-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* removing ruleset files * adding 3_interface rules and refs * Revert "adding 3_interface rules and refs" This reverts commit 6ec630d. * added 3_interfaces rules and refs again * added 4_protocols tests * restrctured 3_interfaces folder * added 6_services * 5_snmp * 1 general recommendations * Checkpoint tests * adding xr, asa, nxos * modified test-rules --------- Co-authored-by: mailsanjayhere <mailsanjayhere@gmail.com>
- Loading branch information
1 parent
5ff9dd2
commit 0852661
Showing
515 changed files
with
6,396 additions
and
1 deletion.
There are no files selected for viewing
10 changes: 10 additions & 0 deletions
10
..._change_password_at_first_login_after_password_was_changed_from_users_page_is_selected.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_10_ensure_force_users_to_change_password_at_first_login_after_password_was_changed_from_users_page_is_selected', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_10_ensure_force_users_to_change_password_at_first_login_after_password_was_changed_from_users_page_is_selected(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
17 changes: 17 additions & 0 deletions
17
...change_password_at_first_login_after_password_was_changed_from_users_page_is_selected.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
.rule_1_10_ensure_force_users_to_change_password_at_first_login_after_password_was_changed_from_users_page_is_selected | ||
|
||
Reference: | ||
Remediation: Run the following command to set force-change-when setting. | ||
CLI: | ||
Hostname>set password-controls force-change-when password | ||
GUI: | ||
Navigate to User Management > Password Policy > Mandatory Password Change: | ||
Checked the 'Force users to change password at first login after password was | ||
changed from Users page' setting. | ||
|
||
|
||
|
||
|
||
|
||
|
||
. |
10 changes: 10 additions & 0 deletions
10
...1_password_policy/rule_1_11_ensure_deny_access_after_failed_login_attempts_is_selected.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_11_ensure_deny_access_after_failed_login_attempts_is_selected', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_11_ensure_deny_access_after_failed_login_attempts_is_selected(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
17 changes: 17 additions & 0 deletions
17
..._password_policy/rule_1_11_ensure_deny_access_after_failed_login_attempts_is_selected.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
.rule_1_11_ensure_deny_access_after_failed_login_attempts_is_selected | ||
|
||
Reference: | ||
Remediation: Run the following command to set the deny-on-fail setting. | ||
CLI: | ||
Hostname>set password-controls deny-on-fail enable on | ||
GUI: | ||
Navigate to User Management > Password Policy > Deny Access After Failed | ||
Login Attempts: | ||
Checked the 'Deny access after failed login attempts' setting. | ||
|
||
|
||
|
||
|
||
|
||
|
||
. |
10 changes: 10 additions & 0 deletions
10
...policy/rule_1_12_ensure_maximum_number_of_failed_attempts_allowed_is_set_to_5_or_fewer.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_12_ensure_maximum_number_of_failed_attempts_allowed_is_set_to_5_or_fewer', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_12_ensure_maximum_number_of_failed_attempts_allowed_is_set_to_5_or_fewer(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
26 changes: 26 additions & 0 deletions
26
...olicy/rule_1_12_ensure_maximum_number_of_failed_attempts_allowed_is_set_to_5_or_fewer.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
.rule_1_12_ensure_maximum_number_of_failed_attempts_allowed_is_set_to_5_or_fewer | ||
|
||
Reference: #o94478 | ||
Notes: | ||
Looking for input regarding a value for this recommendation. | ||
Note from checkpoint documentation.... | ||
Warning: Enabling this leaves you open to a "denial of service" -- if an attacker issues | ||
unsuccessful login attempts often enough you will be locked out. Please consider the | ||
advantages and disadvantages of this option, in light of your security policy, before | ||
enabling it. | ||
|
||
Remediation: Run the following command to set the deny-on-fail failures-allowed setting. | ||
CLI: | ||
Hostname>set password-controls deny-on-fail failures-allowed 5 | ||
|
||
|
||
|
||
|
||
|
||
GUI: | ||
Navigate to User Management > Password Policy > Deny Access After Failed | ||
Login Attempts: | ||
checked and set ' Maximum number of failed attempts allowed is set to' | ||
setting to 5 or fewer. | ||
|
||
. |
10 changes: 10 additions & 0 deletions
10
...rd_policy/rule_1_13_ensure_allow_access_again_after_time_is_set_to_300_or_more_seconds.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_13_ensure_allow_access_again_after_time_is_set_to_300_or_more_seconds', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_13_ensure_allow_access_again_after_time_is_set_to_300_or_more_seconds(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
18 changes: 18 additions & 0 deletions
18
...d_policy/rule_1_13_ensure_allow_access_again_after_time_is_set_to_300_or_more_seconds.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
