cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
287
Views
0
Helpful
1
Replies

Experience with Authenticated Scans for Audit/PCI

joeharb
Level 5
Level 5

We are working on getting authenticated scans working from our Risk department to determine to gather more information to eliminate some false positives as well as PCI requirements for authenticated scans.  We are working with the Vendor (Qualys) on this, but it appears that when the scanner logs in it run many different versions of the "show" command, and a large amount of commands for every scan.  I am curious if anyone here has had any experience with authenticated scans?

Thanks,

Joe

1 Reply 1

pman
Spotlight
Spotlight

Hi,

Hope this is still relevant, and maybe it can help someone later.

Here are some steps I would recommend working on with the Risk department to ensure smooth authenticated scans:

  1. Work with the Risk department to ensure only the necessary commands are included in the scan for devices, and confirm that these commands are read-only to prevent accidental changes to the configuration.

  2. Review and tighten the user permissions on the device to make sure the scan account has only the required access (preferably read-only). This limits potential risks and ensures that no unauthorized changes can be made during the scan.

  3. Schedule scans during off-peak times to minimize the impact on production traffic (if possible, of course — there could be cases where this is not feasible depending on the environment and priorities).

  4. Run a test scan first to verify that the desired information is being gathered without causing performance issues or accidental configuration changes. This step will help identify any issues before the actual scan is performed.

  5. There could very well be a correlation between certain commands, such as show crypto * and show version, for example. These commands are often used to check for security vulnerabilities related to specific ciphers/encryptions for the device’s version.

  6. Another example might be running commands like show mka session, show run, show authentication *, and show log, which can be helpful to see which ciphers are used for MACsec, or to check connectivity between devices to ensure they are protected by MACsec and that the session is functioning properly.

Of course, there are many other variations depending on what specific information is being sought.

Review Cisco Networking for a $25 gift card