Definition of Australian Signals Directorate Information Security Manual for ol8
based on https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism
0418: Credentials are kept separate from systems they are used to authenticate to, except for when performing authentication activities.
Description: None
Levels:
Automated: yes
Selections:
0421: Passphrases used for single-factor authentication are at least 4 random words with a total minimum length of 14 characters, unless more stringent requirements apply.
Description: None
Levels:
Automated: yes
Selections:
0422: Passphrases used for single-factor authentication on TOP SECRET systems are at least 6 random words with a total minimum length of 20 characters.
Description: None
Levels:
Automated: yes
Selections:
0484: SSH daemon configuration
Description: None
Levels:
Automated: no
Selections:
0487: Passwordless SSH Connections Configuration
Description: None
Levels:
Automated: no
No rules selected
0582: Central Logging for OS Events
Description: None
Levels:
Automated: yes
Selections:
0846: All users (with the exception of local administrator accounts and break glass accounts) cannot disable, bypass or be exempted from application control.
Description: None
Levels:
Automated: yes
Selections:
0974: Multi-factor authentication is used to authenticate unprivileged users of systems.
Description: None
Levels:
Automated: no
Selections:
0988: An accurate time source is established and used consistently across systems to assist with identifying connections between events.
Description: None
Levels:
Automated: yes
Selections:
1034: A HIPS is implemented on critical servers and high-value servers.
Description: None
Levels:
Automated: yes
Selections:
1055: LAN Manager and NT LAN Manager authentication methods are disabled.
Description: None
Levels:
Automated: no
Selections:
1173: Multi-factor authentication is used to authenticate privileged users of systems.
Description: None
Levels:
Automated: yes
Selections:
1277: Data communicated between database servers and web servers is encrypted.
Description: None
Levels:
Automated: no
Selections:
1288: Files imported or exported via gateways or CDSs undergo antivirus scanning using multiple different scanning engines.
Description: None
Levels:
Automated: no
Selections:
1311: SNMP version 1 and SNMP version 2 are not used on networks.
Description: None
Levels:
Automated: no
Selections:
1315: The administrative interface on wireless access points is disabled for wireless network connections.
Description: None
Levels:
Automated: yes
Selections:
1319: Static addressing is not used for assigning IP addresses on wireless networks.
Description: None
Levels:
Automated: no
Selections:
1341: A HIPS is implemented on workstations.
Description: None
Levels:
Automated: yes
Selections:
1386: Network management traffic can only originate from administrative infrastructure.
Description: None
Levels:
Automated: no
Selections:
1401: Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.
Description: None
Levels:
Automated: no
Selections:
1402: Credentials stored on systems are protected by a password manager; a hardware security module; or by salting, hashing and stretching them before storage within a database
Description: None
Levels:
Automated: yes
Selections:
1405: A centralised event logging facility is implemented and event logs are sent to the facility as soon as possible after they occur.
Description: None
Levels:
Automated: yes
Selections:
1416: A software firewall is implemented on workstations and servers to restrict inbound and outbound network connections to an organisation-approved set of applications and services.
Description: None
Levels:
Automated: yes
Selections:
1417: Antivirus software is implemented on workstations and server.
Description: None
Levels:
Automated: no
Selections:
1418: If there is no business requirement for reading from removable media and devices, such functionality is disabled via the use of device access control software or by disabling external communication interfaces
Description: None
Levels:
Automated: yes
Selections:
1446: When using elliptic curve cryptography, a suitable curve from NIST SP 800-186 is used.
Description: None
Levels:
Automated: yes
Selections:
1449: SSH private keys are protected with a passphrase or a key encryption key
Description: None
Levels:
Automated: no
Selections:
1467: The latest release of office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are used.
Description: None
Levels:
Automated: yes
Selections:
1483: The latest release of internet-facing server applications are used.
Description: None
Levels:
Automated: yes
Selections:
1491: Unprivileged users are prevented from running script execution engines.
Description: None
Levels:
Automated: yes
Selections:
1493: Software registers for workstations, servers, network devices and other ICT equipment are developed, implemented, maintained and verified on a regular basis.
Description: None
Levels:
Automated: yes
Selections:
1504: Multi-factor authentication is used to authenticate users to their organisation’s online services that process, store or communicate their organisation’s sensitive data.
Description: None
Levels:
Automated: no
Selections:
1505: Multi-factor authentication is used to authenticate users of data repositories.
Description: None
Levels:
Automated: no
Selections:
1506: The use of SSH version 1 is disabled for SSH connections.
Description: None
Levels:
Automated: no
No rules selected
1546: Users are authenticated before they are granted access to a system and its resources
Description: None
Levels:
Automated: yes
Selections:
1552: All web application content is offered exclusively using HTTPS.
Description: None
Levels:
Automated: no
Selections:
1557: Passphrases used for single-factor authentication on SECRET systems are at least 5 random words with a total minimum length of 17 characters.
Description: None
Levels:
Automated: no
Selections:
1558: Passphrases used for single-factor authentication are not a list of categorised words; do not form a real sentence in a natural language; and are not constructed from song lyrics, movies, literature or any other publicly available material.
Description: None
Levels:
Automated: yes
Selections:
1559: Memorised secrets used for multi-factor authentication are a minimum of 6 characters, unless more stringent requirements apply.
Description: None
Levels:
Automated: yes
Selections:
1560: Memorised secrets used for multi-factor authentication on SECRET systems are a minimum of 8 characters
Description: None
Levels:
Automated: yes
Selections:
1561: Memorised secrets used for multi-factor authentication on TOP SECRET systems are a minimum of 10 characters.
Description: None
Levels:
Automated: yes
Selections: