Review the Best Practice Summary

Check your configuration against industry-standard security best practices using the Best Practice Assessment (BPA) tool.
When you change the view from Heatmaps to the BPA report, the report shows you the Best Practice Summary.
best-practice-summary.png
The summary presents best practice configuration check results mapped to the control categories of industry standards, such as the Center for Internet Security’s (CIS) Critical Security Controls and the National Institute of Standards and Technology (NIST) publication on Security Controls and Assessment Procedures. The purpose of this information is to provide a good way to learn how BPA checks tie to industry standards, not to act as an audit.
Like the Adoption Summary, the Best Practice Summary includes metrics that show your current adoption rate and adoption progress (in parentheses) since the last time you generated the BPA on the device’s configuration.
Click
Mapping Definitions
(left sidebar) to see a complete list of all of the mapped checks and their individual scores.
Show Filters
to set filters,
Apply Filters
to the output, and
Export Mappings
to export the mappings to a .csv file.
bp-mapping-definitions.png

Recommended For You