regscale-cli 6.16.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/__init__.py +1 -0
- regscale/airflow/__init__.py +9 -0
- regscale/airflow/azure/__init__.py +9 -0
- regscale/airflow/azure/cli.py +89 -0
- regscale/airflow/azure/upload_dags.py +116 -0
- regscale/airflow/click_dags.py +127 -0
- regscale/airflow/click_mixins.py +82 -0
- regscale/airflow/config.py +25 -0
- regscale/airflow/factories/__init__.py +0 -0
- regscale/airflow/factories/connections.py +58 -0
- regscale/airflow/factories/workflows.py +78 -0
- regscale/airflow/hierarchy.py +88 -0
- regscale/airflow/operators/__init__.py +0 -0
- regscale/airflow/operators/click.py +36 -0
- regscale/airflow/sensors/__init__.py +0 -0
- regscale/airflow/sensors/sql.py +107 -0
- regscale/airflow/sessions/__init__.py +0 -0
- regscale/airflow/sessions/sql/__init__.py +3 -0
- regscale/airflow/sessions/sql/queries.py +64 -0
- regscale/airflow/sessions/sql/sql_server_queries.py +248 -0
- regscale/airflow/tasks/__init__.py +0 -0
- regscale/airflow/tasks/branches.py +22 -0
- regscale/airflow/tasks/cli.py +116 -0
- regscale/airflow/tasks/click.py +73 -0
- regscale/airflow/tasks/debugging.py +9 -0
- regscale/airflow/tasks/groups.py +116 -0
- regscale/airflow/tasks/init.py +60 -0
- regscale/airflow/tasks/states.py +47 -0
- regscale/airflow/tasks/workflows.py +36 -0
- regscale/ansible/__init__.py +9 -0
- regscale/core/__init__.py +0 -0
- regscale/core/app/__init__.py +3 -0
- regscale/core/app/api.py +571 -0
- regscale/core/app/application.py +665 -0
- regscale/core/app/internal/__init__.py +136 -0
- regscale/core/app/internal/admin_actions.py +230 -0
- regscale/core/app/internal/assessments_editor.py +873 -0
- regscale/core/app/internal/catalog.py +316 -0
- regscale/core/app/internal/comparison.py +459 -0
- regscale/core/app/internal/control_editor.py +571 -0
- regscale/core/app/internal/encrypt.py +79 -0
- regscale/core/app/internal/evidence.py +1240 -0
- regscale/core/app/internal/file_uploads.py +151 -0
- regscale/core/app/internal/healthcheck.py +66 -0
- regscale/core/app/internal/login.py +305 -0
- regscale/core/app/internal/migrations.py +240 -0
- regscale/core/app/internal/model_editor.py +1701 -0
- regscale/core/app/internal/poam_editor.py +632 -0
- regscale/core/app/internal/workflow.py +105 -0
- regscale/core/app/logz.py +74 -0
- regscale/core/app/utils/XMLIR.py +258 -0
- regscale/core/app/utils/__init__.py +0 -0
- regscale/core/app/utils/api_handler.py +358 -0
- regscale/core/app/utils/app_utils.py +1110 -0
- regscale/core/app/utils/catalog_utils/__init__.py +0 -0
- regscale/core/app/utils/catalog_utils/common.py +91 -0
- regscale/core/app/utils/catalog_utils/compare_catalog.py +193 -0
- regscale/core/app/utils/catalog_utils/diagnostic_catalog.py +97 -0
- regscale/core/app/utils/catalog_utils/download_catalog.py +103 -0
- regscale/core/app/utils/catalog_utils/update_catalog.py +718 -0
- regscale/core/app/utils/catalog_utils/update_catalog_v2.py +1378 -0
- regscale/core/app/utils/catalog_utils/update_catalog_v3.py +1272 -0
- regscale/core/app/utils/catalog_utils/update_plans.py +334 -0
- regscale/core/app/utils/file_utils.py +238 -0
- regscale/core/app/utils/parser_utils.py +81 -0
- regscale/core/app/utils/pickle_file_handler.py +57 -0
- regscale/core/app/utils/regscale_utils.py +319 -0
- regscale/core/app/utils/report_utils.py +119 -0
- regscale/core/app/utils/variables.py +226 -0
- regscale/core/decorators.py +31 -0
- regscale/core/lazy_group.py +65 -0
- regscale/core/login.py +63 -0
- regscale/core/server/__init__.py +0 -0
- regscale/core/server/flask_api.py +473 -0
- regscale/core/server/helpers.py +373 -0
- regscale/core/server/rest.py +64 -0
- regscale/core/server/static/css/bootstrap.css +6030 -0
- regscale/core/server/static/css/bootstrap.min.css +6 -0
- regscale/core/server/static/css/main.css +176 -0
- regscale/core/server/static/images/regscale-cli.svg +49 -0
- regscale/core/server/static/images/regscale.svg +38 -0
- regscale/core/server/templates/base.html +74 -0
- regscale/core/server/templates/index.html +43 -0
- regscale/core/server/templates/login.html +28 -0
- regscale/core/server/templates/make_base64.html +22 -0
- regscale/core/server/templates/upload_STIG.html +109 -0
- regscale/core/server/templates/upload_STIG_result.html +26 -0
- regscale/core/server/templates/upload_ssp.html +144 -0
- regscale/core/server/templates/upload_ssp_result.html +128 -0
- regscale/core/static/__init__.py +0 -0
- regscale/core/static/regex.py +14 -0
- regscale/core/utils/__init__.py +117 -0
- regscale/core/utils/click_utils.py +13 -0
- regscale/core/utils/date.py +238 -0
- regscale/core/utils/graphql.py +254 -0
- regscale/core/utils/urls.py +23 -0
- regscale/dev/__init__.py +6 -0
- regscale/dev/analysis.py +454 -0
- regscale/dev/cli.py +235 -0
- regscale/dev/code_gen.py +492 -0
- regscale/dev/dirs.py +69 -0
- regscale/dev/docs.py +384 -0
- regscale/dev/monitoring.py +26 -0
- regscale/dev/profiling.py +216 -0
- regscale/exceptions/__init__.py +4 -0
- regscale/exceptions/license_exception.py +7 -0
- regscale/exceptions/validation_exception.py +9 -0
- regscale/integrations/__init__.py +1 -0
- regscale/integrations/commercial/__init__.py +486 -0
- regscale/integrations/commercial/ad.py +433 -0
- regscale/integrations/commercial/amazon/__init__.py +0 -0
- regscale/integrations/commercial/amazon/common.py +106 -0
- regscale/integrations/commercial/aqua/__init__.py +0 -0
- regscale/integrations/commercial/aqua/aqua.py +91 -0
- regscale/integrations/commercial/aws/__init__.py +6 -0
- regscale/integrations/commercial/aws/cli.py +322 -0
- regscale/integrations/commercial/aws/inventory/__init__.py +110 -0
- regscale/integrations/commercial/aws/inventory/base.py +64 -0
- regscale/integrations/commercial/aws/inventory/resources/__init__.py +19 -0
- regscale/integrations/commercial/aws/inventory/resources/compute.py +234 -0
- regscale/integrations/commercial/aws/inventory/resources/containers.py +113 -0
- regscale/integrations/commercial/aws/inventory/resources/database.py +101 -0
- regscale/integrations/commercial/aws/inventory/resources/integration.py +237 -0
- regscale/integrations/commercial/aws/inventory/resources/networking.py +253 -0
- regscale/integrations/commercial/aws/inventory/resources/security.py +240 -0
- regscale/integrations/commercial/aws/inventory/resources/storage.py +91 -0
- regscale/integrations/commercial/aws/scanner.py +823 -0
- regscale/integrations/commercial/azure/__init__.py +0 -0
- regscale/integrations/commercial/azure/common.py +32 -0
- regscale/integrations/commercial/azure/intune.py +488 -0
- regscale/integrations/commercial/azure/scanner.py +49 -0
- regscale/integrations/commercial/burp.py +78 -0
- regscale/integrations/commercial/cpe.py +144 -0
- regscale/integrations/commercial/crowdstrike.py +1117 -0
- regscale/integrations/commercial/defender.py +1511 -0
- regscale/integrations/commercial/dependabot.py +210 -0
- regscale/integrations/commercial/durosuite/__init__.py +0 -0
- regscale/integrations/commercial/durosuite/api.py +1546 -0
- regscale/integrations/commercial/durosuite/process_devices.py +101 -0
- regscale/integrations/commercial/durosuite/scanner.py +637 -0
- regscale/integrations/commercial/durosuite/variables.py +21 -0
- regscale/integrations/commercial/ecr.py +90 -0
- regscale/integrations/commercial/gcp/__init__.py +237 -0
- regscale/integrations/commercial/gcp/auth.py +96 -0
- regscale/integrations/commercial/gcp/control_tests.py +238 -0
- regscale/integrations/commercial/gcp/variables.py +18 -0
- regscale/integrations/commercial/gitlab.py +332 -0
- regscale/integrations/commercial/grype.py +165 -0
- regscale/integrations/commercial/ibm.py +90 -0
- regscale/integrations/commercial/import_all/__init__.py +0 -0
- regscale/integrations/commercial/import_all/import_all_cmd.py +467 -0
- regscale/integrations/commercial/import_all/scan_file_fingerprints.json +27 -0
- regscale/integrations/commercial/jira.py +1046 -0
