PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: air traffic controller

Auditing System Configurations and Content - Tenable, Inc.

Nessus Compliance Checks Auditing System Configurations and Content January 25, 2017 Copyright 2016. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. 2 Table of Contents Introduction .. 5 Prerequisites .. 5 Nessus and SecurityCenter Customers .. 5 Standards and Conventions .. 5 Compliance Standards .. 6 Configuration Audits, Data Leakage, and Compliance .. 6 What is an audit? .. 6 Audit vs. Vulnerability Scan .. 7 Example Audit Items .. 7 Windows .. 7 Unix .. 8 Cisco .. 8 Huawei .. 8 Palo Alto Firewall .. 9 IBM iSeries.

• Center for Internet Security Benchmarks (CIS) • Control Objectives for Information and related Technology (COBIT) • Defense Information Systems Agency (DISA) STIGs • Federal Information Security Management Act (FISMA) • Federal Desktop Core Configuration (FDCC) • Gramm-Leach-Bliley Act (GLBA)

Tags:

  Internet

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of Auditing System Configurations and Content - Tenable, Inc.

Related search queries