.rule_1_13_ensure_allow_access_again_after_time_is_set_to_300_or_more_seconds | ||
|
||
Reference: | ||
Remediation: Run the following command to set the deny-on-fail allow-afte setting. | ||
CLI: | ||
Hostname> set password-controls deny-on-fail allow-after 300 | ||
|
||
|
||
|
||
|
||
|
||
|
||
GUI: | ||
Navigate to User Management > Password Policy > Deny Access After Failed | ||
Login Attempts: | ||
Set the 'Allow access again after time' setting to 300 or more seconds. | ||
|
||
. |
10 changes: 10 additions & 0 deletions
10
...point/1_password_policy/rule_1_1_ensure_minimum_password_length_is_set_to_14_or_higher.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_1_ensure_minimum_password_length_is_set_to_14_or_higher', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_1_ensure_minimum_password_length_is_set_to_14_or_higher(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
15 changes: 15 additions & 0 deletions
15
...oint/1_password_policy/rule_1_1_ensure_minimum_password_length_is_set_to_14_or_higher.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
.rule_1_1_ensure_minimum_password_length_is_set_to_14_or_higher | ||
|
||
Reference: | ||
Remediation: Run the following command to set the min-password-length setting. | ||
CLI: | ||
Hostname>set password-controls min-password-length 14 | ||
GUI: | ||
Navigate to User Management > Password Policy | ||
Ensure 'Minimum Password Length' is set to 14 or higher. | ||
|
||
|
||
|
||
|
||
|
||
. |
10 changes: 10 additions & 0 deletions
10
CIS/Checkpoint/1_password_policy/rule_1_2_ensure_disallow_palindromes_is_selected.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_2_ensure_disallow_palindromes_is_selected', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_2_ensure_disallow_palindromes_is_selected(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
11 changes: 11 additions & 0 deletions
11
CIS/Checkpoint/1_password_policy/rule_1_2_ensure_disallow_palindromes_is_selected.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
.rule_1_2_ensure_disallow_palindromes_is_selected | ||
|
||
Reference: | ||
Remediation: Run the following command to set the palindrome-check setting. | ||
CLI: | ||
Hostname>set password-controls palindrome-check on | ||
GUI: | ||
Navigate to User Management > Password Policy | ||
Ensure 'Disallow Palindrome' is checked. | ||
|
||
. |
10 changes: 10 additions & 0 deletions
10
CIS/Checkpoint/1_password_policy/rule_1_3_ensure_password_complexity_is_set_to_3.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_3_ensure_password_complexity_is_set_to_3', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_3_ensure_password_complexity_is_set_to_3(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
16 changes: 16 additions & 0 deletions
16
CIS/Checkpoint/1_password_policy/rule_1_3_ensure_password_complexity_is_set_to_3.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
.rule_1_3_ensure_password_complexity_is_set_to_3 | ||
|
||
Reference: | ||
Remediation: Run the following command to set the password-controls complexity setting. | ||
CLI: | ||
Hostname>set password-controls complexity 3 | ||
|
||
|
||
|
||
|
||
|
||
GUI: | ||
Navigate to User Management > Password Policy > Password Complexity: | ||
checked the '3 - Require three character types' setting. | ||
|
||
. |
10 changes: 10 additions & 0 deletions
10
..._4_ensure_check_for_password_reuse_is_selected_and_history_length_is_set_to_12_or_more.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_4_ensure_check_for_password_reuse_is_selected_and_history_length_is_set_to_12_or_more', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_4_ensure_check_for_password_reuse_is_selected_and_history_length_is_set_to_12_or_more(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
16 changes: 16 additions & 0 deletions
16
...4_ensure_check_for_password_reuse_is_selected_and_history_length_is_set_to_12_or_more.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
.rule_1_4_ensure_check_for_password_reuse_is_selected_and_history_length_is_set_to_12_or_more | ||
|
||
Reference: | ||
Remediation: Run the following command to set tie history-checking setting. | ||
CLI: | ||
Hostname>set password-controls history-checking on | ||
|
||
Hostname>set password-controls history-length 12 | ||
GUI: | ||
Navigate to User Management > Password Policy > Password History: | ||
checked the 'Check for Password Reuse' setting. | ||
|
||
Navigate to User Management > Password Policy > Password History: | ||
Set 'History Length' is set to 12 or more. | ||
|
||
. |
10 changes: 10 additions & 0 deletions
10
CIS/Checkpoint/1_password_policy/rule_1_5_ensure_password_expiration_is_set_to_90_days.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_5_ensure_password_expiration_is_set_to_90_days', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_5_ensure_password_expiration_is_set_to_90_days(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
16 changes: 16 additions & 0 deletions
16
CIS/Checkpoint/1_password_policy/rule_1_5_ensure_password_expiration_is_set_to_90_days.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
.rule_1_5_ensure_password_expiration_is_set_to_90_days | ||
