC ID 09559 | System hardening through configuration management | Configuration | |
Configure the "default gateway" setting for "IPv6" to organizational standards. CC ID 09560 | System hardening through configuration management | Configuration | |
Configure the "system domain name" setting to organizational standards. CC ID 09561 | System hardening through configuration management | Configuration | |
Configure the "primary DNS server address" setting to organizational standards. CC ID 09562 | System hardening through configuration management | Configuration | |
Configure the "secondary DNS server address" setting to organizational standards. CC ID 09563 | System hardening through configuration management | Configuration | |
Configure the "third DNS server address" setting to organizational standards. CC ID 09564 | System hardening through configuration management | Configuration | |
Configure the "fourth DNS server address" setting to organizational standards. CC ID 09565 | System hardening through configuration management | Configuration | |
Configure the "system LAN speed" setting to organizational standards. CC ID 09566 | System hardening through configuration management | Configuration | |
Configure the "system duplex mode" setting to organizational standards. CC ID 09567 | System hardening through configuration management | Configuration | |
Configure the "system to ignore redirect messages" setting to organizational standards. CC ID 09568 | System hardening through configuration management | Configuration | |
Configure the "system ICMP transmission rate limit (in milliseconds)" setting to organizational standards. CC ID 09569 | System hardening through configuration management | Configuration | |
Configure the "generate destination unreachable messages" setting to organizational standards. CC ID 09570 | System hardening through configuration management | Configuration | |
Configure the "respond to broadcast and multicast echo requests" setting to organizational standards. CC ID 09571 | System hardening through configuration management | Configuration | |
Configure the "IPv6 DAD transmit count" setting to organizational standards. CC ID 09572 | System hardening through configuration management | Configuration | |
Configure the "phone number of the room where the system is located" setting to organizational standards. CC ID 09573 | System hardening through configuration management | Configuration | |
Configure the "GMS tech support contact name" setting to organizational standards. CC ID 09574 | System hardening through configuration management | Configuration | |
Configure the "GMS tech support contact email" setting to organizational standards. CC ID 09575 | System hardening through configuration management | Configuration | |
Configure the "GMS tech support contact phone number" setting to organizational standards. CC ID 09576 | System hardening through configuration management | Configuration | |
Configure the "GMS tech support contact fax number" setting to organizational standards. CC ID 09577 | System hardening through configuration management | Configuration | |
Configure the "GMS tech support contact city" setting to organizational standards. CC ID 09578 | System hardening through configuration management | Configuration | |
Configure the "GMS tech support contact state" setting to organizational standards. CC ID 09579 | System hardening through configuration management | Configuration | |
Configure the "GMS tech support contact country" setting to organizational standards. CC ID 09580 | System hardening through configuration management | Configuration | |
Configure the "security profile" setting to organizational standards. CC ID 09581 | System hardening through configuration management | Configuration | |
Configure the "allow PC LAN port access" setting to organizational standards. CC ID 09582 | System hardening through configuration management | Configuration | |
Configure the "require certificate validation for web server" setting to organizational standards. CC ID 09583 | System hardening through configuration management | Configuration | |
Configure the "require certificate validation for peer client applications" setting to organizational standards. CC ID 09584 | System hardening through configuration management | Configuration | |
Configure the "maximum peer certificate chain depth" setting to organizational standards. CC ID 09585 | System hardening through configuration management | Configuration | |
Configure the "certificate revocation method" setting to organizational standards. CC ID 09586 | System hardening through configuration management | Configuration | |
Configure the "allow incomplete revocation checks" setting to organizational standards. CC ID 09587 | System hardening through configuration management | Configuration | |
Configure the "the global responder specified in the certificate" setting to organizational standards. CC ID 09588 | System hardening through configuration management | Configuration | |
Configure the "require login for system access" setting to organizational standards. CC ID 09589 | System hardening through configuration management | Configuration | |
Configure the "allow the local password to be used for remote access" setting to organizational standards. CC ID 09590 | System hardening through configuration management | Configuration | |
Configure the "allow remote access via web" setting to organizational standards. CC ID 09591 | System hardening through configuration management | Configuration | |
Configure the "web access port number" setting to organizational standards. CC ID 09592 | System hardening through configuration management | Configuration | |
Configure the "require whitelist" setting to organizational standards. CC ID 09593 | System hardening through configuration management | Configuration | |
Configure the "allow remote access via telnet" setting to organizational standards. CC ID 09594 | System hardening through configuration management | Configuration | |
Configure the "allow remote access via SNMP" setting to organizational standards. CC ID 09595 | System hardening through configuration management | Configuration | |
Configure the "allow video display on the web" setting to organizational standards. CC ID 09596 | System hardening through configuration management | Configuration | |
Configure the "require display of a security banner upon login" setting to organizational standards. CC ID 09597 | System hardening through configuration management | Configuration | |
Configure the "custom text for the local security banner" setting to organizational standards. CC ID 09598 | System hardening through configuration management | Configuration | |
Configure the "custom text for the web security banner" setting to organizational standards. CC ID 09599 | System hardening through configuration management | Configuration | |
Configure the "allow a non-admin user to make changes to the local system address book" setting to organizational standards. CC ID 09600 | System hardening through configuration management | Configuration | |
Configure the "allow a non-admin user to make changes to the camera presets" setting to organizational standards. CC ID 09601 | System hardening through configuration management | Configuration | |
Configure the "allow mixed protocol (IP and ISDN) multipoint calls" setting to organizational standards. CC ID 09602 | System hardening through configuration management | Configuration | |
Configure the "require Active Directory authentication" setting to organizational standards. CC ID 09603 | System hardening through configuration management | Configuration | |
Configure the "Active Directory server address" setting to organizational standards. CC ID 09604 | System hardening through configuration management | Configuration | |
Configure the "Active Directory admin group" setting to organizational standards. CC ID 09605 | System hardening through configuration management | Configuration | |
Configure the "Active Directory user group" setting to organizational standards. CC ID 09606 | System hardening through configuration management | Configuration | |
Configure the "require admin password for remote login" setting to organizational standards. CC ID 09607 | System hardening through configuration management | Configuration | |
Configure the "RS-232 serial port access mode" setting to organizational standards. CC ID 09608 | System hardening through configuration management | Configuration | |
Configure the "RS-232 serial port baud rate" setting to organizational standards. CC ID 09609 | System hardening through configuration management | Configuration | |
Configure the "require AES encryption" setting to organizational standards. CC ID 09610 | System hardening through configuration management | Configuration | |
Configure the "SIP" setting to organizational standards. CC ID 09611 | System hardening through configuration management | Configuration | |
Configure the "allow recent call list to be accessible" setting to organizational standards. CC ID 09612 | System hardening through configuration management | Configuration | |
Configure the "allow the last number dialed to be accessible" setting to organizational standards. CC ID 09613 | System hardening through configuration management | Configuration | |
Configure the "allow far end control of the near camera" setting to organizational standards. CC ID 09614 | System hardening through configuration management | Configuration | |
Configure the "allow a call detail report to be created and maintained" setting to organizational standards. CC ID 09615 | System hardening through configuration management | Configuration | |
Configure the "Availability Control (Do Not Disturb) for all calls" setting to organizational standards. CC ID 09616 | System hardening through configuration management | Configuration | |
Configure the "Do Not Disturb only for point to point calls" setting to organizational standards. CC ID 09617 | System hardening through configuration management | Configuration | |
Configure the "Do Not Disturb only for multipoint calls" setting to organizational standards. CC ID 09618 | System hardening through configuration management | Configuration | |
Configure the "require the admin account to be locked after a certain number of failed login attempts" setting to organizational standards. CC ID 09619 | System hardening through configuration management | Configuration | |
Configure the "admin account lock duration (in minutes)" setting to organizational standards. CC ID 09620 | System hardening through configuration management | Configuration | |
Configure the "require the user account to be locked after a certain number of unsuccessful logon attempts" setting to organizational standards. CC ID 09621 | System hardening through configuration management | Configuration | |
Configure the "user account lock duration (in minutes)" setting to organizational standards. CC ID 09622 | System hardening through configuration management | Configuration | |
Configure the "idle session timeout (in minutes)" setting to organizational standards. CC ID 09623 | System hardening through configuration management | Configuration | |
Configure the "monitoring of inactive web sessions " setting to organizational standards. CC ID 09624 | System hardening through configuration management | Configuration | |
Configure the "list of all sessions (local, web and serial) visible on the local or web GUI" setting to organizational standards. CC ID 09625 | System hardening through configuration management | Configuration | |
Configure the "maximum number of concurrent active web sessions" setting to organizational standards. CC ID 09626 | System hardening through configuration management | Configuration | |
Configure the "number of failed login attempts on the web interface and serial port (port lockout) after which the interface will be locked" setting to organizational standards. CC ID 09627 | System hardening through configuration management | Configuration | |
Configure the "web interface and serial port (port lockout) lock duration should (in minutes) be configured" setting to organizational standards. CC ID 09628 | System hardening through configuration management | Configuration | |
Configure the "local (room) admin password" setting to organizational standards. CC ID 09629 | System hardening through configuration management | Configuration | |
Configure the "remote access admin password" setting to organizational standards. CC ID 09630 | System hardening through configuration management | Configuration | |
Configure the "local (room) user password" setting to organizational standards. CC ID 09631 | System hardening through configuration management | Configuration | |
Configure the "meeting password" setting to organizational standards. CC ID 09632 | System hardening through configuration management | Configuration | |
Configure the "MCU password" setting to organizational standards. CC ID 09633 | System hardening through configuration management | Configuration | |
Configure the "minimum length required for a local (room) admin password" setting to organizational standards. CC ID 09634 | System hardening through configuration management | Configuration | |
Configure the "require that the local (room) admin password contain lower case characters" setting to organizational standards. CC ID 09635 | System hardening through configuration management | Configuration | |
Configure the "require that the local (room) admin password contain upper case characters" setting to organizational standards. CC ID 09636 | System hardening through configuration management | Configuration | |
Configure the "require that the local (room) admin password contain numbers" setting to organizational standards. CC ID 09637 | System hardening through configuration management | Configuration | |
Configure the "require that the local (room) admin password contain special characters" setting to organizational standards. CC ID 09638 | System hardening through configuration management | Configuration | |
Configure the "reject a certain number of previous local (room) admin passwords when creating a new password" setting to organizational standards. CC ID 09639 | System hardening through configuration management | Configuration | |
Configure the "minimum age for the local (room) admin password before it can be changed" setting to organizational standards. CC ID 09640 | System hardening through configuration management | Configuration | |
Configure the "maximum age for the local (room) admin password after which it must be changed" setting to organizational standards. CC ID 09641 | System hardening through configuration management | Configuration | |
Configure the "how many days ahead of time a password expiration warning should be provided when the local (room) admin password is about to expire" setting to organizational standards. CC ID 09642 | System hardening through configuration management | Configuration | |
Configure the "minimum number of characters that must be changed when creating a new local (room) admin password" setting to organizational standards. CC ID 09643 | System hardening through configuration management | Configuration | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new local (room) admin password" setting to organizational standards. CC ID 09644 | System hardening through configuration management | Configuration | |
Configure the "the local (room) admin password can contain the admin account name or the reverse of the account name" setting to organizational standards. CC ID 09645 | System hardening through configuration management | Configuration | |
Configure the "minimum length required for a remote admin password" setting to organizational standards. CC ID 09646 | System hardening through configuration management | Configuration | |
Configure the "require that the remote admin password contain lower case characters" setting to organizational standards. CC ID 09647 | System hardening through configuration management | Configuration | |
Configure the "require that the remote admin password contain upper case characters" setting to organizational standards. CC ID 09648 | System hardening through configuration management | Configuration | |
Configure the "require that the remote admin password contain numbers" setting to organizational standards. CC ID 09649 | System hardening through configuration management | Configuration | |
Configure the "require that the remote admin password contain special characters" setting to organizational standards. CC ID 09650 | System hardening through configuration management | Configuration | |
Configure the "reject a certain number of previous remote admin passwords when creating a new password" setting to organizational standards. CC ID 09651 | System hardening through configuration management | Configuration | |
Configure the "minimum age for the remote admin password before it can be changed" setting to organizational standards. CC ID 09652 | System hardening through configuration management | Configuration | |
Configure the "maximum age for the remote admin password after which it must be changed" setting to organizational standards. CC ID 09653 | System hardening through configuration management | Configuration | |
Configure the "how many days ahead of time a password expiration warning should be provided when the remote admin password is about to expire" setting to organizational standards. CC ID 09654 | System hardening through configuration management | Configuration | |
Configure the "minimum number of characters that must be changed when creating a new remote admin password" setting to organizational standards. CC ID 09655 | System hardening through configuration management | Configuration | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new remote admin password" setting to organizational standards. CC ID 09656 | System hardening through configuration management | Configuration | |
Configure the "remote admin password can contain the admin account name or the reverse of the account name" setting to organizational standards. CC ID 09657 | System hardening through configuration management | Configuration | |
Configure the "minimum length required for a local (room) user password" setting to organizational standards. CC ID 09658 | System hardening through configuration management | Configuration | |
Configure the "require that the local (room) user password contain lower case characters" setting to organizational standards. CC ID 09659 | System hardening through configuration management | Configuration | |
Configure the "require that the local (room) user password contain upper case characters" setting to organizational standards. CC ID 09660 | System hardening through configuration management | Configuration | |
Configure the "require that the local (room) user password contain numbers" setting to organizational standards. CC ID 09661 | System hardening through configuration management | Configuration | |
Configure the "require that the local (room) user password contain special characters" setting to organizational standards. CC ID 09662 | System hardening through configuration management | Configuration | |
