CIS F5 Networks Benchmark v1 0 0
CIS F5 Networks Benchmark v1 0 0
v1.0.0 - 11-01-2021
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
1|Page
Table of Contents
2|Page
4.1 Ensure Prelogin 'Login Banner' is set (Manual) .......................................................... 34
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for SSH connections
(Manual) ............................................................................................................................................. 36
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for tmsh sessions
(Manual) ............................................................................................................................................. 38
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for serial console
sessions (Manual) ........................................................................................................................... 40
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-cbc (Manual) ... 42
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256 (Manual)............................ 44
4.7 Ensure to set Strong SSH KEY Exchange algorithm (Manual) ................................ 46
4.8 Ensure access SSH to CLI interface is restricted to needed IP addresses only
(Manual) ............................................................................................................................................. 48
5 System ............................................................................................................................................................ 50
5.1 Ensure redundant NTP servers are configured appropriately (Manual) .......... 50
5.2 Ensure to exclude inode information from ETags HTTP Header (Manual) ...... 52
5.3 Ensure port lockdown for self IP is set (Manual) ........................................................ 54
5.4 Ensure to disable unused services in BIG-IP configuration (Manual) ................ 56
6 Monitoring and Auditing ........................................................................................................................ 58
6.1 Ensure that SNMP access is allowed to trusted agents IPs only (Manual) ........ 58
6.2 Ensure minimum SNMP version is set to V3 for agent access (Manual)............ 60
6.3 Ensure to lockdown access logs to "Administrator , Resource Administrator
and Auditor " roles only (Manual) ............................................................................................ 62
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to enabled (Manual)
................................................................................................................................................................ 63
6.5 Ensure that Remote Syslog Servers are configured (Manual) ............................... 65
Appendix: Recommendation Summary Table ........................................................................................ 67
Appendix: CIS Controls v7 IG 1 Mapped Recommendations ............................................................ 69
Appendix: CIS Controls v7 IG 2 Mapped Recommendations ............................................................ 70
Appendix: CIS Controls v7 IG 3 Mapped Recommendations ............................................................ 72
Appendix: CIS Controls v8 IG 1 Mapped Recommendations ............................................................ 74
Appendix: CIS Controls v8 IG 2 Mapped Recommendations ............................................................ 76
Appendix: CIS Controls v8 IG 3 Mapped Recommendations ............................................................ 78
3|Page
Appendix: Change History .............................................................................................................................. 80
4|Page
Overview
This document provides prescriptive guidance for establishing a secure configuration
posture for F5 Networks.
To obtain the latest version of this guide, please visit http://benchmarks.cisecurity.org. If
you have questions, comments, or have identified ways to improve this guide, please write
us at [email protected].
Intended Audience
This benchmark is intended for system and application administrators, security specialists,
auditors, help desk, and platform deployment personnel who plan to develop, deploy,
assess, or secure solutions that incorporate F5 Networks family of products
Consensus Guidance
This benchmark was created using a consensus review process comprised of subject
matter experts. Consensus participants provide perspective from a diverse set of
backgrounds including consulting, software development, audit and compliance, security
research, operations, government, and legal.
Each CIS benchmark undergoes two phases of consensus review. The first phase occurs
during initial benchmark development. During this phase, subject matter experts convene
to discuss, create, and test working drafts of the benchmark. This discussion occurs until
consensus has been reached on benchmark recommendations. The second phase begins
after the benchmark has been published. During this phase, all feedback provided by the
Internet community is reviewed by the consensus team for incorporation in the
benchmark. If you are interested in participating in the consensus process, please visit
https://workbench.cisecurity.org/.
5|Page
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Stylized Monospace font Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.
Monospace font Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.
