Open adammontville opened 5 years ago
Inputs 1) List of endpoints 2) Approved configuration(s) for command line auditing of command shells (note: there may be multiple configurations based on the various types of endpoints, including various operating systems, etc.)
Operations
1) For each endpoint in Input 1, examine the endpoint to see if it is configured according to the appropriate approved configuration(s) from Input 2.
2) Create a list of endpoints that meet the approved configuration (M1)
3) Create a list of endpoints that do not meet the approved configuration (M2), noting the deviations.
Measures
Optional Measures:
Metrics Ratio of endpoints compliant with command shell logging configurations: M1 / M2
Enable command-line audit logging for command shells, such as Microsoft PowerShell and Bash.
Measures
Metrics