shellsharksM to [email protected]English • 8 months agoWhat are You Working on Wednesdaymessage-square9fedilinkarrow-up110arrow-down12file-text
arrow-up18arrow-down1message-squareWhat are You Working on WednesdayshellsharksM to [email protected]English • 8 months agomessage-square9fedilinkfile-text
minus-squareRedFoxlinkfedilinkEnglish2•8 months agoCan you share any of the baseline that’s not specific to your org/sensitive? What sources are you using as a reference?
minus-squareslazer2aulinkEnglish1•8 months agoI am using the Cisco hardening guide with some tweeks. https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-16/220270-use-cisco-ios-xe-hardening-guide.html Covers things like only allowing sshv2, enable logging of commands to syslog, disabling the switch web servers.
minus-squareRedFoxlinkfedilinkEnglish1•8 months agoNice. You guys allowing the playbooks to configure or just audit?
minus-squareslazer2aulinkEnglish2•8 months agowe use the playbooks to configure, the trick is to do it in an idempotent way so when something is changed it doesn’t kick off alarm bells. SNMPv3 is my current bane as snmpv3 accounts are not stored in running config so snmp always says something is changed.
Can you share any of the baseline that’s not specific to your org/sensitive? What sources are you using as a reference?
I am using the Cisco hardening guide with some tweeks.
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-16/220270-use-cisco-ios-xe-hardening-guide.html
Covers things like only allowing sshv2, enable logging of commands to syslog, disabling the switch web servers.
Nice. You guys allowing the playbooks to configure or just audit?
we use the playbooks to configure, the trick is to do it in an idempotent way so when something is changed it doesn’t kick off alarm bells.
SNMPv3 is my current bane as snmpv3 accounts are not stored in running config so snmp always says something is changed.