- regscale/integrations/commercial/mappings/__init__.py +0 -0
- regscale/integrations/commercial/mappings/csf_controls.json +713 -0
- regscale/integrations/commercial/mappings/nist_800_53_r5_controls.json +1516 -0
- regscale/integrations/commercial/nessus/__init__.py +0 -0
- regscale/integrations/commercial/nessus/nessus_utils.py +429 -0
- regscale/integrations/commercial/nessus/scanner.py +416 -0
- regscale/integrations/commercial/nexpose.py +90 -0
- regscale/integrations/commercial/okta.py +798 -0
- regscale/integrations/commercial/opentext/__init__.py +0 -0
- regscale/integrations/commercial/opentext/click.py +99 -0
- regscale/integrations/commercial/opentext/scanner.py +143 -0
- regscale/integrations/commercial/prisma.py +91 -0
- regscale/integrations/commercial/qualys.py +1462 -0
- regscale/integrations/commercial/salesforce.py +980 -0
- regscale/integrations/commercial/sap/__init__.py +0 -0
- regscale/integrations/commercial/sap/click.py +31 -0
- regscale/integrations/commercial/sap/sysdig/__init__.py +0 -0
- regscale/integrations/commercial/sap/sysdig/click.py +57 -0
- regscale/integrations/commercial/sap/sysdig/sysdig_scanner.py +190 -0
- regscale/integrations/commercial/sap/tenable/__init__.py +0 -0
- regscale/integrations/commercial/sap/tenable/click.py +49 -0
- regscale/integrations/commercial/sap/tenable/scanner.py +196 -0
- regscale/integrations/commercial/servicenow.py +1756 -0
- regscale/integrations/commercial/sicura/__init__.py +0 -0
- regscale/integrations/commercial/sicura/api.py +855 -0
- regscale/integrations/commercial/sicura/commands.py +73 -0
- regscale/integrations/commercial/sicura/scanner.py +481 -0
- regscale/integrations/commercial/sicura/variables.py +16 -0
- regscale/integrations/commercial/snyk.py +90 -0
- regscale/integrations/commercial/sonarcloud.py +260 -0
- regscale/integrations/commercial/sqlserver.py +369 -0
- regscale/integrations/commercial/stig_mapper_integration/__init__.py +0 -0
- regscale/integrations/commercial/stig_mapper_integration/click_commands.py +38 -0
- regscale/integrations/commercial/stig_mapper_integration/mapping_engine.py +353 -0
- regscale/integrations/commercial/stigv2/__init__.py +0 -0
- regscale/integrations/commercial/stigv2/ckl_parser.py +349 -0
- regscale/integrations/commercial/stigv2/click_commands.py +95 -0
- regscale/integrations/commercial/stigv2/stig_integration.py +202 -0
- regscale/integrations/commercial/synqly/__init__.py +0 -0
- regscale/integrations/commercial/synqly/assets.py +46 -0
- regscale/integrations/commercial/synqly/ticketing.py +132 -0
- regscale/integrations/commercial/synqly/vulnerabilities.py +223 -0
- regscale/integrations/commercial/synqly_jira.py +840 -0
- regscale/integrations/commercial/tenablev2/__init__.py +0 -0
- regscale/integrations/commercial/tenablev2/authenticate.py +31 -0
- regscale/integrations/commercial/tenablev2/click.py +1584 -0
- regscale/integrations/commercial/tenablev2/scanner.py +504 -0
- regscale/integrations/commercial/tenablev2/stig_parsers.py +140 -0
- regscale/integrations/commercial/tenablev2/utils.py +78 -0
- regscale/integrations/commercial/tenablev2/variables.py +17 -0
- regscale/integrations/commercial/trivy.py +162 -0
- regscale/integrations/commercial/veracode.py +96 -0
- regscale/integrations/commercial/wizv2/WizDataMixin.py +97 -0
- regscale/integrations/commercial/wizv2/__init__.py +0 -0
- regscale/integrations/commercial/wizv2/click.py +429 -0
- regscale/integrations/commercial/wizv2/constants.py +1001 -0
- regscale/integrations/commercial/wizv2/issue.py +361 -0
- regscale/integrations/commercial/wizv2/models.py +112 -0
- regscale/integrations/commercial/wizv2/parsers.py +339 -0
- regscale/integrations/commercial/wizv2/sbom.py +115 -0
- regscale/integrations/commercial/wizv2/scanner.py +416 -0
- regscale/integrations/commercial/wizv2/utils.py +796 -0
- regscale/integrations/commercial/wizv2/variables.py +39 -0
- regscale/integrations/commercial/wizv2/wiz_auth.py +159 -0
- regscale/integrations/commercial/xray.py +91 -0
- regscale/integrations/integration/__init__.py +2 -0
- regscale/integrations/integration/integration.py +26 -0
- regscale/integrations/integration/inventory.py +17 -0
- regscale/integrations/integration/issue.py +100 -0
- regscale/integrations/integration_override.py +149 -0
- regscale/integrations/public/__init__.py +103 -0
- regscale/integrations/public/cisa.py +641 -0
- regscale/integrations/public/criticality_updater.py +70 -0
- regscale/integrations/public/emass.py +411 -0
- regscale/integrations/public/emass_slcm_import.py +697 -0
- regscale/integrations/public/fedramp/__init__.py +0 -0
- regscale/integrations/public/fedramp/appendix_parser.py +548 -0
- regscale/integrations/public/fedramp/click.py +479 -0
- regscale/integrations/public/fedramp/components.py +714 -0
- regscale/integrations/public/fedramp/docx_parser.py +259 -0
- regscale/integrations/public/fedramp/fedramp_cis_crm.py +1124 -0
- regscale/integrations/public/fedramp/fedramp_common.py +3181 -0
- regscale/integrations/public/fedramp/fedramp_docx.py +388 -0
- regscale/integrations/public/fedramp/fedramp_five.py +2343 -0
- regscale/integrations/public/fedramp/fedramp_traversal.py +138 -0
- regscale/integrations/public/fedramp/import_fedramp_r4_ssp.py +279 -0
- regscale/integrations/public/fedramp/import_workbook.py +495 -0
- regscale/integrations/public/fedramp/inventory_items.py +244 -0
- regscale/integrations/public/fedramp/mappings/__init__.py +0 -0
- regscale/integrations/public/fedramp/mappings/fedramp_r4_parts.json +7388 -0
- regscale/integrations/public/fedramp/mappings/fedramp_r5_params.json +8636 -0
- regscale/integrations/public/fedramp/mappings/fedramp_r5_parts.json +9605 -0
- regscale/integrations/public/fedramp/mappings/system_roles.py +34 -0
- regscale/integrations/public/fedramp/mappings/user.py +175 -0
- regscale/integrations/public/fedramp/mappings/values.py +141 -0
- regscale/integrations/public/fedramp/markdown_parser.py +150 -0
- regscale/integrations/public/fedramp/metadata.py +689 -0
- regscale/integrations/public/fedramp/models/__init__.py +59 -0
- regscale/integrations/public/fedramp/models/leveraged_auth_new.py +168 -0
- regscale/integrations/public/fedramp/models/poam_importer.py +522 -0
- regscale/integrations/public/fedramp/parts_mapper.py +107 -0
- regscale/integrations/public/fedramp/poam/__init__.py +0 -0
- regscale/integrations/public/fedramp/poam/scanner.py +851 -0
- regscale/integrations/public/fedramp/properties.py +201 -0
- regscale/integrations/public/fedramp/reporting.py +84 -0
- regscale/integrations/public/fedramp/resources.py +496 -0
- regscale/integrations/public/fedramp/rosetta.py +110 -0
- regscale/integrations/public/fedramp/ssp_logger.py +87 -0
- regscale/integrations/public/fedramp/system_characteristics.py +922 -0
- regscale/integrations/public/fedramp/system_control_implementations.py +582 -0
- regscale/integrations/public/fedramp/system_implementation.py +190 -0
- regscale/integrations/public/fedramp/xml_utils.py +87 -0
- regscale/integrations/public/nist_catalog.py +275 -0
- regscale/integrations/public/oscal.py +1946 -0
- regscale/integrations/public/otx.py +169 -0
- regscale/integrations/scanner_integration.py +2692 -0
- regscale/integrations/variables.py +25 -0
- regscale/models/__init__.py +7 -0
- regscale/models/app_models/__init__.py +5 -0
- regscale/models/app_models/catalog_compare.py +213 -0
- regscale/models/app_models/click.py +252 -0
- regscale/models/app_models/datetime_encoder.py +21 -0
- regscale/models/app_models/import_validater.py +321 -0
- regscale/models/app_models/mapping.py +260 -0
- regscale/models/app_models/pipeline.py +37 -0
- regscale/models/click_models.py +413 -0
- regscale/models/config.py +154 -0
- regscale/models/email_style.css +67 -0
- regscale/models/hierarchy.py +8 -0
- regscale/models/inspect_models.py +79 -0
- regscale/models/integration_models/__init__.py +0 -0