Configure the "reject a certain number of previous local (room) user passwords when creating a new password" setting to organizational standards. CC ID 09663 | System hardening through configuration management | Configuration | |
Configure the "minimum age for the local (room) user password before it can be changed" setting to organizational standards. CC ID 09664 | System hardening through configuration management | Configuration | |
Configure the "maximum age for the local (room) user password after which it must be changed" setting to organizational standards. CC ID 09665 | System hardening through configuration management | Configuration | |
Configure the "how many days ahead of time a password expiration warning should be provided when the local (room) user password is about to expire" setting to organizational standards. CC ID 09666 | System hardening through configuration management | Configuration | |
Configure the "minimum number of characters that must be changed when creating a new local (room) user password" setting to organizational standards. CC ID 09667 | System hardening through configuration management | Configuration | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new local (room) user password" setting to organizational standards. CC ID 09668 | System hardening through configuration management | Configuration | |
Configure the "the local (room) user password can contain the user account name or the reverse of the account name" setting to organizational standards. CC ID 09669 | System hardening through configuration management | Configuration | |
Configure the "minimum length required for a meeting password" setting to organizational standards. CC ID 09670 | System hardening through configuration management | Configuration | |
Configure the "require that the meeting password contain lower case characters" setting to organizational standards. CC ID 09671 | System hardening through configuration management | Configuration | |
Configure the "require that the meeting password contain upper case characters" setting to organizational standards. CC ID 09672 | System hardening through configuration management | Configuration | |
Configure the "require that the meeting password contain numbers" setting to organizational standards. CC ID 09673 | System hardening through configuration management | Configuration | |
Configure the "require that the meeting password contain special characters" setting to organizational standards. CC ID 09674 | System hardening through configuration management | Configuration | |
Configure the "reject a certain number of previous meeting passwords when creating a new meeting password" setting to organizational standards. CC ID 09675 | System hardening through configuration management | Configuration | |
Configure the "minimum age for the meeting password before it can be changed" setting to organizational standards. CC ID 09676 | System hardening through configuration management | Configuration | |
Configure the "maximum age for the meeting password after which it must be changed" setting to organizational standards. CC ID 09677 | System hardening through configuration management | Configuration | |
Configure the "how many days ahead of time a password expiration warning should be provided when the meeting password is about to expire" setting to organizational standards. CC ID 09678 | System hardening through configuration management | Configuration | |
Configure the "minimum number of characters that must be changed when creating a new meeting password" setting to organizational standards. CC ID 09679 | System hardening through configuration management | Configuration | |
Configure the "maximum number of consecutive repeating characters that are allowed when creating a new meeting password" setting to organizational standards. CC ID 09680 | System hardening through configuration management | Configuration | |
Configure the "allow access to security related settings by non-admin users" setting to organizational standards. CC ID 09681 | System hardening through configuration management | Configuration | |
Configure the "NTLM version" setting to organizational standards. CC ID 09682 | System hardening through configuration management | Configuration | |
Configure the "folder name to be used when downloading log files" setting to organizational standards. CC ID 09683 | System hardening through configuration management | Configuration | |
Configure the "percent filled threshold above which a warning will be provided if log files exceed it" setting to organizational standards. CC ID 09684 | System hardening through configuration management | Configuration | |
Configure the "frequency of transferring logs to a storage device then deleting the logs from the system" setting to organizational standards. CC ID 09685 | System hardening through configuration management | Configuration | |
Configure the "show content immediately upon connecting a computer to the system" setting to organizational standards. CC ID 09686 | System hardening through configuration management | Configuration | |
Configure the "require an account number to dial a call" setting to organizational standards. CC ID 09687 | System hardening through configuration management | Configuration | |
Configure the "require validation of an account number before allowing a call to be dialed" setting to organizational standards. CC ID 09688 | System hardening through configuration management | Configuration | |
Configure the "maximum time that a call can be connected" setting to organizational standards. CC ID 09689 | System hardening through configuration management | Configuration | |
Configure the "mute a call that is auto answered" setting to organizational standards. CC ID 09690 | System hardening through configuration management | Configuration | |
Configure the "H.460 firewall traversal" setting to organizational standards CC ID 09691 | System hardening through configuration management | Configuration | |
Configure the "POTS" setting to organizational standards. CC ID 09692 | System hardening through configuration management | Configuration | |
Configure the "POTS area code manually" setting to organizational standards. CC ID 09693 | System hardening through configuration management | Configuration | |
Configure the "POTS number manually" setting to organizational standards. CC ID 09694 | System hardening through configuration management | Configuration | |
Configure the "allow a Polycom Touch Control panel to pair with the system" setting to organizational standards. CC ID 09695 | System hardening through configuration management | Configuration | |
Configure the "screen saver wait time" setting to organizational standards. CC ID 09696 | System hardening through configuration management | Configuration | |
Configure the "video call dial order" setting to organizational standards. CC ID 09697 | System hardening through configuration management | Configuration | |
Configure the "voice call dial order" setting to organizational standards. CC ID 09698 | System hardening through configuration management | Configuration | |
Configure the "diagnostic (basic) mode" setting to organizational standards. CC ID 09699 | System hardening through configuration management | Configuration | |
Configure the "dual monitor emulation" setting to organizational standards. CC ID 09700 | System hardening through configuration management | Configuration | |
Configure the "H.239" setting to organizational standards CC ID 09701 | System hardening through configuration management | Configuration | |
Configure the "VGA quality preference" setting to organizational standards. CC ID 09702 | System hardening through configuration management | Configuration | |
Configure the "power button on the IR remote control" setting to organizational standards. CC ID 09703 | System hardening through configuration management | Configuration | |
Configure the "numeric keypad function on the IR remote control" setting to organizational standards. CC ID 09704 | System hardening through configuration management | Configuration | |
Configure the "allow use of a non-Polycom IR remote control" setting to organizational standards. CC ID 09705 | System hardening through configuration management | Configuration | |
Configure the "channel ID for the IR remote control" setting to organizational standards. CC ID 09706 | System hardening through configuration management | Configuration | |
Configure the "transcoding" setting to organizational standards. CC ID 09707 | System hardening through configuration management | Configuration | |
Configure the "allow the system to dial any calls" setting to organizational standards. CC ID 09708 | System hardening through configuration management | Configuration | |
Configure the "preferred dialing method" setting to organizational standards. CC ID 09709 | System hardening through configuration management | Configuration | |
Configure the "domain of the provisioning server" setting to organizational standards. CC ID 09710 | System hardening through configuration management | Configuration | |
Configure the "user name to connect to the provisioning server" setting to organizational standards. CC ID 09711 | System hardening through configuration management | Configuration | |
Configure the "password to connect to the provisioning server" setting to organizational standards. CC ID 09712 | System hardening through configuration management | Configuration | |
Configure the "server address of the provisioning server" setting to organizational standards. CC ID 09713 | System hardening through configuration management | Configuration | |
Configure the "SNMP admin name" setting to organizational standards. CC ID 09714 | System hardening through configuration management | Configuration | |
Configure the "SNMP community name" setting to organizational standards. CC ID 09715 | System hardening through configuration management | Configuration | |
Configure the "SNMP console address" setting to organizational standards. CC ID 09716 | System hardening through configuration management | Configuration | |
Configure the "SNMP location" setting to organizational standards. CC ID 09717 | System hardening through configuration management | Configuration | |
Configure the "SNMP system description" setting to organizational standards. CC ID 09718 | System hardening through configuration management | Configuration | |
Configure the "SNMP trap version" setting to organizational standards. CC ID 09719 | System hardening through configuration management | Configuration | |
Configure Apache and Tomcat to Organizational Standards. CC ID 08987 | System hardening through configuration management | Configuration | |
Configure the "demo CGI printenv.pl" setting to organizational standards. CC ID 08993 | System hardening through configuration management | Configuration | |
Configure the "testcgi" setting to organizational standards. CC ID 08994 | System hardening through configuration management | Configuration | |
Configure the "FollowSymLinks" setting for the "DocumentRoot" to organizational standards. CC ID 08995 | System hardening through configuration management | Configuration | |
Configure the "IncludesNOEXEC" setting for the "DocumentRoot" to organizational standards. CC ID 08996 | System hardening through configuration management | Configuration | |
Configure the "Indexes" setting for the "DocumentRoot" to organizational standards. CC ID 08997 | System hardening through configuration management | Configuration | |
Configure the "Allow" setting for the "OS root" to organizational standards. CC ID 08998 | System hardening through configuration management | Configuration | |
Configure the "Allow" setting to organizational standards. CC ID 08999 | System hardening through configuration management | Configuration | |
Configure the "KeepAlive" setting to organizational standards. CC ID 09000 | System hardening through configuration management | Configuration | |
Configure the "KeepAliveTimeout" setting to organizational standards. CC ID 09001 | System hardening through configuration management | Configuration | |
Configure the "LimitRequestBody" setting to organizational standards. CC ID 09002 | System hardening through configuration management | Configuration | |
Configure the "LimitRequestFields" setting to organizational standards. CC ID 09003 | System hardening through configuration management | Configuration | |
Configure the "LimitRequestFieldSizeBody" setting to organizational standards. CC ID 09004 | System hardening through configuration management | Configuration | |
Configure the "LimitRequestline" setting to organizational standards. CC ID 09005 | System hardening through configuration management | Configuration | |
Configure the "loglevel" setting to organizational standards. CC ID 09006 | System hardening through configuration management | Configuration | |
Configure the "MaxClients" setting to organizational standards. CC ID 09007 | System hardening through configuration management | Configuration | |
Configure the "ServerTokens" setting to organizational standards. CC ID 09008 | System hardening through configuration management | Configuration | |
Configure the "Timeout" setting to organizational standards. CC ID 09009 | System hardening through configuration management | Configuration | |
Configure the "apache access log file" setting to organizational standards. CC ID 09010 | System hardening through configuration management | Configuration | |
Configure the "AllowOverride" for "OS root" to organizational standards. CC ID 09011 | System hardening through configuration management | Configuration | |
Configure the "AllowOverride" setting for "web site root directories" to organizational standards. CC ID 09012 | System hardening through configuration management | Configuration | |
Configure the "ErrorDocument" setting for "HTTP 400 errors" to organizational standards. CC ID 09013 | System hardening through configuration management | Configuration | |
Configure the "Group" setting to organizational standards. CC ID 09014 | System hardening through configuration management | Configuration | |
Configure the "runtime rewriting engine" setting to organizational standards. CC ID 09015 | System hardening through configuration management | Configuration | |
Configure the "ServerSignature" setting to organizational standards. CC ID 09016 | System hardening through configuration management | Configuration | |
Configure the "apache system logging" setting to organizational standards. CC ID 09017 | System hardening through configuration management | Configuration | |
Configure the "User" setting to organizational standards. CC ID 09019 | System hardening through configuration management | Configuration | |
Configure the "ErrorDocument" setting for "HTTP 401 errors" to organizational standards. CC ID 09020 | System hardening through configuration management | Configuration | |
Configure the "ErrorDocument" setting for "HTTP 403 errors" to organizational standards. CC ID 09021 | System hardening through configuration management | Configuration | |
Configure the "ErrorDocument" setting for "HTTP 404 errors" to organizational standards. CC ID 09022 | System hardening through configuration management | Configuration | |
Configure the "ErrorDocument" setting for "HTTP 405 errors" to organizational standards. CC ID 09023 | System hardening through configuration management | Configuration | |
Configure the "ErrorDocument" setting for "HTTP 500 errors" to organizational standards. CC ID 09024 | System hardening through configuration management | Configuration | |
Configure the "Deny" setting for the "OS root" to organizational standards. CC ID 09025 | System hardening through configuration management | Configuration | |
Configure the "Deny" setting to organizational standards. CC ID 09026 | System hardening through configuration management | Configuration | |
Configure the "error log file" setting to organizational standards. CC ID 09040 | System hardening through configuration management | Configuration | |
Configure the "Includes" setting for the "DocumentRoot" to organizational standards. CC ID 09046 | System hardening through configuration management | Configuration | |
Configure the "MultiViews" setting for the "DocumentRoot" to organizational standards. CC ID 09047 | System hardening through configuration management | Configuration | |
Configure the "Order" setting for the "OS root" to organizational standards. CC ID 09048 | System hardening through configuration management | Configuration | |
Configure the "permitted HTTP request methods" setting to organizational standards. CC ID 09049 | System hardening through configuration management | Configuration | |
Configure the "httpd.conf" file to organizational standards. CC ID 09050 | System hardening through configuration management | Configuration | |
Configure the "htpasswd" file to organizational standards. CC ID 09053 | System hardening through configuration management | Configuration | |
Configure the "Server Administrator email address" setting to organizational standards. CC ID 09054 | System hardening through configuration management | Configuration | |
Configure the "StartServers" setting to organizational standards. CC ID 09060 | System hardening through configuration management | Configuration | |
Configure the "MinSpareServers" setting to organizational standards. CC ID 09061 | System hardening through configuration management | Configuration | |
Configure the "MaxSpareServers" setting to organizational standards. CC ID 09062 | System hardening through configuration management | Configuration | |
Configure the "ExecCGI" setting for the "DocumentRoot" to organizational standards. CC ID 09063 | System hardening through configuration management | Configuration | |
Configure the "Order" setting for "all DocumentRoots" to organizational standards. CC ID 09064 | System hardening through configuration management | Configuration | |
Configure the "Order" setting to organizational standards. CC ID 09065 | System hardening through configuration management | Configuration | |
Configure the "action directive" setting to organizational standards. CC ID 09066 | System hardening through configuration management | Configuration | |
Configure the "AddHandler directive" setting to organizational standards. CC ID 09067 | System hardening through configuration management | Configuration | |
Configure the "Anonymous sharing of Apache's web content directories with nfs" setting to organizational standards. CC ID 09068 | System hardening through configuration management | Configuration | |
Configure the "Anonymous sharing of Apache's web content directories with smb" setting to organizational standards. CC ID 09069 | System hardening through configuration management | Configuration | |
Configure the "MaxKeepAliveRequests" setting to organizational standards. CC ID 09070 | System hardening through configuration management | Configuration | |
Configure the "log_config_module" setting to organizational standards. CC ID 09072 | System hardening through configuration management | Configuration | |
Configure the "disallow paths and files" setting for "robots.txt" to organizational standards. CC ID 09105 | System hardening through configuration management | Configuration | |
Configure the "ssl_module" setting to organizational standards. CC ID 09106 | System hardening through configuration management | Configuration | |
Configure the "SSLProtocol" setting to organizational standards. CC ID 09107 | System hardening through configuration management | Configuration | |
Configure the "SSLEngine" setting to organizational standards. CC ID 09108 | System hardening through configuration management | Configuration | |
Configure the "apache online manual" setting to organizational standards. CC ID 09109 | System hardening through configuration management | Configuration | |
Configure the "FollowSymLinks" setting for "all options directives" to organizational standards. CC ID 09110 | System hardening through configuration management | Configuration | |
Configure the "Includes" setting for "all options directives" to organizational standards. CC ID 09111 | System hardening through configuration management | Configuration | |
Configure the "IncludesNoExec" setting for "all options directives" to organizational standards. CC ID 09112 | System hardening through configuration management | Configuration | |
Configure the "MultiViews" setting for "all options directives" to organizational standards. CC ID 09113 | System hardening through configuration management | Configuration | |
Configure the "Indexes" setting for "all options directives" to organizational standards. CC ID 09114 | System hardening through configuration management | Configuration | |
Configure the "dav_module" setting to organizational standards. CC ID 09115 | System hardening through configuration management | Configuration | |
Configure the "dav_fs_module" setting to organizational standards. CC ID 09116 | System hardening through configuration management | Configuration | |
Configure the "info_module" setting to organizational standards. CC ID 09117 | System hardening through configuration management | Configuration | |
Configure the "status_module" setting to organizational standards. CC ID 09118 | System hardening through configuration management | Configuration | |
Configure the "proxy_module" setting to organizational standards. CC ID 09119 | System hardening through configuration management | Configuration | |
Configure the "proxy_ftp_module" setting to organizational standards. CC ID 09120 | System hardening through configuration management | Configuration | |
Configure the "proxy_http_module" setting to organizational standards. CC ID 09121 | System hardening through configuration management | Configuration | |
Configure the "proxy_connect_module" setting to organizational standards. CC ID 09122 | System hardening through configuration management | Configuration | |
Configure the "ExecCGI" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09130 | System hardening through configuration management | Configuration | |
Configure the "FollowSymLinks" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09131 | System hardening through configuration management | Configuration | |
Configure the "Includes" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09132 | System hardening through configuration management | Configuration | |
Configure the "IncludesNoExec" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09133 | System hardening through configuration management | Configuration | |
Configure the "Indexes" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09134 | System hardening through configuration management | Configuration | |
Configure the "MultiViews" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09135 | System hardening through configuration management | Configuration | |
Configure the "SymLinksIfOwnerMatch" setting for "all options directives" for the "OS root" to organizational standards. CC ID 09136 | System hardening through configuration management | Configuration | |
Configure the "TraceEnable" setting to organizational standards. CC ID 09137 | System hardening through configuration management | Configuration | |
Configure the "listening IP address" setting to organizational standards. CC ID 09138 | System hardening through configuration management | Configuration | |
Configure the "listening port" setting to organizational standards. CC ID 09139 | System hardening through configuration management | Configuration | |
Configure the "ScriptAlias" setting to organizational standards. CC ID 09140 | System hardening through configuration management | Configuration | |
Configure the "automatic directory indexing" setting to organizational standards. CC ID 09141 | System hardening through configuration management | Configuration | |
Configure the "Anonymous sharing of Apache's web content directories" setting to organizational standards. CC ID 09142 | System hardening through configuration management | Configuration | |
Configure the "apache web server" setting to organizational standards. CC ID 09147 | System hardening through configuration management | Configuration | |
Configure the "dav_lock_module" setting to organizational standards. CC ID 09150 | System hardening through configuration management | Configuration | |
Configure the "proxy_ajp_module" setting to organizational standards. CC ID 09151 | System hardening through configuration management | Configuration | |
Configure the "proxy_balancer_module" setting to organizational standards. CC ID 09152 | System hardening through configuration management | Configuration | |
Configure the "CGI scripts for Apache Tomcat" setting to organizational standards. CC ID 09720 | System hardening through configuration management | Configuration | |
Configure the "Access to Apache Tomcat's interactive scripts" setting to organizational standards. CC ID 09721 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Apache's backup CGI *.bak" files to organizational standards CC ID 09722 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Apache's backup CGI *.old" files to organizational standards CC ID 09723 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Apache's backup CGI *.temp" files to organizational standards CC ID 09724 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Apache's backup CGI *.tmp" files to organizational standards CC ID 09725 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Apache's backup CGI *.backup" files to organizational standards CC ID 09726 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Apache's backup CGI copy of*.*" files to organizational standards CC ID 09727 | System hardening through configuration management | Configuration | |
Configure the "maxProcessors attribute" setting to organizational standards. CC ID 09728 | System hardening through configuration management | Configuration | |
Configure the "access log valve" setting for the "tomcat Engine container" to organizational standards. CC ID 09730 | System hardening through configuration management | Configuration | |
Configure the "access log valve" setting for the "tomcat Host container" to organizational standards. CC ID 09731 | System hardening through configuration management | Configuration | |
Configure the "access log valve" setting for the "tomcat Context container" to organizational standards. CC ID 09732 | System hardening through configuration management | Configuration | |
Configure the "disallow paths and files" setting for the "tomcat site robots.txt" file to organizational standards. CC ID 09745 | System hardening through configuration management | Configuration | |
Configure the "tomcat SSLProtocol atribute" setting to organizational standards. CC ID 09746 | System hardening through configuration management | Configuration | |
Configure the "tomcat Connector SSLEngine attribute" setting to organizational standards. CC ID 09747 | System hardening through configuration management | Configuration | |
Configure the "tomcat Listener SSLEngine attribute" setting to organizational standards. CC ID 09748 | System hardening through configuration management | Configuration | |
Configure the "tomcat server attribute" setting to organizational standards. CC ID 09749 | System hardening through configuration management | Configuration | |
Configure the "account running the tomcat service" setting to organizational standards. CC ID 09750 | System hardening through configuration management | Configuration | |
Configure the "tomcat server documentation" setting to organizational standards. CC ID 09751 | System hardening through configuration management | Configuration | |
Configure the "tomcat js examples" setting to organizational standards. CC ID 09752 | System hardening through configuration management | Configuration | |
Configure the "tomcat servlet examples" setting to organizational standards. CC ID 09753 | System hardening through configuration management | Configuration | |
Configure the "tomcat webdav" folder to organizational standards. CC ID 09754 | System hardening through configuration management | Configuration | |
Configure the "tomcat examples" folder to organizational standards. CC ID 09755 | System hardening through configuration management | Configuration | |
Configure the "tomcat balancer" folder to organizational standards. CC ID 09756 | System hardening through configuration management | Configuration | |
Configure the "tomcat pattern attribute" setting to organizational standards. CC ID 09757 | System hardening through configuration management | Configuration | |
Configure the "Java Security Manager (JSM)" setting to organizational standards. CC ID 09758 | System hardening through configuration management | Configuration | |
Configure the "run with the Java Security Manager upon startup" setting to organizational standards. CC ID 09759 | System hardening through configuration management | Configuration | |
Configure the "shutdown port number" for the "tomcat server" to organizational standards. CC ID 09760 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Legacy JK AJP 1.3 connector" setting to organizational standards. CC ID 09761 | System hardening through configuration management | Configuration | |
Configure the "port number" setting for the "Tomcat Legacy JK AJP 1.3 connector" to organizational standards. CC ID 09762 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Legacy HTTP/1.1 connector" setting to organizational standards. CC ID 09763 | System hardening through configuration management | Configuration | |
Configure the "port number" for the "Tomcat Legacy HTTP/1.1 connector" to organizational standards. CC ID 09764 | System hardening through configuration management | Configuration | |
Configure the "Tomcat login authentication method" setting to organizational standards. CC ID 09765 | System hardening through configuration management | Configuration | |
Configure the "security roles" for the "Tomcat manager app" to organizational standards. CC ID 09766 | System hardening through configuration management | Configuration | |
Configure the "security roles" setting for the "tomcat admin app" to organizational standards. CC ID 09767 | System hardening through configuration management | Configuration | |
Configure the "deny access to the Tomcat Admin app" setting to organizational standards. CC ID 09768 | System hardening through configuration management | Configuration | |
Configure the "allow access to the Tomcat Admin app" setting to organizational standards. CC ID 09769 | System hardening through configuration management | Configuration | |
Configure the "deny access to the Tomcat manager app" setting to organizational standards. CC ID 09770 | System hardening through configuration management | Configuration | |
Configure the "allow access to the Tomcat manager app" setting to organizational standards. CC ID 09771 | System hardening through configuration management | Configuration | |
Configure the "password digest algorithm" setting for "JDBCRealm (database) connections" to organizational standards. CC ID 09779 | System hardening through configuration management | Configuration | |
Configure the "JDBCRealm (database) password digest algorithm" setting to organizational standards. CC ID 09780 | System hardening through configuration management | Configuration | |
Configure the "password digest algorithm" setting for "JNDIRealm (LDAP) connections" to organizational standards. CC ID 09781 | System hardening through configuration management | Configuration | |
Configure the "JNDIRealm (LDAP) password digest" setting to organizational standards. CC ID 09782 | System hardening through configuration management | Configuration | |
Configure the "Tomcat HTTP/1.1 connector" setting to organizational standards. CC ID 09783 | System hardening through configuration management | Configuration | |
Configure the "port number" setting for the "Tomcat HTTP/1.1 connector" to organizational standards. CC ID 09784 | System hardening through configuration management | Configuration | |
Configure the "secure attribute" for the "Tomcat HTTP/1.1 connectors" to organizational standards. CC ID 09785 | System hardening through configuration management | Configuration | |
Configure the "Tomcat Legacy JK/JK2 AJP 1.3 connector" setting to organizational standards. CC ID 09786 | System hardening through configuration management | Configuration | |
Configure the "port number" setting for the "JK/JK2 AJP 1.3 connector" to organizational standards. CC ID 09787 | System hardening through configuration management | Configuration | |
Configure the "Tomcat WARP connector" setting to organizational standards. CC ID 09788 | System hardening through configuration management | Configuration | |
Configure the "port number" setting for the "WARP connector" to organizational standards. CC ID 09789 | System hardening through configuration management | Configuration | |
Configure the "location of the log files directory" setting for the "Logger element" to organizational standards. CC ID 09790 | System hardening through configuration management | Configuration | |
Configure the "example server.xml" file to organizational standards. CC ID 09791 | System hardening through configuration management | Configuration | |
Configure the "file prefix" setting for the "Logger element" to organizational standards. CC ID 09794 | System hardening through configuration management | Configuration | |
Configure the "verbosity" setting for the "Logger element" to organizational standards. CC ID 09795 | System hardening through configuration management | Configuration | |
Configure the "Tomcat server port number" setting to organizational standards. CC ID 09797 | System hardening through configuration management | Configuration | |
Configure the "secure attribute" for the "Tomcat JK/JK2 AJP 1.3 connectors" to organizational standards. CC ID 09803 | System hardening through configuration management | Configuration | |
Configure the "JULI container level logging" setting to organizational standards. CC ID 09804 | System hardening through configuration management | Configuration | |
Configure the "JULI FileHandler threshold level " setting to organizational standards. CC ID 09805 | System hardening through configuration management | Configuration | |
Configure the "JULI FileHandler save directory " setting to organizational standards. CC ID 09806 | System hardening through configuration management | Configuration | |
Configure the "JULI FileHandlerlog file name prefix " setting to organizational standards. CC ID 09807 | System hardening through configuration management | Configuration | |
Configure the "grant of all permissions to Tomcat web applications" setting to organizational standards. CC ID 09808 | System hardening through configuration management | Configuration | |
Configure the "example" files to organizational standards. CC ID 09809 | System hardening through configuration management | Configuration | |
Configure the "WebDAV app" setting to organizational standards. CC ID 09810 | System hardening through configuration management | Configuration | |
Configure the "Tomcat-docs" setting to organizational standards. CC ID 09811 | System hardening through configuration management | Configuration | |
Configure the "Balancer app" setting to organizational standards. CC ID 09812 | System hardening through configuration management | Configuration | |
Configure the "save directory for log files" setting to organizational standards. CC ID 09816 | System hardening through configuration management | Configuration | |
Configure the "verify passwords in tomcat-users.xml are stored using an authorized digest" setting to organizational standards. CC ID 09817 | System hardening through configuration management | Configuration | |
Configure IIS to Organizational Standards. CC ID 08988 | System hardening through configuration management | Configuration | |
Configure the "IIS Web Root folder path" setting to organizational standards. CC ID 09153 | System hardening through configuration management | Configuration | |
Configure the "IIS Web Root" directory to organizational standards. CC ID 09154 | System hardening through configuration management | Configuration | |
Configure the "use the appropriate network interface" setting to organizational standards. CC ID 09155 | System hardening through configuration management | Configuration | |
Configure the "Enable Logging" setting to organizational standards. CC ID 09167 | System hardening through configuration management | Configuration | |
Configure the "Integrated Windows Authentication" setting to organizational standards. CC ID 09176 | System hardening through configuration management | Configuration | |
Configure the "Special Characters In Shells" setting for the "WWW service" to organizational standards. CC ID 09177 | System hardening through configuration management | Configuration | |
Configure the "IIS WWW service SSL error logging" setting to organizational standards. CC ID 09178 | System hardening through configuration management | Configuration | |
Configure the "RDSServer.DataFactory object" setting to organizational standards. CC ID 09179 | System hardening through configuration management | Configuration | |
Configure the "AdvancedDataFactory object" setting to organizational standards. CC ID 09180 | System hardening through configuration management | Configuration | |
Configure the "VbBusObj.VbBusObjCls object" setting to organizational standards. CC ID 09181 | System hardening through configuration management | Configuration | |
Configure the ".printer extension mapping" setting to organizational standards CC ID 09182 | System hardening through configuration management | Configuration | |
Configure the ".htw extension mapping" setting to organizational standards CC ID 09183 | System hardening through configuration management | Configuration | |
Configure the ".ida extension mapping" setting to organizational standards CC ID 09184 | System hardening through configuration management | Configuration | |
Configure the ".idq extension mapping" setting to organizational standards CC ID 09185 | System hardening through configuration management | Configuration | |
Configure the ".idc extension mapping" setting to organizational standards CC ID 09186 | System hardening through configuration management | Configuration | |
Configure the ".shtm extension mapping" setting to organizational standards CC ID 09187 | System hardening through configuration management | Configuration | |
Configure the ".stm extension mapping" setting to organizational standards CC ID 09188 | System hardening through configuration management | Configuration | |
