Cisco ISE NDM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −1 ✎ 4
Comparison against the immediately-prior release (V1R6). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 1
- V-242631 Medium The Cisco ISE must audit the enforcement actions used to restrict access associated with changes to the device.
Content changes 4
- V-242629 Medium descriptionfix The Cisco ISE must be configured to synchronize internal information system clocks using redundant authoritative time sources.
- V-242633 Medium description The Cisco ISE must be configured to use an external authentication server to authenticate administrators prior to granting administrative access.
- V-242646 Medium check For accounts using password authentication, the Cisco ISE must enforce password complexity by requiring that at least one uppercase character be used.
- V-242647 Medium check For accounts using password authentication, the Cisco ISE must enforce password complexity by requiring that at least one lowercase character be used.
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- CSCO-NM-000010
- Vuln IDs
-
- V-242607
- Rule IDs
-
- SV-242607r960735_rule
Checks: C-45882r822783_chk
Review the concurrent sessions to ensure the CLI and GUI have the correct number of sessions defined. From web Admin portal: 1. Choose Administration >> System >>Admin Access >> Settings >> Access. 2. Verify the "Maximum Concurrent Sessions" under "GUI" Sessions is set to the organization-defined number. 3. Verify the "Maximum Concurrent Sessions" under "CLI" Sessions is set to one. If the CLI is not set to limit the maximum number of sessions to one or the GUI is not set to limit the maximum number of sessions to the organization-defined number, then this is a finding.
Fix: F-45839r822786_fix
Configure the concurrent sessions for the CLI and GUI. From web admin portal: 1. Choose Administration >> System >>Admin Access >> Settings >> Access. 2. Configure the "Maximum Concurrent Sessions" under "GUI" to be the organization-defined number. 3. Configure the "Maximum Concurrent Sessions" under "CLI" to be one.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- CSCO-NM-000020
- Vuln IDs
-
- V-242608
- Rule IDs
-
- SV-242608r997479_rule
Checks: C-45883r714132_chk
Verify by viewing site SSP to view that there is a procedure that requires password change with administrators leave the group. If Cisco ISE does not change the password for the local CLI and web-based account when members who have access to the password leave the role and are no longer authorized access, this is a finding.
Fix: F-45840r714133_fix
Generate Automatic Password for Users and Administrators (or generate using other encryption method). Navigate to Administrators—Administration >> System >> Admin Access >> Administrators >> Admin Users. Select the CLI and the web Admin users and select the option to generate the password. Document the generated password and secure it for emergency use as an Account of Last Resort. Do not share with other Admins unless necessary.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- CSCO-NM-000030
- Vuln IDs
-
- V-242609
- Rule IDs
-
- SV-242609r960777_rule
Checks: C-45884r714135_chk
Verify logging categories for Administrative and Operational Audit has been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit has been set to INFO and the Targets field has been set to the syslog target. If the Administrative and Operational Audit logging category is not configured for INFO severity level and send to the central syslog server, this is a finding.
Fix: F-45841r714136_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Click "Save".
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- CSCO-NM-000040
- Vuln IDs
-
- V-242610
- Rule IDs
-
- SV-242610r960780_rule
Checks: C-45885r714138_chk
Verify logging categories for Administrative and Operational Audit has been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit has been set to INFO and the Targets field has been set to the syslog target. If the Administrative and Operational Audit logging category is not configured for INFO severity level and send to the central syslog server, this is a finding.
Fix: F-45842r714139_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Click "Save".
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- CSCO-NM-000050
- Vuln IDs
-
- V-242611
- Rule IDs
-
- SV-242611r960783_rule
Checks: C-45886r714141_chk
Verify logging categories for Administrative and Operational Audit has been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit has been set to INFO and the Targets field has been set to the syslog target. If the Administrative and Operational Audit logging category is not configured for INFO severity level and send to the central syslog server, this is a finding.
Fix: F-45843r714142_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Click "Save".
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- CSCO-NM-000060
- Vuln IDs
-
- V-242612
- Rule IDs
-
- SV-242612r960786_rule
Checks: C-45887r714144_chk
Verify logging categories for Administrative and Operational Audit has been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit has been set to INFO and the Targets field has been set to the syslog target. If the Administrative and Operational Audit logging category is not configured for INFO severity level and send to the central syslog server, this is a finding.
Fix: F-45844r714145_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Click "Save".
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-002130
- Version
- CSCO-NM-000070
- Vuln IDs
-
- V-242613
- Rule IDs
-
- SV-242613r961290_rule
Checks: C-45888r714147_chk
Verify logging categories for Administrative and Operational Audit has been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit has been set to INFO and the Targets field has been set to the syslog target. If the Administrative and Operational Audit logging category is not configured for INFO severity level and send to the central syslog server, this is a finding.
Fix: F-45845r714148_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Click "Save".
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001358
- Version
- CSCO-NM-000080
- Vuln IDs
-
- V-242614
- Rule IDs
-
- SV-242614r960969_rule
Checks: C-45889r714150_chk
View the local admin users. 1. Choose Administration >> System >> Admin Access >> Administrators >> Admin Users >>View. 2. Verify there are only two local accounts are defined. Both must be in the Super User group. These users must be the web-based Account of Last Resort and the default CLI admin user. If the Cisco ISE has unauthorized local users defined, this is a finding.
Fix: F-45846r714151_fix
Create a local web-based administrator. ONLY one web-based admin account should exist on the local device. The default CLI account is also local and cannot be removed. 1. Choose Administration >> System >> Admin Access >> Administrators >> Admin Users >> Add. 2. From the drop-down, choose Create an Admin User. 3. Enter the admin name and other information. 4. Add the Super User group. 5. Click "Submit".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- CSCO-NM-000090
- Vuln IDs
-
- V-242615
- Rule IDs
-
- SV-242615r961353_rule
Checks: C-45890r803574_chk
Verify that only administrator accounts are located in administrative groups. From the web Admin portal: 1. Navigate to Administration >> System >> Admin Access >> Authorization >> Permissions >> Policy. 2. Verify non-administrative users are located in read only or limited access admin groups. If non-adminstrative accounts are in administrative admin groups, this is a finding.