- regscale/models/integration_models/amazon_models/__init__.py +0 -0
- regscale/models/integration_models/amazon_models/inspector.py +262 -0
- regscale/models/integration_models/amazon_models/inspector_scan.py +206 -0
- regscale/models/integration_models/aqua.py +247 -0
- regscale/models/integration_models/azure_alerts.py +255 -0
- regscale/models/integration_models/base64.py +23 -0
- regscale/models/integration_models/burp.py +433 -0
- regscale/models/integration_models/burp_models.py +128 -0
- regscale/models/integration_models/cisa_kev_data.json +19333 -0
- regscale/models/integration_models/defender_data.py +93 -0
- regscale/models/integration_models/defenderimport.py +143 -0
- regscale/models/integration_models/drf.py +443 -0
- regscale/models/integration_models/ecr_models/__init__.py +0 -0
- regscale/models/integration_models/ecr_models/data.py +69 -0
- regscale/models/integration_models/ecr_models/ecr.py +239 -0
- regscale/models/integration_models/flat_file_importer.py +1079 -0
- regscale/models/integration_models/grype_import.py +247 -0
- regscale/models/integration_models/ibm.py +126 -0
- regscale/models/integration_models/implementation_results.py +85 -0
- regscale/models/integration_models/nexpose.py +140 -0
- regscale/models/integration_models/prisma.py +202 -0
- regscale/models/integration_models/qualys.py +720 -0
- regscale/models/integration_models/qualys_scanner.py +160 -0
- regscale/models/integration_models/sbom/__init__.py +0 -0
- regscale/models/integration_models/sbom/cyclone_dx.py +139 -0
- regscale/models/integration_models/send_reminders.py +620 -0
- regscale/models/integration_models/snyk.py +155 -0
- regscale/models/integration_models/synqly_models/__init__.py +0 -0
- regscale/models/integration_models/synqly_models/capabilities.json +1 -0
- regscale/models/integration_models/synqly_models/connector_types.py +22 -0
- regscale/models/integration_models/synqly_models/connectors/__init__.py +7 -0
- regscale/models/integration_models/synqly_models/connectors/assets.py +97 -0
- regscale/models/integration_models/synqly_models/connectors/ticketing.py +583 -0
- regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py +169 -0
- regscale/models/integration_models/synqly_models/ocsf_mapper.py +331 -0
- regscale/models/integration_models/synqly_models/param.py +72 -0
- regscale/models/integration_models/synqly_models/synqly_model.py +733 -0
- regscale/models/integration_models/synqly_models/tenants.py +39 -0
- regscale/models/integration_models/tenable_models/__init__.py +0 -0
- regscale/models/integration_models/tenable_models/integration.py +187 -0
- regscale/models/integration_models/tenable_models/models.py +513 -0
- regscale/models/integration_models/trivy_import.py +231 -0
- regscale/models/integration_models/veracode.py +217 -0
- regscale/models/integration_models/xray.py +135 -0
- regscale/models/locking.py +100 -0
- regscale/models/platform.py +110 -0
- regscale/models/regscale_models/__init__.py +67 -0
- regscale/models/regscale_models/assessment.py +570 -0
- regscale/models/regscale_models/assessment_plan.py +52 -0
- regscale/models/regscale_models/asset.py +567 -0
- regscale/models/regscale_models/asset_mapping.py +190 -0
- regscale/models/regscale_models/case.py +42 -0
- regscale/models/regscale_models/catalog.py +261 -0
- regscale/models/regscale_models/cci.py +46 -0
- regscale/models/regscale_models/change.py +167 -0
- regscale/models/regscale_models/checklist.py +372 -0
- regscale/models/regscale_models/comment.py +49 -0
- regscale/models/regscale_models/compliance_settings.py +112 -0
- regscale/models/regscale_models/component.py +412 -0
- regscale/models/regscale_models/component_mapping.py +65 -0
- regscale/models/regscale_models/control.py +38 -0
- regscale/models/regscale_models/control_implementation.py +1128 -0
- regscale/models/regscale_models/control_objective.py +261 -0
- regscale/models/regscale_models/control_parameter.py +100 -0
- regscale/models/regscale_models/control_test.py +34 -0
- regscale/models/regscale_models/control_test_plan.py +75 -0
- regscale/models/regscale_models/control_test_result.py +52 -0
- regscale/models/regscale_models/custom_field.py +245 -0
- regscale/models/regscale_models/data.py +109 -0
- regscale/models/regscale_models/data_center.py +40 -0
- regscale/models/regscale_models/deviation.py +203 -0
- regscale/models/regscale_models/email.py +97 -0
- regscale/models/regscale_models/evidence.py +47 -0
- regscale/models/regscale_models/evidence_mapping.py +40 -0
- regscale/models/regscale_models/facility.py +59 -0
- regscale/models/regscale_models/file.py +382 -0
- regscale/models/regscale_models/filetag.py +37 -0
- regscale/models/regscale_models/form_field_value.py +94 -0
- regscale/models/regscale_models/group.py +169 -0
- regscale/models/regscale_models/implementation_objective.py +335 -0
- regscale/models/regscale_models/implementation_option.py +275 -0
- regscale/models/regscale_models/implementation_role.py +33 -0
- regscale/models/regscale_models/incident.py +177 -0
- regscale/models/regscale_models/interconnection.py +43 -0
- regscale/models/regscale_models/issue.py +1176 -0
- regscale/models/regscale_models/leveraged_authorization.py +125 -0
- regscale/models/regscale_models/line_of_inquiry.py +52 -0
- regscale/models/regscale_models/link.py +205 -0
- regscale/models/regscale_models/meta_data.py +64 -0
- regscale/models/regscale_models/mixins/__init__.py +0 -0
- regscale/models/regscale_models/mixins/parent_cache.py +124 -0
- regscale/models/regscale_models/module.py +224 -0
- regscale/models/regscale_models/modules.py +191 -0
- regscale/models/regscale_models/objective.py +14 -0
- regscale/models/regscale_models/parameter.py +87 -0
- regscale/models/regscale_models/ports_protocol.py +81 -0
- regscale/models/regscale_models/privacy.py +89 -0
- regscale/models/regscale_models/profile.py +50 -0
- regscale/models/regscale_models/profile_link.py +68 -0
- regscale/models/regscale_models/profile_mapping.py +124 -0
- regscale/models/regscale_models/project.py +63 -0
- regscale/models/regscale_models/property.py +278 -0
- regscale/models/regscale_models/question.py +85 -0
- regscale/models/regscale_models/questionnaire.py +87 -0
- regscale/models/regscale_models/questionnaire_instance.py +177 -0
- regscale/models/regscale_models/rbac.py +132 -0
- regscale/models/regscale_models/reference.py +86 -0
- regscale/models/regscale_models/regscale_model.py +1643 -0
- regscale/models/regscale_models/requirement.py +29 -0
- regscale/models/regscale_models/risk.py +274 -0
- regscale/models/regscale_models/sbom.py +54 -0
- regscale/models/regscale_models/scan_history.py +436 -0
- regscale/models/regscale_models/search.py +53 -0
- regscale/models/regscale_models/security_control.py +132 -0
- regscale/models/regscale_models/security_plan.py +204 -0
- regscale/models/regscale_models/software_inventory.py +159 -0
- regscale/models/regscale_models/stake_holder.py +64 -0
- regscale/models/regscale_models/stig.py +647 -0
- regscale/models/regscale_models/supply_chain.py +152 -0
- regscale/models/regscale_models/system_role.py +188 -0
- regscale/models/regscale_models/system_role_external_assignment.py +40 -0
- regscale/models/regscale_models/tag.py +37 -0
- regscale/models/regscale_models/tag_mapping.py +19 -0
- regscale/models/regscale_models/task.py +133 -0
- regscale/models/regscale_models/threat.py +196 -0
- regscale/models/regscale_models/user.py +175 -0
- regscale/models/regscale_models/user_group.py +55 -0
- regscale/models/regscale_models/vulnerability.py +242 -0
- regscale/models/regscale_models/vulnerability_mapping.py +162 -0
- regscale/models/regscale_models/workflow.py +55 -0
- regscale/models/regscale_models/workflow_action.py +34 -0
- regscale/models/regscale_models/workflow_instance.py +269 -0
- regscale/models/regscale_models/workflow_instance_step.py +114 -0
- regscale/models/regscale_models/workflow_template.py +58 -0