Configure the ".shtml extension mapping" setting to organizational standards CC ID 09189 | System hardening through configuration management | Configuration | |
Configure the "Relative path traversal" setting to organizational standards. CC ID 09190 | System hardening through configuration management | Configuration | |
Configure the "HTTP protocol logging" setting to organizational standards. CC ID 09199 | System hardening through configuration management | Configuration | |
Configure the "Date logging" setting to organizational standards. CC ID 09200 | System hardening through configuration management | Configuration | |
Configure the "Time logging" setting to organizational standards. CC ID 09201 | System hardening through configuration management | Configuration | |
Configure the "Client IP Address logging" setting to organizational standards. CC ID 09202 | System hardening through configuration management | Configuration | |
Configure the "User name logging" setting to organizational standards. CC ID 09203 | System hardening through configuration management | Configuration | |
Configure the "User agent logging" setting to organizational standards. CC ID 09204 | System hardening through configuration management | Configuration | |
Configure the "Method logging" setting to organizational standards. CC ID 09205 | System hardening through configuration management | Configuration | |
Configure the "URI stem logging" setting to organizational standards. CC ID 09206 | System hardening through configuration management | Configuration | |
Configure the "URL query logging" setting to organizational standards. CC ID 09207 | System hardening through configuration management | Configuration | |
Configure the "Server IP address logging" setting to organizational standards. CC ID 09208 | System hardening through configuration management | Configuration | |
Configure the "Server port logging" setting to organizational standards. CC ID 09209 | System hardening through configuration management | Configuration | |
Configure the "Protocol status logging" setting to organizational standards. CC ID 09210 | System hardening through configuration management | Configuration | |
Configure the "Win32 status logging" setting to organizational standards. CC ID 09211 | System hardening through configuration management | Configuration | |
Configure the "HTTP Log folder path" setting to organizational standards. CC ID 09212 | System hardening through configuration management | Configuration | |
Configure the "Web-based password reset IIS application mappings (.htr)" setting to organizational standards CC ID 09215 | System hardening through configuration management | Configuration | |
Configure the "IIS Sample files" setting to organizational standards. CC ID 09216 | System hardening through configuration management | Configuration | |
Configure the "sample Data Access files" setting to organizational standards. CC ID 09217 | System hardening through configuration management | Configuration | |
Configure the "IIS Help files" setting to organizational standards. CC ID 09218 | System hardening through configuration management | Configuration | |
Configure the "Remote Account password changes" setting to organizational standards. CC ID 09219 | System hardening through configuration management | Configuration | |
Configure the "execution context of the IIS CGI processes" setting to organizational standards. CC ID 09220 | System hardening through configuration management | Configuration | |
Configure the "Server Side Includes command shell" setting to organizational standards. CC ID 09229 | System hardening through configuration management | Configuration | |
Configure the "IIS sample Web Printing files" setting to organizational standards. CC ID 09230 | System hardening through configuration management | Configuration | |
Configure the "AllowRestrictedChars" setting to organizational standards. CC ID 09231 | System hardening through configuration management | Configuration | |
Configure the "EnableNonUTF8" setting to organizational standards. CC ID 09232 | System hardening through configuration management | Configuration | |
Configure the "FavorUTF8" setting to organizational standards. CC ID 09233 | System hardening through configuration management | Configuration | |
Configure the "maximum possible size of request headers" setting to organizational standards. CC ID 09234 | System hardening through configuration management | Configuration | |
Configure the "maximum possible combined size of request line and headers" setting to organizational standards. CC ID 09235 | System hardening through configuration management | Configuration | |
Configure the "maximum number of characters in a URL path setting" setting to organizational standards. CC ID 09236 | System hardening through configuration management | Configuration | |
Configure the "maximum number of URL path segments" setting to organizational standards. CC ID 09237 | System hardening through configuration management | Configuration | |
Configure the "allowance of %U notation in request URLs" setting to organizational standards. CC ID 09238 | System hardening through configuration management | Configuration | |
Configure the "maximum response size that can be cached in the kernel" setting to organizational standards. CC ID 09239 | System hardening through configuration management | Configuration | |
Configure the "maximum size of the entire request body" setting to organizational standards. CC ID 09240 | System hardening through configuration management | Configuration | |
Configure the "URLScan ISAPI filters" setting to organizational standards. CC ID 09241 | System hardening through configuration management | Configuration | |
Configure the "HTTP SSL (HTTPFilter) service" setting to organizational standards. CC ID 09242 | System hardening through configuration management | Configuration | |
Configure the "identity" setting for the "IIS Application Pools service" to organizational standards. CC ID 09243 | System hardening through configuration management | Configuration | |
Configure the "worker process isolation" setting to organizational standards. CC ID 09244 | System hardening through configuration management | Configuration | |
Configure the "Recycle worker process (in minutes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09245 | System hardening through configuration management | Configuration | |
Configure the "Recycle worker process (number of requests)" setting for the "IIS Application Pool" to organizational standards. CC ID 09246 | System hardening through configuration management | Configuration | |
Configure the "Maximum virtual memory (in megabytes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09247 | System hardening through configuration management | Configuration | |
Configure the "Maximum used memory (in megabytes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09248 | System hardening through configuration management | Configuration | |
Configure the "Shutdown worker processes after being idle (time in minutes)" setting for the "IIS Application Pool" to organizational standards. CC ID 09249 | System hardening through configuration management | Configuration | |
Configure the "Limit the kernel request queue (number of requests)" setting for the "IIS Application Pool" to organizational standards. CC ID 09250 | System hardening through configuration management | Configuration | |
Configure the "Enable pinging" setting for the "IIS Application Pool" to organizational standards. CC ID 09251 | System hardening through configuration management | Configuration | |
Configure the "Ping worker process every (frequency in seconds)" setting for the "IIS Application Pool" to organizational standards. CC ID 09252 | System hardening through configuration management | Configuration | |
Configure the "Enable rapid-fail protection" setting for the "IIS Application Pool" to organizational standards. CC ID 09253 | System hardening through configuration management | Configuration | |
Configure the "Enable rapid-fail protection - Failures" setting for the "IIS Application Pool" to organizational standards. CC ID 09254 | System hardening through configuration management | Configuration | |
Configure the "Enable rapid-fail protection - Time Period" setting for the "IIS Application Pool" to organizational standards. CC ID 09255 | System hardening through configuration management | Configuration | |
Configure the "auditing" setting for the "MetaBase.xml" file to organizational standards. CC ID 09256 | System hardening through configuration management | Configuration | |
Configure Microsoft SQL Server to Organizational Standards. CC ID 08989 | System hardening through configuration management | Configuration | |
Configure the "allowing DDL statements to modify the application schema" permissions for the "Database application" to organizational standards. CC ID 09258 | System hardening through configuration management | Configuration | |
Configure the "encrypt custom and GOTS application source code" setting to organizational standards. CC ID 09259 | System hardening through configuration management | Configuration | |
Configure the "Access to DBMS software files and directories" setting to organizational standards. CC ID 09264 | System hardening through configuration management | Configuration | |
Configure the "Default demonstration and sample database objects and applications" setting to organizational standards. CC ID 09265 | System hardening through configuration management | Configuration | |
Configure the "auditing parameters" for "database auditing" to organizational standards. CC ID 09266 | System hardening through configuration management | Configuration | |
Configure the "DBMS login account password complexity requirements" setting to organizational standards. CC ID 09268 | System hardening through configuration management | Configuration | |
Configure the "Passwords for DBMS default accounts" setting to organizational standards. CC ID 09269 | System hardening through configuration management | Configuration | |
Configure the "Remote DBMS administration" setting to organizational standards. CC ID 09270 | System hardening through configuration management | Configuration | |
Configure the "C2 Audit records" setting to organizational standards. CC ID 09271 | System hardening through configuration management | Configuration | |
Configure the "SQL Mail XPs" setting to organizational standards. CC ID 09272 | System hardening through configuration management | Configuration | |
Configure the "SQL Server Service" setting to organizational standards. CC ID 09275 | System hardening through configuration management | Configuration | |
Configure the "Access extended stored procedure xp_cmdshell" setting to organizational standards. CC ID 09277 | System hardening through configuration management | Configuration | |
Configure the "xp_cmdshell" setting to organizational standards. CC ID 09278 | System hardening through configuration management | Configuration | |
Configure the "OLE Automation extended stored procedures" setting to organizational standards. CC ID 09279 | System hardening through configuration management | Configuration | |
Configure the "Access to registry extended stored procedures" setting to organizational standards. CC ID 09280 | System hardening through configuration management | Configuration | |
Configure the "Remote access" setting to organizational standards. CC ID 09281 | System hardening through configuration management | Configuration | |
Configure "Set time limit for active but idle Remote Desktop Services sessions" to organizational standards. CC ID 15382 | System hardening through configuration management | Configuration | |
Configure the "Always show desktop on connection" setting to organizational standards. CC ID 10753 | System hardening through configuration management | Configuration | |
Configure the "Automatic reconnection" setting to organizational standards. CC ID 10760 | System hardening through configuration management | Configuration | |
Configure the "keep-alive connection interval" setting to organizational standards. CC ID 10790 | System hardening through configuration management | Configuration | |
Configure the "RD Connection Broker farm name" setting to organizational standards. CC ID 10800 | System hardening through configuration management | Configuration | |
Configure the "RD Connection Broker server name" setting to organizational standards. CC ID 10801 | System hardening through configuration management | Configuration | |
Configure the "server authentication for client" setting for "Remote Desktop Connection Client" to organizational standards. CC ID 10817 | System hardening through configuration management | Configuration | |
Configure the "Do not use Remote Desktop Session Host server IP address when virtual IP address is not available" setting to organizational standards. CC ID 10938 | System hardening through configuration management | Configuration | |
Configure the "Enforce Removal of Remote Desktop Wallpaper" setting to organizational standards. CC ID 10957 | System hardening through configuration management | Configuration | |
Configure the "Hide previous versions list for remote files" setting to organizational standards. CC ID 10990 | System hardening through configuration management | Configuration | |
Configure the "Join RD Connection Broker" setting to organizational standards. CC ID 11003 | System hardening through configuration management | Configuration | |
Configure the "Limit number of connections" setting to organizational standards. CC ID 11011 | System hardening through configuration management | Configuration | |
Configure the "Optimize visual experience for Remote Desktop Services sessions" setting to organizational standards. CC ID 11058 | System hardening through configuration management | Configuration | |
Configure the "Prevent restoring remote previous versions" setting to organizational standards. CC ID 11089 | System hardening through configuration management | Configuration | |
Configure the "Require strict target SPN match on remote procedure calls" setting to organizational standards. CC ID 11136 | System hardening through configuration management | Configuration | |
Configure the "Require use of specific security layer for remote (RDP) connections" setting to organizational standards. CC ID 11137 | System hardening through configuration management | Configuration | |
Configure the "Restrict Remote Desktop Services users to a single Remote Desktop Services session" setting to organizational standards. CC ID 11142 | System hardening through configuration management | Configuration | |
Configure the "Select the network adapter to be used for Remote Desktop IP Virtualization" setting to organizational standards. CC ID 11164 | System hardening through configuration management | Configuration | |
Configure the "Set maximum wait time for the network if a user has a roaming user profile or remote home directory" setting to organizational standards. CC ID 11175 | System hardening through configuration management | Configuration | |
Configure the "Set path for Remote Desktop Services Roaming User Profile" setting to organizational standards. CC ID 11176 | System hardening through configuration management | Configuration | |
Configure the "Set Remote Desktop Services User Home Directory" setting to organizational standards. CC ID 11181 | System hardening through configuration management | Configuration | |
Configure the "Set rules for remote control of Remote Desktop Services user sessions" setting to organizational standards. CC ID 11183 | System hardening through configuration management | Configuration | |
Configure the "Set the Remote Desktop licensing mode" setting to organizational standards. CC ID 11188 | System hardening through configuration management | Configuration | |
Configure the "Set time limit for active Remote Desktop Services sessions" setting to organizational standards. CC ID 11194 | System hardening through configuration management | Configuration | |
Configure the "Set time limit for logoff of RemoteApp sessions" setting to organizational standards. CC ID 11195 | System hardening through configuration management | Configuration | |
Configure the "Specify maximum number of remote shells per user" setting to organizational standards. CC ID 11213 | System hardening through configuration management | Configuration | |
Configure the "Start a program on connection" setting to organizational standards. CC ID 11228 | System hardening through configuration management | Configuration | |
Configure the "Turn off desktop gadgets" setting to organizational standards. CC ID 11275 | System hardening through configuration management | Configuration | |
Configure the "Turn off legacy remote shutdown interface" setting to organizational standards. CC ID 11285 | System hardening through configuration management | Configuration | |
Configure the "Turn Off user-installed desktop gadgets" setting to organizational standards. CC ID 11322 | System hardening through configuration management | Configuration | |
Configure the "Turn on Remote Desktop IP Virtualization" setting to organizational standards. CC ID 11348 | System hardening through configuration management | Configuration | |
Configure the "Use RD Connection Broker load balancing" setting to organizational standards. CC ID 11364 | System hardening through configuration management | Configuration | |
Configure the "Use the specified Remote Desktop license servers" setting to organizational standards. CC ID 11366 | System hardening through configuration management | Configuration | |
Configure the "Wait for remote user profile" setting to organizational standards. CC ID 11370 | System hardening through configuration management | Configuration | |
Configure the "SQL Server authentication" setting to organizational standards. CC ID 09282 | System hardening through configuration management | Configuration | |
Configure the "Access to CmdExec and ActiveScripting jobs" setting to organizational standards. CC ID 09283 | System hardening through configuration management | Configuration | |
Configure the "Error log retention" setting to organizational standards. CC ID 09284 | System hardening through configuration management | Configuration | |
Configure the "Trace rollover" setting to organizational standards. CC ID 09285 | System hardening through configuration management | Configuration | |
Configure the "Named Pipes network protocol" setting to organizational standards. CC ID 09286 | System hardening through configuration management | Configuration | |
Configure the "SQL Server event forwarding" setting to organizational standards. CC ID 09287 | System hardening through configuration management | Configuration | |
Configure the "Access to manage the database master key" setting to organizational standards. CC ID 09288 | System hardening through configuration management | Configuration | |
Configure the "Encryption of the asymmetric keys" setting to organizational standards. CC ID 09290 | System hardening through configuration management | Configuration | |
Configure the "audit unauthorized access to the asymmetric keys" setting to organizational standards. CC ID 09291 | System hardening through configuration management | Configuration | |