Fix: F-45847r803575_fix
Configure Role Based Access Control to ensure only administrator accounts have admin or super admin rights. From web Admin portal: 1. Navigate to Administration >> System >> Admin Access >> Authorization >> Permissions > Policy. 2. Take note of admin account groups. 3. Navigate to Administration >> System >> Admin Access >> Administrators >> Admin Users. 4. Ensure only admin accounts are placed within admin groups. Note: If Active Directory is in use for external authentication, verify from AD that only administrative users are in the security group used for ISE admins.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002264
- Version
- CSCO-NM-000100
- Vuln IDs
-
- V-242616
- Rule IDs
-
- SV-242616r961362_rule
Checks: C-45891r864183_chk
Verify logging categories have been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit is configured for the INFO log severity level. 3. Verify both the Administrative and Operational Audit and the AAA Audit logging categories have been set to the syslog target. If the Administrative and Operational Audit (INFO severity) and the AAA Audit logging category is not configured to send to the central syslog server, this is a finding.
Fix: F-45848r864184_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Repeat the above steps to enable the AAA Audit logging category. However, this logging category has INFO as the default log severity level and cannot be changed. 5. Click "Save".
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- CSCO-NM-000110
- Vuln IDs
-
- V-242617
- Rule IDs
-
- SV-242617r960840_rule
Checks: C-45892r822784_chk
Verify ISE will disable accounts for at least 15 minutes after a maximum of three consecutive invalid logon attempts. From web admin portal: 1. Choose Administration >> System >> Admin Access >> Authentication >> Lock/Suspend Settings. 2. Verify the "Take action after [ ] failed attempts" setting is set to a value of 3 or lower. 3. Verify the "Suspend account for [ ] minutes" setting is selected and set to be 15 minutes or higher If the lockout for admin accounts is not configured to lock the account after a maximum of three incorrect passwords are attempted, this is a finding. If the lockout for admin accounts is not configured to lock the account for a minimum of 15 minutes, this is a finding.
Fix: F-45849r822785_fix
Configure ISE to disable accounts for at least 15 minutes after a maximum of three consecutive invalid logon attempts. From web admin portal: 1. Choose Administration >> System >> Admin Access >> Authentication >> Lock/Suspend Settings. 2. Configure the "Take action after [ ] failed attempts" setting to be set to a value of 3 or lower. 3. Check the "Suspend account for [ ] minutes" setting and set to be 15 minutes or higher. 4. Click Save. Note: This setting will propagate to the ADE-OS applying the settings for the CLI accounts as well.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- CSCO-NM-000120
- Vuln IDs
-
- V-242618
- Rule IDs
-
- SV-242618r960843_rule
Checks: C-45893r714162_chk
Determine if the network device is configured to present a DoD-approved banner that is formatted in accordance with DTM-08-060. In the configuration, view the "banner login" configuration. If such a banner is not presented, this is a finding.
Fix: F-45850r714163_fix
Configure the administrative sessions login banner to display when users access the web or CLI interface that appears before and after an administrator logs in. By default, these login banners are disabled. 1. From the web management tool, click on Administration >> System >> Admin Access >> Settings >> Access >> Session. 2. To display the banner message before an administrator logs in, check the Pre-login banner check box and enter the message in the text box. 3. To display the banner message after an administrator logs in, check the Post-login banner check box and enter your message in the text box. 4. Click "Save".
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- CSCO-NM-000130
- Vuln IDs
-
- V-242619
- Rule IDs
-
- SV-242619r960864_rule
Checks: C-45894r714165_chk
To view remote logging targets, complete the following steps: 1. From the ISE Administration Interface, choose Administration >> System >> Logging >> Remote Logging Targets. 2. The Remote Logging Targets page appears with a list of existing logging targets. If a remote logging target is not configured, this is a finding.
Fix: F-45851r714166_fix
Create a secure syslog remote logging target and direct logging to that site's central syslog or events server. To create an external logging target, complete the following steps: 1. Choose Administration >> System >> Logging >> Remote Logging Targets. 2. Click "Add". 3. Configure the following fields: - Name - Enter the name of the new target. - Target Type - By default it is set to Syslog. The value of this field cannot be changed. - Description - Enter a brief description of the new target. - IP Address - Enter the IP address of the destination machine where you want to store the logs. - Port - Enter the port number of the destination machine. - Facility Code - Choose the syslog facility code to be used for logging. Valid options are Local0 through Local7. - Maximum Length - Enter the maximum length of the remote log target messages. Valid options are from 200 to 1024 bytes. 4. Click "Save". Go to the Logging Targets page and verify the creation of the new target. To edit a remote logging target, complete the following steps: 1. Choose Administration >> System >> Logging >> Remote Logging Targets. 2. Click the radio button next to the logging target name that you want to edit and click "Edit". 3. Modify the following field values on the Log Collection page as needed: - Name - Target Type - Description - IP Address - Port - Facility Code - Maximum Length 4. Click "Save". The updating of the selected Log Collector is completed.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CSCO-NM-000140
- Vuln IDs
-
- V-242620
- Rule IDs
-
- SV-242620r960885_rule
Checks: C-45895r864186_chk
Verify logging categories have been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit is configured for the INFO log severity level. 3. Verify both the Administrative and Operational Audit and the AAA Audit logging categories have been set to the syslog target. If the Administrative and Operational Audit (INFO severity) and the AAA Audit logging category is not configured to send to the central syslog server, this is a finding.
Fix: F-45852r864187_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Repeat the above steps to enable the AAA Audit logging category. However, this logging category has INFO as the default log severity level and cannot be changed. 5. Click "Save".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CSCO-NM-000150
- Vuln IDs
-
- V-242621
- Rule IDs
-
- SV-242621r961800_rule
Checks: C-45896r864222_chk
Verify logging categories have been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit is configured for the INFO log severity level. 3. Verify both the Administrative and Operational Audit and the AAA Audit logging categories have been set to the syslog target. If the Administrative and Operational Audit (INFO severity) and the AAA Audit logging category is not configured to send to the central syslog server, this is a finding.
