Requirements and Security Assessment Procedures Version 3.2: April 2016
Thank you for choosing this document. You will need to supply vendor specific CLI or Regular expression statements for these checks. I understand some of these reports contain rules that require manual verification of process, procedure, and documentation.
Thanks,
CourtesyIT