Configure the "Database Master key encryption password" setting to organizational standards. CC ID 09292 | System hardening through configuration management | Configuration | |
Configure the "encrypt Database Master Key" setting to organizational standards. CC ID 09293 | System hardening through configuration management | Configuration | |
Configure the "store the database master key password" setting to organizational standards. CC ID 09294 | System hardening through configuration management | Configuration | |
Configure the "protect symmetric keys" setting to organizational standards. CC ID 09295 | System hardening through configuration management | Configuration | |
Configure the "clear residual data from memory, data objects or files, or other storage locations" setting to organizational standards. CC ID 09296 | System hardening through configuration management | Configuration | |
Configure the "DBMS account passwords expiration" setting to organizational standards. CC ID 09297 | System hardening through configuration management | Configuration | |
Configure the "audit attempts to bypass access controls" setting to organizational standards. CC ID 09310 | System hardening through configuration management | Configuration | |
Configure the "default audit trace" setting to organizational standards. CC ID 09311 | System hardening through configuration management | Configuration | |
Configure the "Audit records contents" setting to organizational standards. CC ID 09312 | System hardening through configuration management | Configuration | |
Configure the "port" setting for "Sql Server Analysis Services" to organizational standards. CC ID 09313 | System hardening through configuration management | Configuration | |
Configure the "port" setting for the "DBMS" to organizational standards. CC ID 09314 | System hardening through configuration management | Configuration | |
Configure the "Fixed server roll membership" setting to organizational standards. CC ID 09315 | System hardening through configuration management | Configuration | |
Configure the "Database Mail XPs" setting to organizational standards. CC ID 09316 | System hardening through configuration management | Configuration | |
Configure the "SQL Server Agent Email" setting to organizational standards. CC ID 09317 | System hardening through configuration management | Configuration | |
Configure the "scan for startup procs" setting to organizational standards. CC ID 09331 | System hardening through configuration management | Configuration | |
Configure the "Access to SQL Server Agent CmdExec" setting to organizational standards. CC ID 09332 | System hardening through configuration management | Configuration | |
Configure the "Access to ActiveScripting jobs" setting to organizational standards. CC ID 09333 | System hardening through configuration management | Configuration | |
Configure the "SQL Server Agent proxies" setting to organizational standards. CC ID 09334 | System hardening through configuration management | Configuration | |
Configure the "Replication snapshot folders" setting to organizational standards. CC ID 09335 | System hardening through configuration management | Configuration | |
Configure the "Ad hoc data mining queries configuration" setting to organizational standards. CC ID 09336 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services Anonymous Connections" setting to organizational standards. CC ID 09337 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services Links to Objects" setting to organizational standards. CC ID 09338 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services Links From Objects" setting to organizational standards. CC ID 09339 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services user-defined COM functions" setting to organizational standards. CC ID 09340 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services Required Protection Levels" setting to organizational standards. CC ID 09341 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services Security Package List" setting to organizational standards. CC ID 09342 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services server role" setting to organizational standards. CC ID 09343 | System hardening through configuration management | Configuration | |
Configure the "Analysis Services database roles" setting to organizational standards. CC ID 09344 | System hardening through configuration management | Configuration | |
Configure the "Reporting Services Web service requests and HTTP" setting to organizational standards. CC ID 09345 | System hardening through configuration management | Configuration | |
Configure the "Reporting Services scheduled events and report delivery" setting to organizational standards. CC ID 09346 | System hardening through configuration management | Configuration | |
Configure the "Command Language Runtime objects" setting to organizational standards. CC ID 09348 | System hardening through configuration management | Configuration | |
Configure the "XML Web Services endpoints" setting to organizational standards. CC ID 09349 | System hardening through configuration management | Configuration | |
Configure the "db_owner role members" setting to organizational standards. CC ID 09350 | System hardening through configuration management | Configuration | |
Configure the "Web Assistant procedures configuration" setting to organizational standards. CC ID 09351 | System hardening through configuration management | Configuration | |
Configure the "Disallow adhoc access" setting for "linked servers" to organizational standards. CC ID 09353 | System hardening through configuration management | Configuration | |
Configure the "Ad Hoc distributed queries" setting to organizational standards. CC ID 09354 | System hardening through configuration management | Configuration | |
Configure the "Access to Analysis Services data sources" setting to organizational standards. CC ID 09355 | System hardening through configuration management | Configuration | |
Configure the "Database TRUSTWORTHY status" setting to organizational standards. CC ID 09356 | System hardening through configuration management | Configuration | |
Configure the "Agent XPs" setting to organizational standards. CC ID 09357 | System hardening through configuration management | Configuration | |
Configure the "SMO and DMO XPs" setting to organizational standards. CC ID 09358 | System hardening through configuration management | Configuration | |
Configure Oracle WebLogic Server to Organizational Standards. CC ID 08990 | System hardening through configuration management | Configuration | |
Configure the "Complete Message Timeout" setting to organizational standards. CC ID 09818 | System hardening through configuration management | Configuration | |
Configure the "FIPS- compliant cryptographic module" setting to organizational standards. CC ID 09819 | System hardening through configuration management | Configuration | |
Configure the "Allow Unencrypted Null Cipher" setting to organizational standards. CC ID 09820 | System hardening through configuration management | Configuration | |
Configure the "Maximum Message Size" setting to organizational standards. CC ID 09821 | System hardening through configuration management | Configuration | |
Configure the "Security Interoperability Mode" setting to organizational standards. CC ID 09822 | System hardening through configuration management | Configuration | |
Configure the "Severity field" setting to organizational standards. CC ID 09824 | System hardening through configuration management | Configuration | |
Configure the "servlet.HttpServletResponse" setting for "Active Context Handler" to organizational standards. CC ID 09825 | System hardening through configuration management | Configuration | |
Configure the "wli.Message" setting for "Active Context Handler" to organizational standards. CC ID 09826 | System hardening through configuration management | Configuration | |
Configure the "channel.Port" setting for "Active Context Handler" to organizational standards. CC ID 09827 | System hardening through configuration management | Configuration | |
Configure the "channel.PublicPort" setting for "Active Context Handler" to organizational standards. CC ID 09828 | System hardening through configuration management | Configuration | |
Configure the "channel.RemotePort" setting for "Active Context Handler" to organizational standards. CC ID 09829 | System hardening through configuration management | Configuration | |
Configure the "channel.Protocol" setting for "Active Context Handler" to organizational standards. CC ID 09830 | System hardening through configuration management | Configuration | |
Configure the "channel.Address" setting for "Active Context Handler" to organizational standards. CC ID 09831 | System hardening through configuration management | Configuration | |
Configure the "channel.PublicAddress" setting for "Active Context Handler" to organizational standards. CC ID 09832 | System hardening through configuration management | Configuration | |
Configure the "channel.RemoteAddress" setting for "Active Context Handler" to organizational standards. CC ID 09833 | System hardening through configuration management | Configuration | |
Configure the "channel.ChannelName" setting for "Active Context Handler" to organizational standards. CC ID 09834 | System hardening through configuration management | Configuration | |
Configure the "channel.Secure" setting for "Active Context Handler" to organizational standards. CC ID 09835 | System hardening through configuration management | Configuration | |
Configure the "ejb20.Parameter" setting for "Active Context Handler" to organizational standards CC ID 09836 | System hardening through configuration management | Configuration | |
Configure the "wsee.SOAPmessage" setting for "Active Context Handler" to organizational standards. CC ID 09837 | System hardening through configuration management | Configuration | |
Configure the "entitlement.EAuxilaryID" setting for "Active Context Handler" to organizational standards. CC ID 09838 | System hardening through configuration management | Configuration | |
Configure the "security.ChainPrevalidatedBySSL" setting for "Active Context Handler" to organizational standards. CC ID 09839 | System hardening through configuration management | Configuration | |
Configure the "xml.SecurityToken" setting for "Active Context Handler" to organizational standards. CC ID 09840 | System hardening through configuration management | Configuration | |
Configure the "webservice.Integrity" setting for "Active Context Handler" to organizational standards. CC ID 09841 | System hardening through configuration management | Configuration | |
Configure the "saml.SSLClientCertificateChain" setting for "Active Context Handler" to organizational standards. CC ID 09842 | System hardening through configuration management | Configuration | |
Configure the "saml.MessageSignerCerficate" setting for "Active Context Handler" to organizational standards. CC ID 09843 | System hardening through configuration management | Configuration | |
Configure the "saml.subject.ConfirmationMethod" setting for "Active Context Handler" to organizational standards. CC ID 09844 | System hardening through configuration management | Configuration | |
Configure the "saml.subject.dom.KeyInfo" setting for "Active Context Handler" to organizational standards. CC ID 09845 | System hardening through configuration management | Configuration | |
Configure the "jmx.ObjectName" setting for "Active Context Handler" to organizational standards. CC ID 09846 | System hardening through configuration management | Configuration | |
Configure the "jmx.ShortName" setting for "Active Context Handler" to organizational standards. CC ID 09847 | System hardening through configuration management | Configuration | |
Configure the "jmx.Parameters" setting for "Active Context Handler" to organizational standards. CC ID 09848 | System hardening through configuration management | Configuration | |
Configure the "jmx.Signature" setting for "Active Context Handler" to organizational standards. CC ID 09849 | System hardening through configuration management | Configuration | |
Configure the "jmx.AuditProtectedArgInfo" setting for "Active Context Handler" to organizational standards. CC ID 09850 | System hardening through configuration management | Configuration | |
Configure the "jmx.OldAttributeValue" setting for "Active Context Handler" to organizational standards. CC ID 09851 | System hardening through configuration management | Configuration | |
Configure the "Reject if Password Contains the User Name" setting to organizational standards. CC ID 09852 | System hardening through configuration management | Configuration | |
Configure the "Reject if Password Contains the User Name Reversed" setting to organizational standards. CC ID 09853 | System hardening through configuration management | Configuration | |
Configure the "maximum instances of any character field" setting to organizational standards. CC ID 09854 | System hardening through configuration management | Configuration | |
Configure the "maximum consecutive characters field" setting to organizational standards. CC ID 09855 | System hardening through configuration management | Configuration | |
Configure the "minimum number of alphabetic characters field" setting to organizational standards. CC ID 09856 | System hardening through configuration management | Configuration | |
Configure the "minimum number of numeric characters field" setting to organizational standards. CC ID 09857 | System hardening through configuration management | Configuration | |
Configure the "minimum number of non-alphanumeric characters field" setting to organizational standards. CC ID 09858 | System hardening through configuration management | Configuration | |
Configure the "Lockout Threshold" setting in the "Security Realm" to organizational standards. CC ID 09861 | System hardening through configuration management | Configuration | |
Configure the "Lockout Duration" setting in the "Security Realm" to organizational standards. CC ID 09862 | System hardening through configuration management | Configuration | |
Configure the "Lockout Reset Duration" setting in the "Security Realm" to organizational standards. CC ID 09863 | System hardening through configuration management | Configuration | |
Configure the "Require Unanimous Permit" setting to organizational standards. CC ID 09864 | System hardening through configuration management | Configuration | |
Configure the "Host Name Verification" setting on the "Administration Server" to organizational standards. CC ID 09865 | System hardening through configuration management | Configuration | |
Configure the "Minimum Number of Non-Alphabetic Characters" setting to organizational standards. CC ID 09866 | System hardening through configuration management | Configuration | |
Configure the "SSL Enabled" setting for "LDAP Server connections" to organizational standards. CC ID 09867 | System hardening through configuration management | Configuration | |
Configure the "Host Name Verification" setting to organizational standards. CC ID 09868 | System hardening through configuration management | Configuration | |
Configure the "Domain Credentials" setting to organizational standards. CC ID 09869 | System hardening through configuration management | Configuration | |
Configure the "Configuration Archive Enabled" setting to organizational standards. CC ID 09870 | System hardening through configuration management | Configuration | |
Configure the "Archive Configuration Count" setting to organizational standards. CC ID 09871 | System hardening through configuration management | Configuration | |
Configure the "Default Administrator field" setting to organizational standards. CC ID 09872 | System hardening through configuration management | Configuration | |
Configure the "SSL Listen Port" setting to organizational standards. CC ID 09873 | System hardening through configuration management | Configuration | |
Configure the "Administration Console Session Timeout field" setting to organizational standards. CC ID 09874 | System hardening through configuration management | Configuration | |
Configure the "Production Mode" setting to organizational standards. CC ID 09875 | System hardening through configuration management | Configuration | |
Configure the "WebLogic Auditing provider" setting to organizational standards. CC ID 09876 | System hardening through configuration management | Configuration | |
Configure the "Invocation Timeout Seconds" setting to organizational standards. CC ID 09877 | System hardening through configuration management | Configuration | |
Configure the "Anonymous Admin Lookup Enabled" setting to organizational standards. CC ID 09878 | System hardening through configuration management | Configuration | |
Configure the "Web App Files Case Insensitive" setting to organizational standards. CC ID 09879 | System hardening through configuration management | Configuration | |
Configure the "Enable Administration Port" setting to organizational standards. CC ID 09880 | System hardening through configuration management | Configuration | |
Configure the "SSL Rejection Logging Enabled" setting to organizational standards. CC ID 09881 | System hardening through configuration management | Configuration | |
Configure the "Export Key Lifespan" setting to organizational standards. CC ID 09882 | System hardening through configuration management | Configuration | |
Configure the "Client Cert Proxy Enabled" setting for the "Administration Server" to organizational standards. CC ID 09883 | System hardening through configuration management | Configuration | |
Configure the "Client Cert Proxy Enabled" setting for the "managed server" to organizational standards. CC ID 09884 | System hardening through configuration management | Configuration | |
Configure the "Frontend Host" setting to organizational standards. CC ID 09885 | System hardening through configuration management | Configuration | |
Configure the "Check Roles and Policies" setting to organizational standards. CC ID 09886 | System hardening through configuration management | Configuration | |
Configure the "Security Model Default" setting to organizational standards. CC ID 09887 | System hardening through configuration management | Configuration | |
Configure the "When Deploying Web Applications or EJBS" setting to organizational standards. CC ID 09888 | System hardening through configuration management | Configuration | |
Configure the "Configuration Audit Type field" setting to organizational standards. CC ID 09889 | System hardening through configuration management | Configuration | |
Configure the "EditMBeanServerEnabled" setting for the "Administration Server" to organizational standards. CC ID 09890 | System hardening through configuration management | Configuration | |
Configure the "two-way SSL" setting to organizational standards. CC ID 09891 | System hardening through configuration management | Configuration | |
Configure the "Embedded LDAP Timeout" setting to organizational standards. CC ID 09892 | System hardening through configuration management | Configuration | |