Fix: F-45853r864223_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Repeat the above steps to enable the AAA Audit logging category. However, this logging category has INFO as the default log severity level and cannot be changed. 5. Click "Save".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CSCO-NM-000160
- Vuln IDs
-
- V-242622
- Rule IDs
-
- SV-242622r961812_rule
Checks: C-45897r864189_chk
Verify logging categories have been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit is configured for the INFO log severity level. 3. Verify both the Administrative and Operational Audit and the AAA Audit logging categories have been set to the syslog target. If the Administrative and Operational Audit (INFO severity) and the AAA Audit logging category is not configured to send to the central syslog server, this is a finding.
Fix: F-45854r864190_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Repeat the above steps to enable the AAA Audit logging category. However, this logging category has INFO as the default log severity level and cannot be changed. 5. Click "Save".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CSCO-NM-000170
- Vuln IDs
-
- V-242623
- Rule IDs
-
- SV-242623r961824_rule
Checks: C-45898r864192_chk
Verify logging categories have been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit is configured for the INFO log severity level. 3. Verify both the Administrative and Operational Audit and the AAA Audit logging categories have been set to the syslog target. If the Administrative and Operational Audit (INFO severity) and the AAA Audit logging category is not configured to send to the central syslog server, this is a finding.
Fix: F-45855r864193_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Repeat the above steps to enable the AAA Audit logging category. However, this logging category has INFO as the default log severity level and cannot be changed. 5. Click "Save".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CSCO-NM-000180
- Vuln IDs
-
- V-242624
- Rule IDs
-
- SV-242624r961827_rule
Checks: C-45899r864195_chk
Verify logging categories have been configured to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit is configured for the INFO log severity level. 3. Verify both the Administrative and Operational Audit and the AAA Audit logging categories have been set to the syslog target. If the Administrative and Operational Audit (INFO severity) and the AAA Audit logging category is not configured to send to the central syslog server, this is a finding.
Fix: F-45856r864196_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Repeat the above steps to enable the AAA Audit logging category. However, this logging category has INFO as the default log severity level and cannot be changed. 5. Click "Save".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CSCO-NM-000190
- Vuln IDs
-
- V-242625
- Rule IDs
-
- SV-242625r961833_rule
Checks: C-45900r944972_chk
Verify logging categories have been configured. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit logs are set to INFO severity category. If the Administrative and Operational Audit are not set to the INFO severity category, this is a finding.
Fix: F-45857r944973_fix
Enable logging categories for Cisco ISE. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Click "Save".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- CSCO-NM-000200
- Vuln IDs
-
- V-242626
- Rule IDs
-
- SV-242626r961392_rule
Checks: C-45901r714186_chk
Examine the local log purge setting. show logging internal or Choose Administration >> System >> Logging >> Local Log Settings >> Local Log Storage Period. If local logs are set to purge after a locally established period, this is not a finding.
Fix: F-45858r714187_fix
Configure syslog purge settings. Use the following process to delete local logs after a certain period of time. This is set based on the local environment and size of the implementation. 1. Choose Administration >> System >> Logging >> Local Log Settings. 2. In the Local Log Storage Period field, enter the maximum number of days to keep the log entries in the configuration source. 3. Click "Delete Logs Now" to delete the existing log files at any time before the expiration of the storage period. 4. Click "Save". Note: The system is designed to delete logs if the size of the localStore folder reaches 97 GB, regardless of the configured Local Log Storage Period.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- CSCO-NM-000210
- Vuln IDs
-
- V-242627
- Rule IDs
-
- SV-242627r961860_rule
Checks: C-45902r714189_chk
To view remote logging targets, complete the following steps: 1. From the ISE Administration Interface, choose Administration >> System >> Logging >> Remote Logging Targets. 2. The Remote Logging Targets page appears with a list of existing logging targets. If a remote logging target is not configured, this is a finding.
Fix: F-45859r714190_fix
Create a Remote Logging Target and direct logging to that target. To create an external logging target, complete the following steps: 1. Choose Administration >> System >> Logging >> Remote Logging Targets. 2. Click "Add". 3. Configure the following fields. - Name - Enter the name of the new target - Target Type - By default it is set to Syslog. The value of this field cannot be changed. - Description - Enter a brief description of the new target. - IP Address - Enter the IP address of the destination machine where you want to store the logs. - Port - Enter the port number of the destination machine. - Facility Code - Choose the syslog facility code to be used for logging. Valid options are Local0 through Local7. - Maximum Length - Enter the maximum length of the remote log target messages. Valid options are from 200 to 1024 bytes. 4. Click "Save". Go to the Logging Targets page and verify the creation of the new target. To edit a remote logging target, complete the following steps: 1. Choose Administration >> System >> Logging >> Remote Logging Targets. 2. Click the radio button next to the logging target name that you want to edit and click "Edit". 3. Modify the following field values on the Log Collection page as needed. - Name - Target Type - Description - IP Address - Port - Facility Code - Maximum Length 4. Click "Save". The updating of the selected Log Collector is completed.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- CSCO-NM-000220
- Vuln IDs
-
- V-242628
- Rule IDs
-
- SV-242628r961401_rule
Checks: C-45903r714192_chk
Verify the Cisco ISE notifies one or more individuals when the monitoring collector process is unable to persist the audit logs generated from the policy service nodes. 1. Choose Administration >> System >> Settings >> Alarm Settings. 2. Select "Log Collector Error" from the list of default alarms and click "Edit". 3. Verify that "Enable" is selected. 4. Select "Enter Multiple Emails Separated with Comma". 5. Verify one or more email addresses are configured. If "Log Collector Error" alarm type is not enabled or email addresses are not configured to receive the alert, this is a finding.
Fix: F-45860r714193_fix
Configure Cisco ISE to notify one or more individuals when the monitoring collector process is unable to persist the audit logs generated from the policy service nodes. 1. Choose Administration >> System >> Settings >> Alarm Settings. 2. Select "Log Collector Error" from the list of default alarms and click "Edit". 3. Select "Enable". 4. Select "Enter Multiple Emails Separated with Comma". 5. Configure email addresses of individuals to be notified. 6. Click "Submit".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CSCO-NM-000230
- Vuln IDs
-
- V-242629
- Rule IDs
-
- SV-242629r997481_rule
Checks: C-45904r714195_chk
1. View the status of the Network Translation Protocol (NTP) associations. show ntp 2. Verify a primary and secondary ntp server address is configured. If the Cisco ISE is not configured to synchronize internal information system clocks using redundant authoritative time sources, this is a finding.
