ISM Control to Tenable Filters Mapping
Application Control:
The following mapping table lists the go-to filters an organisation can utilise to verify conformity to the related Essential Eight mapped ISM controls. The filters most used for ISM controls mapped to the Application Control Essential Eight Strategy are the Plugin Name Filter and Audit Name Filter (Plugin Name in Tenable Security Center). The Plugin Name Filter can assist any application control solution to detect any possible blacklisted application on an asset. Then the Audit Name, or Plugin Name in Security Center, can allow an organisation to target specific audit checks run during a host audit scan. These host audit scans can include, depending on the audit file used, configuration setups. For example, if an organisation utilises MSCT audit files which would be pertinent when relating to controls like ISM-1544, ISM-0843 and others, an organisation can look for the audit results for checks like "Configure detection for potentially unwanted applications." To enhance these filters utilise Asset Tagging in Tenable Vulnerability Management or Dynamic Asset Lists in Tenable Security Center.Tagging and lists will allow an organisation to separate findings and detected assets by categories like internet-facing, non-internet-facing, etc. Refer to Tagging and Dynamic Asset Lists for tips on Tagging and Dynamic Asset Lists.
Control ID | Description | Tenable VM Filter |
---|---|---|
ISM-0843 | Application control is implemented on workstations. | Plugin Name, Audit Name |
ISM-1490 |
Application control is implemented on internet-facing servers. |
(Plugin Name OR Audit Name) + Asset Tagging |
ISM-1544 |
Microsoft’s recommended application blocklist is implemented. |
Audit Name |
ISM-1582 |
Application control rulesets are validated on an annual or more frequent basis. |
(Plugin Name, Audit Name) + Last Seen |
ISM-1656 |
Application control is implemented on non-internet-facing servers. |
(Plugin Name) + Asset Tagging |
ISM-1657 |
Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set. |
Audit Name |
ISM-1658 |
Application control restricts the execution of drivers to an organisation-approved set. |
Audit Name |
ISM-1659 |
Microsoft’s vulnerable driver blocklist is implemented. |
Plugin Name, Audit Name |
Patch Applications:
The following Mapping Table lists the go-to filters an organisation can utilise to verify conformity to the related Essential Eight mapped ISM controls. The filters most used for ISM controls mapped to the Patch Applications Essential Eight Strategy are the Plugin Name filter and Vulnerability Published filter, Patch Published filter, Exploitability Ease filter, Unsupported by Vendor filter, and Last Authenticated Scan asset filter. The Plugin Name filter can help the organisation look for any detected unsupported applications present on an asset. The Unsupported by Vendor filter can be used to quickly identify if an application is deemed to be unsupported by the vendor, this would support many controls related to Patch applications like: ISM-0304, ISM-1905, ISM-1704. Throughout the Patch Applications strategy, many of the mapped ISM controls include a timeframe when the requirements need to be done (for example,ISM-1691 states patches for office vulnerabilities need to be applied within two weeks). To meet the two week timeframes, Tenable Vulnerability Management and Security Center support searching with the Patch Published filter. If a patch has not been released by the vendor, you can use the Vulnerability published filter. Exploitability Ease filter assists the organisation in determining if a vulnerability is exploitable or not, this exploitability is an explicit requirement in determining in ISM controls like: ISM-1690, ISM-1692, ISM-1876, and more. Lastly, the Last Authenticated Scan asset filter will satisfy the requirements where there are vulnerability scan frequency requirements and asset detection is required. Keeping the plugin set up to date is crucial to ensure the latest vulnerabilities are detected, enabling timely and accurate risk identification and remediation. These ISM controls are: ISM-1807, and ISM-1808.