Configure the "Anonymous Bind Allowed" setting to organizational standards. CC ID 09893 | System hardening through configuration management | Configuration | |
Configure the "Post Timeout field" setting to organizational standards. CC ID 09894 | System hardening through configuration management | Configuration | |
Configure the "HTTP Duration" setting to organizational standards. CC ID 09895 | System hardening through configuration management | Configuration | |
Configure the "HTTPS Duration" setting to organizational standards. CC ID 09896 | System hardening through configuration management | Configuration | |
Configure the "HTTP Maximum Message Size" setting to organizational standards. CC ID 09897 | System hardening through configuration management | Configuration | |
Configure the "Connection Filter" setting for the "managed server" to organizational standards. CC ID 09898 | System hardening through configuration management | Configuration | |
Configure the "connection filter" setting to organizational standards. CC ID 09899 | System hardening through configuration management | Configuration | |
Configure the "Client Cert Proxy Enabled" setting to organizational standards. CC ID 09904 | System hardening through configuration management | Configuration | |
Configure the "Auth Cookie Enabled" setting to organizational standards. CC ID 09905 | System hardening through configuration management | Configuration | |
Configure the "Maximum Open Sockets" setting on the "Administration server" to organizational standards. CC ID 09906 | System hardening through configuration management | Configuration | |
Configure the "Complete Message Timeout" setting for "each custom channel" to organizational standards. CC ID 09908 | System hardening through configuration management | Configuration | |
Configure the "Idle Connection Timeout" setting for "each custom channel" to organizational standards. CC ID 09909 | System hardening through configuration management | Configuration | |
Configure the "Maximum Message Size" setting for "each custom channel" to organizational standards. CC ID 09910 | System hardening through configuration management | Configuration | |
Configure the "Node Manager Listen Address" setting to organizational standards. CC ID 09911 | System hardening through configuration management | Configuration | |
Configure the "Node Manager Type" setting to organizational standards. CC ID 09912 | System hardening through configuration management | Configuration | |
Configure the "Policy Selection Preference" setting to organizational standards. CC ID 09913 | System hardening through configuration management | Configuration | |
Configure the "Maximum Open Sockets" setting for "all Managed Servers" to organizational standards. CC ID 09914 | System hardening through configuration management | Configuration | |
Configure the "Enforce Constraints" setting for "digital certificates" to organizational standards. CC ID 09915 | System hardening through configuration management | Configuration | |
Configure the "Keystores field" setting to organizational standards. CC ID 09916 | System hardening through configuration management | Configuration | |
Configure the "HTTP Access Log File" setting to organizational standards. CC ID 09917 | System hardening through configuration management | Configuration | |
Configure the "Custom Hostname Verifier field" setting to organizational standards. CC ID 09918 | System hardening through configuration management | Configuration | |
Configure the "SSL port enabled" setting to organizational standards. CC ID 09919 | System hardening through configuration management | Configuration | |
Configure the "Listen Port Enabled" setting to organizational standards. CC ID 09920 | System hardening through configuration management | Configuration | |
Configure security and protection software according to Organizational Standards. CC ID 11917 | System hardening through configuration management | Configuration | |
Configure security and protection software to automatically run at startup. CC ID 12443 | System hardening through configuration management | Configuration | |
Configure security and protection software to enable automatic updates. CC ID 11945 | System hardening through configuration management | Configuration | |
Configure security and protection software to check e-mail messages. CC ID 00578 | System hardening through configuration management | Testing | |
Configure security and protection software to check e-mail attachments. CC ID 11860 | System hardening through configuration management | Configuration | |
Configure Windows Defender Remote Credential Guard to organizational standards. CC ID 16515 | System hardening through configuration management | Configuration | |
Configure Windows Defender Credential Guard to organizational standards. CC ID 16514 | System hardening through configuration management | Configuration | |
Configure dedicated systems used for system management according to organizational standards. CC ID 12132 | System hardening through configuration management | Configuration | |
Configure dedicated systems used for system management to prohibit them from composing documents. CC ID 12161 | System hardening through configuration management | Configuration | |
Configure dedicated systems used for system management so they are prohibited from accessing e-mail. CC ID 12160 | System hardening through configuration management | Configuration | |
Configure Application Programming Interfaces in accordance with organizational standards. CC ID 12170 | System hardening through configuration management | Configuration | |
Configure Application Programming Interfaces to enforce authentication. CC ID 12172 | System hardening through configuration management | Configuration | |
Configure Application Programming Interfaces to employ strong cryptography. CC ID 12171 | System hardening through configuration management | Configuration | |
Configure the Domain Name System in accordance with organizational standards. CC ID 12202 | System hardening through configuration management | Configuration | |
Configure the Domain Name System query logging to organizational standards. CC ID 12210 | System hardening through configuration management | Configuration | |
Configure the secure name/address resolution service (recursive or caching resolver). CC ID 01625 | System hardening through configuration management | Configuration | |
Configure the secure name/address resolution service (authoritative source). CC ID 01624 | System hardening through configuration management | Configuration | |
Configure payment systems in accordance with organizational standards. CC ID 12217 | System hardening through configuration management | Configuration | |
Configure payment systems to disable storing transactions when offline. CC ID 12220 | System hardening through configuration management | Configuration | |
Configure payment systems to disable authorizing transactions when offline. CC ID 12219 | System hardening through configuration management | Configuration | |
Configure File Integrity Monitoring Software to Organizational Standards. CC ID 11923 | System hardening through configuration management | Configuration | |
Configure the file integrity monitoring software to perform critical file comparisons, as necessary. CC ID 11924 | System hardening through configuration management | Configuration | |
Configure Bluetooth settings according to organizational standards. CC ID 12422 | System hardening through configuration management | Configuration | |
Unpair Bluetooth devices when the pairing is no longer required. CC ID 15232 | System hardening through configuration management | Configuration | |
Use authorized versions of Bluetooth to pair Bluetooth devices. CC ID 15231 | System hardening through configuration management | Configuration | |
Refrain from using unit keys on Bluetooth devices. CC ID 12541 | System hardening through configuration management | Configuration | |
Configure link keys to be based on combination keys in Bluetooth devices. CC ID 12539 | System hardening through configuration management | Configuration | |
Refrain from using the "Just Works" model of Secure Simple Pairing in Bluetooth settings. CC ID 12538 | System hardening through configuration management | Configuration | |
Disable all Bluetooth profiles other than the Serial Port Profile. CC ID 12536 | System hardening through configuration management | Configuration | |
Lock Bluetooth profiles to prevent them being altered by end users. CC ID 12535 | System hardening through configuration management | Configuration | |
Configure Bluetooth to refrain from allowing multiple profiles of Bluetooth stacks. CC ID 12433 | System hardening through configuration management | Configuration | |
Remove backup files after initializing and hardening is complete. CC ID 01602 | System hardening through configuration management | Configuration | |
Reboot the system after initial systems hardening is complete and before certification. CC ID 01603 | System hardening through configuration management | Systems Design, Build, and Implementation | |
Configure systems to protect against unauthorized data mining. CC ID 10095 | System hardening through configuration management | Configuration | |
Implement safeguards to prevent unauthorized code execution. CC ID 10686 | System hardening through configuration management | Configuration | |
Configure network switches to organizational standards. CC ID 12120 | System hardening through configuration management | Configuration | |
Enable Virtual Local Area Networks on network switches, as necessary. CC ID 12129 | System hardening through configuration management | Configuration | |
Establish, implement, and maintain records management policies. CC ID 00903 | Records management | Establish/Maintain Documentation | |
Determine how long to keep records and logs before disposing them. CC ID 11661 | Records management | Process or Activity | |
Retain records in accordance with applicable requirements. CC ID 00968 [{incident analysis} Review whether management has the following: Log retention policies that meet incident response and analysis needs. App A Objective 6.35.a] | Records management | Records Management | |
Establish, implement, and maintain storage media disposition and destruction procedures. CC ID 11657 [Review whether the institution's life cycle management includes the following: Outlining procedures for the secure destruction or wiping of hard drives being returned to vendors or donated to prevent the inadvertent disclosure of sensitive information. App A Objective 6.16.e] | Records management | Establish/Maintain Documentation | |
Supervise media destruction in accordance with organizational standards. CC ID 16456 | Records management | Business Processes | |
Sanitize electronic storage media in accordance with organizational standards. CC ID 16464 | Records management | Data and Information Management | |
Sanitize all electronic storage media before disposing a system or redeploying a system. CC ID 01643 | Records management | Data and Information Management | |
Degauss as a method of sanitizing electronic storage media. CC ID 00973 | Records management | Records Management | |
Manage waste materials in accordance with the storage media disposition and destruction procedures. CC ID 16485 | Records management | Process or Activity | |
Use approved media sanitization equipment for destruction. CC ID 16459 | Records management | Business Processes | |
Define each system's disposition requirements for records and logs. CC ID 11651 | Records management | Process or Activity | |
Establish, implement, and maintain records disposition procedures. CC ID 00971 [Review whether management does the following: Has appropriate disposal procedures for both paper-based and electronic information. App A Objective 6.18.e {information flow} Management should control and protect access to and transmission of information to avoid loss or damage and do the following: - Establish and supervise compliance with policies for storing and handling information, including storing data on mobile devices and cloud services. - Define and implement appropriate controls over the electronic transmission of information. - Facilitate safe and secure disposal of sensitive information. - Secure physical media in transit. II.C.13 Control of Information] | Records management | Establish/Maintain Documentation | |
Manage the disposition status for all records. CC ID 00972 | Records management | Records Management | |
Use a second person to confirm and sign-off that manually deleted data was deleted. CC ID 12313 | Records management | Data and Information Management | |
Remove and/or destroy records according to the records' retention event and retention period schedule. CC ID 06621 | Records management | Records Management | |
Place printed records awaiting destruction into secure containers. CC ID 12464 | Records management | Physical and Environmental Protection | |
Destroy printed records so they cannot be reconstructed. CC ID 11779 | Records management | Physical and Environmental Protection | |
Automate a programmatic process to remove stored data and records that exceed retention requirements. CC ID 06082 | Records management | Data and Information Management | |
Include methods to identify records that meet or exceed the record's retention event in the records disposition procedures. CC ID 11962 | Records management | Establish/Maintain Documentation | |
Maintain disposal records or redeployment records. CC ID 01644 | Records management | Establish/Maintain Documentation | |
Include the name of the signing officer in the disposal record. CC ID 15710 | Records management | Establish/Maintain Documentation | |
Establish, implement, and maintain records management procedures. CC ID 11619 | Records management | Establish/Maintain Documentation | |
Establish, implement, and maintain data processing integrity controls. CC ID 00923 [{data validation control} Review whether applications in use provide the following capabilities: Use validation controls for data entry and data processing. App A Objective 6.27.e] | Records management | Establish Roles | |
Sanitize user input in accordance with organizational standards. CC ID 16856 | Records management | Process or Activity | |
Establish, implement, and maintain Automated Data Processing validation checks and editing checks. CC ID 00924 | Records management | Data and Information Management | |
Establish, implement, and maintain Automated Data Processing error handling procedures. CC ID 00925 | Records management | Establish/Maintain Documentation | |
Establish, implement, and maintain Automated Data Processing error handling reporting. CC ID 11659 | Records management | Establish/Maintain Documentation | |
Establish, implement, and maintain a System Development Life Cycle program. CC ID 11823 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Include information security throughout the system development life cycle. CC ID 12042 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Protect confidential information during the system development life cycle program. CC ID 13479 | Systems design, build, and implementation | Data and Information Management | |
Initiate the System Development Life Cycle planning phase. CC ID 06266 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Establish, implement, and maintain a system design project management framework. CC ID 00990 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Establish, implement, and maintain project management standards. CC ID 00992 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Initiate the System Development Life Cycle development phase or System Development Life Cycle build phase. CC ID 06267 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Develop systems in accordance with the system design specifications and system design standards. CC ID 01094 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Develop new products based on best practices. CC ID 01095 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Implement security controls when developing systems. CC ID 06270 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Include restricted data encryption and restricted information encryption in the security controls. CC ID 01083 | Systems design, build, and implementation | Technical Security | |
Analyze and minimize attack surfaces when developing systems. CC ID 06828 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Require successful authentication before granting access to system functionality via network interfaces. CC ID 14926 | Systems design, build, and implementation | Technical Security | |