Fix: F-45861r997480_fix
1. Choose Administration >> System >> Settings >> System Time. 2. Enter unique IP addresses (IPv4/IPv6/FQDN) for the NTP servers. 3. Check the "Only allow authenticated NTP servers" check box to restrict Cisco ISE to use only authenticated NTP servers to keep system and network time. DOD requires NTP authentication where available, so configure the NTP server using private keys. Click the NTP Authentication Keys tab and specify one or more authentication keys if any of the servers specified requires authentication via an authentication key, as follows: 4. Click "Add". 5. Enter the necessary Key ID and Key Value. Specify whether the key in question is trusted by activating or deactivating the Trusted Key option, and click "OK". The Key ID field supports numeric values between 1 and 65535 and the Key Value field supports up to 15 alphanumeric characters. 6. Return to the NTP Server Configuration tab after entering the NTP Server Authentication Keys. 7. Click "Save".
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- CSCO-NM-000240
- Vuln IDs
-
- V-242630
- Rule IDs
-
- SV-242630r961443_rule
Checks: C-45905r714198_chk
1. View the clock setting. show clock 2. Verify the clock is set to use UTC. If the Cisco ISE does not use UTC, this is a finding.
Fix: F-45862r714199_fix
Change the clock to UTC using the CLI. clock timezone UTC
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000345
- Version
- CSCO-NM-000260
- Vuln IDs
-
- V-242632
- Rule IDs
-
- SV-242632r961863_rule
Checks: C-45907r714204_chk
Determine if groups with access such as Helpdesk Admin, Network Device Admin, SuperAdmin, and System Admin (at a minimum) are assigned unauthorized users. 1. Choose Administration >> System >> Admin Access >> Administrators >> Admin Groups. 2. Review the users for the groups with edit access such as Helpdesk Admin, Network Device Admin, SuperAdmin, and System Admin at a minimum. If the Cisco ISE does not enforce access restrictions associated with changes to the firmware, OS, and hardware components, this is a finding.
Fix: F-45864r714205_fix
1. Choose Administration >> System >> Admin Access >> Administrators >> Admin Groups. 2. Review the users for the groups with edit access such as Helpdesk Admin, Network Device Admin, SuperAdmin, and System Admin at a minimum. 3. To delete users from the admin group, check the check box corresponding to the user that you want to delete, and click "Remove". 4. Click "Submit".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CSCO-NM-000270
- Vuln IDs
-
- V-242633
- Rule IDs
-
- SV-242633r997485_rule
Checks: C-45908r714207_chk
Verify an external authentication identity source is configured. 1. Choose Administration >> System >> Admin Access >> Administrators >> Admin Groups. 2. View the External Group configuration. If the Cisco ISE is not configured to use an external authentication server to authenticate administrators prior to granting administrative access, this is a finding.
Fix: F-45865r997484_fix
Configure external authentication to a central AAA identity source. Configure password-based authentication for administrators who authenticate using an external identity store such as Active Directory or LDAP. 1. Choose Administration >> System >> Admin Access >> Authentication. 2. On the Authentication Method tab, select Password Based and choose one of the external identity sources that was previously configured (for example, the Active Directory instance that was created). 3. Configure any other specific password policy settings for administrators who authenticate using an external identity store. 4. Click "Save". Create an external Active Directory or LDAP administrator group. This ensures that Cisco ISE uses the username that is defined in the external Active Directory or LDAP identity store to validate the administrator username and password that was entered upon login. Cisco ISE imports the Active Directory or LDAP group information from the external resource and stores it as a dictionary attribute. Specify that attribute as one of the policy elements when it is time to configure the RBAC policy for this external administrator authentication method. 1. Choose Administration >> System >> Admin Access >> Administrators >> Admin Groups. 2. Click "Add". 3. Enter a name and optional description. 4. Choose the "External" radio button. 5. From the External Groups drop-down list box, choose the Active Directory group to map for this external administrator group. Click the "+" sign to map additional Active Directory groups to this external administrator group. 6. Click "Save". Configure menu access and data access permissions that can be assigned to the external administrator group. 1. Choose Administration >> System >> Admin Access >> Permissions. 2. Click one of the following: - Menu Access - All administrators who belong to the external administrator group can be granted permission at the menu or submenu level. The menu access permission determines the menus or submenus that they can access. - Data Access - All administrators who belong to the external administrator group can be granted permission at the data level. The data access permission determines the data that they can access. 3. Specify menu access or data access permissions for the external administrator group. 4. Click "Save". In order to configure Cisco ISE to authenticate the administrator using an external identity store and to specify custom menu and data access permissions at the same time, configure a new RBAC policy. This policy must have the external administrator group for authentication and the Cisco ISE menu and data access permissions to manage the external authentication and authorization. 1. Choose Administration >> System >> Admin Access >> Authorization >> Policy. 2. Specify the rule name, external administrator group, and permissions. Remember that the appropriate external administrator group must be assigned to the correct administrator user IDs. Ensure the administrator in question is associated with the correct external administrator group. 3. Click "Save".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CSCO-NM-000280
- Vuln IDs
-
- V-242634
- Rule IDs
-
- SV-242634r961863_rule
Checks: C-45909r714210_chk
To display information about the software version, type the following at the CLI: show version View details about the installed version of Cisco ADE-OS software running in the Cisco ISE server and also the Cisco ISE version. If the Cisco ISE is not running an operating system release that is currently supported by the vendor, this is a finding.