<italic font in brackets> Italic texts set in angle brackets denote a variable
requiring substitution for a real value.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual steps
to implement. Both statuses are equally important and are determined and supported as
defined below:
Automated
Manual
6|Page
Profile Definitions
The following configuration profiles are defined by this Benchmark:
Level 1
Level 2
This profile extends the "Level 1" profile. Items in this profile exhibit one or more of
the following characteristics:
7|Page
Acknowledgements
This benchmark exemplifies the great things a community of users, vendors, and subject matter
experts can accomplish through consensus collaboration. The CIS community thanks the entire
consensus team with special recognition to the following individuals who contributed greatly to
the creation of this guide:
Author
Omar Batis
Contributor
Darren Freidel
8|Page
Recommendations
1 Accounts
9|Page
1.1 Passwords
1.1.1 Ensure default password of root is not allowed (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Using Default passwords for 'root' access could cause a compromise to the overall system
security
Impact:
Failure of changing default root's password brings high risk to the system as the root
account might be abused by unauthorized users who would have full privilege on F5
systems
Audit:
Remediation:
References:
1. https://api-u.f5.com/support/kb-articles/K13121?pdf
10 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
11 | P a g e
1.1.2 Ensure default password of admin is not used (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Using Default passwords for 'admin' access could cause a compromise to the overall system
security
Impact:
Failure of changing default root's password brings high risk to the system as the root
account might be abused by unauthorized users who would have full privilege on F5
systems
Audit:
Remediation:
References:
1. https://api-u.f5.com/support/kb-articles/K13121?pdf
12 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
13 | P a g e
1.1.3 Configure Secure Password Policy (Manual)
Profile Applicability:
Level 1
Description:
To assist users in maintaining strong passwords, ensure that passwords are changed at
appropriate intervals and new passwords to be used
Rationale:
Having a weak or non-existent password policy will allow users to use weak or easily
cracked passwords.
Impact:
Without proper password management the users are more likely to select weak passwords
or forget complex passwords. This can create security risks as these passwords make it
easier for attackers to crack.
Audit:
-Minimum Length
Specifies the minimum number of characters required for a password. The
default value is 6, and the system allows the range of values from 6 through
255. This setting appears in the Configuration utility, and the system only
enforces it when you enable the Secure Password Enforcement setting.
-Required Characters
Specifies the number of numeric, uppercase, lowercase, and other characters
required for a password. The default value for each character type is 0, and
the system allows the range of values from 0 through 127. This setting
appears in the Configuration utility, and the system only enforces it when
you enable the Secure Password Enforcement setting.
-Password Memory
Specifies, for each user account, the number of former passwords that the
BIG-IP system retains to prevent the user from reusing a recent password. The
default value is 0, and the system allows the range of values from 0 through
127.
14 | P a g e
-Minimum Duration
Specifies the minimum number of days before users can change their password.
The default value is 0, and the system allows the range of values from 0
through 255.
-Maximum Duration
Specifies the maximum number of days that users' passwords are valid. The
default value is 99999, and the system allows the range of values from 1
through 99999. If a user does not change their password by the time they
reach the maximum duration, in versions prior to BIG-IP 13.1.0, an
administrator must change the user's password, and in BIG-IP 13.1.0 and
after, the user can reset their own password.
-Expiration Warning
Specifies the number of days prior to password expiration that the system
sends a warning message to a users. The default value is 7, and the system
allows the range of values from 1 to 255.
Remediation:
15 | P a g e
- User Lockout : Automatically enable locked-out users after : 300 seconds
**Notice: Some settings can be done through Configuration Utility only while
others are done through tmsh only.**
References:
1. https://support.f5.com/csp/article/K15497
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
16 | P a g e
2 AAA
2.1 Ensure that Remote Radius is used for Authentication Only
(Automated)
Profile Applicability:
Level 2
Description:
To specify the authentication mechanism that F5 systems use for external (remote) users
Rationale:
Impact:
Audit:
On Configuration utility:
System > Users > Authentication
Under Authentication : Check "Service Type"
Remediation:
5-Define the RADIUS server configuration settings, including the port and
shared secret settings:
7-Click Finished.
17 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
18 | P a g e
2.2 Ensure redundant remote authentication servers are configured
(Manual)
Profile Applicability:
Level 2
Description:
Having multiple points of authentication is important in the event that the primary remote
authentication source goes down.
Rationale:
Impact:
Having a single Authentication server reduce the availability for systems operators and
admins to perform their tasks and support when the Radius server is down
Audit:
Remediation:
5-Define the RADIUS server configuration settings, including the port and
shared secret settings:
7-This should be completed for Primary RADIUS server as well as for Secondary
RADIUS server.
8-Click Finished.