Implement a hardware security module, as necessary. CC ID 12222 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Require dual authentication when switching out of PCI mode in the hardware security module. CC ID 12274 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Include an indicator to designate when the hardware security module is in PCI mode. CC ID 12273 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Design the random number generator to generate random numbers that are unpredictable. CC ID 12255 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Design the hardware security module to enforce the separation between applications. CC ID 12254 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Protect sensitive data when transiting sensitive services in the hardware security module. CC ID 12253 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Design the hardware security module to automatically clear its internal buffers of sensitive information prior to reuse of the buffer. CC ID 12233 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Design the hardware security module to automatically clear its internal buffers of sensitive information after it recovers from an error condition. CC ID 12252 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Design the hardware security module to automatically clear its internal buffers of sensitive information when it has timed out. CC ID 12251 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Design the hardware security module to erase sensitive data when compromised. CC ID 12275 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Restrict key-usage information for cryptographic keys in the hardware security module. CC ID 12232 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Prevent cryptographic keys in the hardware security module from making unauthorized changes to data. CC ID 12231 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Include in the system documentation methodologies for authenticating the hardware security module. CC ID 12258 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Protect sensitive information within the hardware security module from unauthorized changes. CC ID 12225 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Prohibit sensitive functions from working outside of protected areas of the hardware security module. CC ID 12224 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Establish, implement, and maintain an acceptable use policy for the hardware security module. CC ID 12247 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include roles and responsibilities in the acceptable use policy for the hardware security module. CC ID 12264 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include the environmental requirements in the acceptable use policy for the hardware security module. CC ID 12263 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include device identification in the acceptable use policy for the hardware security module. CC ID 12262 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include device functionality in the acceptable use policy for the hardware security module. CC ID 12261 [{network device configuration} Determine whether management does the following: Verifies network devices are properly configured and function appropriately within the environment App A Objective 6.11.l] | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include administrative responsibilities in the acceptable use policy for the hardware security module. CC ID 12260 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Install secret information into the hardware security module during manufacturing. CC ID 12249 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Install secret information into the hardware security module so that it can only be verified by the initial-key-loading facility. CC ID 12272 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Install secret information under dual control into the hardware security module. CC ID 12257 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Establish, implement, and maintain session security coding standards. CC ID 04584 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Establish and maintain a cryptographic architecture document. CC ID 12476 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include the algorithms used in the cryptographic architecture document. CC ID 12483 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include an inventory of all protected areas in the cryptographic architecture document. CC ID 12486 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include a description of the key usage for each key in the cryptographic architecture document. CC ID 12484 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include descriptions of all cryptographic keys in the cryptographic architecture document. CC ID 12487 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include descriptions of the cryptographic key strength of all cryptographic keys in the cryptographic architecture document. CC ID 12488 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include each cryptographic key's expiration date in the cryptographic architecture document. CC ID 12489 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include the protocols used in the cryptographic architecture document. CC ID 12485 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Implement software development version controls. CC ID 01098 [Determine whether management does the following: Maintains strict version control of all software updates. App A Objective 6.11.j] | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Develop new products based on secure coding techniques. CC ID 11733 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Establish and maintain a coding manual for secure coding techniques. CC ID 11863 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Control user account management through secure coding techniques in source code. CC ID 11909 | Systems design, build, and implementation | Technical Security | |
Restrict direct access of databases to the database administrator through secure coding techniques in source code. CC ID 11933 [Management should implement effective controls for databases and restrict access appropriately. II.C.18 Database Security Management should implement effective controls for databases and restrict access appropriately. II.C.18 Database Security {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the yle="background-color:#F0BBBC;" class="term_primary-noun">sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts access and applies the rule of least privilege in assigning authorizations. App A Objective 6.29 {be commensurate with} For database security, determine whether management implemented or enabled controls commensurate with the sensitivity of the data stored in or accessed by the database(s). Determine whether management appropriately restricts und-color:#F0BBBC;" class="term_primary-noun">access and applies the rule of least privilege in assigning authorizations. App A Objective 6.29] | Systems design, build, and implementation | Technical Security | |
Establish and maintain the overall system development project management roles and responsibilities. CC ID 00991 | Systems design, build, and implementation | Establish Roles | |
Assign the role of information security management as a part of developing systems. CC ID 06823 [Determine whether management uses applications that were developed by following secure development practices and that meet a prudent level of security. Determine whether management develops security control requirements for applications, whether they are developed in-house or externally. Determine whether information security personnel are involved in monitoring the application development process to verify secure development practices. Review whether applications in use provide the following capabilities: App A Objective 6.27 Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security Management should use applications that have been developed following secure development practices and that meet a prudent level of security. Management should develop security control requirements for all applications, whether the institution acquires or develops them. Information security personnel should be involved in monitoring the application development process to verify that secure development practices are followed, security controls are implemented, and information security needs are met. II.C.17 Application Security] | Systems design, build, and implementation | Establish Roles | |
Establish, implement, and maintain system testing procedures. CC ID 11744 [Determine whether management does the following: Develops test scripts and implementation plans. App A Objective 6.11.f] | Systems design, build, and implementation | Establish/Maintain Documentation | |
Protect test data in the development environment. CC ID 12014 [{test data} Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality of test plans and data. App A Objective 10.2.e] | Systems design, build, and implementation | Technical Security | |
Control the test data used in the development environment. CC ID 12013 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Select the test data carefully. CC ID 12011 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Test security functionality during the development process. CC ID 12015 | Systems design, build, and implementation | Testing | |
Include system performance in the scope of system testing. CC ID 12624 | Systems design, build, and implementation | Process or Activity | |
Include security controls in the scope of system testing. CC ID 12623 | Systems design, build, and implementation | Process or Activity | |
Include business logic in the scope of system testing. CC ID 12622 | Systems design, build, and implementation | Process or Activity | |
Assign the review of custom code changes to individuals other than the code author. CC ID 06291 | Systems design, build, and implementation | Establish Roles | |
Evaluate and document all known code anomalies and code deficiencies. CC ID 06611 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Disseminate and communicate the system testing procedures to interested personnel and affected parties. CC ID 15471 | Systems design, build, and implementation | Communicate | |
Establish, implement, and maintain poor quality material removal procedures. CC ID 06214 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Establish, implement, and maintain a system testing program for all system development projects. CC ID 01101 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Initiate the System Development Life Cycle implementation phase. CC ID 06268 | Systems design, build, and implementation | Systems Design, Build, and Implementation | |
Establish, implement, and maintain a system implementation standard. CC ID 01111 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Establish, implement, and maintain an implementation plan. CC ID 01114 [Determine whether management does the following: Develops test scripts and implementation plans. App A Objective 6.11.f] | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include an implementation schedule in the implementation plan. CC ID 16124 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include the allocation of resources in the implementation plan. CC ID 16122 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Include roles and responsibilities in the implementation plan. CC ID 16121 | Systems design, build, and implementation | Establish/Maintain Documentation | |
Integrate additional security controls for newly implemented systems into interconnected systems, as necessary. CC ID 06272 [{integrate} Determine whether management responsibilities are appropriate and include the following: Integration of security controls throughout the institution. App A Objective 2.5.i] | Systems design, build, and implementation | Technical Security | |
Establish, implement, and maintain a product upgrade program. CC ID 12216 [{internal user} Interview management and review responses to pre-examination information requests to identify changes to technology infrastructure or new products and services that might increase the institution's risk. Consider the following: Products or services delivered to either internal or external users. App A Objective 1.3.a] | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Establish, implement, and maintain product update procedures. CC ID 12218 [Determine whether management has a process to update and patch operating systems, network devices, and software applications, including internally developed software provided to customers, for newly discovered vulnerabilities. Review whether patch management processes include the following: App A Objective 6.15] | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Establish, implement, and maintain payment and settlement functions for selling products and services. CC ID 13538 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Establish, implement, and maintain an electronic commerce program. CC ID 08617 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Establish, implement, and maintain payment transaction security measures. CC ID 13088 [Review whether management does the following: Develops and maintains policies and procedures to securely offer and ensure the resilience of remote financial services (e.g., using appropriate authentication, layered security controls, and fraud detection monitoring). (For additional questions, refer to the "Mobile Financial Services" examination procedures.) App A Objective 6.25.a Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services Management should do the following: - Develop and maintain policies and procedures to securely offer and strengthen the resilience of remote financial services, if the institution offers such services. - Plan for actions that adversely affect the availability of remote banking services to customers. - Coordinate appropriate responses with the institution's ISPs and third-party service providers. - Regularly test the institution's response plans. II.C.16 Customer Remote Access to Financial Services] | Acquisition or sale of facilities, technology, and services | Technical Security | |
Establish, implement, and maintain a list of approved third parties for payment transactions. CC ID 16349 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Restrict transaction activities, as necessary. CC ID 16334 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Notify affected parties prior to initiating high-risk funds transfer transactions. CC ID 13687 | Acquisition or sale of facilities, technology, and services | Communicate | |
Reset transaction limits to zero after no activity within N* time period, as necessary. CC ID 13683 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Preset transaction limits for high-risk funds transfers, as necessary. CC ID 13682 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Implement dual authorization for high-risk funds transfers, as necessary. CC ID 13671 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Establish, implement, and maintain a mobile payment acceptance security program. CC ID 12182 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Obtain cardholder authorization prior to completing payment transactions. CC ID 13108 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Encrypt electronic commerce transactions and messages. CC ID 08621 | Acquisition or sale of facilities, technology, and services | Configuration | |
Protect the integrity of application service transactions. CC ID 12017 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Include required information in electronic commerce transactions and messages. CC ID 15318 | Acquisition or sale of facilities, technology, and services | Data and Information Management | |
Establish, implement, and maintain telephone-initiated transaction security measures. CC ID 13566 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Disseminate and communicate confirmations of telephone-initiated transactions to affected parties. CC ID 13571 | Acquisition or sale of facilities, technology, and services | Communicate | |
Plan for acquiring facilities, technology, or services. CC ID 06892 [Review the institution's policies, standards, and procedures related to the use of the following: Due diligence in research and selection of third-party service providers. App A Objective 6.31.b {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Establish, implement, and maintain acquisition notices. CC ID 16682 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include the geographic locations of the organization in the acquisition notice. CC ID 16723 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include certification that the organizations meet applicable requirements in the acquisition notice. CC ID 16714 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include the capital ratios in the acquisition notice. CC ID 16712 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include the relevant authorities in the acquisition notice. CC ID 16711 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include a description of the subsidiary's activities in the acquisition notice. CC ID 16707 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include the subsidiary's contact information in the acquisition notice. CC ID 16704 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include in scope transactions in the acquisition notice. CC ID 16700 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Involve all stakeholders in the acquisition process. CC ID 13169 | Acquisition or sale of facilities, technology, and services | Human Resources Management | |
Perform a due diligence assessment on bidding suppliers prior to acquiring assets. CC ID 15714 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Require third parties to disclose all known vulnerabilities in third party products and services. CC ID 15491 | Acquisition or sale of facilities, technology, and services | Communicate | |
Allocate sufficient resources to protect Information Systems during capital planning. CC ID 01444 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Establish, implement, and maintain system acquisition contracts. CC ID 14758 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include security requirements in system acquisition contracts. CC ID 01124 [With respect to developed software, determine whether institution management does the following: Obtains attestation or evidence from third-party developers that the applications acquired by the institution meet the necessary security requirements and that noted vulnerabilities or flaws are remediated in a timely manner. App A Objective 6.28.b Review the institution's policies, standards, and procedures related to the use of the following: Contractual assurances from third-party service providers for security responsibilities, controls, and reporting. App A Objective 6.31.c {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers {information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include operational requirements in system acquisition contracts. CC ID 00825 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Provide suppliers with operational requirement information needed to define required service levels in system acquisition contracts. CC ID 06890 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include required service levels in system acquisition contracts. CC ID 11652 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include security controls in system acquisition contracts. CC ID 01125 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Obtain system documentation before acquiring products and services. CC ID 01445 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include a description of the use and maintenance of security functions in the administration documentation. CC ID 14309 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include a description of the known vulnerabilities for administrative functions in the administration documentation. CC ID 14302 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Disseminate and communicate the system documentation to interested personnel and affected parties. CC ID 14285 | Acquisition or sale of facilities, technology, and services | Communicate | |
Obtain user documentation before acquiring products and services. CC ID 14283 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include instructions on how to use the security functions in the user documentation. CC ID 14314 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include security functions in the user documentation. CC ID 14313 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include user responsibilities for maintaining system security in the user documentation. CC ID 14312 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include a description of user interactions in the user documentation. CC ID 14311 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Require the information system developer to create a continuous monitoring plan. CC ID 14307 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include roles and responsibilities in system acquisition contracts. CC ID 14765 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include the acceptance criteria in system acquisition contracts. CC ID 14288 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include audit record generation capabilities in system acquisition contracts. CC ID 16427 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include a description of the development environment and operational environment in system acquisition contracts. CC ID 14256 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include a Business Impact Analysis in the acquisition feasibility study. CC ID 16231 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Include environmental considerations in the acquisition feasibility study. CC ID 16224 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Refrain from implementing systems that are beyond the organization's risk acceptance level. CC ID 13054 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Approve the risk assessment report of operational risks as a part of the acquisition feasibility study. CC ID 11666 | Acquisition or sale of facilities, technology, and services | Technical Security | |
