CIS provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and materials from the CIS website or elsewhere (“Products”) as a public service to Internet users worldwide. CIS Hardened Images are available for use in nearly all major cloud computing platforms and are easy to deploy and manage. As per my understanding CIS benchmark have levels i.e 1 and 2. 2 | Page Background. Mitigating Risk with CIS Benchmarks for Microsoft Windows Server That is how we have implemented CIS security benchmarks. With unlimited scans available via CIS-CAT Lite, your organization can download and start implementing CIS Benchmarks in minutes. CIS Benchmarks Audit - bash script which performs tests against your CentOS system to give an indication of whether the running server may comply with the CIS v2.2.0 Benchmarks for CentOS (only CentOS 7 for now) Windows security chef-cookbook windows-10 hardening cis-benchmark Updated Aug 5, 2018; Ruby; jpboyce / cb_cis_windows_2016 Star 11 Code Issues Pull requests Chef Cookbook for applying CIS Benchmark settings to Windows 2016 systems. Download LGPO.zip & LAPS x64.msi and export it to C:\CIS. Applying CIS benchmark hardening is best done using Domain GPO, segregated by domain controllers and member servers. Open Local Group Policy Editor with gpedit.msc and configure the GPO based on CIS Benchmark. Depending on your environment and how much your can restrict your environment. ansible-cis-hardening-windows. Export the configured GPO to C:\Temp. Ansible playbooks for configuring CIS Microsoft Windows Server Benchmarks The tool is available in two varieties: v3 and v4. #Export existing Local GPO , /b specify the path for the exported GPO setting, /n for notes only LGPO.exe /b c:\Temp /n "CIS" LGPO.exe v2.2 - Local Group Policy Object utility Creating LGPO … System hardening should be a mandatory requirement. CIS Hardened Images were designed and configured in compliance with CIS Benchmarks and Controls and have been recognized to be fully compliant with various regulatory compliance organizations. CIS benchmarks provide incredible depth – so following them can be considered a burden. The Windows CIS Benchmarks are written for Active Directory domain-joined systems using Group Policy, not standalone/workgroup systems. The Windows CIS Benchmarks are written for Active Directory domain-joined systems using Group Policy, not standalone/workgroup systems. In my previous post, we discussed the CIS Benchmarks and system hardening. Version 3 primarily offers scans of local systems, while version 4 offers the robust CIS Controls Assessment Module and offers local and remote system assessment. If you missed it, please check it out here so you can follow along. Recommendations contained in the Products (“Recommendations”) result from a consensus-building process that I have been assigned an task for hardening of windows server based on CIS benchmark. More than half of these failures were high-severity issues. Steps should be : Adjustments/tailoring to some recommendations will be needed to maintain functionality if attempting to implement CIS hardening on standalone systems or a system running in the cloud. fyi - existing production environment running on AWS. Adjustments/tailoring to some recommendations will be needed to maintain functionality if attempting to implement CIS hardening on standalone systems. If you are familiar with the Benchmarks and would love to learn how you can automate implementation with Ansible, please keep reading.. With that said, there are numerous ways in which you can automate system hardening using the Benchmarks …