19 | P a g e
References:
1. https://support.f5.com/csp/article/K17403
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
20 | P a g e
2.3 Ensure that "Fallback to local" option is disabled for Remote
Authentication Settings (Manual)
Profile Applicability:
Level 2
Description:
To prevent the system from checking local DB for remote users authentication
Rationale:
Impact:
Though the impact might be low, it is a good practice to segregate remote users from local
and to limit local users’ usage.
Audit:
Remediation:
3. Select Change.
5. Select Finished.
References:
1. https://support.f5.com/csp/article/K67025432
21 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
22 | P a g e
2.4 Ensure External Users' role is set to "No Access" (Automated)
Profile Applicability:
Level 2
Description:
To set a default role for remote users Authentication and authorization for remote users
are handled by third party system
Rationale:
Impact:
Providing remote users with a preconfigured role might allow unauthorized access to these
users.
Audit:
Remediation:
23 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
24 | P a g e
2.5 Ensure External Users' has access to needed Partitions only
(Automated)
Profile Applicability:
Level 1
Description:
To limit access for remote users to needed partitions only granting a user access to "All
Partitions" might provide the users unauthorized access.
Rationale:
Impact:
Audit:
3. Under External Users > Partition Access , you can see no specific
partition is defined or it is set to "All"
Remediation:
4. For Partition Access , specify which partitions are allowed for External
Users.
25 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
26 | P a g e
2.6 Ensure External Users' Terminal Access is Disabled (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Audit:
3. Under External Users > you should see Terminal Access is set to "Enabled"
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
27 | P a g e
3 GUI Interface Management
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
Configuration utility sessions (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Indefinite or even long session timeout windows can increase the risk of attackers abusing
abandoned sessions.
Audit:
On Configuration utility:
System > Preferences, Under Security settings...check the value of Idle Time
Before Automatic Logout
Remediation:
On Configuration utility:
System > Preferences, Under Security settings...set the value of Idle Time
Before Automatic Logout to 600 seconds
Default Value:
1200
References:
1. https://support.f5.com/csp/article/K9908
28 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
29 | P a g e
3.2 Ensure access to Configuration utility by clients using TLS version 1.2
or later (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Weak security protocols may expose vulnerability by disclosing data through SSL/TLS
sessions
Audit:
Remediation:
If the value is different, execute the following command to modify the protocol used to
access GUI:
Default Value:
References:
1. https://support.f5.com/csp/article/K02321234
30 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
31 | P a g e
3.3 Ensure access to Configuration utility is restricted to needed IP
addresses only (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Any compromised network device within enterprise network would gain illegal access to
F5 configuration utility abusing existing unresolved vulnerabilities.
Impact:
Allowing any IP address to access may expose the management interface of F5 to different
types of attacks such as DoS
Audit:
Remediation:
If the output of the above command show ALL, the following command would be executed
to modify the settings:
Default Value:
ALL
References:
1. https://support.f5.com/csp/article/K13309
32 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
33 | P a g e
4 CLI Interface Management
4.1 Ensure Prelogin 'Login Banner' is set (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Failure to display adequate warning messages could result in the loss of litigation
capabilities.
Audit:
Remediation:
3-Click SSHD.
4-Enter the desired pre-login message banner in the text box and enable
appropriate options.
5-To enable this banner message, check the Show The Security Banner On The
Login Screen option.
To disable this message banner, clear the Show The Security Banner On The
Login Screen option.
6-Click Update.
References:
1. https://support.f5.com/csp/article/K6068
34 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
35 | P a g e
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for SSH
connections (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Indefinite or even long session timeout window increase the risk of attackers abusing
abandoned sessions
Audit:
Remediation:
2-To configure an automatic logout idle time (10 minutes) for SSH sessions,
use the following command syntax:
modify /sys sshd inactivity-timeout 600
3-Save the change by typing the following command:
save /sys config
References:
1. https://support.f5.com/csp/article/K9908
36 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
37 | P a g e
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for tmsh
sessions (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Indefinite or even long session timeout window increases the risk of attackers abusing
abandoned sessions.
Audit:
Remediation:
References:
1. https://support.f5.com/csp/article/K9908#ssh
38 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
39 | P a g e
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for serial
console sessions (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Indefinite or even long session timeout window increases the risk of attackers abusing
abandoned sessions.