Establish test environments separate from the production environment to support feasibility testing before product acquisition. CC ID 01130 | Acquisition or sale of facilities, technology, and services | Configuration | |
Establish, implement, and maintain a product and services acquisition strategy. CC ID 01133 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Establish, implement, and maintain a product and services acquisition program. CC ID 01136 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Establish, implement, and maintain a product and services acquisition policy. CC ID 14028 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Obtain authorization for marketing new products. CC ID 16805 | Acquisition or sale of facilities, technology, and services | Business Processes | |
Include compliance requirements in the product and services acquisition policy. CC ID 14163 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include coordination amongst entities in the product and services acquisition policy. CC ID 14162 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include management commitment in the product and services acquisition policy. CC ID 14161 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include roles and responsibilities in the product and services acquisition policy. CC ID 14160 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include the scope in the product and services acquisition policy. CC ID 14159 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Include the purpose in the product and services acquisition policy. CC ID 14158 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Disseminate and communicate the product and services acquisition policy to interested personnel and affected parties. CC ID 14157 | Acquisition or sale of facilities, technology, and services | Communicate | |
Establish, implement, and maintain product and services acquisition procedures. CC ID 14065 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Disseminate and communicate the product and services acquisition procedures to interested personnel and affected parties. CC ID 14152 | Acquisition or sale of facilities, technology, and services | Communicate | |
Establish, implement, and maintain acquisition approval requirements. CC ID 13704 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Disseminate and communicate acquisition approval requirements to all affected parties. CC ID 13706 | Acquisition or sale of facilities, technology, and services | Communicate | |
Include preventive maintenance contracts in system acquisition contracts. CC ID 06658 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Sign a forfeiture statement acknowledging unapproved Personal Electronic Devices will be confiscated. CC ID 11667 | Acquisition or sale of facilities, technology, and services | Physical and Environmental Protection | |
Include chain of custody procedures in the product and services acquisition program. CC ID 10058 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Establish, implement, and maintain a software product acquisition methodology. CC ID 01138 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Align the service management program with the Code of Conduct. CC ID 14211 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Establish, implement, and maintain third party Software Maintenance Agreements. CC ID 01143 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Establish and maintain a register of approved third parties, technologies and tools. CC ID 06836 | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Install software that originates from approved third parties. CC ID 12184 | Acquisition or sale of facilities, technology, and services | Technical Security | |
Promote joint acquisition of products or services. CC ID 11453 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Acquire products or services. CC ID 11450 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Acquire products through suppliers, as necessary. CC ID 13171 [Review whether management implements the following as appropriate: Purchases are made through a third party to shield the institution's identity. App A Objective 6.19.b] | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Pay suppliers in a timely manner. CC ID 06891 | Acquisition or sale of facilities, technology, and services | Acquisition/Sale of Assets or Services | |
Establish, implement, and maintain facilities, assets, and services acceptance procedures. CC ID 01144 [Determine whether management does the following: Validates that new hardware complies with institution policies and guidelines. App A Objective 6.11.k] | Acquisition or sale of facilities, technology, and services | Establish/Maintain Documentation | |
Authorize new assets prior to putting them into the production environment. CC ID 13530 | Acquisition or sale of facilities, technology, and services | Process or Activity | |
Establish, implement, and maintain a privacy framework that protects restricted data. CC ID 11850 | Privacy protection for information and data | Establish/Maintain Documentation | |
Establish, implement, and maintain a data handling program. CC ID 13427 | Privacy protection for information and data | Establish/Maintain Documentation | |
Establish, implement, and maintain data handling policies. CC ID 00353 | Privacy protection for information and data | Establish/Maintain Documentation | |
Establish, implement, and maintain data and information confidentiality policies. CC ID 00361 [{test data} Determine whether management considers the following key testing factors when developing and implementing independent tests: Confidentiality of test plans and data. App A Objective 10.2.e {physical access}{confidentiality agreement}{nondisclosure agreement}{authorized use agreement} Management should mitigate the risks posed by users by doing the following: - Establishing and administering security screening in IT hiring practices. - Establishing and administering a user access program for physical and logical access. - Employing segregation of duties. - Obtaining agreements covering confidentiality, nondisclosure, and authorized use. - Providing training to support awareness and policy compliance. II.C.7 User Security Controls] | Privacy protection for information and data | Establish/Maintain Documentation | |
Prohibit personal data from being sent by e-mail or instant messaging. CC ID 00565 | Privacy protection for information and data | Data and Information Management | |
Protect electronic messaging information. CC ID 12022 | Privacy protection for information and data | Technical Security | |
Establish, implement, and maintain record structures to support information confidentiality. CC ID 00360 | Privacy protection for information and data | Data and Information Management | |
Include passwords, Personal Identification Numbers, and card security codes in the personal data definition. CC ID 04699 | Privacy protection for information and data | Configuration | |
Store payment card data in secure chips, if possible. CC ID 13065 | Privacy protection for information and data | Configuration | |
Refrain from storing data elements containing sensitive authentication data after authorization is approved. CC ID 04758 | Privacy protection for information and data | Configuration | |
Render unrecoverable sensitive authentication data after authorization is approved. CC ID 11952 | Privacy protection for information and data | Technical Security | |
Automate the disposition process for records that contain "do not store" data or "delete after transaction process" data. CC ID 06083 | Privacy protection for information and data | Data and Information Management | |
Log the disclosure of personal data. CC ID 06628 | Privacy protection for information and data | Log Management | |
Log the modification of personal data. CC ID 11844 | Privacy protection for information and data | Log Management | |
Encrypt, truncate, or tokenize data fields, as necessary. CC ID 06850 | Privacy protection for information and data | Technical Security | |
Implement security measures to protect personal data. CC ID 13606 | Privacy protection for information and data | Technical Security | |
Implement physical controls to protect personal data. CC ID 00355 | Privacy protection for information and data | Testing | |
Limit data leakage. CC ID 00356 | Privacy protection for information and data | Data and Information Management | |
Identify potential red flags to alert the organization before a data leakage has occurred. CC ID 04654 | Privacy protection for information and data | Monitor and Evaluate Occurrences | |
Establish, implement, and maintain Consumer Reporting Agency notification procedures. CC ID 04851 | Privacy protection for information and data | Business Processes | |
Acquire enough insurance to cover the liability for damages due to data leakage. CC ID 06408 | Privacy protection for information and data | Acquisition/Sale of Assets or Services | |
Alert appropriate personnel when data leakage is detected. CC ID 14715 | Privacy protection for information and data | Process or Activity | |
Establish, implement, and maintain a supply chain management program. CC ID 11742 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Include a nondisclosure agreement in third party contracts if a separate nondisclosure agreement does not exist. CC ID 06505 [{nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e {nondisclosure agreement} {authorized use agreement} Review whether management does the following: Obtains agreements from employees, contractors, and service providers covering confidentiality, nondisclosure, and authorized use. App A Objective 6.8.e] | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Include incident management procedures and incident reporting procedures in third party contracts. CC ID 01214 [Review whether management does the following: Plans and coordinates with ISPs and third parties to minimize exposure to incidents and continue services when faced with an incident (e.g., monitors threat alerts, service availability, applications, and network traffic for indicators of nefarious activity, and ensures traffic filtering). App A Objective 6.25.b] | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Establish, implement, and maintain Service Level Agreements with the organization's supply chain. CC ID 00838 | Third Party and supply chain oversight | Process or Activity | |
Include risk management procedures in the supply chain management policy. CC ID 08811 [Determine whether management identifies factors that may increase risk from supply chain attacks and responds with appropriate risk mitigation. Review whether management implements the following as appropriate: App A Objective 6.19 Determine whether management identifies factors that may increase risk from supply chain attacks and responds with appropriate risk mitigation. Review whether management implements the following as appropriate: App A Objective 6.19] | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Include a determination of the complexity of the third party relationships in the supply chain risk assessment. CC ID 10024 | Third Party and supply chain oversight | Business Processes | |
Include a determination of financial benefits over actual costs of third party relationships in the supply chain risk assessment report. CC ID 10025 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Include a determination of how third party relationships affect strategic initiatives in the supply chain risk assessment report. CC ID 10026 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Include a determination if the third party relationship will affect employees in the supply chain risk assessment report. CC ID 10027 | Third Party and supply chain oversight | Business Processes | |
Include a determination of customer interactions with third parties in the supply chain risk assessment report. CC ID 10028 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Include a determination on the risks third parties pose to Information Security in the supply chain risk assessment report. CC ID 10029 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Establish, implement, and maintain a supply chain management policy. CC ID 08808 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Include the third party selection process in the supply chain management policy. CC ID 13132 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Select suppliers based on their qualifications. CC ID 00795 [Review whether management implements the following as appropriate: Purchases are made only through reputable sellers. App A Objective 6.19.a] | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Establish, implement, and maintain supply chain due diligence standards. CC ID 08846 [{information risk}{third-party management} Management should oversee outsourced operations through the following: - Appropriate due diligence in third-party research, selection, and relationship management. - Contractual assurances for security responsibilities, controls, and reporting. - Nondisclosure agreements regarding the institution's systems and data. - Independent review of the third party's security through appropriate reports from audits and tests. - Coordination of incident response policies and contractual notification requirements. - Verification that information and cybersecurity risks are appropriately identified, measured, mitigated, monitored, and reported. II.C.20 Oversight of Third-Party Service Providers] | Third Party and supply chain oversight | Business Processes | |
Provide management support for third party due diligence. CC ID 08847 | Third Party and supply chain oversight | Business Processes | |
Commit to the supply chain due diligence process. CC ID 08849 | Third Party and supply chain oversight | Business Processes | |
Structure the organization to support supply chain due diligence. CC ID 08850 | Third Party and supply chain oversight | Business Processes | |
Schedule supply chain audits, as necessary. CC ID 10015 | Third Party and supply chain oversight | Audits and Risk Management | |
Establish, implement, and maintain internal accountability for the supply chain due diligence process. CC ID 08851 [Determine whether management appropriately oversees the effectiveness of information security controls over outsourced operations and is accountable for the mitigation of risks involved with the use of third-party service providers. Review the due diligence involved, security controls to mitigate risk, and monitoring capabilities over the institution's third parties. Review the institution's policies, standards, and procedures related to the use of the following: App A Objective 6.31] | Third Party and supply chain oversight | Business Processes | |
Establish, implement, and maintain supply chain due diligence requirements. CC ID 08853 | Third Party and supply chain oversight | Business Processes | |
Document and maintain records of supply chain transactions in a transaction file. CC ID 08858 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Cross-check the supply chain due diligence practices against the supply chain management policy. CC ID 08859 | Third Party and supply chain oversight | Business Processes | |
Exclude suppliers that have passed the conflict-free smelter program from the conflict materials report. CC ID 10016 | Third Party and supply chain oversight | Business Processes | |
Assign the appropriate individuals or groups to oversee and support supply chain due diligence. CC ID 08861 | Third Party and supply chain oversight | Business Processes | |
Develop and implement supply chain due diligence capability training program. CC ID 08862 | Third Party and supply chain oversight | Business Processes | |
Determine if additional supply chain due diligence processes are required. CC ID 08863 | Third Party and supply chain oversight | Business Processes | |
Review transaction files for compliance with the supply chain audit standard. CC ID 08864 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Provide additional documentation to validate and approve the use of non-compliant materials. CC ID 08865 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Define ways a third party may be non-compliant with the organization's supply chain due diligence requirements. CC ID 08870 | Third Party and supply chain oversight | Business Processes | |
Calculate and report the margin of error in the supply chain due diligence report. CC ID 08871 | Third Party and supply chain oversight | Business Processes | |
Conduct all parts of the supply chain due diligence process. CC ID 08854 | Third Party and supply chain oversight | Business Processes | |
Identify all service providers in the supply chain. CC ID 12213 [{network connection} Review whether management does the following: Identifies connections with third parties. App A Objective 6.7.a Determine the degree of reliance on service providers for information processing and technology support, including security operation management. App A Objective 1.4.a] | Third Party and supply chain oversight | Business Processes | |
Include a requirement in outsourcing contracts that supply chain members must implement security controls to protect information. CC ID 13353 | Third Party and supply chain oversight | Establish/Maintain Documentation | |
Review the supply chain's service delivery on a regular basis. CC ID 12010 | Third Party and supply chain oversight | Business Processes | |
Establish, implement, and maintain information security controls for the supply chain. CC ID 13109 [Determine whether management of the information security program is appropriate and supports the institution's ITRM process, integrates with lines of business and support functions, and integrates third-party service provider activities with the information security program. App A Objective 3 Determine whether the information security program is integrated with the institution's lines of business, support functions, and management of third parties. App A Objective 2.1.b Management should develop and implement an information security program that does the following: - Supports the institution's IT risk management (ITRM) process by identifying threats, measuring risk, defining information security requirements, and implementing controls. - Integrates with lines of business and support functions in which risk decisions are made. - Integrates third-party service provider activities with the information security program. II Information Security Program Management] | Third Party and supply chain oversight | Establish/Maintain Documentation |