CIS Palo Alto Firewall 9 Benchmark v1.0.1
CIS Palo Alto Firewall 9 Benchmark v1.0.1
CIS Palo Alto Firewall 9 Benchmark v1.0.1
v1.0.1 - 02-28-2022
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
1|Page
Table of Contents
2|Page
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or equal to 1
(Automated) ...................................................................................................................................... 37
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or equal to 1
(Automated) ...................................................................................................................................... 39
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal to 1
(Automated) ...................................................................................................................................... 41
1.3.6 Ensure 'Minimum Special Characters' is greater than or equal to 1
(Automated) ...................................................................................................................................... 43
1.3.7 Ensure 'Required Password Change Period' is less than or equal to 90 days
(Automated) ...................................................................................................................................... 45
1.3.8 Ensure 'New Password Differs By Characters' is greater than or equal to 3
(Automated) ...................................................................................................................................... 47
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more passwords
(Automated) ...................................................................................................................................... 49
1.3.10 Ensure 'Password Profiles' do not exist (Automated) ........................................ 51
1.4 Authentication Settings (for Device Mgmt) ............................................................................ 53
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for device
management (Automated) .......................................................................................................... 53
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are
properly configured (Automated) ............................................................................................ 55
1.5 SNMP Polling Settings ..................................................................................................................... 57
1.5.1 Ensure 'V3' is selected for SNMP polling (Automated) ......................................... 57
1.6 Device Services Settings ................................................................................................................. 59
1.6.1 Ensure 'Verify Update Server Identity' is enabled (Automated) ....................... 59
1.6.2 Ensure redundant NTP servers are configured appropriately (Automated) 61
1.6.3 Ensure that the Certificate Securing Remote Access VPNs is Valid
(Automated) ...................................................................................................................................... 63
2 User Identification..................................................................................................................................... 66
2.1 Ensure that IP addresses are mapped to usernames (Automated) ..................... 66
2.2 Ensure that WMI probing is disabled (Automated) ................................................... 68
2.3 Ensure that User-ID is only enabled for internal trusted interfaces
(Automated) ...................................................................................................................................... 70
3|Page
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabled
(Automated) ...................................................................................................................................... 72
2.5 Ensure that the User-ID Agent has minimal permissions if User-ID is enabled
(Manual) ............................................................................................................................................. 74
2.6 Ensure that the User-ID service account does not have interactive logon rights
(Automated) ...................................................................................................................................... 76
2.7 Ensure remote access capabilities for the User-ID service account are
forbidden. (Automated)................................................................................................................ 78
2.8 Ensure that security policies restrict User-ID Agent traffic from crossing into
untrusted zones (Manual) ........................................................................................................... 80
3 High Availability ......................................................................................................................................... 83
3.1 Ensure a fully-synchronized High Availability peer is configured (Automated)
................................................................................................................................................................ 83
3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring
(Automated) ...................................................................................................................................... 85
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately
(Automated) ...................................................................................................................................... 88
4 Dynamic Updates ....................................................................................................................................... 90
4.1 Ensure 'Antivirus Update Schedule' is set to download and install updates
hourly (Automated) ....................................................................................................................... 90
4.2 Ensure 'Applications and Threats Update Schedule' is set to download and
install updates at daily or shorter intervals (Automated) .............................................. 92
5 Wildfire .......................................................................................................................................................... 94
5.1 Ensure that WildFire file size upload limits are maximized (Automated) ........ 94
5.2 Ensure forwarding is enabled for all applications and file types in WildFire file
blocking profiles (Automated) ................................................................................................... 97
5.3 Ensure a WildFire Analysis profile is enabled for all security policies
(Automated) ...................................................................................................................................... 99
5.4 Ensure forwarding of decrypted content to WildFire is enabled (Automated)
.............................................................................................................................................................. 101
5.5 Ensure all WildFire session information settings are enabled (Automated) . 103
5.6 Ensure alerts are enabled for malicious files detected by WildFire
(Automated) .................................................................................................................................... 105
4|Page
5.7 Ensure 'WildFire Update Schedule' is set to download and install updates
every minute (Automated) ........................................................................................................ 108
6 Security Profiles ....................................................................................................................................... 110
6.1 Ensure that antivirus profiles are set to block on all decoders except 'imap'
and 'pop3' (Automated) ............................................................................................................. 110
6.2 Ensure a secure antivirus profile is applied to all relevant security policies
(Automated) .................................................................................................................................... 112
6.3 Ensure an anti-spyware profile is configured to block on all spyware severity
levels, categories, and threats (Automated) ....................................................................... 114
6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in use
(Automated) .................................................................................................................................... 116
6.5 Ensure passive DNS monitoring is set to enabled on all anti-spyware profiles
in use (Automated)....................................................................................................................... 119
6.6 Ensure a secure anti-spyware profile is applied to all security policies
permitting traffic to the Internet (Manual)......................................................................... 121
6.7 Ensure a Vulnerability Protection Profile is set to block attacks against critical
and high vulnerabilities, and set to default on medium, low, and informational
vulnerabilities (Automated) ..................................................................................................... 123
6.8 Ensure a secure Vulnerability Protection Profile is applied to all security rules
allowing traffic (Manual) ........................................................................................................... 125
6.9 Ensure that PAN-DB URL Filtering is used (Manual) .............................................. 127
6.10 Ensure that URL Filtering uses the action of “block” or “override” on the URL
categories (Manual) ..................................................................................................................... 129
6.11 Ensure that access to every URL is logged (Manual) ............................................ 131
6.12 Ensure all HTTP Header Logging options are enabled (Manual) ..................... 133
6.13 Ensure secure URL filtering is enabled for all security policies allowing traffic
to the Internet (Manual)............................................................................................................. 135
6.14 Ensure alerting after a threshold of credit card or Social Security numbers is
detected is enabled (Manual) ................................................................................................... 137
6.15 Ensure a secure Data Filtering profile is applied to all security policies
allowing traffic to or from the Internet (Manual) ............................................................ 140
6.16 Ensure that a Zone Protection Profile with an enabled SYN Flood Action of
SYN Cookies is attached to all untrusted zones (Automated) ..................................... 142
5|Page
6.17 Ensure that a Zone Protection Profile with tuned Flood Protection settings
enabled for all flood types is attached to all untrusted zones (Automated) .......... 145
6.18 Ensure that all zones have Zone Protection Profiles with all Reconnaissance
Protection settings enabled, tuned, and set to appropriate actions (Manual) ...... 147
6.19 Ensure all zones have Zone Protection Profiles that drop specially crafted
packets (Automated) ................................................................................................................... 150
6.20 Ensure that User Credential Submission uses the action of “block” or
“continue” on the URL categories (Manual) ....................................................................... 152
7 Security Policies ....................................................................................................................................... 154
7.1 Ensure application security policies exist when allowing traffic from an
untrusted zone to a more trusted zone (Manual) ............................................................ 154
7.2 Ensure 'Service setting of ANY' in a security policy allowing traffic does not
exist (Manual) ................................................................................................................................ 157
7.3 Ensure 'Security Policy' denying any/all traffic to/from IP addresses on
Trusted Threat Intelligence Sources Exists (Manual) .................................................... 159
8 Decryption .................................................................................................................................................. 162
8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the Internet is
configured (Automated) ............................................................................................................. 162
8.2 Ensure 'SSL Inbound Inspection' is required for all untrusted traffic destined
for servers using SSL or TLS (Manual) ................................................................................. 165
8.3 Ensure that the Certificate used for Decryption is Trusted (Manual)............... 168
Appendix: Recommendation Summary Table ...................................................................................... 171
Appendix: CIS Controls v7 IG 1 Mapped Recommendations .......................................................... 176
Appendix: CIS Controls v7 IG 2 Mapped Recommendations .......................................................... 178
Appendix: CIS Controls v7 IG 3 Mapped Recommendations .......................................................... 180
Appendix: CIS Controls v8 IG 1 Mapped Recommendations .......................................................... 183
Appendix: CIS Controls v8 IG 2 Mapped Recommendations .......................................................... 186
Appendix: CIS Controls v8 IG 3 Mapped Recommendations .......................................................... 189
Appendix: Change History ............................................................................................................................ 193
6|Page
Overview
This document provides prescriptive guidance for establishing a secure configuration
posture for Palo Alto Firewalls running PAN-OS version 9.x. This guide was tested against
PAN-OS v9.x.
To obtain the latest version of this guide, please visit http://benchmarks.cisecurity.org. If
you have questions, comments, or have identified ways to improve this guide, please write
us at feedback@cisecurity.org.
Intended Audience
This benchmark is intended for system and application administrators, security specialists,
auditors, help desk, and platform deployment personnel who plan to develop, deploy,
assess, or secure solutions that incorporate PAN-OS on a Palo Alto Firewall
Consensus Guidance
This benchmark was created using a consensus review process comprised of subject
matter experts. Consensus participants provide perspective from a diverse set of
backgrounds including consulting, software development, audit and compliance, security
research, operations, government, and legal.
Each CIS benchmark undergoes two phases of consensus review. The first phase occurs
during initial benchmark development. During this phase, subject matter experts convene
to discuss, create, and test working drafts of the benchmark. This discussion occurs until
consensus has been reached on benchmark recommendations. The second phase begins
after the benchmark has been published. During this phase, all feedback provided by the
Internet community is reviewed by the consensus team for incorporation in the
benchmark. If you are interested in participating in the consensus process, please visit
https://workbench.cisecurity.org/.
7|Page
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Stylized Monospace font Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.
Monospace font Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.
<italic font in brackets> Italic texts set in angle brackets denote a variable
requiring substitution for a real value.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual steps
to implement. Both statuses are equally important and are determined and supported as
defined below:
Automated
Manual
8|Page
Profile Definitions
The following configuration profiles are defined by this Benchmark:
Level 1
Level 2
This profile extends the "Level 1" profile. Items in this profile exhibit one or more of
the following characteristics:
9|Page
Acknowledgements
This benchmark exemplifies the great things a community of users, vendors, and subject matter
experts can accomplish through consensus collaboration. The CIS community thanks the entire
consensus team with special recognition to the following individuals who contributed greatly to
the creation of this guide:
Author
Rob Vandenbrink
Contributor
Darren Freidel
Editor
Darren Freidel
10 | P a g e
Recommendations
1 Device Setup
The Device Setup section covers requirements for login banners, logging, management
interfaces, password strength, device management authentication, SNMP polling, and
device services.
11 | P a g e
1.1.1 Ensure System Logging to a Remote Host
Logging to a remote host permits longer log retention than on-device logging. This allows
more flexible approaches to log processing, both in real time and retrospectively. Real time
log processing often includes log entries being used to trigger scripts or other events.
Finally, logging to an external host provides a second copy of all logs. In the event that the
firewall is compromised or logs are lost for whatever reason, a second copy of the logs are
available.
Logging all infrastructure to a single central destination also allows the configuration of
SIEM services, which facilitates correlation of firewall logs with logs of other infrastructure
components. For these reasons, most regulatory frameworks require remote, centralized
logging for all critical infrastructure components.
Level 1
Description:
Rationale:
Sending all system logs to a remote host is recommended to provide protected, long term
storage and archiving. This also places a copy of the logs in a second location, in case the
primary (on the firewall) logs are compromised. Storing logs on a remote host also allows
for more flexible log searches and log processing, as well as many methods of triggering
events or scripts based on specific log events or combinations of events. Finally, remote
logging provides many organizations with the opportunity to combine logs from disparate
infrastructure in a SIEM (Security Information and Event Management) system.
Impact:
Failure to properly store and archive logs for critical infrastructure leaves an organization
without the tools required to establish trends in events or activity, or to retrospectively
analyze security or operational events beyond the log timespan stored on the firewall. Not
having remote logs also puts many organizations outside of compliance with many
12 | P a g e
regulatory frameworks. Finally, not logging to a remote host leaves organizations without
recourse in the event of a compromise of logs on the primary device. It is imperative that
organizations log critical infrastructure appropriately, store and archive these logs in a
central location, and have a robust set of tools to analyze logs both in real time and after the
fact.
Audit:
Remediation:
Default Value:
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
14 | P a g e
1.1.1.2 SNMPv3 traps should be configured (Automated)
Profile Applicability:
Level 2
Description:
SNMP v3 can be used for remote logging, and is the recommended protocol in higher
security situations as it fully supports encryption of logs.
Rationale:
Sending all system logs to a remote host is recommended to provide protected, long term
storage and archiving. This also places a copy of the logs in a second location, in case the
primary (on the firewall) logs are compromised. Storing logs on a remote host also allows
for more flexible log searches and log processing, as well as many methods of triggering
events or scripts based on specific log events or combinations of events. Finally, remote
logging provides many organizations with the opportunity to combine logs from disparate
infrastructure in a SIEM (Security Information and Event Management) system.
Impact:
Failure to properly store and archive logs for critical infrastructure leaves an organization
without the tools required to establish trends in events or activity, or to retrospectively
analyze security or operational events beyond the log timespan stored on the firewall. Not
having remote logs also puts many organizations outside of compliance with many
regulatory frameworks. Finally, not logging to a remote host leaves organizations without
recourse in the event of a compromise of logs on the primary device. It is imperative that
organizations log critical infrastructure appropriately, store and archive these logs in a
central location, and have a robust set of tools to analyze logs both in real time and after the
fact. Not encrypting log data as it transits the network allows an attacker to mount a
"MiTM" (Monkey in the Middle) attack, which allows them to intercept and/or modify logs
as they transit from the source to the destination.
Audit:
15 | P a g e
Navigate to Device > Log Settings
Under System, verify that at least one SNMP entry exists, corresponding to an SNMPv3
Server Profile and that at least one entry has "All Logs" selected.
Under Configuration, verify that at least one SNMP entry exists, corresponding to an
SNMPv3 Server Profile and that at least one entry has "All Logs" selected.
Under User-ID, verify that at least one SNMP entry exists, corresponding to an SNMPv3
Server Profile and that at least one entry has "All Logs" selected.
Under HIP Match (Host Information Profile), verify that at least one SNMP entry exists,
corresponding to an SNMPv3 Server Profile and that at least one entry has "All Logs"
selected.
Under IP-Tag, verify that at least one SNMP entry exists, corresponding to an SNMPv3
Server Profile and that at least one entry has "All Logs" selected.
Remediation:
16 | P a g e
Default Value:
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
17 | P a g e
1.1.2 Ensure 'Login Banner' is set (Automated)
Profile Applicability:
Level 1
Description:
Configure a login banner, ideally approved by the organization’s legal team. This banner
should, at minimum, prohibit unauthorized access, provide notice of logging or monitoring,
and avoid using the word “welcome” or similar words of invitation.
Rationale:
Through a properly stated login banner, the risk of unintentional access to the device by
unauthorized users is reduced. Should legal action take place against a person accessing the
device without authorization, the login banner greatly diminishes a defendant’s claim of
ignorance.