Fix: F-45866r714211_fix
Install the latest approved update of the CISCO ADE-OS software. 1. Click the "Upgrade" tab in the Admin portal. 2. Click "Proceed". The Review Checklist window appears. Read the instructions carefully. 3. Check the "I have reviewed the checklist" check box, and click "Continue".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- CSCO-NM-000300
- Vuln IDs
-
- V-242636
- Rule IDs
-
- SV-242636r961863_rule
Checks: C-45911r714216_chk
View the SSP syslog requirements. View the logging categories for Cisco ISE to verify the logging categories that pertain to the corresponding locally developed list of auditable events are enabled, configured, and being sent to the remote syslog target. 1. Log in to the Admin portal. 2. Choose Administration >> System >> Logging >> Logging Categories. 3. Click the radio button next to the desired logging category that pertains to the local list of auditable events and then click "Edit". 4. Choose the Log Severity Level drop-down list. 5. In the Targets field, move the secure syslog remote logging target to the Selected box. 6. Click "Save". 7. Repeat this procedure to enable all locally logging categories that pertain to the local list of auditable events. If the Cisco ISE does not generate log records for a locally developed list of auditable events, this is a finding.
Fix: F-45868r714217_fix
Enable logging categories for Cisco ISE to send auditable events to the remote syslog target. 1. Log in to the Admin portal. 2. Choose Administration >> System >> Logging >> Logging Categories. 3. Click the radio button next to the desired logging category that pertains to the local list of auditable events and then click "Edit". 4. Choose the Log Severity Level drop-down list. 5. In the Targets field, move the syslog remote logging target to the Selected box. 6. Click "Save". 7. Repeat this procedure to enable all locally logging categories that pertain to the local list of auditable events.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CSCO-NM-000320
- Vuln IDs
-
- V-242637
- Rule IDs
-
- SV-242637r961863_rule
Checks: C-45912r803577_chk
Navigate to Administration >> System >> Backup and Restore. Ensure that configuration data backups are scheduled for weekly intervals or in accordance with the site's SSP. If backups of the confiuration data are not made when when changes occur or in accordance with the site's SSP, this is a finding.
Fix: F-45869r803578_fix
Navigate to Administration >> System >> Backup and Restore. 1. Select the "Schedule" option next to configuration Data Backup. 2. Ensure a weekly scheduled backup is configured (or in accordance with the site's SSP).
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- CSCO-NM-000330
- Vuln IDs
-
- V-242638
- Rule IDs
-
- SV-242638r961863_rule
Checks: C-45913r714222_chk
1. Review the SSP to see the site's network device backup policy. Check the Cisco ISE backup log to verify regular backups are being performed. show backup history 2. Determine if there is a recent history of backups. Verify if the backup history shows either weekly backups or periodic backups. If the Cisco ISE is not configured to conduct backups of system-level information contained in the information system when changes occur, this is a finding.
Fix: F-45870r714223_fix
Save changes to the Cisco ISE configuration files data and place the backup in a repository by using the backup command in EXEC mode on the CLI. backup [{backup-name} repository {repository-name} ise-config encryption-key hash| plain {encryption-key name}]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CSCO-NM-000340
- Vuln IDs
-
- V-242639
- Rule IDs
-
- SV-242639r961863_rule
Checks: C-45914r714225_chk
Choose Administration >> System >> Certificates >> System Certificates. 1. The System Certificates page appears and provides information for the local certificates. 2. Select a certificate and choose "View" to display the certificate details. If the Cisco ISE does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix: F-45871r714226_fix
Replace the self-signed certificate with a CA-signed certificates for greater security. To obtain a CA-signed certificate: A. Generate a certificate signing request (CSR) to obtain a CA-signed certificate for the nodes in your deployment. 1. Choose Administration >> System >> Certificates >> Certificate Signing Requests. 2. Enter the values for generating a CSR. Examples: RSA: Request security pki generate-key-pair certificate-id <cert name>> type rsa size <512 | 1024 | 2048 | 4096>> ECDSA: Request security pki generate-key-pair certificate-id <cert_name>> type ecdsa size <256 | 384>> 3. Click "Generate" to generate the CSR. 4. Click "Export" to open the CSR in a Notepad. 5. Copy all the text from "-----BEGIN CERTIFICATE REQUEST-----" through "-----END CERTIFICATE REQUEST-----." 6. Paste the contents of the CSR into the certificate request. Generate a new key-pair from a DoD-approved certificate issuer. Sites must consult the PKI/PKI pages on the https://cyber.mil/ website for procedures for NIPRNet and SIPRNet. 7. Download the signed certificate. B. Import the Root Certificates to the Trusted Certificate Store: Administration >> System >> Certificates >> Trusted Certificates C. Bind the CA-Signed Certificate to the CSR. 1. Choose Administration >> System >> Certificates >> Certificate Signing Requests. Check the check box next to the node for which you are binding the CSR with the CA-signed certificate. 2. Click "Bind". 3. Click "Browse" to choose the CA-signed certificate. 4. Specify a Friendly Name for the certificate. 5. Check the "Validate Certificate Extensions" check box if you want Cisco ISE to validate certificate extensions. 6. Check the service for which this certificate will be used in the Usage area. This information is auto populated if you have enabled the Usage option while generating the CSR. If you do not want to specify the usage at the time of binding the certificate, uncheck the Usage option. You can edit the certificate later and specify the usage. 7. Click "Submit". If you have chosen to use this certificate for Cisco ISE internode communication, the application server on the Cisco ISE node is restarted.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- CSCO-NM-000350
- Vuln IDs
-
- V-242640
- Rule IDs
-
- SV-242640r960966_rule
Checks: C-45915r714228_chk
If an SNMP stanza does not exist, this is not a finding. 1. Use the command line interface to view the current SNMP configuration. show startup-config 2. Search for the keyword SNMP. If versions earlier than SNMPv3 are enabled, this is a finding. If SNMPv3 is not configured to meet DoD requirements, this is a finding.
Fix: F-45872r714229_fix
If SNMP is used by the organization, then SNMP is configured at the command line interface. To disable SNMPv1 and SNMPv2c if enabled type the remove the group with the following command. no snmp-server group <community> v1 To enable the SNMPv3 server on Cisco ISE, use the snmp-server enable command in global configuration mode. 1. snmp-server enable 2. snmp-server user <username> v3 hash <auth-password> <priv-password> 3. snmp-server host {ip-address | hostname} trap version 3 username engine_ID hash <auth-password> <priv-password>
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- CSCO-NM-000360
- Vuln IDs
-
- V-242641
- Rule IDs
-
- SV-242641r960966_rule
Checks: C-45916r822758_chk
If wireless setup is not availabe in this version of the product, this is not applicable. Verify Wi-Fi setup has been disabled on a device after initial setup and the device has been placed on the production network. Show application status Wi-Fi setup. If wireless setup is not disabled, this is a finding.
