Check your configuration against industry-standard security
best practices using the Best Practice Assessment (BPA) tool.
When you change the view from Heatmaps
to the BPA report, the report shows you the Best Practice Summary.
The summary presents best practice configuration check results
mapped to the control categories of industry standards, such as
the Center for Internet Security’s (CIS) Critical Security Controls
and the National Institute of Standards and Technology (NIST) publication
on Security Controls and Assessment Procedures. The purpose of this
information is to provide a good way to learn how BPA checks tie
to industry standards, not to act as an audit.
Like the Adoption Summary,
the Best Practice Summary includes metrics that show your current
adoption rate and adoption progress (in parentheses) since the last
time you generated the BPA on the device’s configuration.
Click
Mapping Definitions
(left sidebar)
to see a complete list of all of the mapped checks and their individual
scores.