Audit:
Remediation:
Default Value:
Not configured
References:
18 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
19 | P a g e
1.1.3 Ensure 'Enable Log on High DP Load' is enabled (Automated)
Profile Applicability:
Level 1
Description:
Enable the option 'Enable Log on High DP Load' feature. When this option is selected, a
system log entry is created when the device’s packet processing load reaches 100%
utilization.
Rationale:
When the device’s packet processing load reaches 100%, a degradation in the availability of
services accessed through the device can occur. Logging this event can help with
troubleshooting system performance.
Impact:
Sustained attacks, especially volumetric DOS and DDOS attacks will often affect CPU
utilization. This setting will generate an event that is easily monitored for and alerted on.
While setting CPU utilization watermarks in a Network Management System is a standard
practice, this setting does not depend on even having an NMS, it doesn't require anything
other than standard logging to implement.
Audit:
Navigate to Device > Setup > Management > Logging and Reporting Settings > Log
Export and Reporting.
Verify Enable Log on High DP Load is checked.
Remediation:
Navigate to Device > Setup > Management > Logging and Reporting Settings > Log
Export and Reporting.
Set the Enable Log on High DP Load box to checked.
Default Value:
Not enabled
20 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
21 | P a g e
1.2 Management Interface Settings
The Management Interface settings include restrictions on how management interfaces are
accessed, secured, and used.
Level 1
Description:
Rationale:
Management access to the device should be restricted to the IP addresses or subnets used
by firewall administrators. Permitting management access from other IP addresses
increases the risk of unauthorized access through password guessing, stolen credentials, or
other means.
Audit:
Remediation:
Default Value:
Not enabled (all addresses that can reach the interface are permitted)
22 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
23 | P a g e
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles
where SSH, HTTPS, or SNMP is enabled (Automated)
Profile Applicability:
Level 1
Description:
For all management profiles, only the IP addresses required for device management should
be specified.
Rationale:
If a Permitted IP Addresses list is either not specified or is too broad, an attacker may gain
the ability to attempt management access from unintended locations, such as the Internet.
The “Ensure 'Security Policy' denying any/all traffic exists at the bottom of the security
policies ruleset” recommendation in this benchmark can provide additional protection by
requiring a security policy specifically allowing device management access.
Audit:
Remediation:
Default Value:
Not enabled
References:
24 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
25 | P a g e
1.2.3 Ensure HTTP and Telnet options are disabled for the management
interface (Automated)
Profile Applicability:
Level 1
Description:
HTTP and Telnet options should not be enabled for device management.
Rationale:
Management access over cleartext services such as HTTP or Telnet could result in a
compromise of administrator credentials and other sensitive information related to device
management. Theft of either administrative credentials or session data is easily
accomplished with a "Man in the Middle" attack.
Audit:
Remediation:
Default Value:
References:
26 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
27 | P a g e
1.2.4 Ensure HTTP and Telnet options are disabled for all management
profiles (Automated)
Profile Applicability:
Level 1
Description:
HTTP and Telnet options should not be enabled for device management.
Rationale:
Management access over cleartext services such as HTTP or Telnet could result in a
compromise of administrator credentials and other sensitive information related to device
management.
Audit:
Remediation:
References:
28 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
29 | P a g e
1.2.5 Ensure valid certificate is set for browser-based administrator
interface (Automated)
Profile Applicability:
Level 2
Description:
In most cases, a browser HTTPS interface is used to administer the Palo Alto appliance. The
certificate used to secure this session should satisfy the following criteria:
1. A valid certificate from a trusted source should be used. While a certificate from a
trusted Public Certificate Authority is certainly valid, one from a trusted Private
Certificate Authority is absolutely acceptable for this purpose.
2. The certificate should have a valid date. It should not have a "to" date in the past (it
should not be expired), and should not have a "from" date in the future.
3. The certificate should use an acceptable cipher and encryption level.
Rationale:
If a certificate that is self-signed, expired, or otherwise invalid is used for the browser
HTTPS interface, administrators in most cases will not be able to tell if their session is
being eavesdropped on or injected into by a "Man in the Middle" attack.
Impact:
If the default self-signed certificate is used, an administrator will not be able to clearly tell if
their HTTPS session is being hijacked or not. Using a trusted certificate ensures that the
session is both encrypted and trusted.
Audit:
Verify that the certificate used to secure HTTPS sessions meets the criteria by reviewing
the appropriate certificate:
Navigate to Device > Certificate Management > Certificates
Verify that this Certificate is properly applied to the Management Interface:
Navigate to Device > Setup > Management > General Settings > SSL/TLS Service
Profile
Remediation:
Create or acquire a certificate that meets the stated criteria and set it:
Navigate to Device > Certificate Management > Certificates
30 | P a g e
Import an appropriate Certificate for your administrative session, from a trusted Certificate
Authority.
Navigate to Device > Certificate Management > SSL/TLS Service Profile
Choose or import the certificate you want to use for the web based administrative session.
Navigate to Device > Setup > Management > General Settings > SSL/TLS Service
Profile
Choose the Service Profile that you have configured
Default Value:
References:
Additional Information:
Verify that the clock is both accurate and reliable on both the Palo Alto and on the
administrative workstations before setting the SSL/TLS Service Profile. Inaccurate or
mismatched clocks will result in certificate errors and can result in loss of HTTPS
administrative access.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
31 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
Ensure that all account usernames and authentication credentials are transmitted
across networks using encrypted channels.
32 | P a g e
1.3 Minimum Password Requirements
The Minimum Password Requirements Section contains criteria for local passwords such
as complexity and restrictions. The best practice is to use named accounts, and if possible a
back-end authentication solution such as Active Directory or (best case) a two-factor
authentication solution. However, local credentials will always exist, if only to account for
failure of a back-end authentication solution.
It's recommended that a majority of the following recommendations be followed. This will
vary from organization to organization, but at a minimum 5 of the following 10 password
complexity recommendations on should be followed, as well as the first one that enables
password complexity.
Level 1
Description:
This checks all new passwords to ensure that they meet basic requirements for strong
passwords.
Rationale:
Password complexity recommendations are derived from the USGCB (United States
Government Configuration Baseline), Common Weakness Enumeration, and benchmarks
published by the CIS (Center for Internet Security). Password complexity adds entropy to a
password, in comparison to a simple password of the same length. A complex password is
more difficult to attack, either directly against administrative interfaces or
cryptographically, against captured password hashes. However, making a password of
greater length will generally have a greater impact in this regard, in comparison to making
a shorter password more complex.
Impact:
Simple passwords make an attacker's job very easy. There is a reasonably short list of
commonly used admin passwords for network infrastructure, not enforcing password
lengths and complexity can lend itself to making an attacker's brute force attack successful.
33 | P a g e
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity.
Verify Enabled is checked
Ensure that the various password settings to values that are appropriate to your
organization. Non-zero values should be set for Minimum Uppercase, Lowercase and
Special Characters. "Block Username Inclusion" should be enabled.
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity.
Set Enabled to be checked
Set that the various password settings to values that are appropriate to your organization.
It is suggested that there at least be some special characters enforced, and that a minimum
length be set. Ensure that non-zero values are set for Minimum Uppercase, Lowercase and
Special Characters. "Block Username Inclusion" should be enabled.
Operationally, dictionary words should be avoided for all passwords - passphrases are a
much better alternative.
Default Value:
Not enabled.
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
34 | P a g e
1.3.2 Ensure 'Minimum Length' is greater than or equal to 12
(Automated)
Profile Applicability:
Level 1
Description:
This determines the least number of characters that make up a password for a user
account.
Rationale:
A longer password is much more difficult to attack, either directly against administrative
interfaces or cryptographically, against captured password hashes. Making a password of
greater length will generally have a greater impact in this regard, in comparison to making
a shorter password more complex. Passphrases are a commonly used recommendation, to
make longer passwords more palatable to end users. Administrative staff however
generally use "password safe" applications, so a long and complex password is more easily
implemented for most infrastructure administrative interfaces.
Impact:
Longer passwords are much more difficult to attack. This is true of attacks against the
administrative interfaces themselves, or of decryption attacks against captured hashes. A
longer password will almost always have a more positive impact than a shorter but more
complex password.
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity.
Verify Minimum Length is greater than or equal to 12
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity.
Set Minimum Length to greater than or equal to 12
Default Value:
Not enabled.
35 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
36 | P a g e
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or equal to 1
(Automated)
Profile Applicability:
Level 1
Description:
This checks all new passwords to ensure that they contain at least one English uppercase
character (A through Z).
Rationale:
This is one of several settings that, when taken together, ensure that passwords are
sufficiently complex as to thwart brute force and dictionary attacks.
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity
Verify Minimum Uppercase Letters is greater than or equal to 1
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity
Set Minimum Uppercase Letters to greater than or equal to 1
Default Value:
Not enabled.
References:
37 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
38 | P a g e
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or equal to 1
(Automated)
Profile Applicability:
Level 1
Description:
This checks all new passwords to ensure that they contain at least one English lowercase
character (a through z).
Rationale:
This is one of several settings that, when taken together, ensure that passwords are
sufficiently complex as to thwart brute force and dictionary attacks.
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity
Verify Minimum Lowercase Letters is greater than or equal to 1
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity
Set Minimum Lowercase Letters to greater than or equal to 1
Default Value:
Not enabled.
References:
39 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
40 | P a g e
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal to 1
(Automated)
Profile Applicability:
Level 1
Description:
This checks all new passwords to ensure that they contain at least one base 10 digit (0
through 9).
Rationale:
This is one of several settings that, when taken together, ensure that passwords are
sufficiently complex as to thwart brute force and dictionary attacks.
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity`
Verify Minimum Numeric Letters is greater than or equal to 1
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity
Set Minimum Numeric Letters to greater than or equal to 1
Default Value:
Not enabled.
References:
41 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
42 | P a g e
1.3.6 Ensure 'Minimum Special Characters' is greater than or equal to 1
(Automated)
Profile Applicability:
Level 1
Description:
This checks all new passwords to ensure that they contain at least one non-alphabetic
character (for example, !, $, #, %).
Rationale:
This is one of several settings that, when taken together, ensure that passwords are
sufficiently complex as to thwart brute force and dictionary attacks.
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity
Verify Minimum Special Characters is greater than or equal to 1
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity
Set Minimum Special Characters to greater than or equal to 1
Default Value:
Not enabled.
References:
43 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
44 | P a g e
1.3.7 Ensure 'Required Password Change Period' is less than or equal to
90 days (Automated)
Profile Applicability:
Level 1
Description:
This defines how long a user can use a password before it expires.
Rationale:
The longer a password exists, the higher the likelihood that it will be compromised by a
brute force attack, by an attacker gaining general knowledge about the user and guessing
the password, or by the user sharing the password.
Impact:
Failure to change administrative passwords can result in a slow "creep" of people who have
access. Especially in a situation with high staff turnover (for instance, in a NOC or SOC
situation), administrative passwords need to be changed frequently.
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity.
Verify Required Password Change Period (days) is less than or equal to 90
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity.
Set Required Password Change Period (days) to less than or equal to 90
Default Value:
Not enabled.
45 | P a g e
References:
Additional Information:
This guidance is currently under some debate in the community. If the password length is
sufficient and password complexity is enforced, then in many organizations it is likely that
the password change period can be increased to 6, 9 or even 12 months.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
46 | P a g e
1.3.8 Ensure 'New Password Differs By Characters' is greater than or
equal to 3 (Automated)
Profile Applicability:
Level 1
Description:
This checks all new passwords to ensure that they differ by at least three characters from
the previous password.
Rationale:
This is one of several settings that, when taken together, ensure that passwords are
sufficiently complex as to thwart brute force and dictionary attacks.
Impact:
This prevents the use of passwords that fall into a predictable pattern. Especially in
situations that involve staff turnover, having a pattern to password changes should be
avoided.
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity
Verify New Password Differs By Characters is set to greater than or equal to 3
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity
Set New Password Differs By Characters to 3 or more
Default Value:
Not enabled.
References:
47 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
48 | P a g e
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more
passwords (Automated)
Profile Applicability:
Level 1
Description:
This determines the number of unique passwords that have to be most recently used for a
user account before a previous password can be reused.
Rationale:
The longer a user uses the same password, the greater the chance that an attacker can
determine the password through brute force attacks. Also, any accounts that may have
been compromised will remain exploitable for as long as the password is left unchanged. If
password changes are required but password reuse is not prevented, or if users continually
reuse a small number of passwords, the effectiveness of a good password policy is greatly
reduced. While current guidance emphasizes password length above frequent password
changes, not enforcing password re-use guidance adds the temptation of using a small pool
of passwords, which can make an attacker's job easier across an entire infrastructure.
Audit:
Navigate to Device > Setup > Management > Minimum Password Complexity.
Verify Prevent Password Reuse Limit is greater than or equal to 24
Remediation:
Navigate to Device > Setup > Management > Minimum Password Complexity.
Set Prevent Password Reuse Limit to greater than or equal to 24
Default Value:
Not enabled.
References:
49 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
50 | P a g e
1.3.10 Ensure 'Password Profiles' do not exist (Automated)
Profile Applicability:
Level 1
Description:
Password profiles that are weaker than the recommended minimum password complexity
settings must not exist.
Rationale:
As password profiles override any 'Minimum Password Complexity' settings defined in the
device, they generally should not exist. If these password profiles do exist, they should
enforce stronger password policies than what is set in the 'Minimum Password Complexity'
settings.
Audit:
Remediation:
Default Value:
Not configured
References:
51 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
52 | P a g e
1.4 Authentication Settings (for Device Mgmt)
The Authentication Settings Section contains Idle Timeout values and requirements for
Authentication Profiles.
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for device
management (Automated)
Profile Applicability:
Level 1
Description:
Set the Idle Timeout value for device management to 10 minutes or less to automatically
close inactive sessions.
Rationale:
An unattended computer with an open administrative session to the device could allow an
unauthorized user access to the firewall’s management interface.
Audit:
Remediation:
Default Value:
Not configured
References:
53 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
54 | P a g e
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication
Profile are properly configured (Automated)
Profile Applicability:
Level 1
Description:
Configure values for Failed Login Attempts and Account Lockout Time set to organization-
defined values (for example, 3 failed attempts and a 15 minute lockout time). Do not set
Failed Attempts and Lockout Time in the Authentication Settings section; any Failed
Attempts or Lockout Time settings within the selected Authentication Profile do not apply
in the Authentication Settings section.
Rationale:
Audit:
Remediation:
Default Value:
Not configured
55 | P a g e
References:
Additional Information:
Both values must be set. If either value is not set, account lockout does not occur.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
56 | P a g e
1.5 SNMP Polling Settings
SNMP polling sets out requirements for using SNMP.
Level 1
Description:
Rationale:
SNMPv3 utilizes AES-128 encryption, message integrity, user authorization, and device
authentication security features. SNMPv2c does not provide these security features. If an
SNMPv2c community string is intercepted or otherwise obtained, an attacker could gain
read access to the firewall. Note that SNMP write access is not possible.
Impact:
Any clear-text administrative protocol (such as SNMPv2) can expose valuable information
to any attacker that is in a position to eavesdrop on that protocol.
Audit:
Navigate to Device > Setup > Operations > Miscellaneous > SNMP Setup
Verify V3 is selected.
Remediation:
Navigate to Device > Setup > Operations > Miscellaneous > SNMP Setup
Select V3.
In order to be usable, the User and View sections of this dialog should also be completed.
These settings need to match the settings in the organization's NMS (Network Management
System)
Default Value:
Not configured
57 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
58 | P a g e
1.6 Device Services Settings
The Device Services Settings section contains requirements for verifying the update
server's identity, enabling redundant NTP services, and using a valid certificate for securing
VPN remote access.
Level 1
Description:
This setting determines whether or not the identity of the update server must be verified
before performing an update session. Note that if an SSL Forward Proxy is configured to
intercept the update session, this option may need to be disabled (because the SSL
Certificate will not match).
Rationale:
Verifying the update server identity before package download ensures the packages
originate from a trusted source. Without this, it is possible to receive and install an update
from a malicious source.
Impact:
This setting protects the device from an "evilgrade" attack, where a successful DNS attack
can redirect the firewall to an attacker-controlled update server, which can then serve a
modified update.
Audit:
Remediation:
Default Value:
Not configured
59 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
60 | P a g e
1.6.2 Ensure redundant NTP servers are configured appropriately
(Automated)
Profile Applicability:
Level 1
Description:
These settings enable use of primary and secondary NTP servers to provide redundancy in
case of a failure involving the primary NTP server.
Rationale:
NTP enables the device to maintain an accurate time and date when receiving updates from
a reliable NTP server. Accurate timestamps are critical when correlating events with other
systems, troubleshooting, or performing investigative work. Logs and certain
cryptographic functions, such as those utilizing certificates, rely on accurate time and date
parameters. In addition, rules referencing a Schedule object will not function as intended if
the device’s time and date are incorrect.
For additional security, authenticated NTP can be utilized. If Symmetric Key authentication
is selected, only SHA1 should be used, as MD5 is considered severely compromised.
Most organizations will maintain a pair of internal NTP servers for all internal time
services. These servers will either be self-contained atomic clocks, or will collect time from
a known reliable source (often GPS or a well-known internet server pool will be used).
Audit:
Remediation:
Default Value:
Not configured
61 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
62 | P a g e
1.6.3 Ensure that the Certificate Securing Remote Access VPNs is Valid
(Automated)
Profile Applicability:
Level 2
Description:
The Certificate used to secure Remote Access VPNs should satisfy the following criteria:
It should be a valid certificate from a trusted source. In almost cases this means a
trusted Public Certificate Authority, as in most cases remote access VPN users will
not have access to any Private Certificate Authorities for Certificate validation.
The certificate should have a valid date. It should not have a "to" date in the past (it
should not be expired), and should not have a "from" date in the future.
The key length used to encrypt the certificate should be 2048 bits or more.
The hash used to sign the certificate should be SHA-2 or better.
When the Certificate is applied, the TLS version should be 1.1 or higher (1.2 is
recommended)
Rationale:
If presented with a certificate error, the end user in most cases will not be able to tell if
their session is using a self-signed or expired certificate, or if their session is being
eavesdropped on or injected into by a "Man in the Middle" attack. This means that self-
signed or invalid certificates should never be used for VPN connections.
Impact:
Not using a trusted Certificate, issued by a trusted Public Certificate Authority means that
clients establishing VPN sessions will always see an error indicating an untrusted
Certificate. This means that they will have no method of validating if their VPN session is
being hijacked by a "Monkey in the Middle" (MitM) attack. It also "trains" them to bypass
certificate warnings for other services, making MitM attacks easier for those other services
as well.
Audit:
Verify that the certificate being used to secure the VPN meets the criteria listed above:
Navigate to Device > Certificate Management > Certificates
Ensure that a valid certificate is applied to the HTTPS portal:
Navigate to Network > GlobalProtect > Portals > Portal Configuration > (Select
63 | P a g e
the Portal being assessed) > Authentication > SSL/TLS Profile
Ensure that a valid certificate is applied to the GlobalProtect Gateway:
Navigate to Network > GlobalProtect > Gateways > (Select the Gateway being
Assessed) > Authentication > SSL/TLS Service Profile
Ensure that the correct Certificate is selected.
Ensure that the Minimum TLS version is configured to be 1.1 or higher (TLSv1.2 is
recommended).
Remediation:
Create a CSR and install a certificate from a public CA (Certificate Authority) here:
Navigate to Device > Certificate Management > Certificates
Apply a valid certificate to the HTTPS portal:
Navigate to Network > GlobalProtect > Portals > Portal Configuration >
Authentication > SSL/TLS Profile
Apply a valid certificate to the GlobalProtect Gateway:
Navigate to Network > GlobalProtect > Gateways > Authentication > SSL/TLS
Service Profile
Configure the Service Profile to use the correct certificate
Ensure that the Minimum TLS version is set to 1.1 or 1.2 (1.2 is recommended).
Default Value:
Not configured
References:
64 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
65 | P a g e
2 User Identification
The User Identification section covers requirements for IP address mapping and User-ID
functionality.
Level 2
Description:
Rationale:
Audit:
To validate if this recommendation has been met, look at the Source User column in the
URL Filtering or Traffic logs (Monitor > Logs > URL Filtering and Logs > Traffic
Logs, respectively.)
User traffic originating from a trusted zone should identify a username.
Remediation:
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
67 | P a g e
2.2 Ensure that WMI probing is disabled (Automated)
Profile Applicability:
Level 2
Description:
Disable WMI probing if it is not required for User-ID functionality in the environment.
Rationale:
WMI probing normally requires a domain administrator account. A malicious user could
capture the encrypted password hash for offline cracking or relayed authentication attacks.
Relying on other forms of user identification, such as using UserID Agents or security log
monitoring, mitigates this risk.
Impact:
While this removes the exposure of having the WMI user account password being
compromised, it also reduces the effectiveness of user identification during operation of
the firewall (applying rules and policies). This trade-off should be weighed carefully for all
installations.
Audit:
Navigate to Device > User Identification > User Mapping > Palo Alto Networks
User ID Agent Setup.
Verify that Enable Probing is not checked.
Remediation:
Navigate to Device > User Identification > User Mapping > Palo Alto Networks
User ID Agent Setup.
Set Enable Probing so it is unchecked.
Default Value:
Not configured
68 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
69 | P a g e
2.3 Ensure that User-ID is only enabled for internal trusted interfaces
(Automated)
Profile Applicability:
Level 1
Description:
Only enable the User-ID option for interfaces that are both internal and trusted. There is
rarely a legitimate need to allow WMI probing (or any user-id identification) on an
untrusted interface. The exception to this is identification of remote-access VPN users, who
are identified as they connect.
Rationale:
Impact:
If WMI probing is enabled without limiting the scope, internet hosts that are sources or
destinations of traffic will be probed, and the password hash of the configured Domain
Admin account can be captured by an outside attacker on such a host.
Audit:
Remediation:
Default Value:
70 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
71 | P a g e
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabled
(Automated)
Profile Applicability:
Level 1
Description:
If User-ID is configured, use the Include/Exclude Networks section to limit the User-ID
scope to operate only on trusted networks. There is rarely a legitimate need to allow WMI
probing or other User identification on an untrusted network.
Rationale:
The Include/Exclude Networks feature allow users to configure boundaries for the User-ID
service. By using the feature to limit User-ID probing to only trusted internal networks, the
risks of privileged information disclosure through sent probes can be reduced. Note that if
an entry appears in the Include/Exclude Networks section, an implicit exclude-all-
networks policy will take effect for all other networks.
Impact:
Not restricting the networks subject to User Identification means that the administrative
credentials (userid and password hash) used for this task will transit untrusted networks,
or be sent to untrusted hosts. Capturing these credentials exposes them to offline cracking
attacks.
Audit:
Navigate to Device > User Identification > User Mapping > Include/Exclude
Networks.
Verify that all trusted internal networks have a Discovery value of Include.
Verify that all untrusted external networks have a Discovery value of Exclude. Note that
any value in the trusted networks list implies that all other networks are untrusted.
Remediation:
Navigate to Device > User Identification > User Mapping > Include/Exclude
Networks.
Set all trusted internal networks to have a Discovery value of Include.
Set all untrusted external networks to have a Discovery value of Exclude. Note that any
value in the trusted networks list implies that all other networks are untrusted.
72 | P a g e
Default Value:
Not configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
73 | P a g e
2.5 Ensure that the User-ID Agent has minimal permissions if User-ID is
enabled (Manual)
Profile Applicability:
Level 1
Description:
If the integrated (on-device) User-ID Agent is utilized, the Active Directory account for the
agent should only be a member of the Event Log Readers group, Distributed COM Users
group, and Domain Users group. If the Windows User-ID agent is utilized, the Active
Directory account for the agent should only be a member of the Event Log Readers group,
Server Operators group, and Domain Users group.
Rationale:
As a principle of least privilege, user accounts should have only minimum necessary
permissions. If an attacker compromises a User-ID service account with domain admin
rights, the organization is at far greater risk than if the service account were only granted
minimum rights.
Impact:
Using accounts with full administrative privileges when those rights are not required is
always a bad idea. This is particularly true for service accounts of this type, which in many
organizations do not see strong passwords or frequent password changes. In addition,
service passwords are stored in the Windows Registry, and are recoverable with the user
of appropriate malicious tools. The principal of least privilege means that any
compromised accounts of this type have less value to an attacker, and expose fewer assets
based on their rights.
Audit:
Navigate to Active Directory Users and Computers for the Active Directory under
consideration.
Verify that the service account for the User-ID agent is not a member of any groups other
than Event Log Readers, Distributed COM Users, and Domain Users (for the integrated, on-
device User-ID agent) or Event Log Readers, Server Operators, and Domain Users (for the
Windows User-ID agent.)
74 | P a g e
Remediation:
Default Value:
Not configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
75 | P a g e
2.6 Ensure that the User-ID service account does not have interactive
logon rights (Automated)
Profile Applicability:
Level 1
Description:
Restrict the User-ID service account from interactively logging on to systems in the Active
Directory domain.
Rationale:
Audit:
Remediation:
Default Value:
Not configured
76 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
77 | P a g e
2.7 Ensure remote access capabilities for the User-ID service account are
forbidden. (Automated)
Profile Applicability:
Level 1
Description:
Restrict the User-ID service account’s ability to gain remote access into the organization.
This capability could be made available through a variety of technologies, such as VPN,
Citrix GoToMyPC, or TeamViewer. Remote services that integrate authentication with the
organization’s Active Directory may unintentionally allow the User-ID service account to
gain remote access.
Rationale:
In the event of a compromised User-ID service account, restricting the account’s ability to
remotely access resources within the organization’s internal network reduces the impact of
a service account compromise.
Audit:
Remediation:
Remove this account from all groups that might grant remote access to the network, or to
any network services or hosts. Remediation is operating-system dependent. For instance,
in Windows Active Directory, this account should be removed from any group that grants
the account access to VPN or Wireless access. In addition, domain administrative accounts
by default have remote desktop (RDP) access to all domain member workstations - this
should be explicitly denied for this account.
Default Value:
Not configured
78 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
79 | P a g e
2.8 Ensure that security policies restrict User-ID Agent traffic from
crossing into untrusted zones (Manual)
Profile Applicability:
Level 1
Description:
Create security policies to deny Palo Alto User-ID traffic originating from the interface
configured for the UID Agent service that are destined to any untrusted zone.
Rationale:
If User-ID and WMI probes are sent to untrusted zones, the risk of privileged information
disclosure exists. The information disclosed can include the User-ID Agent service account
name, domain name, and encrypted password hashes sent in User-ID and WMI probes. To
prevent this exposure, msrpc traffic originating from the firewall to untrusted networks
should be explicitly denied. This security policy should be in effect even for environments
not currently using WMI probing to help guard against possible probe misconfigurations in
the future.
This setting is a "fail safe" to prevent exposure of this information if any of the other WMI
User control settings are misconfigured.
Audit:
Navigate to Device > Setup > Services > Services Features > Service Route
Configuration > Customize.
Click on the protocol in use (IPv4 and/or IPv6).
Click UID Agent.
Click on the address object for the UID Agent's IP address.
Verify SOURCE/NAME is set to 'Deny msrpc to untrusted'.
Verify SOURCE/ZONE is set to 'INSIDE'.
Verify SOURCE/Address is set to the Address object for the UID Agent.
Verify DESTINATION/ZONE is set to 'GUEST' and 'OUTSIDE'.
Verify DESTINATION/Address is set to 'any'.
Verify DESTINATION/Application is set to 'msrpc'.
Verify DESTINATION/Service is set to 'application-default'.
Verify DESTINATION/Action is set to 'Block' (red circle with diagonal line).
80 | P a g e
Remediation:
Navigate to Device > Setup > Services > Services Features > Service Route
Configuration > Customize.
Click on the protocol in use (IPv4 and/or IPv6).
Click UID Agent.
Click on the address object for the UID Agent's IP address.
Set SOURCE/NAME to 'Deny msrpc to untrusted'.
Set SOURCE/ZONE to 'INSIDE'.
Set SOURCE/Address to the Address object for the UID Agent.
Set DESTINATION/ZONE to 'GUEST' and 'OUTSIDE'.
Set DESTINATION/Address to 'any'.
Set DESTINATION/Application to 'msrpc'.
Set DESTINATION/Service to 'application-default'.
Set DESTINATION/Action to 'Block' (red circle with diagonal line).
References:
81 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
82 | P a g e
3 High Availability
The High Availability section includes requirements for High Availability peer
synchronization and monitoring.
Level 1
Description:
Ensure a High Availability peer is fully synchronized and in a passive or active state.
Rationale:
To ensure availability of both the firewall and the resources it protects, a High Availability
peer is required. In the event a single firewall fails, or when maintenance such as a
software update is required, the HA peer can be used to automatically fail over session
states and maintain overall availability
Impact:
Not configuring High Availability (HA) correctly directly impacts the Availability of the
system. With HA in place, standard maintenance such as OS updates, network and power
cabling can be accomplished with no outage or a minimum impact.
Audit:
Remediation:
83 | P a g e
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
84 | P a g e
3.2 Ensure 'High Availability' requires Link Monitoring and/or Path
Monitoring (Automated)
Profile Applicability:
Level 1
Description:
Configure Link Monitoring and/or Path Monitoring under High Availability options. If Link
Monitoring is utilized, all links critical to traffic flow should be monitored.
Rationale:
If Link or Path Monitoring is not enabled, the standby router will not automatically take
over as active if a critical link fails on the active firewall. Services through the firewall could
become unavailable as a result.
Impact:
Not configuring High Availability (HA) correctly directly impacts the Availability of the
system. With HA in place, standard maintenance such as OS updates, network and power
cabling can be accomplished with no outage or a minimum impact.
Without Link and Path monitoring in particular, failover will only occur when the primary
device fails completely. Link and path monitoring permits failover if a critical interface
loses link (either due to cabling or an upstream switch failover), or if a route or path fails
(indicating an upstream issue that affects local Layer 3).