Audit:
Remediation:
References:
1. https://support.f5.com/csp/article/K9908#ssh
40 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
41 | P a g e
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-cbc
(Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Weak encryption algorithms make it possible for attackers to decrypt traffic and reduce the
confidentiality capability that SSH provides for remote connections.
Audit:
Remediation:
References:
1. https://support.f5.com/csp/article/K80425458
42 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
43 | P a g e
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256 (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Weak MAC algorithms make it possible for attackers to bypass authentication , steal keys
and reduce the integrity capability that SSH provides for remote connections.
Audit:
Remediation:
References:
1. https://support.f5.com/csp/article/K80425458
44 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
45 | P a g e
4.7 Ensure to set Strong SSH KEY Exchange algorithm (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Weak Key Exchange algorithms make it possible for attackers to bypass authentication ,
steal keys and reduce the integrity capability that SSH provides for remote connections .
Audit:
Remediation:
2-To modify the sshd configuration, type the following command to start the
vi editor:edit /sys sshd all-properties
4-To change the list of ciphers, you can navigate to the line that starts
with the include statement, and use the keyword KexAlgorithms ,and adding the
list of desired KexAlgorithms to the 2-line include statement:
include "Ciphers aes128-cbc,aes128-ctr,aes192-ctr,aes256-
ctr,arcfour128,arcfour256,arcfour
MACs hmac-sha2-256
KexAlgorithms diffie-hellman-group14-sha256
References:
1. https://support.f5.com/csp/article/K80425458
46 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
47 | P a g e
4.8 Ensure access SSH to CLI interface is restricted to needed IP
addresses only (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Restricting access to the system MGT interface is to ensure that even if an attacker gains
access to privileged credentials, his/her ability to get in and do damage is still limited.
Audit:
Remediation:
3-For SSH IP Allow, select Specify Range and then enter the IP addresses or
address ranges for the remote systems allowed to use SSH to communicate with
this system.
References:
1. https://support.f5.com/csp/article/K5380
48 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
49 | P a g e
5 System
5.1 Ensure redundant NTP servers are configured appropriately
(Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Failing to connect to an NTP server results on incorrect time zone and date which impacts
several functions on BIG-IP systems. It is recommended to have dual NTP servers
configured to avoid single point of failure .
Audit:
3-Click NTP
Remediation:
50 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
51 | P a g e
5.2 Ensure to exclude inode information from ETags HTTP Header
(Manual)
Profile Applicability:
Level 1
Description:
To prevent the disclosure of inode information when accessing Configuration utility (GUI).
Rationale:
Impact:
When connecting to the Configuration utility, responses from the Apache server contain an
Etag HTTP header that includes the file's inode information.(CVE-2003-1418).
Audit:
Remediation:
2-To specify the format to be used for the Etag header, enter the following
command:
References:
1. https://support.f5.com/csp/article/K14206
52 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
53 | P a g e
5.3 Ensure port lockdown for self IP is set (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Default settings allow BIG-IP to listen on several ports on which some are not needed .
Attackers may initiate attacks against the system self IPs on these ports . To reduce the risk
, only needed ports should be enabled on self IPs.
Audit:
Remediation:
4-If the specified interface does not need to listen to incoming connections
( Example BGP ,BDF ..etc) , set "Port Lockdown" to "Allow None"
5-If the specified interface need to listen for incoming connections , set
"Port Lockdown" to "Allow Custom". Then in the "Custom List" add needed ports
only.
References:
1. https://support.f5.com/csp/article/K17333
54 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
55 | P a g e
5.4 Ensure to disable unused services in BIG-IP configuration (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Many systems break-ins are a result of people taking advantage of security holes or
problems with these programs. The more services that are running on your system, the
more opportunities there are for others to use them, break into or take control of your
system through them.
Audit:
Remediation:
3-Select the unnecessary services you want to disable , then click "stop"
4-Click OK
References:
1. https://support.f5.com/csp/article/K05645522
56 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
57 | P a g e
6 Monitoring and Auditing
6.1 Ensure that SNMP access is allowed to trusted agents IPs only
(Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Failing on restricting access to SNMP may allow unauthorised systems to gain access to the
network device.
