CIS Benchmarks Audit - bash script which performs tests against your CentOS system to give an indication of whether the running server may comply with the CIS v2.2.0 Benchmarks for CentOS (only CentOS 7 for now) Windows #Export existing Local GPO , /b specify the path for the exported GPO setting, /n for notes only LGPO.exe /b c:\Temp /n "CIS" LGPO.exe v2.2 - Local Group Policy Object utility Creating LGPO … As per my understanding CIS benchmark have levels i.e 1 and 2. Adjustments/tailoring to some recommendations will be needed to maintain functionality if attempting to implement CIS hardening on standalone systems or a system running in the cloud. CIS Hardened Images are available for use in nearly all major cloud computing platforms and are easy to deploy and manage. If you missed it, please check it out here so you can follow along. The Windows CIS Benchmarks are written for Active Directory domain-joined systems using Group Policy, not standalone/workgroup systems. That is how we have implemented CIS security benchmarks. Depending on your environment and how much your can restrict your environment. 2 | Page Background. In my previous post, we discussed the CIS Benchmarks and system hardening. Applying CIS benchmark hardening is best done using Domain GPO, segregated by domain controllers and member servers. CIS provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and materials from the CIS website or elsewhere (“Products”) as a public service to Internet users worldwide. System hardening should be a mandatory requirement. Version 3 primarily offers scans of local systems, while version 4 offers the robust CIS Controls Assessment Module and offers local and remote system assessment. CIS benchmarks provide incredible depth – so following them can be considered a burden. If you are familiar with the Benchmarks and would love to learn how you can automate implementation with Ansible, please keep reading.. With that said, there are numerous ways in which you can automate system hardening using the Benchmarks … Mitigating Risk with CIS Benchmarks for Microsoft Windows Server Adjustments/tailoring to some recommendations will be needed to maintain functionality if attempting to implement CIS hardening on standalone systems. ansible-cis-hardening-windows. security chef-cookbook windows-10 hardening cis-benchmark Updated Aug 5, 2018; Ruby; jpboyce / cb_cis_windows_2016 Star 11 Code Issues Pull requests Chef Cookbook for applying CIS Benchmark settings to Windows 2016 systems. The tool is available in two varieties: v3 and v4. Recommendations contained in the Products (“Recommendations”) result from a consensus-building process that I have been assigned an task for hardening of windows server based on CIS benchmark. CIS Hardened Images were designed and configured in compliance with CIS Benchmarks and Controls and have been recognized to be fully compliant with various regulatory compliance organizations. Export the configured GPO to C:\Temp. The Windows CIS Benchmarks are written for Active Directory domain-joined systems using Group Policy, not standalone/workgroup systems. Steps should be : More than half of these failures were high-severity issues. Ansible playbooks for configuring CIS Microsoft Windows Server Benchmarks Open Local Group Policy Editor with gpedit.msc and configure the GPO based on CIS Benchmark. fyi - existing production environment running on AWS. With unlimited scans available via CIS-CAT Lite, your organization can download and start implementing CIS Benchmarks in minutes. Download LGPO.zip & LAPS x64.msi and export it to C:\CIS.