Audit:
85 | P a g e
Verify Default setting is set to Any.
Verify Enabled button is checked.
Remediation:
Default Value:
Not Configured
References:
86 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
87 | P a g e
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured
appropriately (Automated)
Profile Applicability:
Level 1
Description:
Set the Passive Link State to auto, and uncheck the Preemptive option to disable it.
Rationale:
Simultaneously enabling the 'Preemptive' option and setting the 'Passive Link State' option
to 'Shutdown' could cause a 'preemptive loop' if Link and Path Monitoring are both
configured. This will negatively impact the availability of the firewall and network services,
should a monitored failure occur.
Impact:
Incorrectly configuring this setting will adversely affect availability, rather than positively
affect it.
Audit:
Remediation:
88 | P a g e
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
89 | P a g e
4 Dynamic Updates
The Dynamic Updates section covers requirements for scheduled downloads for antivirus
updates and for applications and threats updates.
Level 1
Description:
Rationale:
New antivirus definitions may be released at any time. With an hourly update schedule, the
firewall can ensure threats with new definitions are quickly mitigated. A daily update
schedule could leave an organization vulnerable to a known virus for nearly 24 hours, in a
worst-case scenario. Setting an appropriate threshold value reduces the risk of a bad
definition file negatively affecting traffic.
Audit:
Remediation:
Default Value:
Not Configured
90 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
91 | P a g e
4.2 Ensure 'Applications and Threats Update Schedule' is set to
download and install updates at daily or shorter intervals (Automated)
Profile Applicability:
Level 1
Description:
Set the Applications and Threats Update Schedule to download and install updates at daily
or shorter intervals.
Rationale:
New Applications and Threats file versions may be released at any time. With a frequent
update schedule, the firewall can ensure threats with new signatures are quickly mitigated,
and the latest application signatures are applied.
Audit:
Navigate to Device > Dynamic Updates > Application and Threats Update Schedule.
Verify that Action is set to Download and Install.
Verify that Recurrence is set to Daily, Hourly or Every 30 Minutes
Remediation:
Navigate to Device > Dynamic Updates > Application and Threats Update Schedule.
Set Action to Download and Install.
Set Recurrence to Daily, Hourly or Every 30 Minutes
Default Value:
References:
92 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
93 | P a g e
5 Wildfire
WildFire is a cloud-based virtual malware detection, analysis, and blocking service that is
native to Palo Alto next generation firewalls. The service detects and blocks targeted and
unknown malware, exploits, and outbound command and control activity by observing
malicious behavior in real time, rather than using pre-existing signatures. Post-analysis,
WildFire generates protections that are shared globally in about 15 minutes.
The WildFire section covers requirements related to WildFire file size upload limits, file
blocking profiles, decrypted content forwarding, session information settings, malicious file
alerts, and update downloads.
5.1 Ensure that WildFire file size upload limits are maximized
(Automated)
Profile Applicability:
Level 1
Description:
Increase WildFire file size limits to the maximum file size supported by the environment.
An organization with bandwidth constraints or heavy usage of unique files under a
supported file type may require lower settings. The recommendations account for the CPU
load on smaller platforms. If an organization consistently has CPU to spare, it's
recommended to set some or all of these values to the maximum.
Rationale:
Increasing file size limits allows the devices to forward more files for WildFire analysis.
This increases the chances of identifying, and later preventing, threats in larger files. The
default values are configured for files small enough that the majority of files are not
assessed by Wildfire.
Impact:
With the default values known, an attacker has only to send an infected file slightly over the
"maximum" size for that filetype to evade detection at the perimeter. Many of the values
are significantly lower than is typical for each file size.
94 | P a g e
Audit:
Remediation:
95 | P a g e
Default Value:
References:
CIS Controls:
v7 8 Malware Defenses
Malware Defenses
96 | P a g e
5.2 Ensure forwarding is enabled for all applications and file types in
WildFire file blocking profiles (Automated)
Profile Applicability:
Level 1
Description:
Set Applications and File Types fields to any in WildFire file blocking profiles. With a
WildFire license, seven file types are supported, while only PE (Portable Executable) files
are supported without a license. For the "web browsing" application, the action "continue"
can be selected. This still forwards the file to the Wildfire service, but also presents the end
user with a confirmation message before they receive the file. Selecting "continue" for any
other application will block the file (because the end user will not see the prompt). If there
is a "continue" rule, there should still be an "any traffic / any application / forward" rule
after that in the list.
Rationale:
Selecting 'Any' application and file type ensures WildFire is analyzing as many files as
possible.
Audit:
Remediation:
Default Value:
Predefined Security Profiles exist for "basic" and "strict" File Blocking.
97 | P a g e
References:
CIS Controls:
v7 8 Malware Defenses
Malware Defenses
98 | P a g e
5.3 Ensure a WildFire Analysis profile is enabled for all security policies
(Automated)
Profile Applicability:
Level 1
Description:
Ensure that all files traversing the firewall are inspected by WildFire by setting a Wildfire
file blocking profile on all security policies.
Rationale:
Traffic matching security policies that do not include a WildFire file blocking profile will
not utilize WildFire for file analysis. Wildfire analysis is one of the key security measures
available on this platform. Without Wildfire analysis enabled, inbound malware can only be
analyzed by signature - which industry wide is roughly 40-60% effective. In a targeted
attack, the success of signature-based-only analysis drops even further.
Audit:
Navigate to Objects > Security Profiles > WildFire Analysis Profile verify
that a profile exists.
For each Security Policy were the action is set to Allow, edit the Rule and navigate to
Actions > Profile Setting. Ensure that the WildFire Analysis is set to
Allow and verify that a profile is set.
99 | P a g e
Remediation:
Navigate to Objects > Security Profile Groups. Create a Security Profile Group,
and ensure that (among other settings) the Wildfire Analysis Profile is set to
the created profile.
Navigate to Policies > Security. For each Security Policy Rule where the action is
"Allow", Navigate to Actions > Profile Setting. Modify the Profile Type to
Group, and set the Group Profile to the created Security Profile Group.
Default Value:
Not Configured
References:
CIS Controls:
v7 8 Malware Defenses
Malware Defenses
100 | P a g e
5.4 Ensure forwarding of decrypted content to WildFire is enabled
(Automated)
Profile Applicability:
Level 1
Description:
Allow the firewall to forward decrypted content to WildFire. Note that SSL Forward-Proxy
must also be enabled and configured for this setting to take effect on inside-to-outside
traffic flows.
Rationale:
Audit:
Remediation:
Default Value:
Not Configured
References:
101 | P a g e
admin/submit-files-for-wildfire-analysis/forward-decrypted-ssl-traffic-for-wildfire-
analysis.html#
3. “Wildfire Administrator's Guide 9.0 (English) - Wildfire Best Practices" -
https://docs.paloaltonetworks.com/wildfire/9-0/wildfire-admin/wildfire-
deployment-best-practices/wildfire-best-practices.html#
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
v7 8 Malware Defenses
Malware Defenses
102 | P a g e
5.5 Ensure all WildFire session information settings are enabled
(Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Permitting the firewall to send all of this information to WildFire creates more detailed
reports, thereby making the process of tracking down potentially infected devices more
efficient. This could prevent an infected system from further infecting the environment.
Environments with security policies restricting sending this data to the WildFire cloud can
instead utilize an on-premises WildFire appliance. In addition, risk can be analyzed in the
context of the destination host and user account, either during analysis or during incident
response.
Audit:
Navigate to Device > Setup > WildFire > Session Information Settings.
Verify that every option is enabled.
Remediation:
Navigate to Device > Setup > WildFire > Session Information Settings.
Set every option to be enabled.
Default Value:
Source IP
Source port
Destination IP
Destination port
Virtual System
Application
User
URL
File name
103 | P a g e
Email sender
Email recipient
Email subject
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
104 | P a g e
5.6 Ensure alerts are enabled for malicious files detected by WildFire
(Automated)
Profile Applicability:
Level 1
Description:
Configure WildFire to send an alert when a malicious or greyware file is detected. This alert
could be sent by whichever means is preferable, including email, SNMP trap, or syslog
message.
Alternatively, configure the WildFire cloud to generate alerts for malicious files. The cloud
can generate alerts in addition to or instead of the local WildFire implementation. Note that
the destination email address of alerts configured in the WildFire cloud portal is tied to the
logged in account, and cannot be modified. Also, new systems added to the WildFire cloud
portal will not be automatically set to email alerts.
Rationale:
WildFire analyzes files that have already been downloaded and possibly executed. A
WildFire verdict of malicious indicates that a computer could already be infected. In
addition, because WildFire only analyzes files it has not already seen that were not flagged
by the firewall’s antivirus filter, files deemed malicious by WildFire are more likely to
evade detection by desktop antivirus products.
Audit:
Remediation:
105 | P a g e
Configure the Syslog Server:
Select Device > Server Profiles > Syslog > Add
Enter Name, Display Name, Syslog Server, Transport, Port, Format, Facility
Click OK
Click Commit to save the configuration
Configure the SMTP Server:
Select Device > Server Profiles > Email
Select Add, Name, Display Name, From, To, Additional Recipients, Gateway IP or
Hostname
Click OK
Click Commit to save the configuration
Navigate to Objects, Log Forwarding
Choose Add, set the log type to "wildfire", add the filter "(verdict neq benign)", then add log
destinations for SNMP, Syslog, Email or HTTP as required.
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
v7 8 Malware Defenses
Malware Defenses
106 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
107 | P a g e
5.7 Ensure 'WildFire Update Schedule' is set to download and install
updates every minute (Automated)
Profile Applicability:
Level 1
Description:
Set the WildFire update schedule to download and install updates every minute.
Rationale:
WildFire definitions may contain signatures to block immediate, active threats to the
environment. With a 1 minute update schedule, the firewall can ensure threats with new
definitions are quickly mitigated.
Audit:
Remediation:
Default Value:
Not Configured
References:
108 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
109 | P a g e
6 Security Profiles
The Security Profiles section covers requirements for several types of profiles, including
antivirus, anti-spyware, Vulnerability Protection Profiles, URL filtering, URL logging, data
filtering, and Zone Protection Profiles.
6.1 Ensure that antivirus profiles are set to block on all decoders except
'imap' and 'pop3' (Automated)
Profile Applicability:
Level 1
Description:
Configure antivirus profiles to a value of 'block' for all decoders except imap and pop3
under both Action and WildFire Action. If required by the organization's email
implementation, configure imap and pop3 decoders to 'alert' under both Action and
WildFire Action.
Rationale:
Antivirus signatures produce low false positives. By blocking any detected malware
through the specified decoders, the threat of malware propagation through the firewall is
greatly reduced. It is recommended to mitigate malware found in pop3 and imap through a
dedicated antivirus gateway. Due to the nature of the pop3 and imap protocols, the firewall
is not able to block only a single email message containing malware. Instead, the entire
session would be terminated, potentially affecting benign email messages.
Audit:
Remediation:
110 | P a g e
Default Value:
Not Configured
References:
CIS Controls:
v7 8 Malware Defenses
Malware Defenses
111 | P a g e
6.2 Ensure a secure antivirus profile is applied to all relevant security
policies (Automated)
Profile Applicability:
Level 1
Description:
Create a secure antivirus profile and apply it to all security policies that could pass HTTP,
SMTP, IMAP, POP3, FTP, or SMB traffic. The antivirus profile may be applied to the security
policies directly or through a profile group.
Rationale:
By applying a secure antivirus profile to all applicable traffic, the threat of malware
propagation through the firewall is greatly reduced. Without an antivirus profile assigned
to any potential hostile zone, the first protection in the path against malware is removed,
leaving in most cases only the desktop endpoint protection application to detect and
remediate any potential malware.
Impact:
Not having an AV Profile on a Security Policy allows signature-based malware to transit the
security boundary without blocks or alerts. In most cases this leaves only the Endpoint
Security application to block or alert malware.
Audit:
Remediation:
112 | P a g e
Default Value:
References:
CIS Controls:
v7 8 Malware Defenses
Malware Defenses
113 | P a g e
6.3 Ensure an anti-spyware profile is configured to block on all spyware
severity levels, categories, and threats (Automated)
Profile Applicability:
Level 1
Description:
If a single rule exists within the anti-spyware profile, configure it to block on any spyware
severity level, any category, and any threat. If multiple rules exist within the anti-spyware
profile, ensure all spyware categories, threats, and severity levels are set to be blocked.
Additional rules may exist for packet capture or exclusion purposes.
Rationale:
Requiring a blocking policy for all spyware threats, categories, and severities reduces the
risk of spyware traffic from successfully exiting the organization. Without an anti-spyware
profile assigned to any potential hostile zone, the first protection in the path against
malware is removed, leaving in most cases only the desktop endpoint protection
application to detect and remediate any potential spyware.
Audit:
Remediation:
Default Value:
Two Anti-Spyware Security Profiles are configured by default "strict" and "default".
References:
114 | P a g e
CIS Controls:
v7 8 Malware Defenses
Malware Defenses
115 | P a g e
6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in
use (Automated)
Profile Applicability:
Level 1
Description:
Configure DNS sinkholing for all anti-spyware profiles in use. All internal requests to the
selected sinkhole IP address must traverse the firewall. Any device attempting to
communicate with the DNS sinkhole IP address should be considered infected.
Rationale:
DNS sinkholing helps to identify infected clients by spoofing DNS responses for malware
domain queries. Without sinkholing, the DNS server itself may be seen as infected, while
the truly infected device remains unidentified. In addition, sinkholing also ensures that DNS
queries that might be indicators of compromise do not transit the internet, where they
could be potentially used to negatively impact the "ip reputation" of the organization's
internet network subnets.
Audit:
116 | P a g e
To verify correct operation of DNS Security, from an internal station make a DNS request to
each of the following hosts:
test-malware.testpanw.com to test Malware DNS Signature checks
test-c2.testpanw.com to test C2 DNS Signature checks
test-dga.testpanw.com to test DGA (Domain Generation Algorithm) DNS attack
checks
test-dnstun.testpanw.com to test DNS Tunneling attack checks
Each of these DNS requests should be redirected to the configured DNS Sinkhole
server IP address
Each of these DNS requests should appear in the firewall logs, under Monitor >
Logs > Threat. If configured, each of these requests should generate an alert in the
organization's SIEM.
Remediation:
Default Value:
Not Configured
117 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
v7 8 Malware Defenses
Malware Defenses
118 | P a g e
6.5 Ensure passive DNS monitoring is set to enabled on all anti-spyware
profiles in use (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Enabling passive DNS monitoring improves PAN’s threat prevention and threat intelligence
capabilities. This is performed without source information delivered to PAN to ensure
sensitive DNS information of the organization is not compromised.