- regscale/models/regscale_models/workflow_template_step.py +45 -0
- regscale/regscale.py +815 -0
- regscale/utils/__init__.py +7 -0
- regscale/utils/b64conversion.py +14 -0
- regscale/utils/click_utils.py +118 -0
- regscale/utils/decorators.py +48 -0
- regscale/utils/dict_utils.py +59 -0
- regscale/utils/files.py +79 -0
- regscale/utils/fxns.py +30 -0
- regscale/utils/graphql_client.py +113 -0
- regscale/utils/lists.py +16 -0
- regscale/utils/numbers.py +12 -0
- regscale/utils/shell.py +148 -0
- regscale/utils/string.py +121 -0
- regscale/utils/synqly_utils.py +165 -0
- regscale/utils/threading/__init__.py +8 -0
- regscale/utils/threading/threadhandler.py +131 -0
- regscale/utils/threading/threadsafe_counter.py +47 -0
- regscale/utils/threading/threadsafe_dict.py +242 -0
- regscale/utils/threading/threadsafe_list.py +83 -0
- regscale/utils/version.py +104 -0
- regscale/validation/__init__.py +0 -0
- regscale/validation/address.py +37 -0
- regscale/validation/record.py +48 -0
- regscale/visualization/__init__.py +5 -0
- regscale/visualization/click.py +34 -0
- regscale_cli-6.16.0.0.dist-info/LICENSE +21 -0
- regscale_cli-6.16.0.0.dist-info/METADATA +659 -0
- regscale_cli-6.16.0.0.dist-info/RECORD +481 -0
- regscale_cli-6.16.0.0.dist-info/WHEEL +5 -0
- regscale_cli-6.16.0.0.dist-info/entry_points.txt +6 -0
- regscale_cli-6.16.0.0.dist-info/top_level.txt +2 -0
- tests/fixtures/__init__.py +2 -0
- tests/fixtures/api.py +87 -0
- tests/fixtures/models.py +91 -0
- tests/fixtures/test_fixture.py +144 -0
- tests/mocks/__init__.py +0 -0
- tests/mocks/objects.py +3 -0
- tests/mocks/response.py +32 -0
- tests/mocks/xml.py +13 -0
- tests/regscale/__init__.py +0 -0
- tests/regscale/core/__init__.py +0 -0
- tests/regscale/core/test_api.py +232 -0
- tests/regscale/core/test_app.py +406 -0
- tests/regscale/core/test_login.py +37 -0
- tests/regscale/core/test_logz.py +66 -0
- tests/regscale/core/test_sbom_generator.py +87 -0
- tests/regscale/core/test_validation_utils.py +163 -0
- tests/regscale/core/test_version.py +78 -0
- tests/regscale/models/__init__.py +0 -0
- tests/regscale/models/test_asset.py +71 -0
- tests/regscale/models/test_config.py +26 -0
- tests/regscale/models/test_control_implementation.py +27 -0
- tests/regscale/models/test_import.py +97 -0
- tests/regscale/models/test_issue.py +36 -0
- tests/regscale/models/test_mapping.py +52 -0
- tests/regscale/models/test_platform.py +31 -0
- tests/regscale/models/test_regscale_model.py +346 -0
- tests/regscale/models/test_report.py +32 -0
- tests/regscale/models/test_tenable_integrations.py +118 -0
- tests/regscale/models/test_user_model.py +121 -0
- tests/regscale/test_about.py +19 -0
- tests/regscale/test_authorization.py +65 -0
|
@@ -0,0 +1,713 @@
|
|
|
1
|
+
{
|
|
2
|
+
"ID.AM-1": {
|
|
3
|
+
"support_status": true,
|
|
4
|
+
"notes": [
|
|
5
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon console can help generate an inventory of any active systems if the Falcon sensor has been configured on all systems. However, this is primarily the responsibility of the implementing organization. If the implementing organization implements the Falcon Discover module, a rich set of hardware, software, and configuration information is available on any active system.",
|
|
6
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon console can help generate an inventory of all active systems if the Falcon sensor has been configured on all systems. The Falcon Discover module offers contextual information for systems, utilizing dashboards, graphs, charts, and search functionality to drill down into supporting data such as account usage, installed software packages, and insights into potentially unmanaged devices on an organization\u2019s network.\nInstallation of the Falcon sensor is the responsibility of the implementing organization."
|
|
7
|
+
],
|
|
8
|
+
"support": "Partial"
|
|
9
|
+
},
|
|
10
|
+
"ID.AM-2": {
|
|
11
|
+
"support_status": false,
|
|
12
|
+
"notes": [],
|
|
13
|
+
"support": "N/A"
|
|
14
|
+
},
|
|
15
|
+
"ID.AM-4": {
|
|
16
|
+
"support_status": true,
|
|
17
|
+
"notes": [
|
|
18
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon console can help generate an inventory of all active systems if the Falcon sensor has been configured on all systems. The Falcon Discover module offers contextual information for systems, utilizing dashboards, graphs, charts, and search functionality to drill down into supporting data such as account usage, installed software packages, and insights into potentially unmanaged devices on an organization\u2019s network.\nInstallation of the Falcon sensor is the responsibility of the implementing organization."
|
|
19
|
+
],
|
|
20
|
+
"support": "Partial"
|
|
21
|
+
},
|
|
22
|
+
"ID.AM-5": {
|
|
23
|
+
"support_status": false,
|
|
24
|
+
"notes": [],
|
|
25
|
+
"support": "N/A"
|
|
26
|
+
},
|
|
27
|
+
"ID.AM-6": {
|
|
28
|
+
"support_status": false,
|
|
29
|
+
"notes": [],
|
|
30
|
+
"support": "N/A"
|
|
31
|
+
},
|
|
32
|
+
"ID.BE-1": {
|
|
33
|
+
"support_status": false,
|
|
34
|
+
"notes": [],
|
|
35
|
+
"support": "N/A"
|
|
36
|
+
},
|
|
37
|
+
"ID.BE-2": {
|
|
38
|
+
"support_status": false,
|
|
39
|
+
"notes": [],
|
|
40
|
+
"support": "N/A"
|
|
41
|
+
},
|
|
42
|
+
"ID.BE-3": {
|
|
43
|
+
"support_status": false,
|
|
44
|
+
"notes": [],
|
|
45
|
+
"support": "N/A"
|
|
46
|
+
},
|
|
47
|
+
"ID.BE-4": {
|
|
48
|
+
"support_status": false,
|
|
49
|
+
"notes": [],
|
|
50
|
+
"support": "N/A"
|
|
51
|
+
},
|
|
52
|
+
"ID.BE-5": {
|
|
53
|
+
"support_status": false,
|
|
54
|
+
"notes": [],
|
|
55
|
+
"support": "N/A"
|
|
56
|
+
},
|
|
57
|
+
"ID.GV-1": {
|
|
58
|
+
"support_status": false,
|
|
59
|
+
"notes": [],
|
|
60
|
+
"support": "N/A"
|
|
61
|
+
},
|
|
62
|
+
"ID.GV-2": {
|
|
63
|
+
"support_status": false,
|
|
64
|
+
"notes": [],
|
|
65
|
+
"support": "N/A"
|
|
66
|
+
},
|
|
67
|
+
"ID.GV-3": {
|
|
68
|
+
"support_status": false,
|
|
69
|
+
"notes": [],
|
|
70
|
+
"support": "N/A"
|
|
71
|
+
},
|
|
72
|
+
"ID.GV-4": {
|
|
73
|
+
"support_status": false,
|
|
74
|
+
"notes": [],
|
|
75
|
+
"support": "N/A"
|
|
76
|
+
},
|
|
77
|
+
"ID.RA-1": {
|
|
78
|
+
"support_status": true,
|
|
79
|
+
"notes": [
|
|
80
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
81
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon Intelligence product provides implementing organizations with detailed analysis and reports on the latest threats and actors. Additionally, CrowdStrike\u2019s detailed threat actor profiles provide a summary of the adversaries, as well as intelligence including last known activity, community identifiers, target industries and countries, motivations, tactics, techniques, and procedures."
|
|
82
|
+
],
|
|
83
|
+
"support": "Partial"
|
|
84
|
+
},
|
|
85
|
+
"ID.RA-2": {
|
|
86
|
+
"support_status": true,
|
|
87
|
+
"notes": [
|
|
88
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon Intelligence product provides implementing organizations with detailed analysis and reports on the latest threats and actors. Additionally, CrowdStrike\u2019s detailed threat actor profiles provide a summary of the adversaries, as well as intelligence including last known activity, community identifiers, target industries and countries, motivations, tactics, techniques, and procedures."
|
|
89
|
+
],
|
|
90
|
+
"support": "Partial"
|
|
91
|
+
},
|
|
92
|
+
"ID.RA-3": {
|
|
93
|
+
"support_status": true,
|
|
94
|
+
"notes": [
|
|
95
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon Intelligence product provides implementing organizations with detailed analysis and reports on the latest threats and actors. Additionally, CrowdStrike\u2019s detailed threat actor profiles provide a summary of the adversaries, as well as intelligence including last known activity, community identifiers, target industries and countries, motivations, tactics, techniques, and procedures."
|
|
96
|
+
],
|
|
97
|
+
"support": "Partial"
|
|
98
|
+
},
|
|
99
|
+
"ID.RA-4": {
|
|
100
|
+
"support_status": false,
|
|
101
|
+
"notes": [],
|
|
102
|
+
"support": "N/A"
|
|
103
|
+
},
|
|
104
|
+
"ID.RA-5": {
|
|
105
|
+
"support_status": false,
|
|
106
|
+
"notes": [],
|
|
107
|
+
"support": "N/A"
|
|
108
|
+
},
|
|
109
|
+
"ID.RA-6": {
|
|
110
|
+
"support_status": false,
|
|
111
|
+
"notes": [],
|
|
112
|
+
"support": "N/A"
|
|
113
|
+
},
|
|
114
|
+
"ID.RM-1": {
|
|
115
|
+
"support_status": false,
|
|
116
|
+
"notes": [],
|
|
117
|
+
"support": "N/A"
|
|
118
|
+
},
|
|
119
|
+
"ID.RM-2": {
|
|
120
|
+
"support_status": false,
|
|
121
|
+
"notes": [],
|
|
122
|
+
"support": "N/A"
|
|
123
|
+
},
|
|
124
|
+
"ID.RM-3": {
|
|
125
|
+
"support_status": false,
|
|
126
|
+
"notes": [],
|
|
127
|
+
"support": "N/A"
|
|
128
|
+
},
|
|
129
|
+
"ID.SC-1": {
|
|
130
|
+
"support_status": false,
|
|
131
|
+
"notes": [],
|
|
132
|
+
"support": "N/A"
|
|
133
|
+
},
|
|
134
|
+
"ID.SC-2": {
|
|
135
|
+
"support_status": false,
|
|
136
|
+
"notes": [],
|
|
137
|
+
"support": "N/A"
|
|
138
|
+
},
|
|
139
|
+
"ID.SC-3": {
|
|
140
|
+
"support_status": false,
|
|
141
|
+
"notes": [],
|
|
142
|
+
"support": "N/A"
|
|
143
|
+
},
|
|
144
|
+
"ID.SC-4": {
|
|
145
|
+
"support_status": true,
|
|
146
|
+
"notes": [
|
|
147
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor."
|
|
148
|
+
],
|
|
149
|
+
"support": "Partial"
|
|
150
|
+
},
|
|
151
|
+
"ID.SC-5": {
|
|
152
|
+
"support_status": true,
|
|
153
|
+
"notes": [
|
|
154
|
+
"Partially Supported Capability:\nThe Falcon sensor can isolate and eradicate negatively affected system components, acquire artifacts, and remotely remove affected data.\nCrowdStrike provides services to assist customers in monitoring for data spills through its Falcon Intelligence Recon functionality. Falcon Intelligence Recon provides a combination of advanced dark web monitoring and situational awareness concerning potential leaks of organizational data and assets."
|
|
155
|
+
],
|
|
156
|
+
"support": "Partial"
|
|
157
|
+
},
|
|
158
|
+
"PR.AC-1": {
|
|
159
|
+
"support_status": true,
|
|
160
|
+
"notes": [
|
|
161
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon agent gathers telemetry from organizational devices, including the locally active users. This telemetry can support the generation of records regarding unique user activity. Falcon Identity Threat Protection gives deep insight into user account actions, including robust monitoring of authentication and change events."
|
|
162
|
+
],
|
|
163
|
+
"support": "Partial"
|
|
164
|
+
},
|
|
165
|
+
"PR.AC-2": {
|
|
166
|
+
"support_status": true,
|
|
167
|
+
"notes": [
|
|
168
|
+
"Partially Supported Capability:\nFalcon Identity Threat Protection gives deep insight into user account actions, including robust monitoring of authentication and change events. It can also surface group and role membership data, allowing organizations to identify accounts of interest, such as administrative accounts or overprivileged accounts. Organizations may also use the reporting features of the Falcon Identity Threat Protection to support their identity and account review processes.\nFalcon Insight XDR allows organizations to gather telemetry on the use of accounts across their deployed endpoints."
|
|
169
|
+
],
|
|
170
|
+
"support": "Partial"
|
|
171
|
+
},
|
|
172
|
+
"PR.AC-3": {
|
|
173
|
+
"support_status": true,
|
|
174
|
+
"notes": [
|
|
175
|
+
"Partially Supported Capability:\nCrowdStrike Falcon Device Control allows customers to restrict and monitor the use of USB devices, monitor data written to the devices, and restrict certain kinds of devices from being used."
|
|
176
|
+
],
|
|
177
|
+
"support": "Full"
|
|
178
|
+
},
|
|
179
|
+
"PR.AC-4": {
|
|
180
|
+
"support_status": true,
|
|
181
|
+
"notes": [
|
|
182
|
+
"Partially Supported Capability:\nFalcon Identity Threat Protection gives deep insight into user account actions, including robust monitoring of authentication and change events. It can also surface group and role membership data, allowing organizations to identify accounts of interest, such as administrative accounts or overprivileged accounts. Organizations may also use the reporting features of the Falcon Identity Threat Protection to support their identity and account review processes.\nFalcon Insight XDR allows organizations to gather telemetry on the use of accounts across their deployed endpoints.",
|
|
183
|
+
"Partially Supported Capability:\nFalcon Identity Threat Protection gives deep insight into user account actions, including robust monitoring of authentication and change events. It can also surface group and role membership data, allowing organizations to identify accounts of interest, such as administrative accounts or overprivileged accounts."
|
|
184
|
+
],
|
|
185
|
+
"support": "Partial"
|
|
186
|
+
},
|
|
187
|
+
"PR.AC-5": {
|
|
188
|
+
"support_status": true,
|
|
189
|
+
"notes": [
|
|
190
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon agent records a rich set of telemetry, allowing organizations to monitor and control key infrastructure elements. The agent and corresponding telemetry can be used to reinforce an organization\u2019s security architecture.\nIt Is the responsibility of the organization"
|
|
191
|
+
],
|
|
192
|
+
"support": "Partial"
|
|
193
|
+
},
|
|
194
|
+
"PR.AC-6": {
|
|
195
|
+
"support_status": true,
|
|
196
|
+
"notes": [
|
|
197
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon agent gathers telemetry from organizational devices, including the locally active users. This telemetry can support the generation of records regarding unique user activity. Falcon Identity Threat Protection gives deep insight into user account actions, including robust monitoring of authentication and change events."
|
|
198
|
+
],
|
|
199
|
+
"support": "Partial"
|
|
200
|
+
},
|
|
201
|
+
"PR.AC-7": {
|
|
202
|
+
"support_status": true,
|
|
203
|
+
"notes": [
|
|
204
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon agent gathers telemetry from organizational devices, including the locally active users. This telemetry can support the generation of records regarding unique user activity. Falcon Identity Threat Protection gives deep insight into user account actions, including robust monitoring of authentication and change events.",
|
|
205
|
+
"Partially Supported Capability:\nCrowdStrike Falcon Insight XDR captures telemetry from devices, generating a risk score that can be used contextually grant or deny access to organizational resources.",
|
|
206
|
+
"Partially Supported Capability:\nOrganizations may also implement their own single sign-on to further customize the authentication and authorization experience. The Falcon console will terminate inactive sessions."
|
|
207
|
+
],
|
|
208
|
+
"support": "Partial"
|
|
209
|
+
},
|
|
210
|
+
"PR.AT-1": {
|
|
211
|
+
"support_status": false,
|
|
212
|
+
"notes": [],
|
|
213
|
+
"support": "N/A"
|
|
214
|
+
},
|
|
215
|
+
"PR.AT-2": {
|
|
216
|
+
"support_status": false,
|
|
217
|
+
"notes": [],
|
|
218
|
+
"support": "N/A"
|
|
219
|
+
},
|
|
220
|
+
"PR.AT-3": {
|
|
221
|
+
"support_status": false,
|
|
222
|
+
"notes": [],
|
|
223
|
+
"support": "N/A"
|
|
224
|
+
},
|
|
225
|
+
"PR.AT-4": {
|
|
226
|
+
"support_status": false,
|
|
227
|
+
"notes": [],
|
|
228
|
+
"support": "N/A"
|
|
229
|
+
},
|
|
230
|
+
"PR.AT-5": {
|
|
231
|
+
"support_status": false,
|
|
232
|
+
"notes": [],
|
|
233
|
+
"support": "N/A"
|
|
234
|
+
},
|
|
235
|
+
"PR.DS-1": {
|
|
236
|
+
"support_status": true,
|
|
237
|
+
"notes": [
|
|
238
|
+
"Partially Supported Capability:\nCrowdStrike Falcon Device Control allows customers to restrict and monitor the use of USB devices, monitor data written to the devices, and restrict certain kinds of devices from being used.",
|
|
239
|
+
"Partially Supported Capability: CrowdStrike Falcon Device Control allows customers to restrict and monitor the use of USB devices, monitor data written to the devices, and restrict certain kinds of devices from being used.",
|
|
240
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon platform encrypts all gathered telemetry at rest using AES-256."
|
|
241
|
+
],
|
|
242
|
+
"support": "Partial"
|
|
243
|
+
},
|
|
244
|
+
"PR.DS-2": {
|
|
245
|
+
"support_status": true,
|
|
246
|
+
"notes": [
|
|
247
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon platform implements critical security practices to support this control, including:\n\u2022 The CrowdStrike Falcon agent encrypts the communication channel between agent and cloud end-to-end via TLS, using a trusted CrowdStrike certificate and certificate pinning. The CrowdStrike Falcon platform encrypts all gathered telemetry at rest using AES-256.\n\u2022 CrowdStrike\u2019s GovCloud environment implements the required FIPS-validated encryption protocols."