Audit:
Remediation:
References:
1. https://support.f5.com/csp/article/K13535
58 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
59 | P a g e
6.2 Ensure minimum SNMP version is set to V3 for agent access
(Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
Abuse of SNMP settings could allow an unauthorised third party to gain access to a network
device when weak SNMP protocols are used.These protocols ( prior to v3) lack the ability
of authentication and encryption .
Audit:
2- Go to System > SNMP > Agent > SNMP Access (v1, v2c) : check if an entry is
listed.
3-Go to System > SNMP > Agent > SNMP Access (v3) : Check if an entry is
listed
Remediation:
2- Go to System > SNMP > Agent > SNMP Access (v1, v2c) :
Select all listed entries and click “Delete”
3-Go to System > SNMP > Agent > SNMP Access (v3) :
Make sure there is one entry at least , otherwise create one.
References:
1. https://support.f5.com/csp/article/K13625
60 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
61 | P a g e
6.3 Ensure to lockdown access logs to "Administrator , Resource
Administrator and Auditor " roles only (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Audit:
3-Under "Log Access" , check who are allowed to access the logs.
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
62 | P a g e
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to enabled
(Manual)
Profile Applicability:
Level 1
Description:
To enable audit logging on configuration changes that users or services make to the BIG-IP
system.
Rationale:
Impact:
Audit:
Remediation:
References:
1. https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/bigip-
external-monitoring-implementations-13-1-0/1.html
2. https://support.f5.com/csp/article/K07592334
63 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
64 | P a g e
6.5 Ensure that Remote Syslog Servers are configured (Manual)
Profile Applicability:
Level 1
Description:
Rationale:
Impact:
In case of hardware failure , logs stored locally can be lost. This impacts the ability of
investigating security incidents and be in compliance with the requirements of logs
retention period .
Audit:
Remediation:
3-For Remote IP, enter the destination syslog server IP address, or FQDN.
(DNS server configuration required)
4-For Remote Port, enter the remote syslog server UDP port (default is 514).
5-Select Add.
6-Select Update.
References:
1. https://support.f5.com/csp/article/K13080
65 | P a g e
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
66 | P a g e
Appendix: Recommendation Summary
Table
Control Set
Correctly
Yes No
1 Accounts
1.1 Passwords
1.1.1 Ensure default password of root is not allowed (Automated)
1.1.2 Ensure default password of admin is not used (Automated)
1.1.3 Configure Secure Password Policy (Manual)
2 AAA
2.1 Ensure that Remote Radius is used for Authentication Only
(Automated)
2.2 Ensure redundant remote authentication servers are
configured (Manual)
2.3 Ensure that "Fallback to local" option is disabled for Remote
Authentication Settings (Manual)
2.4 Ensure External Users' role is set to "No Access"
(Automated)
2.5 Ensure External Users' has access to needed Partitions only
(Automated)
2.6 Ensure External Users' Terminal Access is Disabled
(Automated)
3 GUI Interface Management
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
Configuration utility sessions (Automated)
3.2 Ensure access to Configuration utility by clients using TLS
version 1.2 or later (Automated)
3.3 Ensure access to Configuration utility is restricted to needed
IP addresses only (Automated)
4 CLI Interface Management
4.1 Ensure Prelogin 'Login Banner' is set (Manual)
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for
SSH connections (Manual)
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for
tmsh sessions (Manual)
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for
serial console sessions (Manual)
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-
cbc (Manual)
67 | P a g e
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256
(Manual)
4.7 Ensure to set Strong SSH KEY Exchange algorithm (Manual)
4.8 Ensure access SSH to CLI interface is restricted to needed IP
addresses only (Manual)
5 System
5.1 Ensure redundant NTP servers are configured appropriately
(Manual)
5.2 Ensure to exclude inode information from ETags HTTP
Header (Manual)
5.3 Ensure port lockdown for self IP is set (Manual)
5.4 Ensure to disable unused services in BIG-IP configuration
(Manual)
6 Monitoring and Auditing
6.1 Ensure that SNMP access is allowed to trusted agents IPs
only (Manual)
6.2 Ensure minimum SNMP version is set to V3 for agent access
(Manual)
6.3 Ensure to lockdown access logs to "Administrator , Resource
Administrator and Auditor " roles only (Manual)
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to
enabled (Manual)
6.5 Ensure that Remote Syslog Servers are configured (Manual)
68 | P a g e
Appendix: CIS Controls v7 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1 Ensure default password of root is not allowed
1.1.2 Ensure default password of admin is not used
1.1.3 Configure Secure Password Policy
