11.3: Use Automated Tools to Verify Standard Device Configurations and Detect Changes

Compare all network device configurations against approved security configurations defined for each network device in use, and alert when any deviations are discovered.

Asset Type

Security Function

Implementation Groups

Network

Detect

2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 2.1: Maintain Inventory of Authorized Software

Inputs

  1. The organization’s configuration monitoring system

  2. The list of network devices

  3. The inventory and mappings of secure configuration policy(ies) to the list of network devices

Operations

  1. For each network devices, obtain the configuration assessment results using Input 1

Measures

  • M1(i) = (For each network device “i”) Count of non-compliant recommendations resulting from Operation 1

  • M2(i) = (For each network device “i”) Count of recommendations assessed

Metrics

Non-Compliance Ratio

Metric

The ratio of network devices not in compliance with secure configuration policies to the
total number of network devices.

Calculation

(SUM from i=1..M2 (M1(i))) / M2