Audit:
Navigate to Device > Setup > Telemetry. Ensure that Passive DNS Monitoring is
enabled
Remediation:
Navigate to Device > Setup > Telemetry. Set Passive DNS Monitoring to enabled
Default Value:
Not Configured
References:
1. “What Information is Submitted to the Palo Alto Networks when Enabling the
Passive DNS Feature” - https://live.paloaltonetworks.com/docs/DOC-7256
2. "PAN-OS Administrator's Guide 9.0 (English) - DNS Security" -
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-
prevention/dns-security.html#
119 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
v7 8 Malware Defenses
Malware Defenses
120 | P a g e
6.6 Ensure a secure anti-spyware profile is applied to all security policies
permitting traffic to the Internet (Manual)
Profile Applicability:
Level 1
Description:
Create one or more anti-spyware profiles and collectively apply them to all security policies
permitting traffic to the Internet. The anti-spyware profiles may be applied to the security
policies directly or through a profile group.
Rationale:
By applying secure anti-spyware profiles to all applicable traffic, the threat of sensitive data
exfiltration or command-and-control traffic successfully passing through the firewall is
greatly reduced. Anti-spyware profiles are not restricted to particular protocols like
antivirus profiles, so anti-spyware profiles should be applied to all security policies
permitting traffic to the Internet. Assigning an anti-spyware profile to each trusted zone
will quickly and easily identify trusted hosts that have been infected with spyware, by
identifying the infection from their outbound network traffic. In addition, that outbound
network traffic will be blocked by the profile.
Audit:
Remediation:
Default Value:
Not Configured
121 | P a g e
References:
CIS Controls:
v7 8 Malware Defenses
Malware Defenses
122 | P a g e
6.7 Ensure a Vulnerability Protection Profile is set to block attacks
against critical and high vulnerabilities, and set to default on medium,
low, and informational vulnerabilities (Automated)
Profile Applicability:
Level 1
Description:
Configure a Vulnerability Protection Profile set to block attacks against any critical or high
vulnerabilities, at minimum, and set to default on any medium, low, or informational
vulnerabilities. Configuring an alert action for low and informational, instead of default, will
produce additional information at the expense of greater log utilization.
Rationale:
Impact:
Not configuring a Vulnerability Protection Profile means that network attacks will not be
logged, alerted on or blocked.
Audit:
Remediation:
Default Value:
Two Vulnerability Protection Profiles are configured by default - "strict" and "default".
123 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
124 | P a g e
6.8 Ensure a secure Vulnerability Protection Profile is applied to all
security rules allowing traffic (Manual)
Profile Applicability:
Level 1
Description:
For any security rule allowing traffic, apply a securely configured Vulnerability Protection
Profile. Careful analysis of the target environment should be performed before
implementing this configuration, as outlined by PAN’s “Threat Prevention Deployment
Tech Note” in the references section.
Rationale:
Impact:
Not configuring a Vulnerability Protection Profile means that network attacks will not be
logged, alerted on or blocked.
Audit:
Remediation:
125 | P a g e
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
v7 8 Malware Defenses
Malware Defenses
126 | P a g e
6.9 Ensure that PAN-DB URL Filtering is used (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Standard URL filtering provides protection against inappropriate and malicious URLs and
IP addresses. PAN-DB URL Filtering is slightly less granular than the BrightCloud URL
filtering. However the PAN-DB Filter offers additional malware protection and PAN threat
intelligence by using the Wildfire service as an additional input, which is currently not
available in the BrightCloud URL Filtering license. This makes the PAN-DB filter more
responsive to specific malware "campaigns".
Impact:
Not having an effective URL Filtering configuration can leave an organization open to legal
action, internal HR issues, non-compliance with regulatory policies or productivity loss.
Audit:
Remediation:
Default Value:
Not Configured
References:
127 | P a g e
2. “PAN-OS Administrator's Guide 9.0 (English) - URL Filtering Best Practices":
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/url-filtering/url-
filtering-best-practices.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
128 | P a g e
6.10 Ensure that URL Filtering uses the action of “block” or “override”
on the URL categories (Manual)
Profile Applicability:
Level 1
Description:
Ideally, deciding which URL categories to block, and which to allow, is a joint effort
between IT and another entity of authority within an organization—such as the legal
department or administration. For most organizations, blocking or requiring an override
on the following categories represents a minimum baseline: adult, hacking, command-and-
control, copyright-infringement, extremism, malware, phishing, proxy-avoidance-and-
anonymizers, and parked. Some organizations may add "unknown" and "dynamic-dns" to
this list, at the expense of some support calls on those topics.
Rationale:
Impact:
Not having an effective URL Filtering configuration can leave an organization open to legal
action, internal HR issues, non-compliance with regulatory policies or productivity loss.
Audit:
Remediation:
129 | P a g e
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
130 | P a g e
6.11 Ensure that access to every URL is logged (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Setting a URL filter to have one or more entries under Allow Categories will cause no log
entries to be produced in the URL Filtering logs for access to URLs in those categories. For
forensic, legal, and HR purposes, it is advisable to log access to every URL. In many cases
failure to log all URL access is a violation of corporate policy, legal requirements or
regulatory requirements.
Impact:
Not having an effective URL Filtering configuration can leave an organization open to legal
action, internal HR issues, non-compliance with regulatory policies or productivity loss.
Audit:
Remediation:
Default Value:
A default URL Filtering Security Profile is configured, with the following categories set to
"block": abused-drugs adult gambling hacking malware phishing questionable weapons 3
Categories are set to alert in the default policy, and 58 Categories are set to allow (which
means they are not logged)
131 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
132 | P a g e
6.12 Ensure all HTTP Header Logging options are enabled (Manual)
Profile Applicability:
Level 1
Description:
Enable all options (User-Agent, Referer, and X-Forwarded-For) for HTTP header logging.
Rationale:
Logging HTTP header information provides additional information in the URL logs, which
may be useful during forensic investigations. The User-Agent option logs which browser
was used during the web session, which could provide insight to the vector used for
malware retrieval. The Referer option logs the source webpage responsible for referring
the user to the logged webpage. The X-Forwarded-For option is useful for preserving the
user’s source IP address, such as if a user traverses a proxy server prior to the firewall. Un-
checking the Log container page only box produces substantially more information about
web activity, with the expense of producing far more entries in the URL logs. If this option
remains checked, a URL filter log entry showing details of a malicious file download may
not exist.
Impact:
Not having an effective URL Filtering configuration can leave an organization open to legal
action, internal HR issues, non-compliance with regulatory policies or productivity loss.
Audit:
Navigate to Objects > Security Profiles > URL Filtering > URL Filtering Profile
> URL Filtering Settings.
Verify these four settings:
a. Log container page only box is un-checked
b. User-Agent box is checked
c. Referer box is checked
d. X-Forwarded-For box is checked
Remediation:
Navigate to Objects > Security Profiles > URL Filtering > URL Filtering Profile
> URL Filtering Settings.
Set the following four settings:
133 | P a g e
a. Log container page only box is un-checked
b. Check the User-Agent box
c. Check the Referer box
d. Check the X-Forwarded-For box
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
134 | P a g e
6.13 Ensure secure URL filtering is enabled for all security policies
allowing traffic to the Internet (Manual)
Profile Applicability:
Level 1
Description:
Apply a secure URL filtering profile to all security policies permitting traffic to the Internet.
The URL Filtering profile may be applied to the security policies directly or through a
profile group.
Rationale:
URL Filtering policies dramatically reduce the risk of users visiting malicious or
inappropriate websites. In addition, a complete URL history log for all devices is invaluable
when performing forensic analysis in the event of a security incident. Applying complete
and approved URL filtering to outbound traffic is a frequent requirement in corporate
policies, legal requirements or regulatory requirements.
Impact:
Not having an effective URL Filtering configuration can leave an organization open to legal
action, internal HR issues, non-compliance with regulatory policies or productivity loss.
Audit:
Remediation:
135 | P a g e
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
136 | P a g e
6.14 Ensure alerting after a threshold of credit card or Social Security
numbers is detected is enabled (Manual)
Profile Applicability:
Level 1
Description:
This guideline is highly specific to an organization. While blocking of credit card or Social
Security numbers will not occur with the recommended settings below, careful tuning is
also recommended.
Rationale:
Credit card and Social Security numbers are sensitive, and should never traverse an
organization’s Internet connection in clear text. Passing sensitive data within an
organization should also be avoided whenever possible. Detecting and blocking known
sensitive information is a basic protection against a data breach or data loss. Not
implementing these defenses can lead to loss of regulatory accreditation (such as PCI,
HIPAA etc), or can lead to legal action from injured parties or regulatory bodies.
Audit:
Remediation:
137 | P a g e
Navigate to Objects > Security Profiles > Data Filtering.
Create appropriate Data Filtering Profile, using the created Data Patterns. Ensure
that an Alert Threshold is set that generates alerts appropriately. A typical starting value
for Alert Threshold is 20, but this should be adjusted after appropriate testing.
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
138 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
139 | P a g e
6.15 Ensure a secure Data Filtering profile is applied to all security
policies allowing traffic to or from the Internet (Manual)
Profile Applicability:
Level 1
Description:
Create a secure Data Filtering profile and apply it to all security policies permitting traffic
to or from the Internet. The Data Filtering profile may be applied to security policies
directly or through a profile group.
Rationale:
A Data Filtering profile helps prevent certain types of sensitive information from traversing
an organization’s Internet connection, especially in clear text. Detecting and blocking
known sensitive information is a basic protection against a data breach or data loss. Not
implementing these defenses can lead to loss of regulatory accreditation (such as PCI,
HIPAA etc), or can lead to legal action from injured parties or regulatory bodies.
Before starting, be very aware that Data Filtering will often block data that you didn't
anticipate, false positives will definitely occur. Even the prebuilt filters will frequently
match on unintended data in files or websites. Work very closely with your user
community to ensure that required data is blocked or alerted on, but a minimum of false
positive blocks occur. As false positives occur, ensure that your user community has a clear
and timely procedure to get the configuration updated.
Audit:
Navigate to Objects > Custom Objects > Data Patterns. Verify that the patterns defined
match the various data that you wish to monitor or make blocking decisions on.
Navigate to Objects > Security Profiles > Data Filtering
For each Filtering Profile, verify that the Data Patterns defined matches the data you
wish to monitor, with appropriate values for Alert Threshold (typically 20), Block
Threshold (typically 0) and Log Severity.
Finally, navigate to Policies > Security. Open all appropriate policies, for each Policy
choose the Actions tab, and verify that the appropriate Data Filtering Policy is applied
(either as an individual Profile or as part of a Group Profile)
140 | P a g e
Remediation:
Navigate to Objects > Custom Objects > Data Patterns. Add patterns to match the
various data that you wish to monitor or make blocking decisions on.
Navigate to Objects > Security Profiles > Data Filtering
Add a Filtering Profile that matches the data you wish to monitor, with appropriate
values for Alert Threshold (typically 20), Block Threshold (typically 0) and Log
Serverity
Finally, apply the Filtering Profile to a Security Profile.
Navigate to Policies > Security. Edit all appropriate policies, and for each Policy choose
the Actions tab, and add the appropriate Data Filtering Policy (either as an individual
Profile or as part of a Group Profile)
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
141 | P a g e
6.16 Ensure that a Zone Protection Profile with an enabled SYN Flood
Action of SYN Cookies is attached to all untrusted zones (Automated)
Profile Applicability:
Level 1
Description:
Enable the SYN Flood Action of SYN Cookies for all untrusted zones. The Alert, Activate, and
Maximum settings for SYN Flood Protection depend highly on the environment and device
used. Perform traffic analysis on the specific environment and firewall to determine
accurate thresholds. Do not rely on default values to be appropriate for an environment.
Setting these values for all interfaces is an approach that should be considered by many
organizations, as traffic floods can result from internal testing or malware as well.
As a rough ballpark for most environments, an Activate value of 50% of the firewall’s
maximum “New sessions per second”/CPS is a conservative setting. The following is a list
of new sessions per second maximum for each platform:
Rationale:
Protecting resources and the firewall itself against DoS/DDoS attacks requires a layered
approach. Firewalls alone cannot mitigate all DoS attacks, however, many attacks can be
successfully mitigated. Utilizing SYN Cookies helps to mitigate SYN flood attacks, where the
CPU and/or memory buffers of the victim device become overwhelmed by incomplete TCP
sessions. SYN Cookies are preferred over Random Early Drop.
Impact:
Audit:
From GUI:
Navigate to Network > Network Profiles > Zone Protection > Zone Protection
Profile > Flood Protection tab.
Verify the SYN box is checked. Verify the Action dropdown is SYN Cookies. Verify Alert is
20000 (or appropriate for org). Verify Activate is 25000 (50% of maximum for firewall
model). Verify Maximum is 1000000 (or appropriate for org).
Navigate to Network > Zones >. Open the zone facing any untrusted network. Verify that
Zone Protection has the Zone Protection Profile set to the Profile created.
Remediation:
From GUI:
Navigate to Network > Network Profiles > Zone Protection > Zone Protection
Profile > Flood Protection tab.
Check the SYN box. Set the Action dropdown to SYN Cookies Set Alert to 20000 (or
appropriate for org). Set Activate to 25000 (50% of maximum for firewall model). Set
Maximum to 1000000 (or appropriate for org)
Navigate to Network > Zones >. Open the zone facing any untrusted network, if one does
not exist create it. Set Zone Protection to the Zone Protection Profile created.
Default Value:
Not Configured
References:
143 | P a g e
7. PANOS 9.0 Admin Guide - Zone Protection . Flood Protection:
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-
help/network/network-network-profiles/network-network-profiles-zone-
protection/flood-protection.html#
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
144 | P a g e
6.17 Ensure that a Zone Protection Profile with tuned Flood Protection
settings enabled for all flood types is attached to all untrusted zones
(Automated)
Profile Applicability:
Level 2
Description:
Enable all Flood Protection options in the Zone Protection Profile attached to all untrusted
zones. The Alert, Activate, and Maximum settings for Flood Protection depend highly on the
environment and device used. Perform traffic analysis on the specific environment and
firewall to determine accurate thresholds. Do not rely on default values to be appropriate
for an environment.
Setting these values for all interfaces is an approach that should be considered by many
organizations, as traffic floods can result from internal testing or malware as well.
Rationale:
Without flood protection, it may be possible for an attacker, through the use of a botnet or
other means, to overwhelm network resources. Flood protection does not completely
eliminate this risk; rather, it provides a layer of protection. Without a properly configured
zone protection profile applied to untrusted interfaces, the protected / trusted networks
are susceptible to large number of attacks. While many of these involve denial of service,
some of these attacks are designed to evade IPS systems (fragmentation attacks for
instance) or to evade basic firewall protections (source routing and record route attacks).
Impact:
Not configuring and applying a Network Zone Protection Profile leaves an organization
exposed to common attacks and reconnaissance from untrusted networks.
Not configuring a Zone Protection Profile for internal networks leaves an organization
vulnerable to malware, software or hardware causes of traffic flooding from internal
sources.
Audit:
In the GUI:
Navigate to Network > Network Profiles > Zone Protection > Flood Protection.
145 | P a g e
Ensure that all settings are enabled with at least the default values.
Navigate to Network > Zones, select each untrusted zone in turn, and ensure that the Zone
Protection Profile is set.
Remediation:
In the GUI:
Navigate to Network > Network Profiles > Zone Protection > Flood Protection.