|
|
248
|
+
],
|
|
249
|
+
"support": "Partial"
|
|
250
|
+
},
|
|
251
|
+
"PR.DS-3": {
|
|
252
|
+
"support_status": false,
|
|
253
|
+
"notes": [],
|
|
254
|
+
"support": "N/A"
|
|
255
|
+
},
|
|
256
|
+
"PR.DS-4": {
|
|
257
|
+
"support_status": true,
|
|
258
|
+
"notes": [
|
|
259
|
+
"Supported Capability:\nAll activity recorded by the Falcon sensor is sent to the CrowdStrike Security Cloud. This rich telemetry can support organizational requirements to store audit records about events on devices in their environments. Organizations may purchase varying retention periods to support their requirements or stream Falcon platform logs using a variety of methods to other systems of their choice. Falcon LogScale permits organizations to store arbitrary data for customized retention periods, allowing effective search and categorization of these records."
|
|
260
|
+
],
|
|
261
|
+
"support": "Full"
|
|
262
|
+
},
|
|
263
|
+
"PR.DS-5": {
|
|
264
|
+
"support_status": true,
|
|
265
|
+
"notes": [
|
|
266
|
+
"Partially Supported Capability:\nFalcon Identity Threat Protection gives deep insight into user account actions, including robust monitoring of authentication and change events. It can also surface group and role membership data, allowing organizations to identify accounts of interest, such as administrative accounts or overprivileged accounts."
|
|
267
|
+
],
|
|
268
|
+
"support": "Partial"
|
|
269
|
+
},
|
|
270
|
+
"PR.DS-6": {
|
|
271
|
+
"support_status": true,
|
|
272
|
+
"notes": [
|
|
273
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon Discover module allows customers to check and validate common UEFI and BIOS hashes, supporting integrity reportability."
|
|
274
|
+
],
|
|
275
|
+
"support": "Partial"
|
|
276
|
+
},
|
|
277
|
+
"PR.DS-7": {
|
|
278
|
+
"support_status": false,
|
|
279
|
+
"notes": [],
|
|
280
|
+
"support": "N/A"
|
|
281
|
+
},
|
|
282
|
+
"PR.DS-8": {
|
|
283
|
+
"support_status": false,
|
|
284
|
+
"notes": [],
|
|
285
|
+
"support": "N/A"
|
|
286
|
+
},
|
|
287
|
+
"PR.IP-1": {
|
|
288
|
+
"support_status": false,
|
|
289
|
+
"notes": [],
|
|
290
|
+
"support": "N/A"
|
|
291
|
+
},
|
|
292
|
+
"PR.IP-2": {
|
|
293
|
+
"support_status": false,
|
|
294
|
+
"notes": [],
|
|
295
|
+
"support": "N/A"
|
|
296
|
+
},
|
|
297
|
+
"PR.IP-3": {
|
|
298
|
+
"support_status": false,
|
|
299
|
+
"notes": [],
|
|
300
|
+
"support": "N/A"
|
|
301
|
+
},
|
|
302
|
+
"PR.IP-4": {
|
|
303
|
+
"support_status": false,
|
|
304
|
+
"notes": [],
|
|
305
|
+
"support": "N/A"
|
|
306
|
+
},
|
|
307
|
+
"PR.IP-5": {
|
|
308
|
+
"support_status": false,
|
|
309
|
+
"notes": [],
|
|
310
|
+
"support": "N/A"
|
|
311
|
+
},
|
|
312
|
+
"PR.IP-6": {
|
|
313
|
+
"support_status": false,
|
|
314
|
+
"notes": [],
|
|
315
|
+
"support": "N/A"
|
|
316
|
+
},
|
|
317
|
+
"PR.IP-7": {
|
|
318
|
+
"support_status": true,
|
|
319
|
+
"notes": [
|
|
320
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
321
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon platform includes a tool that can be used to assess the effectiveness of any IR process that would be an important element of any response."
|
|
322
|
+
],
|
|
323
|
+
"support": "Partial"
|
|
324
|
+
},
|
|
325
|
+
"PR.IP-8": {
|
|
326
|
+
"support_status": true,
|
|
327
|
+
"notes": [
|
|
328
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor."
|
|
329
|
+
],
|
|
330
|
+
"support": "Partial"
|
|
331
|
+
},
|
|
332
|
+
"PR.IP-9": {
|
|
333
|
+
"support_status": true,
|
|
334
|
+
"notes": [
|
|
335
|
+
"Partially Supported Capability:\nCrowdStrike operates an Intelligence team. This team is constantly acquiring, implementing, and publishing intelligence information about adversaries and implementing protective measures in the Falcon sensor. This service is transparent to customers and included with the CrowdStrike Falcon platform. CrowdStrike also offers Falcon Intelligence, an enhanced product offering that permits customers to access specific indicators of compromise (IOCs) and make automated queries against intelligence data.",
|
|
336
|
+
"Partially Supported Capability:\nThe Falcon sensor can isolate and eradicate negatively affected system components, acquire artifacts, and remotely remove affected data.\nCrowdStrike provides services to assist customers in monitoring for data spills through its Falcon Intelligence Recon functionality. Falcon Intelligence Recon provides a combination of advanced dark web monitoring and situational awareness concerning potential leaks of organizational data and assets."
|
|
337
|
+
],
|
|
338
|
+
"support": "Partial"
|
|
339
|
+
},
|
|
340
|
+
"PR.IP-10": {
|
|
341
|
+
"support_status": false,
|
|
342
|
+
"notes": [],
|
|
343
|
+
"support": "N/A"
|
|
344
|
+
},
|
|
345
|
+
"PR.IP-11": {
|
|
346
|
+
"support_status": false,
|
|
347
|
+
"notes": [],
|
|
348
|
+
"support": "N/A"
|
|
349
|
+
},
|
|
350
|
+
"PR.IP-12": {
|
|
351
|
+
"support_status": false,
|
|
352
|
+
"notes": [],
|
|
353
|
+
"support": "N/A"
|
|
354
|
+
},
|
|
355
|
+
"PR.MA-1": {
|
|
356
|
+
"support_status": false,
|
|
357
|
+
"notes": [],
|
|
358
|
+
"support": "N/A"
|
|
359
|
+
},
|
|
360
|
+
"PR.MA-2": {
|
|
361
|
+
"support_status": false,
|
|
362
|
+
"notes": [],
|
|
363
|
+
"support": "N/A"
|
|
364
|
+
},
|
|
365
|
+
"PR.PT-1": {
|
|
366
|
+
"support_status": false,
|
|
367
|
+
"notes": [
|
|
368
|
+
"Partially Supported: The Falcon sensor records running processes and all associated metadata. Specific activities performed within an application are not visible to the Falcon sensor.\nAdditionally, CrowdStrike has an available API to integrate detection activity to widely used SIEM solutions.",
|
|
369
|
+
"Partially Supported Capability:\nAll activity recorded by the Falcon sensor is sent to the CrowdStrike Security Cloud. This rich telemetry can support organizational requirements to store audit records about events on devices in their environments.\nFalcon LogScale permits organizations to store arbitrary data for customized retention periods, allowing effective search and categorization of these records.\nThe CrowdStrike Falcon platform includes a customer-facing audit log that records activities by customer administrators.",
|
|
370
|
+
"Partially Supported Capability:\nAll activity recorded by the Falcon sensor is sent to the CrowdStrike Security Cloud. Detection and alerting functionalities are built into the CrowdStrike Security Cloud environment. Both known patterns of malicious activities and anomalous activities using machine learning-based predictive models are used. Additionally, CrowdStrike offers a service in which the Falcon OverWatch team provides additional behavior analysis, reports, and remediation strategies for customers who might require additional assistance when hunting for suspicious behavior or activity.",
|
|
371
|
+
"Available Capability\nThe Falcon UI allows customers to run various incident reports without affecting the metadata that is stored in the CrowdStrike Security Cloud.",
|
|
372
|
+
"Partially Supported Capability:\nData captured by the Falcon sensor is sent to the CrowdStrike Security Cloud. Captured data is made available to CrowdStrike\u2019s customers through the Falcon UI.\nThe organization utilizing the Falcon sensor is responsible for meeting the terms of this control.",
|
|
373
|
+
"Partially Supported Capability:\nThe Falcon sensor is capable of capturing a user\u2019s activities through an information system and records the meta data for later review. Specific activities performed within the application are not visible to the Falcon sensor."
|
|
374
|
+
],
|
|
375
|
+
"support": "N/A"
|
|
376
|
+
},
|
|
377
|
+
"PR.PT-2": {
|
|
378
|
+
"support_status": true,
|
|
379
|
+
"notes": [
|
|
380
|
+
"Partially Supported Capability:\nCrowdStrike Falcon Device Control allows customers to restrict and monitor the use of USB devices, monitor data written to the devices, and restrict certain kinds of devices from being used.",
|
|
381
|
+
"Partially Supported Capability: CrowdStrike Falcon Device Control allows customers to restrict and monitor the use of USB devices, monitor data written to the devices, and restrict certain kinds of devices from being used."
|
|
382
|
+
],
|
|
383
|
+
"support": "Partial"
|
|
384
|
+
},
|
|
385
|
+
"PR.PT-3": {
|
|
386
|
+
"support_status": false,
|
|
387
|
+
"notes": [],
|
|
388
|
+
"support": "N/A"
|
|
389
|
+
},
|
|
390
|
+
"PR.PT-4": {
|
|
391
|
+
"support_status": true,
|
|
392
|
+
"notes": [
|
|
393
|
+
"Partially Supported Capability:\nCrowdStrike Falcon Device Control allows customers to restrict and monitor the use of USB devices, monitor data written to the devices, and restrict certain kinds of devices from being used."
