Cisco ISE NDM Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
For the local account of last resort, the Cisco ISE must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
<VulnDiscussion>Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notifi...Rule Medium Severity -
SRG-APP-000080-NDM-000220
<GroupDescription></GroupDescription>Group -
The Cisco ISE must be configured to synchronize internal information system clocks using redundant authoritative time sources.
<VulnDiscussion>The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...Rule Medium Severity -
SRG-APP-000374-NDM-000299
<GroupDescription></GroupDescription>Group -
The Cisco ISE must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
SRG-APP-000516-NDM-000335
<GroupDescription></GroupDescription>Group -
The Cisco ISE must enforce access restrictions associated with changes to the firmware, OS, and hardware components.
<VulnDiscussion>Changes to the hardware or software components of the network device can have significant effects on the overall security of ...Rule Medium Severity -
SRG-APP-000516-NDM-000336
<GroupDescription></GroupDescription>Group -
The Cisco ISE must be configured to use an external authentication server to authenticate administrators prior to granting administrative access.
<VulnDiscussion>Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control ...Rule Medium Severity -
SRG-APP-000516-NDM-000351
<GroupDescription></GroupDescription>Group -
The Cisco ISE must generate log records for a locally developed list of auditable events.
<VulnDiscussion>Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capaci...Rule Medium Severity -
SRG-APP-000516-NDM-000341
<GroupDescription></GroupDescription>Group -
The Cisco ISE must conduct configuration and operational backups when changes are made or must schedule backups weekly, at a minimum.
<VulnDiscussion>If this information is not backed up and a system failure was to occur, the security settings would be difficult to reconfigu...Rule Low Severity -
SRG-APP-000516-NDM-000344
<GroupDescription></GroupDescription>Group -
The Cisco ISE must use DoD-approved PKI rather than proprietary or self-signed device certificates.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The Cisco ISE must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.
<VulnDiscussion>Changes to any software components of the network device can have significant effects on the overall security of the network....Rule High Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The Cisco ISE must be configured to disable Wireless Setup for production systems.
<VulnDiscussion>ISE Wireless Setup is beta software so is not authorized for use in DoD. Wireless Setup is disabled by default after fresh i...Rule High Severity -
SRG-APP-000156-NDM-000250
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.