Set all settings to "enabled" with at least the default values.
Navigate to Network > Zones, select each untrusted zone in turn, and set the Zone
Protection Profile.
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
146 | P a g e
6.18 Ensure that all zones have Zone Protection Profiles with all
Reconnaissance Protection settings enabled, tuned, and set to
appropriate actions (Manual)
Profile Applicability:
Level 1
Description:
Enable all three scan options in a Zone Protection profile. Do not configure an action of
Allow for any scan type. The exact interval and threshold values must be tuned to the
specific environment. Less aggressive settings are typically appropriate for trusted zones,
such as setting an action of alert for all scan types.
Attach appropriate Zone Protection profiles meeting these criteria to all zones. Separate
Zone Protection profiles for trusted and untrusted zones is a best practice.
Rationale:
Port scans and host sweeps are common in the reconnaissance phase of an attack. Bots
scouring the Internet in search of a vulnerable target may also scan for open ports and
available hosts. Reconnaissance Protection will allow for these attacks to be either alerted
on or blocked altogether.
Impact:
Audit:
Navigate to Network > Network Profiles > Zone Protection > Zone Protection
Profile > Reconnaissance Protection.
Verify that TCP Port Scan is enabled, its Action is set to block-ip, its Interval is set to 5,
and its Threshold is set to 20.
Verify that Host Sweep is enabled, its Action is set to block, its Interval is set to 10, and its
Threshold is set to 30.
Verify that UDP Port Scan is enabled, its Action is set to alert, its Interval is set to 10, and
its Threshold is set to 20.
147 | P a g e
Remediation:
Navigate to Network > Network Profiles > Zone Protection > Zone Protection
Profile > Reconnaissance Protection.
Set TCP Port Scan to enabled, its Action to block-ip, its Interval to 5, and its Threshold to
20.
Set Host Sweep to enabled, its Action to block, its Interval to 10, and its Threshold to 30.
Set UDP Port Scan to enabled, its Action to alert, its Interval to 10, and its Threshold to 20.
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
v7 12 Boundary Defense
Boundary Defense
148 | P a g e
Controls
Control IG 1 IG 2 IG 3
Version
ensure that only authorized protocols are allowed to cross the network boundary in or
out of the network at each of the organization's network boundaries.
149 | P a g e
6.19 Ensure all zones have Zone Protection Profiles that drop specially
crafted packets (Automated)
Profile Applicability:
Level 1
Description:
For all zones, attach a Zone Protection Profile that is configured to drop packets with a
spoofed IP address or a mismatched overlapping TCP segment, and packets with
malformed, strict source routing, or loose source routing IP options set.
Rationale:
Using specially crafted packets, an attacker may attempt to evade or diminish the
effectiveness of network security devices. Enabling the options in this recommendation
lowers the risk of these attacks.
Impact:
Audit:
Navigate to Network > Network Profiles > Zone Protection > Zone Protection
Profile > Packet Based Attack Protection > TCP/IP Drop.
Verify Spoofed IP address is checked.
Verify Mismatched overlapping TCP segment is checked.
Under IP Option Drop, verify that Strict Source Routing, Loose Source Routing, and
Malformed are all checked. Additional options may also be checked.
Remediation:
Navigate to Network > Network Profiles > Zone Protection > Zone Protection
Profile > Packet Based Attack Protection > TCP/IP Drop.
Set Spoofed IP address to be checked.
Set Mismatched overlapping TCP segment to be checked.
Under IP Option Drop, set Strict Source Routing, Loose Source Routing, and
Malformed to all be checked. Additional options may also be set if desired.
150 | P a g e
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
v7 12 Boundary Defense
Boundary Defense
151 | P a g e
6.20 Ensure that User Credential Submission uses the action of “block”
or “continue” on the URL categories (Manual)
Profile Applicability:
Level 1
Description:
Ideally user names and passwords user within an organization are not used with third
party sites. Some sanctioned SAS applications may have connections to the corporate
domain, in which case they will need to be exempt from the user credential submission
policy through a custom URL category.
Rationale:
Preventing users from having the ability to submit their corporate credentials to the
Internet could stop credential phishing attacks and the potential that a breach at a site
where a user reused credentials could lead to a credential stuffing attack.
Impact:
Not preventing users from submitting their corporate credentials to the Internet can leave
them open to phishing attacks or allow for credential reuse on unauthorized sites. Using
internal email accounts provides malicious actors with intelligence information, which can
be used for phishing, credential stuffing and other attacks. Using internal passwords will
often provide authenticated access directly to sensitive information. Not only that, but a
pattern of credential re-use can expose personal information from multiple online sources.
Audit:
Remediation:
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
153 | P a g e
7 Security Policies
The Security Policies section covers requirements for application and service security
policies.
7.1 Ensure application security policies exist when allowing traffic from
an untrusted zone to a more trusted zone (Manual)
Profile Applicability:
Level 1
Level 2
Description:
When permitting traffic from an untrusted zone, such as the Internet or guest network, to a
more trusted zone, such as a DMZ segment, create security policies specifying which
specific applications are allowed.
Rationale:
To avoid unintentionally exposing systems and services, rules allowing traffic from
untrusted zones to trusted zones should be as specific as possible. Application-based rules,
as opposed to service/port rules, further tighten what traffic is allowed to pass. Similarly,
traffic from trusted to untrusted networks should have a security policy set, with
application-based rules. A "catch-all" rule that allows all applications will also allow
malware traffic. The goal should be to understand both inbound and outbound traffic,
permit what is known, and block all other traffic.
Impact:
Setting application based rules on both inbound and outbound traffic ensures that the
traffic on the protocol and port being specified is actually the application that you expect.
For outbound traffic, the days of "we trust our users" is well past us, that statement also
implies that we trust the malware on the user workstations, which is obviously not the
case.
154 | P a g e
For traffic from trusted to less trusted interfaces, the applications should be characterized
over time, with the end goal being that all applications in in the rules, and a final "block all"
rule is in place. Not having this goal gives both attackers and malware the leeway they need
to accomplish their goals.
Trusting only Port permissions to control traffic exposes an organization to "tunneling"
style attacks that can exfiltrate data or facilitate Command and Control (C2) sessions.
Audit:
application-default
or:
service-http and/or service-https
Remediation:
application-default
or:
155 | P a g e
service-http and/or service-https
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
156 | P a g e
7.2 Ensure 'Service setting of ANY' in a security policy allowing traffic
does not exist (Manual)
Profile Applicability:
Level 1
Description:
Create security policies specifying application-default for the Service setting, in addition to
the specific ports desired. The Service setting of any should not be used for any policies that
allow traffic.
Rationale:
App-ID requires a number of packets to traverse the firewall before an application can be
identified and either allowed or dropped. Due to this behavior, even when an application is
defined in a security policy, a service setting of any may allow a device in one zone to
perform ports scans on IP addresses in a different zone. In addition, this recommendation
helps to avoid an App-ID cache pollution attack.
Because of how App-ID works, configuring the service setting to "Any" allows some initial
traffic to reach the target host before App-ID can recognize and appropriately restrict the
traffic. Setting the Service Setting to application specific at least restricts the traffic to the
target applications or protocols for that initial volume of traffic.
Audit:
Source tab: Zone set to OUTSIDE Address set to any
Destination tab: Zone set to DMZ / Address set to <DMZ Host Object>
Application tab: Application set to web-browsing (or appropriate application)
Service tab: Service set to application-default. The value of any should never be
used
157 | P a g e
Remediation:
Source tab: Zone set to OUTSIDE Address set to any
Destination tab: Zone set to DMZ / Address set to <DMZ Host Object>
Application tab: Application set to web-browsing (or appropriate application)
Service tab: Service set to application-default. The value of any should never be
used
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
158 | P a g e
7.3 Ensure 'Security Policy' denying any/all traffic to/from IP addresses
on Trusted Threat Intelligence Sources Exists (Manual)
Profile Applicability:
Level 1
Description:
Create a pair of security rules at the top of the security policies ruleset to block traffic to
and from IP addresses known to be malicious.
Note: This recommendation (as written) requires a Palo Alto "Active Threat License". Third
Party and Open Source Threat Intelligence Feeds can also be used for this purpose.
Rationale:
Creating rules that block traffic to/from known malicious sites from Trusted Threat
Intelligence Sources protects you against IP addresses that Palo Alto Networks has proven
to be used almost exclusively to distribute malware, initiate command-and-control activity,
and launch attacks.
Impact:
While not foolproof, simply blocking traffic from known malicious hosts allows more
resources to be devoted to analyzing traffic from other sources for malicious content. This
approach is a recommended part of most "Defense in Depth" recommendations, allowing
defenders to focus more deeply on traffic from uncategorized sources.
Audit:
General tab: Name set to Deny to Malicious IP
Source tab: Source Zone set to Any,
Destination tab: Destination Zone set to Any, Destination Address set to Palo
Alto Networks - Known malicious IP addresses
Application tab: Application set to Any
159 | P a g e
Service/URL Category tab: Service set to Any
Actions tab: Action set to Block, Profile Type set to None
General tab: Name set to Deny from Malicious IP
Source tab: Source Zone set to Any, Source Address set to Palo Alto Networks -
Known malicious IP addresses
Destination tab: Destination Zone set to Any
Application tab: Application set to Any
Service/URL Category tab: Service set to Any
Actions tab: Action set to Block, Profile Type set to None
Remediation:
General tab: Name set to Deny to Malicious IP
Source tab: Source Zone set to Any,
Destination tab: Destination Zone set to Any, Destination Address set to Palo
Alto Networks - Known malicious IP addresses
Application tab: Application set to Any
Service/URL Category tab: Service set to Any
Actions tab: Action set to Block, Profile Type set to None
160 | P a g e
General tab: Name set to Deny from Malicious IP
Source tab: Source Zone set to Any, Source Address set to Palo Alto Networks -
Known malicious IP addresses
Destination tab: Destination Zone set to Any
Application tab: Application set to Any
Service/URL Category tab: Service set to Any
Actions tab: Action set to Block, Profile Type set to None
Default Value:
Not Configured
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
161 | P a g e
8 Decryption
The Decryption section covers requirements for the SSL Forward Proxy policy and the SSL
Inbound Inspection policy.
8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the Internet
is configured (Automated)
Profile Applicability:
Level 1
Description:
Configure SSL Forward Proxy for all traffic destined to the Internet. In most organizations,
including all categories except financial-services, government and health-and-
medicine is recommended.
Rationale:
Without SSL inspection, the firewall cannot apply many of its protection features against
encrypted traffic. The amount of encrypted malware traffic continues to rise, and legitimate
websites using SSL encryption are hacked or tricked into delivering malware on a frequent
basis. As encryption on the Internet continues to grow at a rapid rate, SSL inspection is no
longer optional as a practical security measure. If proper decryption is not configured, it
follows that the majority of traffic is not being fully inspected for malicious content or
policy violations. This is a major exposure, allowing delivery of exploits and payloads direct
to user desktops.
Impact:
Failure to decrypt outbound traffic allows attackers to mask attacks, data exfiltration
and/or command and control (C2) traffic by simply using standard TLS encryption. Privacy
concerns for your organization's users will dictate that some common categories should be
exempted from inspection and decryption. Personal banking or healthcare information is
almost always exempted, as are interactions with government entities. Exemptions and
inclusions to decryption policies should be negotiated internally and governed by
published Corporate Policies.
162 | P a g e
Audit:
Source tab: The Source Zone and/or Source Address should include all target
internal networks. Source User should include all target internal users
Destination tab: The Destination Zone should include the untrusted target zone
(usually the internet). Destination Address is typically Any for an internet
destination.
Service/URL Category tab: Verify that all URL Category entries are included except
financial-services, government and health-and-medicine (this list may vary
depending on your organization and its policies).
Options tab: Verify that the Type is set to SSL Forward Proxy
Remediation:
Source tab: The Source Zone and/or Source Address should include all target
internal networks. Source User should include all target internal users
Destination tab: The Destination Zone should include the untrusted target zone
(usually the internet). Destination Address is typically Any for an internet
destination.
Service/URL Category tab: all URL Category entries should be included except
financial-services, government and health-and-medicine (this list may vary
depending on your organization and its policies).
Options tab: Type set to SSL Forward Proxy
Default Value:
Not Configured
163 | P a g e
References:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
164 | P a g e
8.2 Ensure 'SSL Inbound Inspection' is required for all untrusted traffic
destined for servers using SSL or TLS (Manual)
Profile Applicability:
Level 1
Description:
Configure SSL Inbound Inspection for all untrusted traffic destined for servers using SSL or
TLS.
Rationale:
Without SSL Inbound Inspection, the firewall is not able to protect SSL or TLS-enabled
webservers against many threats.
Impact:
Not decrypting inbound traffic to TLS encrypted services means that inspection for many
common attacks cannot occur on the firewall. This means that all defenses against these
attacks are up to the host.
Audit:
General tab: Name set to a descriptive name
Source: Source Zone set to the target zone (Internet in many cases). Source
Address set to the target address space (Any for internet traffic)
Destination tab: Destination Zone should be set to the appropriate zone, or Any.
Destination Address set to the target host address
Options tab: Type set to SSL Inbound Inspection
165 | P a g e
Remediation:
General tab: Name set to a descriptive name
Source: Source Zone set to the target zone (Internet in many cases). Source
Address set to the target address space (Any for internet traffic)
Destination tab: Destination Zone should be set to the appropriate zone, or Any.
Destination Address set to the target host address
Options tab: Type set to SSL Inbound Inspection
Default Value:
Not Configured
References:
166 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
167 | P a g e
8.3 Ensure that the Certificate used for Decryption is Trusted (Manual)
Profile Applicability:
Level 1
Level 2
Description:
The CA Certificate used for in-line HTTP Man in the Middle should be trusted by target
users. For SSL Forward Proxy configurations, there are classes of users that need to be
considered.
1: Users that are members of the organization, users of machines under control of the
organization. For these people and machines, ensure that the CA Certificate is in one of the
Trusted CA certificate stores. This is easily done in Active Directory, using Group Policies
for instance. A MDM (Mobile Device Manager) can be used to accomplish the same task for
mobile devices such as telephones or tablets. Other central management or orchestration
tools can be used for Linux or "IoT" (Internet of Things) devices.
2: Users that are not member of the organization - often these are classed as "Visitors" in
the policies of the organization. If a public CA Certificate is a possibility for your
organization, then that is one approach. A second approach is to not decrypt affected traffic
- this is easily done, but leaves the majority of "visitor" traffic uninspected and potentially
carrying malicious content. The final approach, and the one most commonly seen, is to use
the same certificate as is used for the hosting organization. In this last case, visitors will see
a certificate warning, but the issuing CA will be the organization that they are visiting.
Rationale:
Using a self-signed certificate, or any certificate that generates a warning in the browser,
means that members of the organization have no method of determining if they are being
presented with a legitimate certificate, or an attacker's "man in the middle' certificate. It
also very rapidly teaches members of the organization to bypass all security warnings of
this type.
