III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000148-NAC-000620
<GroupDescription></GroupDescription>Group -
The Cisco ISE must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Iden...Rule Medium Severity -
SRG-NET-000343-NAC-001460
<GroupDescription></GroupDescription>Group -
The Cisco ISE must authenticate all endpoint devices before establishing a connection and proceeding with posture assessment. This is required for compliance with C2C Step 4.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. H...Rule Medium Severity -
SRG-NET-000343-NAC-001470
<GroupDescription></GroupDescription>Group -
The Cisco ISE must be configured to dynamically apply restricted access of endpoints that are granted access using MAC Authentication Bypass (MAB). This is required for compliance with C2C Step 4.
<VulnDiscussion>MAB can be defeated by spoofing the MAC address of a valid device. MAB enables port-based access control using the MAC addres...Rule Medium Severity -
SRG-NET-000550-NAC-002470
<GroupDescription></GroupDescription>Group -
Before establishing a connection with a Network Time Protocol (NTP) server, the Cisco ISE must authenticate using a bidirectional, cryptographically based authentication method that uses a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the NTP server. This is required for compliance with C2C Step 1.
<VulnDiscussion>If the NTP server is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to s...Rule Medium Severity -
SRG-NET-000151-NAC-000630
<GroupDescription></GroupDescription>Group -
Before establishing a local, remote, and/or network connection with any endpoint device, the Cisco ISE must use a bidirectional authentication mechanism configured with a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the endpoint device. This is required for compliance with C2C Step 1.
<VulnDiscussion>Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.