|
|
394
|
+
],
|
|
395
|
+
"support": "Partial"
|
|
396
|
+
},
|
|
397
|
+
"PR.PT-5": {
|
|
398
|
+
"support_status": false,
|
|
399
|
+
"notes": [],
|
|
400
|
+
"support": "N/A"
|
|
401
|
+
},
|
|
402
|
+
"DE.AE-1": {
|
|
403
|
+
"support_status": true,
|
|
404
|
+
"notes": [
|
|
405
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
406
|
+
],
|
|
407
|
+
"support": "Partial"
|
|
408
|
+
},
|
|
409
|
+
"DE.AE-2": {
|
|
410
|
+
"support_status": true,
|
|
411
|
+
"notes": [
|
|
412
|
+
"Partially Supported Capability:\nAll activity recorded by the Falcon sensor is sent to the CrowdStrike Security Cloud. Detection and alerting functionalities are built into the CrowdStrike Security Cloud environment. Both known patterns of malicious activities and anomalous activities using machine learning-based predictive models are used. Additionally, CrowdStrike offers a service in which the Falcon OverWatch team provides additional behavior analysis, reports, and remediation strategies for customers who might require additional assistance when hunting for suspicious behavior or activity.",
|
|
413
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
414
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
415
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
416
|
+
],
|
|
417
|
+
"support": "Partial"
|
|
418
|
+
},
|
|
419
|
+
"DE.AE-3": {
|
|
420
|
+
"support_status": true,
|
|
421
|
+
"notes": [
|
|
422
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
423
|
+
"Partially Supported Capability:",
|
|
424
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
425
|
+
"Partially Supported Capability:\nData collected by the Falcon sensor is sent to the CrowdStrike Security Cloud where customers can view system security incidents in the Falcon UI. The CrowdStrike Falcon platform retains data associated with suspected and confirmed incidents for organizations to review and action.\nCrowdStrike also offers customers a free starting tool that can be used to implement some procedural elements of this control \u2014 see: https://www.crowdstrike.com/blog/crowdstrike-releases-digital-forensics-and-incident-response-tracker/",
|
|
426
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
427
|
+
],
|
|
428
|
+
"support": "Partial"
|
|
429
|
+
},
|
|
430
|
+
"DE.AE-4": {
|
|
431
|
+
"support_status": false,
|
|
432
|
+
"notes": [
|
|
433
|
+
"The Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.",
|
|
434
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
435
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
436
|
+
],
|
|
437
|
+
"support": "N/A"
|
|
438
|
+
},
|
|
439
|
+
"DE.AE-5": {
|
|
440
|
+
"support_status": true,
|
|
441
|
+
"notes": [
|
|
442
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
443
|
+
"Recovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
444
|
+
],
|
|
445
|
+
"support": "Full"
|
|
446
|
+
},
|
|
447
|
+
"DE.CM-1": {
|
|
448
|
+
"support_status": true,
|
|
449
|
+
"notes": [
|
|
450
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
451
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon agent records a rich set of telemetry, allowing organizations to monitor and control key infrastructure elements. The agent and corresponding telemetry can be used to reinforce an organization\u2019s security architecture.\nIt Is the responsibility of the organization",
|
|
452
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
453
|
+
],
|
|
454
|
+
"support": "Partial"
|
|
455
|
+
},
|
|
456
|
+
"DE.CM-2": {
|
|
457
|
+
"support_status": true,
|
|
458
|
+
"notes": [
|
|
459
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor."
|
|
460
|
+
],
|
|
461
|
+
"support": "Partial"
|
|
462
|
+
},
|
|
463
|
+
"DE.CM-3": {
|
|
464
|
+
"support_status": true,
|
|
465
|
+
"notes": [
|
|
466
|
+
"Partially Supported Capability:\nFalcon Identity Threat Protection gives deep insight into user account actions, including robust monitoring of authentication and change events. It can also surface group and role membership data, allowing organizations to identify accounts of interest, such as administrative accounts or overprivileged accounts. Organizations may also use the reporting features of the Falcon Identity Threat Protection to support their identity and account review processes.\nFalcon Insight XDR allows organizations to gather telemetry on the use of accounts across their deployed endpoints.",
|
|
467
|
+
"Partially Supported Capability:\nData captured by the Falcon sensor is sent to the CrowdStrike Security Cloud. Captured data is made available to CrowdStrike\u2019s customers through the Falcon UI.\nThe organization utilizing the Falcon sensor is responsible for meeting the terms of this control."
|
|
468
|
+
],
|
|
469
|
+
"support": "Partial"
|
|
470
|
+
},
|
|
471
|
+
"DE.CM-4": {
|
|
472
|
+
"support_status": true,
|
|
473
|
+
"notes": [
|
|
474
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
475
|
+
],
|
|
476
|
+
"support": "Partial"
|
|
477
|
+
},
|
|
478
|
+
"DE.CM-5": {
|
|
479
|
+
"support_status": true,
|
|
480
|
+
"notes": [
|
|
481
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
482
|
+
],
|
|
483
|
+
"support": "Partial"
|
|
484
|
+
},
|
|
485
|
+
"DE.CM-6": {
|
|
486
|
+
"support_status": true,
|
|
487
|
+
"notes": [
|
|
488
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
489
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
490
|
+
],
|
|
491
|
+
"support": "Partial"
|
|
492
|
+
},
|
|
493
|
+
"DE.CM-7": {
|
|
494
|
+
"support_status": true,
|
|
495
|
+
"notes": [
|
|
496
|
+
"Partially Supported Capability:\nData captured by the Falcon sensor is sent to the CrowdStrike Security Cloud. Captured data is made available to CrowdStrike\u2019s customers through the Falcon UI.\nThe organization utilizing the Falcon sensor is responsible for meeting the terms of this control.",
|
|
497
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
498
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon console can help generate an inventory of any active systems if the Falcon sensor has been configured on all systems. However, this is primarily the responsibility of the implementing organization. If the implementing organization implements the Falcon Discover module, a rich set of hardware, software, and configuration information is available on any active system.",
|
|
499
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
500
|
+
],
|
|
501
|
+
"support": "Partial"
|
|
502
|
+
},
|
|
503
|
+
"DE.CM-8": {
|
|
504
|
+
"support_status": false,
|
|
505
|
+
"notes": [],
|
|
506
|
+
"support": "N/A"
|
|
507
|
+
},
|
|
508
|
+
"DE.DP-1": {
|
|
509
|
+
"support_status": true,
|
|
510
|
+
"notes": [
|
|
511
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor."
|
|
512
|
+
],
|
|
513
|
+
"support": "Partial"
|
|
514
|
+
},
|
|
515
|
+
"DE.DP-2": {
|
|
516
|
+
"support_status": true,
|
|
517
|
+
"notes": [
|
|
518
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
519
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
520
|
+
],
|
|
521
|
+
"support": "Partial"
|
|
522
|
+
},
|
|
523
|
+
"DE.DP-3": {
|
|
524
|
+
"support_status": true,
|
|
525
|
+
"notes": [
|
|
526
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
527
|
+
"Supported Capability:\nThe Falcon sensor is capable of being deployed on every endpoint in an organization to continuously gather system events from hosts to detect possible threats. All captured activity is sent to the CrowdStrike Security Cloud for analysis. The CrowdStrike Security Cloud is able to dynamically update its detection patterns based on the data collected from all of the deployed Falcon sensors. Suspicious data is quarantined and presented in the Falcon UI for further analysis in order to determine if an incident is in fact malicious or a false positive. The Falcon sensor continues to provide protection during periods of interrupted cloud connectivity.",
|
|
528
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
529
|
+
],
|
|
530
|
+
"support": "Partial"
|
|
531
|
+
},
|
|
532
|
+
"DE.DP-4": {
|
|
533
|
+
"support_status": true,
|
|
534
|
+
"notes": [
|
|
535
|
+
"Partially Supported Capability:\nAll activity recorded by the Falcon sensor is sent to the CrowdStrike Security Cloud. Detection and alerting functionalities are built into the CrowdStrike Security Cloud environment. Both known patterns of malicious activities and anomalous activities using machine learning-based predictive models are used. Additionally, CrowdStrike offers a service in which the Falcon OverWatch team provides additional behavior analysis, reports, and remediation strategies for customers who might require additional assistance when hunting for suspicious behavior or activity.",
|
|
536
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
537
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
538
|
+
],
|
|
539
|
+
"support": "Partial"
|
|
540
|
+
},
|
|
541
|
+
"DE.DP-5": {
|
|
542
|
+
"support_status": true,
|
|
543
|
+
"notes": [
|
|
544
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
545
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
546
|
+
],
|
|
547
|
+
"support": "Partial"
|
|
548
|
+
},
|
|
549
|
+
"RS.RP-1": {
|
|
550
|
+
"support_status": true,
|
|
551
|
+
"notes": [
|
|
552
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
553
|
+
],
|
|
554
|
+
"support": "Partial"
|
|
555
|
+
},
|
|
556
|
+
"RS.CO-1": {
|
|
557
|
+
"support_status": true,
|
|
558
|
+
"notes": [
|
|
559
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon platform includes a tool that can be used to assess the effectiveness of any IR process that would be an important element of any response."