Audit:
168 | P a g e
Verify that appropriate internal certificates are imported, and that all certificates in
the list are valid. In particular, verify the Subject, Issuer, CA, Expires, Algorithm
and Usage fields
Alternatively, if an internal CA is implemented on the firewall, verify that target
clients have the root certificate for this CA imported into their list of trusted
certificate authorities.
Verify the Certificate Profile needed for the SSL Forward Proxy:
Remediation:
Set the decryption profile to include the settings described in the SSL Forward Proxy
guidance in this document
Default Value:
References:
169 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
170 | P a g e
Appendix: Recommendation Summary
Table
Control Set
Correctly
Yes No
1 Device Setup
1.1 General Settings
1.1.1 Ensure System Logging to a Remote Host
1.1.1.1 Syslog logging should be configured (Automated)
1.1.1.2 SNMPv3 traps should be configured (Automated)
1.1.2 Ensure 'Login Banner' is set (Automated)
1.1.3 Ensure 'Enable Log on High DP Load' is enabled
(Automated)
1.2 Management Interface Settings
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for
device management (Automated)
1.2.2 Ensure 'Permitted IP Addresses' is set for all management
profiles where SSH, HTTPS, or SNMP is enabled
(Automated)
1.2.3 Ensure HTTP and Telnet options are disabled for the
management interface (Automated)
1.2.4 Ensure HTTP and Telnet options are disabled for all
management profiles (Automated)
1.2.5 Ensure valid certificate is set for browser-based
administrator interface (Automated)
1.3 Minimum Password Requirements
1.3.1 Ensure 'Minimum Password Complexity' is enabled
(Automated)
1.3.2 Ensure 'Minimum Length' is greater than or equal to 12
(Automated)
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or
equal to 1 (Automated)
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or
equal to 1 (Automated)
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal
to 1 (Automated)
1.3.6 Ensure 'Minimum Special Characters' is greater than or
equal to 1 (Automated)
1.3.7 Ensure 'Required Password Change Period' is less than or
equal to 90 days (Automated)
171 | P a g e
1.3.8 Ensure 'New Password Differs By Characters' is greater than
or equal to 3 (Automated)
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more
passwords (Automated)
1.3.10 Ensure 'Password Profiles' do not exist (Automated)
1.4 Authentication Settings (for Device Mgmt)
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
device management (Automated)
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for
Authentication Profile are properly configured (Automated)
1.5 SNMP Polling Settings
1.5.1 Ensure 'V3' is selected for SNMP polling (Automated)
1.6 Device Services Settings
1.6.1 Ensure 'Verify Update Server Identity' is enabled
(Automated)
1.6.2 Ensure redundant NTP servers are configured appropriately
(Automated)
1.6.3 Ensure that the Certificate Securing Remote Access VPNs is
Valid (Automated)
2 User Identification
2.1 Ensure that IP addresses are mapped to usernames
(Automated)
2.2 Ensure that WMI probing is disabled (Automated)
2.3 Ensure that User-ID is only enabled for internal trusted
interfaces (Automated)
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is
enabled (Automated)
2.5 Ensure that the User-ID Agent has minimal permissions if
User-ID is enabled (Manual)
2.6 Ensure that the User-ID service account does not have
interactive logon rights (Automated)
2.7 Ensure remote access capabilities for the User-ID service
account are forbidden. (Automated)
2.8 Ensure that security policies restrict User-ID Agent traffic
from crossing into untrusted zones (Manual)
3 High Availability
3.1 Ensure a fully-synchronized High Availability peer is
configured (Automated)
3.2 Ensure 'High Availability' requires Link Monitoring and/or
Path Monitoring (Automated)
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured
appropriately (Automated)
4 Dynamic Updates
172 | P a g e
4.1 Ensure 'Antivirus Update Schedule' is set to download and
install updates hourly (Automated)
4.2 Ensure 'Applications and Threats Update Schedule' is set to
download and install updates at daily or shorter intervals
(Automated)
5 Wildfire
5.1 Ensure that WildFire file size upload limits are maximized
(Automated)
5.2 Ensure forwarding is enabled for all applications and file
types in WildFire file blocking profiles (Automated)
5.3 Ensure a WildFire Analysis profile is enabled for all security
policies (Automated)
5.4 Ensure forwarding of decrypted content to WildFire is
enabled (Automated)
5.5 Ensure all WildFire session information settings are enabled
(Automated)
5.6 Ensure alerts are enabled for malicious files detected by
WildFire (Automated)
5.7 Ensure 'WildFire Update Schedule' is set to download and
install updates every minute (Automated)
6 Security Profiles
6.1 Ensure that antivirus profiles are set to block on all
decoders except 'imap' and 'pop3' (Automated)
6.2 Ensure a secure antivirus profile is applied to all relevant
security policies (Automated)
6.3 Ensure an anti-spyware profile is configured to block on all
spyware severity levels, categories, and threats
(Automated)
6.4 Ensure DNS sinkholing is configured on all anti-spyware
profiles in use (Automated)
6.5 Ensure passive DNS monitoring is set to enabled on all anti-
spyware profiles in use (Automated)
6.6 Ensure a secure anti-spyware profile is applied to all
security policies permitting traffic to the Internet (Manual)
6.7 Ensure a Vulnerability Protection Profile is set to block
attacks against critical and high vulnerabilities, and set to
default on medium, low, and informational vulnerabilities
(Automated)
6.8 Ensure a secure Vulnerability Protection Profile is applied to
all security rules allowing traffic (Manual)
6.9 Ensure that PAN-DB URL Filtering is used (Manual)
6.10 Ensure that URL Filtering uses the action of “block” or
“override” on the <enterprise approved value> URL
categories (Manual)
173 | P a g e
6.11 Ensure that access to every URL is logged (Manual)
6.12 Ensure all HTTP Header Logging options are enabled
(Manual)
6.13 Ensure secure URL filtering is enabled for all security
policies allowing traffic to the Internet (Manual)
6.14 Ensure alerting after a threshold of credit card or Social
Security numbers is detected is enabled (Manual)
6.15 Ensure a secure Data Filtering profile is applied to all
security policies allowing traffic to or from the Internet
(Manual)
6.16 Ensure that a Zone Protection Profile with an enabled SYN
Flood Action of SYN Cookies is attached to all untrusted
zones (Automated)
6.17 Ensure that a Zone Protection Profile with tuned Flood
Protection settings enabled for all flood types is attached to
all untrusted zones (Automated)
6.18 Ensure that all zones have Zone Protection Profiles with all
Reconnaissance Protection settings enabled, tuned, and set
to appropriate actions (Manual)
6.19 Ensure all zones have Zone Protection Profiles that drop
specially crafted packets (Automated)
6.20 Ensure that User Credential Submission uses the action of
“block” or “continue” on the URL categories (Manual)
7 Security Policies
7.1 Ensure application security policies exist when allowing
traffic from an untrusted zone to a more trusted zone
(Manual)
7.2 Ensure 'Service setting of ANY' in a security policy allowing
traffic does not exist (Manual)
7.3 Ensure 'Security Policy' denying any/all traffic to/from IP
addresses on Trusted Threat Intelligence Sources Exists
(Manual)
8 Decryption
8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the
Internet is configured (Automated)
8.2 Ensure 'SSL Inbound Inspection' is required for all
untrusted traffic destined for servers using SSL or TLS
(Manual)
8.3 Ensure that the Certificate used for Decryption is Trusted
(Manual)
174 | P a g e
175 | P a g e
Appendix: CIS Controls v7 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1.1 Syslog logging should be configured
1.1.1.2 SNMPv3 traps should be configured
1.1.3 Ensure 'Enable Log on High DP Load' is enabled
1.3.2 Ensure 'Minimum Length' is greater than or equal to 12
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or
equal to 1
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or
equal to 1
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal
to 1
1.3.7 Ensure 'Required Password Change Period' is less than or
equal to 90 days
1.3.8 Ensure 'New Password Differs By Characters' is greater than
or equal to 3
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more
passwords
1.3.10 Ensure 'Password Profiles' do not exist
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
device management
1.6.1 Ensure 'Verify Update Server Identity' is enabled
2.3 Ensure that User-ID is only enabled for internal trusted
interfaces
4.1 Ensure 'Antivirus Update Schedule' is set to download and
install updates hourly
4.2 Ensure 'Applications and Threats Update Schedule' is set to
download and install updates at daily or shorter intervals
5.5 Ensure all WildFire session information settings are enabled
5.6 Ensure alerts are enabled for malicious files detected by
WildFire
5.7 Ensure 'WildFire Update Schedule' is set to download and
install updates every minute
6.11 Ensure that access to every URL is logged
6.12 Ensure all HTTP Header Logging options are enabled
6.14 Ensure alerting after a threshold of credit card or Social
Security numbers is detected is enabled
176 | P a g e
6.18 Ensure that all zones have Zone Protection Profiles with all
Reconnaissance Protection settings enabled, tuned, and set
to appropriate actions
177 | P a g e
Appendix: CIS Controls v7 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1.1 Syslog logging should be configured
1.1.1.2 SNMPv3 traps should be configured
1.1.3 Ensure 'Enable Log on High DP Load' is enabled
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for
device management
1.2.2 Ensure 'Permitted IP Addresses' is set for all management
profiles where SSH, HTTPS, or SNMP is enabled
1.2.3 Ensure HTTP and Telnet options are disabled for the
management interface
1.2.4 Ensure HTTP and Telnet options are disabled for all
management profiles
1.2.5 Ensure valid certificate is set for browser-based
administrator interface
1.3.1 Ensure 'Minimum Password Complexity' is enabled
1.3.2 Ensure 'Minimum Length' is greater than or equal to 12
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or
equal to 1
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or
equal to 1
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal
to 1
1.3.7 Ensure 'Required Password Change Period' is less than or
equal to 90 days
1.3.8 Ensure 'New Password Differs By Characters' is greater than
or equal to 3
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more
passwords
1.3.10 Ensure 'Password Profiles' do not exist
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
device management
1.5.1 Ensure 'V3' is selected for SNMP polling
1.6.1 Ensure 'Verify Update Server Identity' is enabled
1.6.2 Ensure redundant NTP servers are configured appropriately
1.6.3 Ensure that the Certificate Securing Remote Access VPNs is
Valid
178 | P a g e
2.2 Ensure that WMI probing is disabled
2.3 Ensure that User-ID is only enabled for internal trusted
interfaces
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is
enabled
2.8 Ensure that security policies restrict User-ID Agent traffic
from crossing into untrusted zones
4.1 Ensure 'Antivirus Update Schedule' is set to download and
install updates hourly
4.2 Ensure 'Applications and Threats Update Schedule' is set to
download and install updates at daily or shorter intervals
5.5 Ensure all WildFire session information settings are enabled
5.6 Ensure alerts are enabled for malicious files detected by
WildFire
5.7 Ensure 'WildFire Update Schedule' is set to download and
install updates every minute
6.4 Ensure DNS sinkholing is configured on all anti-spyware
profiles in use
6.5 Ensure passive DNS monitoring is set to enabled on all anti-
spyware profiles in use
6.8 Ensure a secure Vulnerability Protection Profile is applied to
all security rules allowing traffic
6.9 Ensure that PAN-DB URL Filtering is used
6.10 Ensure that URL Filtering uses the action of “block” or
“override” on the <enterprise approved value> URL
categories
6.11 Ensure that access to every URL is logged
6.12 Ensure all HTTP Header Logging options are enabled
6.13 Ensure secure URL filtering is enabled for all security
policies allowing traffic to the Internet
6.14 Ensure alerting after a threshold of credit card or Social
Security numbers is detected is enabled
6.18 Ensure that all zones have Zone Protection Profiles with all
Reconnaissance Protection settings enabled, tuned, and set
to appropriate actions
7.2 Ensure 'Service setting of ANY' in a security policy allowing
traffic does not exist
7.3 Ensure 'Security Policy' denying any/all traffic to/from IP
addresses on Trusted Threat Intelligence Sources Exists
179 | P a g e
Appendix: CIS Controls v7 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1.1 Syslog logging should be configured
1.1.1.2 SNMPv3 traps should be configured
1.1.3 Ensure 'Enable Log on High DP Load' is enabled
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for
device management
1.2.2 Ensure 'Permitted IP Addresses' is set for all management
profiles where SSH, HTTPS, or SNMP is enabled
1.2.3 Ensure HTTP and Telnet options are disabled for the
management interface
1.2.4 Ensure HTTP and Telnet options are disabled for all
management profiles
1.2.5 Ensure valid certificate is set for browser-based
administrator interface
1.3.1 Ensure 'Minimum Password Complexity' is enabled
1.3.2 Ensure 'Minimum Length' is greater than or equal to 12
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or
equal to 1
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or
equal to 1
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal
to 1
1.3.7 Ensure 'Required Password Change Period' is less than or
equal to 90 days
1.3.8 Ensure 'New Password Differs By Characters' is greater than
or equal to 3
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more
passwords
1.3.10 Ensure 'Password Profiles' do not exist
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
device management
1.5.1 Ensure 'V3' is selected for SNMP polling
1.6.1 Ensure 'Verify Update Server Identity' is enabled
1.6.2 Ensure redundant NTP servers are configured appropriately
1.6.3 Ensure that the Certificate Securing Remote Access VPNs is
Valid
180 | P a g e
2.1 Ensure that IP addresses are mapped to usernames
2.2 Ensure that WMI probing is disabled
2.3 Ensure that User-ID is only enabled for internal trusted
interfaces
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is
enabled
2.8 Ensure that security policies restrict User-ID Agent traffic
from crossing into untrusted zones
4.1 Ensure 'Antivirus Update Schedule' is set to download and
install updates hourly
4.2 Ensure 'Applications and Threats Update Schedule' is set to
download and install updates at daily or shorter intervals
5.4 Ensure forwarding of decrypted content to WildFire is
enabled
5.5 Ensure all WildFire session information settings are enabled
5.6 Ensure alerts are enabled for malicious files detected by
WildFire
5.7 Ensure 'WildFire Update Schedule' is set to download and
install updates every minute
6.4 Ensure DNS sinkholing is configured on all anti-spyware
profiles in use
6.5 Ensure passive DNS monitoring is set to enabled on all anti-
spyware profiles in use
6.7 Ensure a Vulnerability Protection Profile is set to block
attacks against critical and high vulnerabilities, and set to
default on medium, low, and informational vulnerabilities
6.8 Ensure a secure Vulnerability Protection Profile is applied to
all security rules allowing traffic
6.9 Ensure that PAN-DB URL Filtering is used
6.10 Ensure that URL Filtering uses the action of “block” or
“override” on the <enterprise approved value> URL
categories
6.11 Ensure that access to every URL is logged
6.12 Ensure all HTTP Header Logging options are enabled
6.13 Ensure secure URL filtering is enabled for all security
policies allowing traffic to the Internet
6.14 Ensure alerting after a threshold of credit card or Social
Security numbers is detected is enabled
6.15 Ensure a secure Data Filtering profile is applied to all
security policies allowing traffic to or from the Internet
6.16 Ensure that a Zone Protection Profile with an enabled SYN
Flood Action of SYN Cookies is attached to all untrusted
zones
181 | P a g e
6.17 Ensure that a Zone Protection Profile with tuned Flood