Fix: F-45873r714232_fix
Use the application configure command in EXEC mode to disable wireless setup. application configure disable Wi-Fi setup
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- CSCO-NM-000370
- Vuln IDs
-
- V-242642
- Rule IDs
-
- SV-242642r960993_rule
Checks: C-45917r864201_chk
Navigate to Administration >> System >> Settings >> FIPS Mode. Verify FIPS Mode is enabled. If FIPS Mode is enabled, this is not a finding. If FIPS mode is not configured, but password authentication is configured to use FIPS 140-2/3 validated replay-resistant authentication mechanism for network access to privileged accounts , this can be lowered to a CAT 3 finding.
Fix: F-45874r864202_fix
Enable FIPS Mode in Cisco ISE to ensure FIPS 140-2/3 algorithms are used in all security functions requiring cryptographic functions. 1. Choose Administration >> System >> Settings >> FIPS Mode. 2. Choose the "Enabled" option from the FIPS Mode drop-down list. 3. Click "Save" and restart the node. NOTE: Configuring FIPS mode is the required DoD configuration. However, this requirement can be lowered to a CAT 3 if the alternative manual configuration is used to configure individual protocols.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- CSCO-NM-000380
- Vuln IDs
-
- V-242643
- Rule IDs
-
- SV-242643r961506_rule
Checks: C-45918r864204_chk
Navigate to Administration >> System >> Settings >> FIPS Mode. Verify FIPS Mode is enabled. If FIPS Mode is enabled, this is not a finding. If FIPS mode is not configured, but the Cisco ISE is configured so that SNMP messages are authenticated using a FIPS 140-2/3 validated HMAC, this can be lowered to a CAT 3 finding.
Fix: F-45875r864205_fix
Enable FIPS Mode in Cisco ISE to ensure FIPS 140-2/3 algorithms are used in all security functions requiring cryptographic functions. 1. Choose Administration >> System >> Settings >> FIPS Mode. 2. Choose the "Enabled" option from the FIPS Mode drop-down list. 3. Click "Save" and restart the node. NOTE: Configuring FIPS mode is the required DoD configuration. However, this requirement can be lowered to a CAT 3 if the alternative manual configuration is used to configure SNMP messages to authenticate using a FIPS-140-2/3 validated HMAC.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- CSCO-NM-000390
- Vuln IDs
-
- V-242644
- Rule IDs
-
- SV-242644r961506_rule
Checks: C-45919r714240_chk
1. View the status of the Network Translation Protocol (NTP) associations. show ntp 2. Verify a primary and secondary ntp server address is configured. If the Cisco ISE is not configured to synchronize internal information system clocks using redundant authoritative time sources, this is a finding.
Fix: F-45876r714241_fix
1. Choose Administration >> System >> Settings >> System Time. 2. Enter unique IP addresses (IPv4/IPv6/FQDN) for the NTP servers. 3. Check the "Only allow authenticated NTP servers" check box if you want to restrict Cisco ISE to use only authenticated NTP servers to keep system and network time. DoD requires NTP authentication where available, so configure the NTP server using private keys. Click the "NTP Authentication Keys" tab and specify one or more authentication keys if any of the servers that you specify requires authentication via an authentication key, as follows: 4. Click "Add". 5. Enter the necessary Key ID and Key Value. Specify whether the key in question is trusted by activating or deactivating the Trusted Key option, and click "OK". The Key ID field supports numeric values between 1 and 65535, and the Key Value field supports up to 15 alphanumeric characters. 6. Return to the NTP Server Configuration tab when finished entering the NTP Server Authentication Keys. 7. Click "Save".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- CSCO-NM-000400
- Vuln IDs
-
- V-242645
- Rule IDs
-
- SV-242645r997486_rule
Checks: C-45920r714243_chk
Verify the min-password length is set to 15. Show password policy If the Cisco ISE password policy is not configured to require a minimum 15-character password length, this is a finding.
Fix: F-45877r714244_fix
Configure the password policy. password-policy min-password-length 15
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- CSCO-NM-000410
- Vuln IDs
-
- V-242646
- Rule IDs
-
- SV-242646r997488_rule
Checks: C-45921r997487_chk
Verify that at least one uppercase letter is required. Show password policy If the Cisco ISE password policy is not configured to require at least one uppercase character, this is a finding.
Fix: F-45878r714247_fix
Configure the password policy. password-policy upper-case required 1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- CSCO-NM-000420
- Vuln IDs
-
- V-242647
- Rule IDs
-
- SV-242647r997490_rule
Checks: C-45922r997489_chk
Verify that at least one lowercase letter is required. Show password policy If the Cisco ISE password policy is not configured to require at least one lowercase character, this is a finding.
Fix: F-45879r714250_fix
Configure the password policy. password-policy lower-case required 1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- CSCO-NM-000430
- Vuln IDs
-
- V-242648
- Rule IDs
-
- SV-242648r997491_rule
Checks: C-45923r714252_chk
Verify that at least one digit is required. Show password policy If the Cisco ISE password policy is not configured to require at least one digit, this is a finding.
Fix: F-45880r714253_fix
Configure the password policy. password-policy digit-required 1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- CSCO-NM-000440
- Vuln IDs
-
- V-242649
- Rule IDs
-
- SV-242649r997492_rule
Checks: C-45924r714255_chk
Verify that at least one special character is required. Show password policy If the Cisco ISE password policy is not configured to require at least one special character, this is a finding.
Fix: F-45881r714256_fix
Configure the password policy. password-policy special-required 1
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- CSCO-NM-000460
- Vuln IDs
-
- V-242651
- Rule IDs
-
- SV-242651r961029_rule
Checks: C-45926r916079_chk
Navigate to Administration >> System >> Settings >> FIPS Mode. Verify FIPS Mode is enabled. If FIPS Mode is enabled, this is not a finding. If FIPS mode is not configured, but the Cisco ISE is configured using an alternative manual method to configure the password authentication process to use a FIPS 140-2/140-3 validated SHA-2 (or greater), this can be lowered to a CAT 2 finding.