|
|
560
|
+
],
|
|
561
|
+
"support": "Partial"
|
|
562
|
+
},
|
|
563
|
+
"RS.CO-2": {
|
|
564
|
+
"support_status": true,
|
|
565
|
+
"notes": [
|
|
566
|
+
"Partially Supported Capability:\nAll activity recorded by the Falcon sensor is sent to the CrowdStrike Security Cloud. Detection and alerting functionalities are built into the CrowdStrike Security Cloud environment. Both known patterns of malicious activities and anomalous activities using machine learning-based predictive models are used. Additionally, CrowdStrike offers a service in which the Falcon OverWatch team provides additional behavior analysis, reports, and remediation strategies for customers who might require additional assistance when hunting for suspicious behavior or activity.",
|
|
567
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon platform supports reporting incidents in several ways: (1) the SIEM connector can automatically deliver alerting to designated SOC or organizational functions, (2) Falcon Fusion workflows can send notifications on customer-defined conditions, and (3) the Falcon platform itself automatically surfaces incidents with confidence levels for organizations to assess."
|
|
568
|
+
],
|
|
569
|
+
"support": "Partial"
|
|
570
|
+
},
|
|
571
|
+
"RS.CO-3": {
|
|
572
|
+
"support_status": true,
|
|
573
|
+
"notes": [
|
|
574
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
575
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
576
|
+
],
|
|
577
|
+
"support": "Partial"
|
|
578
|
+
},
|
|
579
|
+
"RS.CO-4": {
|
|
580
|
+
"support_status": true,
|
|
581
|
+
"notes": [
|
|
582
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
583
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
584
|
+
],
|
|
585
|
+
"support": "Partial"
|
|
586
|
+
},
|
|
587
|
+
"RS.CO-5": {
|
|
588
|
+
"support_status": true,
|
|
589
|
+
"notes": [
|
|
590
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon Intelligence product provides implementing organizations with detailed analysis and reports on the latest threats and actors. Additionally, CrowdStrike\u2019s detailed threat actor profiles provide a summary of the adversaries, as well as intelligence including last known activity, community identifiers, target industries and countries, motivations, tactics, techniques, and procedures."
|
|
591
|
+
],
|
|
592
|
+
"support": "Partial"
|
|
593
|
+
},
|
|
594
|
+
"RS.AN-1": {
|
|
595
|
+
"support_status": true,
|
|
596
|
+
"notes": [
|
|
597
|
+
"Partially Supported Capability:\nAll activity recorded by the Falcon sensor is sent to the CrowdStrike Security Cloud. Detection and alerting functionalities are built into the CrowdStrike Security Cloud environment. Both known patterns of malicious activities and anomalous activities using machine learning-based predictive models are used. Additionally, CrowdStrike offers a service in which the Falcon OverWatch team provides additional behavior analysis, reports, and remediation strategies for customers who might require additional assistance when hunting for suspicious behavior or activity.",
|
|
598
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor.",
|
|
599
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
600
|
+
"Partially Supported Capability:\nThe Falcon sensor continuously monitors systems for suspicious executable files with malicious intent. This data is sent to the CrowdStrike Security Cloud for analysis and made available to the customer for corrective action."
|
|
601
|
+
],
|
|
602
|
+
"support": "Partial"
|
|
603
|
+
},
|
|
604
|
+
"RS.AN-2": {
|
|
605
|
+
"support_status": true,
|
|
606
|
+
"notes": [
|
|
607
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
608
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
609
|
+
],
|
|
610
|
+
"support": "Partial"
|
|
611
|
+
},
|
|
612
|
+
"RS.AN-3": {
|
|
613
|
+
"support_status": true,
|
|
614
|
+
"notes": [
|
|
615
|
+
"Available Capability\nThe Falcon UI allows customers to run various incident reports without affecting the metadata that is stored in the CrowdStrike Security Cloud.",
|
|
616
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
617
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
618
|
+
],
|
|
619
|
+
"support": "Full"
|
|
620
|
+
},
|
|
621
|
+
"RS.AN-4": {
|
|
622
|
+
"support_status": true,
|
|
623
|
+
"notes": [
|
|
624
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
625
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
626
|
+
"Partially Supported Capability:\nData collected by the Falcon sensor is sent to the CrowdStrike Security Cloud where customers can view system security incidents in the Falcon UI. The CrowdStrike Falcon platform retains data associated with suspected and confirmed incidents for organizations to review and action.\nCrowdStrike also offers customers a free starting tool that can be used to implement some procedural elements of this control \u2014 see: https://www.crowdstrike.com/blog/crowdstrike-releases-digital-forensics-and-incident-response-tracker/"
|
|
627
|
+
],
|
|
628
|
+
"support": "Partial"
|
|
629
|
+
},
|
|
630
|
+
"RS.AN-5": {
|
|
631
|
+
"support_status": true,
|
|
632
|
+
"notes": [
|
|
633
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization.",
|
|
634
|
+
"Partially Supported Capability:\nThe CrowdStrike Falcon Intelligence product provides implementing organizations with detailed analysis and reports on the latest threats and actors. Additionally, CrowdStrike\u2019s detailed threat actor profiles provide a summary of the adversaries, as well as intelligence including last known activity, community identifiers, target industries and countries, motivations, tactics, techniques, and procedures."
|
|
635
|
+
],
|
|
636
|
+
"support": "Partial"
|
|
637
|
+
},
|
|
638
|
+
"RS.MI-1": {
|
|
639
|
+
"support_status": false,
|
|
640
|
+
"notes": [],
|
|
641
|
+
"support": "N/A"
|
|
642
|
+
},
|
|
643
|
+
"RS.MI-2": {
|
|
644
|
+
"support_status": true,
|
|
645
|
+
"notes": [
|
|
646
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
647
|
+
],
|
|
648
|
+
"support": "Partial"
|
|
649
|
+
},
|
|
650
|
+
"RS.MI-3": {
|
|
651
|
+
"support_status": true,
|
|
652
|
+
"notes": [
|
|
653
|
+
"Partially Supported Capability:\nThe CrowdStrike Security Cloud infrastructure is in constant contact with the Falcon sensors that have been implemented by organizations. Data is continuously sent to the CrowdStrike Security Cloud and analyzed for malicious behavior. This data is made available to customers via the Falcon UI.\nEstablishment of organization-defined metrics, monitoring frequency, security assessments and status monitoring, and any resulting analysis of the aforementioned strategies is the responsibility of the organization that implements the Falcon sensor."
|
|
654
|
+
],
|
|
655
|
+
"support": "Partial"
|
|
656
|
+
},
|
|
657
|
+
"RS.IM-1": {
|
|
658
|
+
"support_status": true,
|
|
659
|
+
"notes": [
|
|
660
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
661
|
+
],
|
|
662
|
+
"support": "Partial"
|
|
663
|
+
},
|
|
664
|
+
"RS.IM-2": {
|
|
665
|
+
"support_status": true,
|
|
666
|
+
"notes": [
|
|
667
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
668
|
+
],
|
|
669
|
+
"support": "Partial"
|
|
670
|
+
},
|
|
671
|
+
"RC.RP-1": {
|
|
672
|
+
"support_status": true,
|
|
673
|
+
"notes": [
|
|
674
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
675
|
+
],
|
|
676
|
+
"support": "Partial"
|
|
677
|
+
},
|
|
678
|
+
"RC.IM-1": {
|
|
679
|
+
"support_status": true,
|
|
680
|
+
"notes": [
|
|
681
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
682
|
+
],
|
|
683
|
+
"support": "Partial"
|
|
684
|
+
},
|
|
685
|
+
"RC.IM-2": {
|
|
686
|
+
"support_status": true,
|
|
687
|
+
"notes": [
|
|
688
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
689
|
+
],
|
|
690
|
+
"support": "Partial"
|
|
691
|
+
},
|
|
692
|
+
"RC.CO-1": {
|
|
693
|
+
"support_status": true,
|
|
694
|
+
"notes": [
|
|
695
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
696
|
+
],
|
|
697
|
+
"support": "Partial"
|
|
698
|
+
},
|
|
699
|
+
"RC.CO-2": {
|
|
700
|
+
"support_status": true,
|
|
701
|
+
"notes": [
|
|
702
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
703
|
+
],
|
|
704
|
+
"support": "Partial"
|
|
705
|
+
},
|
|
706
|
+
"RC.CO-3": {
|
|
707
|
+
"support_status": true,
|
|
708
|
+
"notes": [
|
|
709
|
+
"Partially Supported Capability:\nThe Falcon sensor sends all captured data to the CrowdStrike Security Cloud in real time for a deeper level of analysis. All detection, analysis, containment, and eradication activities are performed in the Falcon UI.\nRecovery strategies, activities, and policies are the responsibility of the implementing organization."
|
|
710
|
+
],
|
|
711
|
+
"support": "Partial"
|
|
712
|
+
}
|
|
713
|
+
}
|