Control ID | Description | Tenable VM Filter |
---|---|---|
ISM-0304 | Applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed. | (Unsupported by Vendor, Plugin Name) |
ISM-1690 |
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
Vulnerability Published, Patch Published, Exploitability Ease |
ISM-1691 |
Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release. |
Vulnerability Published, Patch Published, plugin name |
ISM-1692 |
Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
Vulnerability Published, Patch Published, plugin name, Exploitability Ease |
ISM-1693 |
Patches, updates or other vendor mitigations for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within one month of release. |
Vulnerability Published, Patch Published, plugin name, Exploitability Ease |
ISM-1698 |
A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services. |
Vulnerability Published, Patch Published, Last Seen, Online Services Tag or Asset List |
ISM-1699 |
A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products. |
Vulnerability Published, Patch Published, plugin name |
ISM-1700 |
A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security |
Vulnerability Published, Patch Published, plugin name |
ISM-1704 |
Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed. |
Plugin Name, Unsupported by Vendor |
ISM-1807 |
An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities. |
Last Authenticated Scan (Asset) |
ISM-1808 |
A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities. |
Last Authenticated Scan (Asset) |
ISM-1876 |
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
Vulnerability Published, Patch Published, plugin name,Online Services Tag or Asset List |
ISM-1901 |
Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
Vulnerability Published, Patch Published, plugin name, Exploitability Ease |
ISM-1905 |
Online services that are no longer supported by vendors are removed. |
Plugin Name, Unsupported by Vendor, ,Online Services Tag or Asset List |
Configure Microsoft Office Macro Settings:
The following Mapping Table lists the go-to filters an organisation can utilise to verify conformity to the related Essential Eight mapped ISM controls. The filters most used for ISM controls mapped to the Configure Microsoft Office Macro Essential Eight Strategy is the Audit Name filter in Tenable Vulnerability Management and Plugin Name filter in Tenable Security Center. Tenable solutions allow organisations to evaluate conformity with this Essential Strategy the most useful filter will be the Audit Name filter in Tenable Vulnerability Management or the Plugin Name filter in Tenable Security Center. These filters should be chosen for this Strategy because many MSCT audit files that can be run during a Policy Compliance Scan will include audit names related to Microsoft office macro configurations. Some related Audit Names include: "Block macros from running in Office files from the Internet - blockcontentexecutionfrominternet - access", "Security setting for macros", "Prevent Excel from running XLM macros", and many more.
Control ID | Description | Tenable VM Filter |
---|---|---|
ISM-1488 | Microsoft Office macros in files originating from the internet are blocked | Audit Name |
ISM-1489 |
Microsoft Office macro security settings cannot be changed by users. |
Audit Name |
ISM-1671 |
Microsoft Office macros are disabled for users that do not have a demonstrated business requirement. |
Audit Name |
ISM-1672 |
Microsoft Office macro antivirus scanning is enabled. |
Audit Name |
ISM-1673 |
Microsoft Office macros are blocked from making Win32 API calls. |
Audit Name |
ISM-1674 |
Only Microsoft Office macros running from within a sandboxed environment, a Trusted Location or that are digitally signed by a trusted publisher are allowed to execute. |
Audit Name |
ISM-1675 |
Microsoft Office macros digitally signed by an untrusted publisher cannot be enabled via the Message Bar or Backstage View. |
Audit Name |
ISM-1676 |
Microsoft Office’s list of trusted publishers is validated on an annual or more frequent basis. |
Audit Name |
ISM-1890 |
Microsoft Office macros are checked to ensure they are free of malicious code before being digitally signed or placed within Trusted Locations. |
Audit Name |
User Application Hardening:
The following mapping table lists the go-to filters an organisation can utilise to verify conformity to the related Essential Eight mapped ISM controls. The filters most used for ISM controls mapped to the User Application Hardening Essential Eight Strategy are the Plugin Name filter and the Audit Name filter in Tenable Vulnerability Management and just Plugin Name filter in Tenable Security Center. Using these filters an organisation can establish a level of compliance with the User Application Hardening strategy. The Plugin Name filter can enhance the implementation of application blocklists by detecting if any application on the list is present. Furthermore, the Host Audit scanning using any of the many supported audit files allows the organisation to get a bit more information on specific configurations.
Control ID | Description | Tenable VM Filter |
---|---|---|
ISM-1486 | Web browsers do not process Java from the internet. | Plugin name, Audit Name |
ISM-1542 |
Microsoft Office is configured to prevent activation of Object Linking and Embedding packages. |
Audit Name |
ISM-1585 |
Web browser security settings cannot be changed by users. |
Audit Name |
ISM-1621 |
Windows PowerShell 2.0 is disabled or removed. |
Plugin Name, Host Audit Name |
ISM-1654 |
Internet Explorer 11 is disabled or removed. |
Plugin Name, Host Audit Name |
ISM-1655 |
.NET Framework 3.5 (includes .NET 2.0 and 3.0) is disabled or removed. |
Plugin Name, Host Audit Name |