Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

CIS Cisco Auditing

by Ron Gula
August 28, 2015

CIS Cisco Auditing Dashboard Screenshot

When deploying Cisco devices on a network, one of the most important issues that an analyst can overlook is applying proper security controls before the device is deployed into production. Hardening network devices can be a time-consuming process that involves patching, modifying configurations, and testing the effectiveness of security controls. Attackers continually seek out new exploits and weaknesses in network devices to gain unauthorized entry into a network. Once a network had been breached, an attacker has access to execute malicious code, steal confidential data, and alter user accounts. Any network entry points that are misconfigured or lack proper security controls undermine the security of an organization’s entire network. 

The CIS Cisco Auditing dashboard is designed to assist the analyst in measuring the Center for Internet Security (CIS) benchmark compliance of Cisco routers and firewalls. This allows issues to be analyzed quickly by leveraging an agent-less audit. Tenable has many CIS-certified benchmark audits for Cisco devices that can be downloaded from Tenable’s Customer Support Portal. In addition, this dashboard also provides vital information that will enhance visibility, increase security awareness, and aid in strengthening an organization’s security posture.

Several components within this dashboard leverage the CISCO plugin family of vulnerability checks, which provides a comprehensive overview of Cisco-related vulnerabilities.  The first column presents a matrix of vulnerabilities by severity found to exist in Cisco devices. In addition, a table that shows  vulnerability checks that detect outdated software and security vulnerabilities is also included. Other components included within this dashboard present a percentage of overall compliance checks completed, along with a table of common security setting vulnerabilities that have been detected on Cisco devices.

All vulnerabilities should be reviewed to determine the impact and risk to an organization. Network devices that have critical, high, and medium severity vulnerabilities should be considered high-risk priorities for an organization to address and remediate.

The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessments.

The dashboard requirements are:

  • Tenable.sc 4.8.2
  • Nessus 8.5.1
  • Compliance Data

Tenable.sc Continuous View (CV) identifies the biggest risks across the entire enterprise, and Tenable’s products allow for the most comprehensive and integrated view of network health. Nessus and Tenable.sc are continuously updated with information about advanced threats and zero-day vulnerabilities, as well as new types of regulatory compliance configuration audits, allowing organizations to maintain a secure network.

The dashboard contains the following components:

  • CIS Cisco Auditing - Plugin Family Vulnerability Checks - This matrix presents vulnerability results for the CISCO plugin family sorted by severity. The results will provide targeted information on outdated software and relevant security patches that need to be applied to a Cisco device. Any network device with critical, high, or medium severity levels vulnerabilities should be the first priority of an analyst to review and mitigate, as this provides attackers a way to comprise an organization’s network.
  • CIS Cisco Auditing - Plugin Family Vulnerability Checks Details - This table presents the top 100 critical, high, and medium severity vulnerabilities detected from the CISCO plugin family. The table is sorted so that the highest severity level is at the top, which aids in prioritizing mitigation efforts. Any outdated software and security vulnerabilities will be presented within this table along with the corresponding plugin ID, plugin name, description of the vulnerability, severity level, and possible solutions to mitigate the vulnerability. Each vulnerability check includes detailed information on the respective vulnerability that the analyst can immediately drill down into. This table provides targeted information the analyst needs to mitigate existing vulnerabilities, and assist in preventing unauthorized access to an organization’s network.
  • CIS Cisco Auditing - Configuration Check Results - This matrix provides information on CIS-based Cisco compliance checks. Each check cross-references with the auditFile|cisco keyword search, and the plugin text search for “cissecurity.org”. The checks are presented as “Pass” for informational, “Fail” for high, and “Manual Check” for medium severity levels.  The ratio of the percentage of overall checks completed against the checks that are marked with the respective severity level are displayed within this matrix. An analyst can click on the appropriate matrix cell to obtain additional information on specific vulnerabilities. Compliance checks with a medium severity levels require a manual review to determine whether the check has passed or failed.
  • CIS Cisco Auditing - Configuration Audit Check Result Details - This component presents the top 100 Cisco compliance vulnerabilities detected on Cisco devices. The table is sorted so that the highest number of vulnerable hosts are listed at the top. Nessus audit capabilities are leveraged by this table in performing a cross-reference check with the auditFile|cisco keyword search, and the plugin text search for “cissecurity.org”. Examples include, but are not limited to, modifying firewall ACLs, logging access attempts, and identifying services that should be disabled. Any high severity level vulnerabilities displayed have failed that associated compliance check. Any medium severity level vulnerabilities require a manual check by the analyst to determine the risk to an organization. The analyst can click on the Browse Component Data to obtain additional information about the respective compliance check. This table presents targeted information the analyst needs to mitigate existing compliance misconfigurations and assist in preventing unauthorized access to an organization’s network.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training