Protection settings enabled for all flood types is attached to
all untrusted zones
6.18 Ensure that all zones have Zone Protection Profiles with all
Reconnaissance Protection settings enabled, tuned, and set
to appropriate actions
6.19 Ensure all zones have Zone Protection Profiles that drop
specially crafted packets
7.2 Ensure 'Service setting of ANY' in a security policy allowing
traffic does not exist
7.3 Ensure 'Security Policy' denying any/all traffic to/from IP
addresses on Trusted Threat Intelligence Sources Exists
8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the
Internet is configured
8.2 Ensure 'SSL Inbound Inspection' is required for all
untrusted traffic destined for servers using SSL or TLS
8.3 Ensure that the Certificate used for Decryption is Trusted
182 | P a g e
Appendix: CIS Controls v8 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1.1 Syslog logging should be configured
1.1.1.2 SNMPv3 traps should be configured
1.1.2 Ensure 'Login Banner' is set
1.1.3 Ensure 'Enable Log on High DP Load' is enabled
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for
device management
1.2.2 Ensure 'Permitted IP Addresses' is set for all management
profiles where SSH, HTTPS, or SNMP is enabled
1.2.3 Ensure HTTP and Telnet options are disabled for the
management interface
1.2.4 Ensure HTTP and Telnet options are disabled for all
management profiles
1.2.5 Ensure valid certificate is set for browser-based
administrator interface
1.3.1 Ensure 'Minimum Password Complexity' is enabled
1.3.2 Ensure 'Minimum Length' is greater than or equal to 12
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or
equal to 1
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or
equal to 1
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal
to 1
1.3.6 Ensure 'Minimum Special Characters' is greater than or
equal to 1
1.3.7 Ensure 'Required Password Change Period' is less than or
equal to 90 days
1.3.8 Ensure 'New Password Differs By Characters' is greater than
or equal to 3
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more
passwords
1.3.10 Ensure 'Password Profiles' do not exist
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
device management
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for
Authentication Profile are properly configured
183 | P a g e
1.6.1 Ensure 'Verify Update Server Identity' is enabled
2.2 Ensure that WMI probing is disabled
2.3 Ensure that User-ID is only enabled for internal trusted
interfaces
2.5 Ensure that the User-ID Agent has minimal permissions if
User-ID is enabled
2.8 Ensure that security policies restrict User-ID Agent traffic
from crossing into untrusted zones
3.1 Ensure a fully-synchronized High Availability peer is
configured
3.2 Ensure 'High Availability' requires Link Monitoring and/or
Path Monitoring
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured
appropriately
4.1 Ensure 'Antivirus Update Schedule' is set to download and
install updates hourly
4.2 Ensure 'Applications and Threats Update Schedule' is set to
download and install updates at daily or shorter intervals
5.1 Ensure that WildFire file size upload limits are maximized
5.2 Ensure forwarding is enabled for all applications and file
types in WildFire file blocking profiles
5.3 Ensure a WildFire Analysis profile is enabled for all security
policies
5.4 Ensure forwarding of decrypted content to WildFire is
enabled
5.5 Ensure all WildFire session information settings are enabled
5.6 Ensure alerts are enabled for malicious files detected by
WildFire
5.7 Ensure 'WildFire Update Schedule' is set to download and
install updates every minute
6.1 Ensure that antivirus profiles are set to block on all
decoders except 'imap' and 'pop3'
6.2 Ensure a secure antivirus profile is applied to all relevant
security policies
6.3 Ensure an anti-spyware profile is configured to block on all
spyware severity levels, categories, and threats
6.6 Ensure a secure anti-spyware profile is applied to all
security policies permitting traffic to the Internet
6.14 Ensure alerting after a threshold of credit card or Social
Security numbers is detected is enabled
6.15 Ensure a secure Data Filtering profile is applied to all
security policies allowing traffic to or from the Internet
184 | P a g e
6.18 Ensure that all zones have Zone Protection Profiles with all
Reconnaissance Protection settings enabled, tuned, and set
to appropriate actions
6.19 Ensure all zones have Zone Protection Profiles that drop
specially crafted packets
6.20 Ensure that User Credential Submission uses the action of
“block” or “continue” on the URL categories
7.1 Ensure application security policies exist when allowing
traffic from an untrusted zone to a more trusted zone
7.2 Ensure 'Service setting of ANY' in a security policy allowing
traffic does not exist
7.3 Ensure 'Security Policy' denying any/all traffic to/from IP
addresses on Trusted Threat Intelligence Sources Exists
8.3 Ensure that the Certificate used for Decryption is Trusted
185 | P a g e
Appendix: CIS Controls v8 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1.1 Syslog logging should be configured
1.1.1.2 SNMPv3 traps should be configured
1.1.2 Ensure 'Login Banner' is set
1.1.3 Ensure 'Enable Log on High DP Load' is enabled
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for
device management
1.2.2 Ensure 'Permitted IP Addresses' is set for all management
profiles where SSH, HTTPS, or SNMP is enabled
1.2.3 Ensure HTTP and Telnet options are disabled for the
management interface
1.2.4 Ensure HTTP and Telnet options are disabled for all
management profiles
1.2.5 Ensure valid certificate is set for browser-based
administrator interface
1.3.1 Ensure 'Minimum Password Complexity' is enabled
1.3.2 Ensure 'Minimum Length' is greater than or equal to 12
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or
equal to 1
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or
equal to 1
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal
to 1
1.3.6 Ensure 'Minimum Special Characters' is greater than or
equal to 1
1.3.7 Ensure 'Required Password Change Period' is less than or
equal to 90 days
1.3.8 Ensure 'New Password Differs By Characters' is greater than
or equal to 3
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more
passwords
1.3.10 Ensure 'Password Profiles' do not exist
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
device management
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for
Authentication Profile are properly configured
186 | P a g e
1.5.1 Ensure 'V3' is selected for SNMP polling
1.6.1 Ensure 'Verify Update Server Identity' is enabled
1.6.2 Ensure redundant NTP servers are configured appropriately
2.2 Ensure that WMI probing is disabled
2.3 Ensure that User-ID is only enabled for internal trusted
interfaces
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is
enabled
2.5 Ensure that the User-ID Agent has minimal permissions if
User-ID is enabled
2.6 Ensure that the User-ID service account does not have
interactive logon rights
2.8 Ensure that security policies restrict User-ID Agent traffic
from crossing into untrusted zones
3.1 Ensure a fully-synchronized High Availability peer is
configured
3.2 Ensure 'High Availability' requires Link Monitoring and/or
Path Monitoring
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured
appropriately
4.1 Ensure 'Antivirus Update Schedule' is set to download and
install updates hourly
4.2 Ensure 'Applications and Threats Update Schedule' is set to
download and install updates at daily or shorter intervals
5.1 Ensure that WildFire file size upload limits are maximized
5.2 Ensure forwarding is enabled for all applications and file
types in WildFire file blocking profiles
5.3 Ensure a WildFire Analysis profile is enabled for all security
policies
5.4 Ensure forwarding of decrypted content to WildFire is
enabled
5.5 Ensure all WildFire session information settings are enabled
5.6 Ensure alerts are enabled for malicious files detected by
WildFire
5.7 Ensure 'WildFire Update Schedule' is set to download and
install updates every minute
6.1 Ensure that antivirus profiles are set to block on all
decoders except 'imap' and 'pop3'
6.2 Ensure a secure antivirus profile is applied to all relevant
security policies
6.3 Ensure an anti-spyware profile is configured to block on all
spyware severity levels, categories, and threats
6.4 Ensure DNS sinkholing is configured on all anti-spyware
profiles in use
187 | P a g e
6.5 Ensure passive DNS monitoring is set to enabled on all anti-
spyware profiles in use
6.6 Ensure a secure anti-spyware profile is applied to all
security policies permitting traffic to the Internet
6.7 Ensure a Vulnerability Protection Profile is set to block
attacks against critical and high vulnerabilities, and set to
default on medium, low, and informational vulnerabilities
6.8 Ensure a secure Vulnerability Protection Profile is applied to
all security rules allowing traffic
6.9 Ensure that PAN-DB URL Filtering is used
6.10 Ensure that URL Filtering uses the action of “block” or
“override” on the <enterprise approved value> URL
categories
6.11 Ensure that access to every URL is logged
6.12 Ensure all HTTP Header Logging options are enabled
6.13 Ensure secure URL filtering is enabled for all security
policies allowing traffic to the Internet
6.14 Ensure alerting after a threshold of credit card or Social
Security numbers is detected is enabled
6.15 Ensure a secure Data Filtering profile is applied to all
security policies allowing traffic to or from the Internet
6.18 Ensure that all zones have Zone Protection Profiles with all
Reconnaissance Protection settings enabled, tuned, and set
to appropriate actions
6.19 Ensure all zones have Zone Protection Profiles that drop
specially crafted packets
6.20 Ensure that User Credential Submission uses the action of
“block” or “continue” on the URL categories
7.1 Ensure application security policies exist when allowing
traffic from an untrusted zone to a more trusted zone
7.2 Ensure 'Service setting of ANY' in a security policy allowing
traffic does not exist
7.3 Ensure 'Security Policy' denying any/all traffic to/from IP
addresses on Trusted Threat Intelligence Sources Exists
8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the
Internet is configured
8.2 Ensure 'SSL Inbound Inspection' is required for all
untrusted traffic destined for servers using SSL or TLS
8.3 Ensure that the Certificate used for Decryption is Trusted
188 | P a g e
Appendix: CIS Controls v8 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1.1 Syslog logging should be configured
1.1.1.2 SNMPv3 traps should be configured
1.1.2 Ensure 'Login Banner' is set
1.1.3 Ensure 'Enable Log on High DP Load' is enabled
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for
device management
1.2.2 Ensure 'Permitted IP Addresses' is set for all management
profiles where SSH, HTTPS, or SNMP is enabled
1.2.3 Ensure HTTP and Telnet options are disabled for the
management interface
1.2.4 Ensure HTTP and Telnet options are disabled for all
management profiles
1.2.5 Ensure valid certificate is set for browser-based
administrator interface
1.3.1 Ensure 'Minimum Password Complexity' is enabled
1.3.2 Ensure 'Minimum Length' is greater than or equal to 12
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or
equal to 1
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or
equal to 1
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal
to 1
1.3.6 Ensure 'Minimum Special Characters' is greater than or
equal to 1
1.3.7 Ensure 'Required Password Change Period' is less than or
equal to 90 days
1.3.8 Ensure 'New Password Differs By Characters' is greater than
or equal to 3
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more
passwords
1.3.10 Ensure 'Password Profiles' do not exist
1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
device management
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for
Authentication Profile are properly configured
189 | P a g e
1.5.1 Ensure 'V3' is selected for SNMP polling
1.6.1 Ensure 'Verify Update Server Identity' is enabled
1.6.2 Ensure redundant NTP servers are configured appropriately
1.6.3 Ensure that the Certificate Securing Remote Access VPNs is
Valid
2.1 Ensure that IP addresses are mapped to usernames
2.2 Ensure that WMI probing is disabled
2.3 Ensure that User-ID is only enabled for internal trusted
interfaces
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is
enabled
2.5 Ensure that the User-ID Agent has minimal permissions if
User-ID is enabled
2.6 Ensure that the User-ID service account does not have
interactive logon rights
2.7 Ensure remote access capabilities for the User-ID service
account are forbidden.
2.8 Ensure that security policies restrict User-ID Agent traffic
from crossing into untrusted zones
3.1 Ensure a fully-synchronized High Availability peer is
configured
3.2 Ensure 'High Availability' requires Link Monitoring and/or
Path Monitoring
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured
appropriately
4.1 Ensure 'Antivirus Update Schedule' is set to download and
install updates hourly
4.2 Ensure 'Applications and Threats Update Schedule' is set to
download and install updates at daily or shorter intervals
5.1 Ensure that WildFire file size upload limits are maximized
5.2 Ensure forwarding is enabled for all applications and file
types in WildFire file blocking profiles
5.3 Ensure a WildFire Analysis profile is enabled for all security
policies
5.4 Ensure forwarding of decrypted content to WildFire is
enabled
5.5 Ensure all WildFire session information settings are enabled
5.6 Ensure alerts are enabled for malicious files detected by
WildFire
5.7 Ensure 'WildFire Update Schedule' is set to download and
install updates every minute
6.1 Ensure that antivirus profiles are set to block on all
decoders except 'imap' and 'pop3'
190 | P a g e
6.2 Ensure a secure antivirus profile is applied to all relevant
security policies
6.3 Ensure an anti-spyware profile is configured to block on all
spyware severity levels, categories, and threats
6.4 Ensure DNS sinkholing is configured on all anti-spyware
profiles in use
6.5 Ensure passive DNS monitoring is set to enabled on all anti-
spyware profiles in use
6.6 Ensure a secure anti-spyware profile is applied to all
security policies permitting traffic to the Internet
6.7 Ensure a Vulnerability Protection Profile is set to block
attacks against critical and high vulnerabilities, and set to
default on medium, low, and informational vulnerabilities
6.8 Ensure a secure Vulnerability Protection Profile is applied to
all security rules allowing traffic
6.9 Ensure that PAN-DB URL Filtering is used
6.10 Ensure that URL Filtering uses the action of “block” or
“override” on the <enterprise approved value> URL
categories
6.11 Ensure that access to every URL is logged
6.12 Ensure all HTTP Header Logging options are enabled
6.13 Ensure secure URL filtering is enabled for all security
policies allowing traffic to the Internet
6.14 Ensure alerting after a threshold of credit card or Social
Security numbers is detected is enabled
6.15 Ensure a secure Data Filtering profile is applied to all
security policies allowing traffic to or from the Internet
6.16 Ensure that a Zone Protection Profile with an enabled SYN
Flood Action of SYN Cookies is attached to all untrusted
zones
6.17 Ensure that a Zone Protection Profile with tuned Flood
Protection settings enabled for all flood types is attached to
all untrusted zones
6.18 Ensure that all zones have Zone Protection Profiles with all
Reconnaissance Protection settings enabled, tuned, and set
to appropriate actions
6.19 Ensure all zones have Zone Protection Profiles that drop
specially crafted packets
6.20 Ensure that User Credential Submission uses the action of
“block” or “continue” on the URL categories
7.1 Ensure application security policies exist when allowing
traffic from an untrusted zone to a more trusted zone
7.2 Ensure 'Service setting of ANY' in a security policy allowing
traffic does not exist
191 | P a g e
7.3 Ensure 'Security Policy' denying any/all traffic to/from IP
addresses on Trusted Threat Intelligence Sources Exists
8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the
Internet is configured
8.2 Ensure 'SSL Inbound Inspection' is required for all
untrusted traffic destined for servers using SSL or TLS
8.3 Ensure that the Certificate used for Decryption is Trusted
192 | P a g e
Appendix: Change History
Date Version Changes for this version
193 | P a g e