Fix: F-45883r916317_fix
Enable FIPS Mode in Cisco ISE to ensure FIPS 140-2/140-3 algorithms are used in all security functions requiring cryptographic functions. 1. Choose Administration >> System >> Settings >> FIPS Mode. 2. Choose the "Enabled" option from the FIPS Mode drop-down list. 3. Click "Save" and restart the node. Note: Configuring FIPS mode is the required DOD configuration. However, this requirement can be lowered to a CAT 2 if the alternative manual configuration is used to configure the password authentication process to use a FIPS 140-2/140-3 validated SHA-2 (or greater).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- CSCO-NM-000470
- Vuln IDs
-
- V-242652
- Rule IDs
-
- SV-242652r961521_rule
Checks: C-45927r714264_chk
View the SSP for the required value. Navigate to Administration >> System >> Admin Access >> Authentication >> Password Policy. Verify the SSP required value matches the "Password cached for" field. If the Cisco ISE does not prohibit the use of cached authenticators after an organization-defined time period, this is a finding.
Fix: F-45884r714265_fix
Navigate to Administration >> System >> Admin Access >> Authentication >> Password Policy. Set the "Password cached for" field to the organization-defined value available in the SSP.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- CSCO-NM-000480
- Vuln IDs
-
- V-242653
- Rule IDs
-
- SV-242653r961050_rule
Checks: C-45928r864210_chk
Navigate to Administration >> System >> Settings >> FIPS Mode. Verify FIPS Mode is enabled. If FIPS Mode is enabled, this is not a finding. If FIPS mode is not configured, but the Cisco ISE is configured using an alternative manual method to configure SHA-2 (or greater) to protect the integrity of HMAC, KDFs, Random Bit Generation, and hash-only applications, this can be lowered to a CAT 2 finding.
Fix: F-45885r864211_fix
Enable FIPS Mode in Cisco ISE to ensure FIPS 140-2/3 algorithms are used in all security functions requiring cryptographic functions. 1. Choose Administration >> System >> Settings >> FIPS Mode. 2. Choose the "Enabled" option from the FIPS Mode drop-down list. 3. Click "Save" and restart the node. NOTE: Configuring FIPS mode is the required DoD configuration. However, this requirement can be lowered to a CAT 2 if the alternative manual configuration is used to configure SHA-2 or higher hash function to protect the integrity of HMAC, KDFs, Random Bit Generation, and hash-only applications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- CSCO-NM-000490
- Vuln IDs
-
- V-242654
- Rule IDs
-
- SV-242654r961554_rule
Checks: C-45929r864213_chk
Navigate to Administration >> System >> Settings >> FIPS Mode. Verify FIPS Mode is enabled. If FIPS Mode is enabled, this is not a finding. If FIPS mode is not configured, but the Cisco ISE is configured using an alternative manual method to configure to configure a FIPS 140-2/3 validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communication, this can be lowered to a CAT 3 finding.
Fix: F-45886r864214_fix
Enable FIPS Mode in Cisco ISE to ensure FIPS 140-2/3 algorithms are used in all security functions requiring cryptographic functions. 1. Choose Administration >> System >> Settings >> FIPS Mode. 2. Choose the "Enabled" option from the FIPS Mode drop-down list. 3. Click "Save" and restart the node. NOTE: Configuring FIPS mode is the required DoD configuration. However, this requirement can be lowered to a CAT 3 if the alternative manual configuration is used to configure a FIPS 140-2/3 validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-002890
- Version
- CSCO-NM-000500
- Vuln IDs
-
- V-242655
- Rule IDs
-
- SV-242655r961554_rule
Checks: C-45930r714273_chk
Verify the SSP requires a process for verifying the checksum for software download and install ISO files. If a local documented process does not require that the checksum value of any software download be verified, this is a finding.
Fix: F-45887r714274_fix
Go to the DoD repository or Cisco download page. Hover over the download link and a small window will pop up. This window will contain information about that particular download. The information includes the MD5 and SHA512 checksum value of that file. From the Cisco ISE command line interface (CLI), enter application upgrade prepare command. This command copies the upgrade bundle to the local repository "upgrade" that you created in the previous step and lists the MD5 and SHA256 checksum. If the checksum matches the value found from the source repository, proceed with the update.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-003123
- Version
- CSCO-NM-000510
- Vuln IDs
-
- V-242656
- Rule IDs
-
- SV-242656r961557_rule
Checks: C-45931r864216_chk
Navigate to Administration >> System >> Settings >> FIPS Mode. Verify FIPS Mode is enabled. If FIPS Mode is enabled, this is not a finding. If FIPS mode is not configured, but the Cisco ISE is configured using an alternative manual method to configure to configure configure a FIPS 140-2/3 validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications, this can be lowered to a CAT 2 finding.
Fix: F-45888r864217_fix
Enable FIPS Mode in Cisco ISE to ensure FIPS 140-2/3 algorithms are used in all security functions requiring cryptographic functions. 1. Choose Administration >> System >> Settings >> FIPS Mode. 2. Choose the "Enabled" option from the FIPS Mode drop-down list. 3. Click "Save" and restart the node. NOTE: Configuring FIPS mode is the required DoD configuration. However, this requirement can be lowered to a CAT 2 if the alternative manual configuration is used to configure a FIPS 140-2/3 validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- CSCO-NM-000520
- Vuln IDs
-
- V-242657
- Rule IDs
-
- SV-242657r961068_rule
Checks: C-45932r944327_chk
From the CLI EXEC mode, type show terminal. From the GUI, navigate to Administration >> System >> Admin Access >> Settings >> Session. View the session timeout setting. If the terminal and administration setting is not set to six minutes or less, this is a finding.
