Back
This checklist helps implement the Axonius Federal Systems Ax-OS STIG (Ver 1, Rel 2) controls for managed environments. It’s aimed at IT administrators, security engineers, and compliance teams who need a practical, step-by-step guide to assess and harden Ax-OS according to DISA guidance.
Progress
0 / 20
- Download Ax-OS STIG documents — Get the Ver 1, Rel 2 STIG from DISA or public.cyber.mil.
- Verify Ax-OS version and CPE — Confirm the deployed Ax-OS version matches the STIG target.
- Inventory Ax-OS assets and roles — Record instances, owners, admin accounts, and integrations.
- Backup Ax-OS configuration files — Take full config and export backups before changes.
- Review STIG controls and checklist — Map STIG requirements to your Ax-OS deployment.
- Perform STIG compliance scan — Run available Ax-OS or third-party checks to find gaps.
- Apply critical security patches and updates — Patch Ax-OS and underlying components promptly.
- Harden default accounts and change default passwords — Remove or rename defaults; apply strong passwords.
- Configure role-based access control (RBAC) and least privilege — Define roles, limit admin privileges, and use separate accounts.
- Enable multi-factor authentication for administrative users — Require MFA for all high-privilege and remote admin access.
- Restrict network access to management interfaces — Limit management ports via firewall or ACL to authorized hosts.
- Configure centralized logging and log retention — Ensure Ax-OS logs are forwarded and retained per policy.
- Set up log forwarding to SIEM — Forward audit and system logs to your centralized SIEM.
- Set log retention and rotation policy — Define retention period and rotate logs securely.
- Enable audit and change tracking for configurations — Turn on configuration audit trails and record changes.
- Enforce secure communication (TLS) and certificate management — Use up-to-date TLS and manage certificates centrally.
- Verify NTP synchronization and secure time sources — Configure trusted NTP and ensure consistent timestamps.
- Document deviations, mitigations, and remediation plans — Record approved exceptions and planned remediation actions.
- Create a remediation action tracker and assign owners — Track findings, priorities, target dates, and responsible staff.
- Schedule periodic STIG reassessments and scans — Set recurring reviews to detect regressions and new issues.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes