- Case closed -
Hi,
Anyone had encounter the VAPT for fortigate even the hardening checklist had been completed using the CIS benchmark? How to solve this issue is listed below.
Foritgate is using 7.0.11.
Example like:
Vul Finding |
"Weak SSL Cipher Suites Supported
Weak Encryption
Weak Key Exchange
Weak Hash Algorithm
|
Vulnerable OpenSSH Version The installed version of OpenSSH is affected by multiple vulnerabilities - logic error |
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Vulnerability Assessment and Penetration Testing (VAPT) can be a complex process, and it's not uncommon to encounter vulnerabilities even after completing a hardening checklist. It's important to remember that hardening checklists are just one aspect of a comprehensive security strategy, and they may not cover all possible vulnerabilities.
To address any vulnerabilities discovered during a VAPT assessment, there are a few steps you can take:
1. Identify the vulnerabilities: The first step is to identify the specific vulnerabilities that were discovered during the assessment. This will help you prioritize which vulnerabilities to address first.
2. Determine the severity: Once you've identified the vulnerabilities, you need to determine their severity. This will help you determine how critical each vulnerability is and how quickly it needs to be addressed.
3. Develop a plan: Based on the severity of the vulnerabilities, you should develop a plan for addressing them. This may involve patching or updating the Fortigate software, adjusting your firewall rules, or implementing additional security controls.
4. Test the fixes: Before implementing any fixes, it's important to test them in a controlled environment to ensure they don't cause any unintended consequences.
5. Monitor for future vulnerabilities: VAPT assessments should be an ongoing process, so it's important to monitor your Fortigate firewall for future vulnerabilities and address them as soon as they are discovered.
It's also worth noting that Fortinet provides regular security updates and advisories, so it's important to stay up-to-date with these and apply any relevant updates as soon as possible.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.