Fix: F-45889r944328_fix
Configure Session Timeout for Administrators. 1. Choose Administration >> System >> Admin Access >> Settings >> Session >> Session Timeout. 2. Type "6". 3. Click "Save".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- CSCO-NM-000530
- Vuln IDs
-
- V-242658
- Rule IDs
-
- SV-242658r961119_rule
Checks: C-45933r864225_chk
Navigate to Administration >> System >> Settings >> FIPS Mode. Verify FIPS Mode is enabled. If FIPS Mode is enabled, this is not a finding. If FIPS mode is not configured, but the Cisco ISE is configured using an alternative manual method to configure the system to use a FIPS 140-2 approved Random Number Generator (RNG) using DRGB to generate unique session identifiers, this can be lowered to a CAT 3 finding.
Fix: F-45890r864226_fix
Enable FIPS Mode in Cisco ISE to ensure FIPS 140-2/3 algorithms are used in all security functions requiring cryptographic functions. 1. Choose Administration >> System >> Settings >> FIPS Mode. 2. Choose the "Enabled" option from the FIPS Mode drop-down list. 3. Click "Save" and restart the node. NOTE: Configuring FIPS mode is the required DoD configuration. However, this requirement can be lowered to a CAT 3 if the alternative manual configuration is used to generate unique session identifiers using a FIPS 140-2 approved Random Number Generator (RNG) using DRGB.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-001199
- Version
- CSCO-NM-000540
- Vuln IDs
-
- V-242659
- Rule IDs
-
- SV-242659r961128_rule
Checks: C-45934r714285_chk
View the local admin users. 1. Choose Administration >> System >> Admin Access >> Administrators >> Admin Users >>View. 2. Verify there are only two local accounts are defined. Both must be in the Super User group. These users must be the web-based Account of Last Resort and the default CLI admin user. If the Cisco ISE has unauthorized local users defined, this is a finding.
Fix: F-45891r720804_fix
Create a local web-based administrator. ONLY one web-based admin account should exist on the local device. The default CLI account is also local and cannot be removed. 1. Choose Administration >> System >> Admin Access >> Administrators >> Admin Users >> Add. 2. From the drop-down, choose "Create an Admin User". 3. Enter the admin name and other information. 4. Add the Super User group. 5. Click "Submit".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CSCO-NM-000550
- Vuln IDs
-
- V-242660
- Rule IDs
-
- SV-242660r961620_rule
Checks: C-45935r714288_chk
Verify the system and system-options are configured to protect against DoS attacks. If the system and system-options that limit the effects of common types of DoS attacks are not configured in compliance with DoD requirements, this is a finding.
Fix: F-45892r714289_fix
Configure the system and system-options to protect against DoS attacks. These are examples of setting that should be adjusted to limit DoS attacks. The exact values will vary based on site traffic. Use the synflood-limit to configure a TCP SYN packet rate limit. To configure the limit of TCP/UDP/ICMP packets from a source IP address, use the rate-limit command in configuration mode.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- CSCO-NM-000560
- Vuln IDs
-
- V-242661
- Rule IDs
-
- SV-242661r961863_rule
Checks: C-45936r916085_chk
To view remote logging targets, complete the following steps: 1. From the ISE Administration Interface, choose Administration >> System >> Logging >> Remote Logging Targets. 2. The Remote Logging Targets page appears with a list of existing logging targets. If at least two remote logging targets are not configured, this is a finding.
Fix: F-45893r916086_fix
Create at least two Remote Logging Targets and direct logging to those targets. To create an external logging target, complete the following steps: 1. Choose Administration >> System >> Logging >> Remote Logging Targets. 2. Click "Add". 3. Configure the following fields: - Name - Enter the name of the new target - Target Type - By default it is set to Syslog. The value of this field cannot be changed. - Description - Enter a brief description of the new target. - IP Address - Enter the IP address of the destination machine where you want to store the logs. - Port - Enter the port number of the destination machine. - Facility Code - Choose the syslog facility code to be used for logging. Valid options are Local0 through Local7. - Maximum Length - Enter the maximum length of the remote log target messages. Valid options are from 200 to 1024 bytes. 4. Click "Save". Go to the Logging Targets page and verify the creation of the new target. To edit a remote logging target, complete the following steps: 1. Choose Administration >> System >> Logging >> Remote Logging Targets. 2. Click the radio button next to the logging target name that you want to edit and click "Edit". 3. Modify the following field values on the Log Collection page as needed. - Name - Target Type - Description - IP Address - Port - Facility Code - Maximum Length 4. Click "Save". The updating of the selected Log Collector is completed.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- CSCO-NM-000650
- Vuln IDs
-
- V-242662
- Rule IDs
-
- SV-242662r960888_rule
Checks: C-45937r864219_chk
Verify logging is initiated upon system startup. Since the production may not be able to be manually started to observe this, review the logging categories setup. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Verify the Administrative and Operational Audit is configured for the INFO log severity level. 3. Verify that logging categories have been configured and have been set to the syslog target. If logging categories are not configured to send to the central syslog server, this is a finding.
Fix: F-45894r864220_fix
Enable logging categories for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Repeat the above steps to enable the AAA Audit logging category and other logging categorized desired. However, note that for some logging categories, the default log severity level and cannot be changed. 5. Click "Save".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- CSCO-NM-000720
- Vuln IDs
-
- V-242663
- Rule IDs
-
- SV-242663r960909_rule
Checks: C-45938r714297_chk
Verify the logging categories as required by the SSP based on mission requirements for Cisco ISE are configured. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button for each logging category and verify it is set. Verify all categories required by the SSP are set. Verify the appropriate severity level (usually WARNING is set). If the logging category required by the SSP is not configured and sent to the central syslog server target, this is a finding.
Fix: F-45895r714298_fix
Enable the logging categories as required by the SSP based on mission requirements for Cisco ISE to send auditable events to the syslog target. From the Web Admin portal: 1. Choose Administration >> System >> Logging >> Logging Categories. 2. Click the radio button next to the Administrative and Operational Audit logging category and then click "Edit". 3. Choose INFO from the Log Severity Level drop-down list. 4. In the Targets field, move the syslog target name that is being used to the Selected box. 5. Repeat steps 2 and 3 with the selection of other category levels required based on organizational mission and SSP. 6. Click "Save".