2.1 Ensure that Remote Radius is used for Authentication Only
2.2 Ensure redundant remote authentication servers are
configured
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
Configuration utility sessions
3.2 Ensure access to Configuration utility by clients using TLS
version 1.2 or later
4.1 Ensure Prelogin 'Login Banner' is set
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for
SSH connections
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for
tmsh sessions
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for
serial console sessions
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-
cbc
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256
5.3 Ensure port lockdown for self IP is set
6.3 Ensure to lockdown access logs to "Administrator , Resource
Administrator and Auditor " roles only
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to
enabled
69 | P a g e
Appendix: CIS Controls v7 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1 Ensure default password of root is not allowed
1.1.2 Ensure default password of admin is not used
1.1.3 Configure Secure Password Policy
2.1 Ensure that Remote Radius is used for Authentication Only
2.2 Ensure redundant remote authentication servers are
configured
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
Configuration utility sessions
3.2 Ensure access to Configuration utility by clients using TLS
version 1.2 or later
3.3 Ensure access to Configuration utility is restricted to needed
IP addresses only
4.1 Ensure Prelogin 'Login Banner' is set
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for
SSH connections
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for
tmsh sessions
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for
serial console sessions
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-
cbc
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256
4.7 Ensure to set Strong SSH KEY Exchange algorithm
4.8 Ensure access SSH to CLI interface is restricted to needed IP
addresses only
5.1 Ensure redundant NTP servers are configured appropriately
5.2 Ensure to exclude inode information from ETags HTTP
Header
5.3 Ensure port lockdown for self IP is set
5.4 Ensure to disable unused services in BIG-IP configuration
6.1 Ensure that SNMP access is allowed to trusted agents IPs
only
6.2 Ensure minimum SNMP version is set to V3 for agent access
6.3 Ensure to lockdown access logs to "Administrator , Resource
Administrator and Auditor " roles only
70 | P a g e
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to
enabled
6.5 Ensure that Remote Syslog Servers are configured
71 | P a g e
Appendix: CIS Controls v7 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1 Ensure default password of root is not allowed
1.1.2 Ensure default password of admin is not used
1.1.3 Configure Secure Password Policy
2.1 Ensure that Remote Radius is used for Authentication Only
2.2 Ensure redundant remote authentication servers are
configured
2.3 Ensure that "Fallback to local" option is disabled for Remote
Authentication Settings
2.4 Ensure External Users' role is set to "No Access"
2.5 Ensure External Users' has access to needed Partitions only
2.6 Ensure External Users' Terminal Access is Disabled
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
Configuration utility sessions
3.2 Ensure access to Configuration utility by clients using TLS
version 1.2 or later
3.3 Ensure access to Configuration utility is restricted to needed
IP addresses only
4.1 Ensure Prelogin 'Login Banner' is set
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for
SSH connections
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for
tmsh sessions
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for
serial console sessions
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-
cbc
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256
4.7 Ensure to set Strong SSH KEY Exchange algorithm
4.8 Ensure access SSH to CLI interface is restricted to needed IP
addresses only
5.1 Ensure redundant NTP servers are configured appropriately
5.2 Ensure to exclude inode information from ETags HTTP
Header
5.3 Ensure port lockdown for self IP is set
5.4 Ensure to disable unused services in BIG-IP configuration
72 | P a g e
6.1 Ensure that SNMP access is allowed to trusted agents IPs
only
6.2 Ensure minimum SNMP version is set to V3 for agent access
6.3 Ensure to lockdown access logs to "Administrator , Resource
Administrator and Auditor " roles only
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to
enabled
6.5 Ensure that Remote Syslog Servers are configured
73 | P a g e
Appendix: CIS Controls v8 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1 Ensure default password of root is not allowed
1.1.2 Ensure default password of admin is not used
1.1.3 Configure Secure Password Policy
2.3 Ensure that "Fallback to local" option is disabled for Remote
Authentication Settings
2.4 Ensure External Users' role is set to "No Access"
2.5 Ensure External Users' has access to needed Partitions only
2.6 Ensure External Users' Terminal Access is Disabled
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
Configuration utility sessions
3.2 Ensure access to Configuration utility by clients using TLS
version 1.2 or later
3.3 Ensure access to Configuration utility is restricted to needed
IP addresses only
4.1 Ensure Prelogin 'Login Banner' is set
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for
SSH connections
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for
tmsh sessions
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for
serial console sessions
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-
cbc
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256
4.7 Ensure to set Strong SSH KEY Exchange algorithm
4.8 Ensure access SSH to CLI interface is restricted to needed IP
addresses only
5.2 Ensure to exclude inode information from ETags HTTP
Header
6.3 Ensure to lockdown access logs to "Administrator , Resource
Administrator and Auditor " roles only
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to
enabled
74 | P a g e
75 | P a g e
Appendix: CIS Controls v8 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1 Ensure default password of root is not allowed
1.1.2 Ensure default password of admin is not used
1.1.3 Configure Secure Password Policy
2.1 Ensure that Remote Radius is used for Authentication Only
2.2 Ensure redundant remote authentication servers are
configured
2.3 Ensure that "Fallback to local" option is disabled for Remote
Authentication Settings
2.4 Ensure External Users' role is set to "No Access"
2.5 Ensure External Users' has access to needed Partitions only
2.6 Ensure External Users' Terminal Access is Disabled
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
Configuration utility sessions
3.2 Ensure access to Configuration utility by clients using TLS
version 1.2 or later
3.3 Ensure access to Configuration utility is restricted to needed
IP addresses only
4.1 Ensure Prelogin 'Login Banner' is set
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for
SSH connections
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for
tmsh sessions
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for
serial console sessions
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-
cbc
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256
4.7 Ensure to set Strong SSH KEY Exchange algorithm
4.8 Ensure access SSH to CLI interface is restricted to needed IP
addresses only
5.1 Ensure redundant NTP servers are configured appropriately
5.2 Ensure to exclude inode information from ETags HTTP
Header
5.3 Ensure port lockdown for self IP is set
5.4 Ensure to disable unused services in BIG-IP configuration
76 | P a g e
6.1 Ensure that SNMP access is allowed to trusted agents IPs
only
6.2 Ensure minimum SNMP version is set to V3 for agent access
6.3 Ensure to lockdown access logs to "Administrator , Resource
Administrator and Auditor " roles only
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to
enabled
6.5 Ensure that Remote Syslog Servers are configured
77 | P a g e
Appendix: CIS Controls v8 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1.1 Ensure default password of root is not allowed
1.1.2 Ensure default password of admin is not used
1.1.3 Configure Secure Password Policy
2.1 Ensure that Remote Radius is used for Authentication Only
2.2 Ensure redundant remote authentication servers are
configured
2.3 Ensure that "Fallback to local" option is disabled for Remote
Authentication Settings
2.4 Ensure External Users' role is set to "No Access"
2.5 Ensure External Users' has access to needed Partitions only
2.6 Ensure External Users' Terminal Access is Disabled
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for
Configuration utility sessions
3.2 Ensure access to Configuration utility by clients using TLS
version 1.2 or later
3.3 Ensure access to Configuration utility is restricted to needed
IP addresses only
4.1 Ensure Prelogin 'Login Banner' is set
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for
SSH connections
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for
tmsh sessions
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for
serial console sessions
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-
cbc
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256
4.7 Ensure to set Strong SSH KEY Exchange algorithm
4.8 Ensure access SSH to CLI interface is restricted to needed IP
addresses only
5.1 Ensure redundant NTP servers are configured appropriately
5.2 Ensure to exclude inode information from ETags HTTP
Header
5.3 Ensure port lockdown for self IP is set
5.4 Ensure to disable unused services in BIG-IP configuration
78 | P a g e
6.1 Ensure that SNMP access is allowed to trusted agents IPs
only
6.2 Ensure minimum SNMP version is set to V3 for agent access
6.3 Ensure to lockdown access logs to "Administrator , Resource
Administrator and Auditor " roles only
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to
enabled
6.5 Ensure that Remote Syslog Servers are configured
79 | P a g e
Appendix: Change History
Date Version Changes for this version
80 | P a g e