|
||
Reference: | ||
Remediation: Run the following command to set the history-length setting. | ||
CLI: | ||
Hostname>set password-controls history-length 90 | ||
GUI: | ||
Navigate to User Management > Password Policy > Mandatory Password Changes: | ||
Password Expiration: | ||
Set 'Password expires after' setting to 90 or less | ||
|
||
|
||
|
||
|
||
|
||
. |
10 changes: 10 additions & 0 deletions
10
...password_policy/rule_1_6_ensure_warn_users_before_password_expiration_is_set_to_7_days.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_6_ensure_warn_users_before_password_expiration_is_set_to_7_days', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_6_ensure_warn_users_before_password_expiration_is_set_to_7_days(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
16 changes: 16 additions & 0 deletions
16
...assword_policy/rule_1_6_ensure_warn_users_before_password_expiration_is_set_to_7_days.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
.rule_1_6_ensure_warn_users_before_password_expiration_is_set_to_7_days | ||
|
||
Reference: | ||
Remediation: Run the following command to set the expiration-warning-days setting. | ||
CLI: | ||
Hostname>set password-controls expiration-warning-days 7 | ||
GUI: | ||
Navigate to User Management > Password Policy > Mandatory Password Changes | ||
Set 'Warn users before password expiration' is set to 7 days or less. | ||
|
||
|
||
|
||
|
||
|
||
|
||
. |
10 changes: 10 additions & 0 deletions
10
.../1_password_policy/rule_1_7_ensure_lockout_users_after_password_expiration_is_set_to_1.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_7_ensure_lockout_users_after_password_expiration_is_set_to_1', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_7_ensure_lockout_users_after_password_expiration_is_set_to_1(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
17 changes: 17 additions & 0 deletions
17
...1_password_policy/rule_1_7_ensure_lockout_users_after_password_expiration_is_set_to_1.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
.rule_1_7_ensure_lockout_users_after_password_expiration_is_set_to_1 | ||
|
||
Reference: | ||
Remediation: Run the following command to set the expiration-lockout-days setting. | ||
CLI: | ||
Hostname>set password-controls expiration-lockout-days 1 | ||
|
||
|
||
|
||
|
||
|
||
GUI: | ||
Navigate to User Management > Password Policy > Mandatory Password Changes > | ||
Lockout users after password expiration: | ||
Checked 'Lockout user after' setting and set to 1 day. | ||
|
||
. |
10 changes: 10 additions & 0 deletions
10
...heckpoint/1_password_policy/rule_1_8_ensure_deny_access_to_unused_accounts_is_selected.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_8_ensure_deny_access_to_unused_accounts_is_selected', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_8_ensure_deny_access_to_unused_accounts_is_selected(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
12 changes: 12 additions & 0 deletions
12
...eckpoint/1_password_policy/rule_1_8_ensure_deny_access_to_unused_accounts_is_selected.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
.rule_1_8_ensure_deny_access_to_unused_accounts_is_selected | ||
|
||
Reference: | ||
Remediation: Run the following command to set the deny-on-nonuse setting. | ||
CLI: | ||
Hostname>set password-controls deny-on-nonuse enable on | ||
GUI: | ||
Navigate to User Management > Password Policy > Deny access to unused | ||
accounts: | ||
Checked the 'Deny access to unused accounts' setting. | ||
|
||
. |
10 changes: 10 additions & 0 deletions
10
...ckpoint/1_password_policy/rule_1_9_ensure_days_of_non_use_before_lock_out_is_set_to_30.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_1_9_ensure_days_of_non_use_before_lock_out_is_set_to_30', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_1_9_ensure_days_of_non_use_before_lock_out_is_set_to_30(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
19 changes: 19 additions & 0 deletions
19
...kpoint/1_password_policy/rule_1_9_ensure_days_of_non_use_before_lock_out_is_set_to_30.ref
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
.rule_1_9_ensure_days_of_non_use_before_lock_out_is_set_to_30 | ||
|
||
Reference: | ||
Remediation: Run the following command to set the deny-on-nonuse allowed-days setting. | ||
CLI: | ||
Hostname>set password-controls deny-on-nonuse allowed-days 30 | ||
|
||
|
||
|
||
|
||
|
||
|
||
GUI: | ||
Navigate to User Management > Password Policy > Deny access to unused | ||
accounts: | ||
Set 'Days of non-use before lock-out' to 30 or less. | ||
Note: This setting only takes effect if 'Deny access to unused accounts' is enabled. | ||
|
||
. |
10 changes: 10 additions & 0 deletions
10
CIS/Checkpoint/2_device_setup/2_1_general_settings/rule_2_1_10_ensure_dhcp_is_disabled.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
from comfy.compliance import medium | ||
|
||
|
||
@medium( | ||
name='rule_2_1_10_ensure_dhcp_is_disabled', | ||
platform=['checkpoint'], | ||
commands=dict(chk_cmd='') | ||
) | ||
def rule_2_1_10_ensure_dhcp_is_disabled(commands, ref): | ||
assert '' in commands.chk_cmd, ref |
Oops, something went wrong.