Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000062-NAC-000340

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must use TLS 1.2, at a minimum, to protect the confidentiality of information passed between the endpoint agent and the Cisco ISE. This is This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;The agent may pass information about the endpoint to the Cisco ISE, which may be sensitive. Using older unauthorized versions...
    Rule High Severity
  • SRG-NET-000015-NAC-000020

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must enforce approved access by employing authorization policies with specific attributes; such as resource groups, device type, certificate attributes, or any other attributes that are specific to a group of endpoints, and/or mission conditions as defined in the site's Cisco ISE System Security Plan (SSP). This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...
    Rule High Severity
  • SRG-NET-000015-NAC-000020

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must be configured to profile endpoints connecting to the network. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;It is possible for endpoints to be manually added to an incorrect endpoint identity group. The endpoint policy can be dynamic...
    Rule High Severity
  • SRG-NET-000015-NAC-000020

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must verify host-based firewall software is running on posture required clients defined in the NAC System Security Plan (SSP) prior to granting trusted network access. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Automated policy assessments must reflect the organization's current security policy so entry control decisions will happen o...
    Rule High Severity
  • SRG-NET-000015-NAC-000020

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must verify anti-malware software is installed and up to date on posture required clients defined in the NAC System Security Plan (SSP) prior to granting trusted network access. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;New viruses and malware are consistently being discovered. If the host-based security software is not current then it will no...
    Rule High Severity
  • SRG-NET-000015-NAC-000020

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must verify host-based IDS/IPS software is authorized and running on posture required clients defined in the NAC System Security Plan (SSP) prior to granting trusted network access. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Automated policy assessments must reflect the organization's current security policy so entry control decisions will happen o...
    Rule High Severity
  • SRG-NET-000015-NAC-000040

    <GroupDescription></GroupDescription>
    Group
  • For endpoints that require automated remediation, the Cisco ISE must be configured to redirect endpoints to a logically separate VLAN for remediation services. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Automated and manual procedures for remediation for critical security updates will be managed differently. Continuing to asse...
    Rule Medium Severity
  • SRG-NET-000015-NAC-000070

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must be configured to notify the user before proceeding with remediation of the user's endpoint device when automated remediation is used. This is required for compliance with C2C Step 3.

    &lt;VulnDiscussion&gt;Notification will let the user know that installation is in progress and may take a while. This notice may deter the user fro...
    Rule Low Severity
  • SRG-NET-000015-NAC-000080

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must be configured so that all endpoints that are allowed to bypass policy assessment are approved by the Information System Security Manager (ISSM) and documented in the System Security Plan (SSP). This is This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Connections that bypass established security controls should be only in cases of administrative need. These procedures and us...
    Rule Medium Severity
  • SRG-NET-000015-NAC-000100

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must send an alert to the Information System Security Manager (ISSM) and System Administrator (SA), at a minimum, when security issues are found that put the network at risk. This is required for compliance with C2C Step 2.

    &lt;VulnDiscussion&gt;Trusted computing should require authentication and authorization of both the user's identity and the identity of the computi...
    Rule Medium Severity
  • SRG-NET-000015-NAC-000110

    <GroupDescription></GroupDescription>
    Group
  • When endpoints fail the policy assessment, the Cisco ISE must create a record with sufficient detail suitable for forwarding to a remediation server for automated remediation or sending to the user for manual remediation. This is required for compliance with C2C Step 3.

    &lt;VulnDiscussion&gt;Failing the NAC assessment means that an unauthorized machine has attempted to access the secure network. Without generating ...
    Rule Medium Severity
  • SRG-NET-000015-NAC-000120

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must place client machines on the blacklist and terminate the agent connection when critical security issues are found that put the network at risk. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Since the Cisco ISE devices and servers should have no legitimate reason for communicating with other devices outside of the ...
    Rule Medium Severity
  • SRG-NET-000015-NAC-000130

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must be configured so client machines do not communicate with other network devices in the DMZ or subnet except as needed to perform an access client assessment or to identify themselves. This is required for compliance with C2C Step 2.

    &lt;VulnDiscussion&gt;Devices not compliant with DoD secure configuration policies are vulnerable to attack. Allowing these systems to connect pres...
    Rule Medium Severity
  • SRG-NET-000322-NAC-001230

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must deny or restrict access for endpoints that fail required posture checks. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Devices, which do not meet minimum-security configuration requirements, pose a risk to the DOD network and information assets...
    Rule Medium Severity
  • SRG-NET-000492-NAC-002100

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must generate a log record when an endpoint fails authentication. This is This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Failing the Cisco ISE assessment means that an unauthorized machine has attempted to access the secure network. Without gener...
    Rule Medium Severity
  • SRG-NET-000492-NAC-002101

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must generate a log record when the client machine fails posture assessment because required security software is missing or has been deleted. This is This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Failing the Cisco ISE assessment means an unauthorized machine has attempted to access the secure network. Without generating...
    Rule Medium Severity
  • SRG-NET-000492-NAC-002120

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must send an alert to the system administrator, at a minimum, when endpoints fail the policy assessment checks for organization-defined infractions. This is required for compliance with C2C Step 3.

    &lt;VulnDiscussion&gt;Failing the Cisco ISE assessment, means that an unauthorized machine has attempted to access the secure network. Without gene...
    Rule Medium Severity
  • SRG-NET-000335-NAC-001360

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must generate a critical alert to be sent to the ISSO and SA (at a minimum) in the event of an audit processing failure. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000335-NAC-001370

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must provide an alert to, at a minimum, the SA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Without an alert, security personnel may be unaware of an impending failure of the audit capability and system operation may ...
    Rule Medium Severity
  • SRG-NET-000336-NAC-001390

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must be configured with a secondary log server in case the primary log is unreachable. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000088-NAC-000440

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must generate a critical alert to be sent to the ISSO and SA (at a minimum) if it is unable to communicate with the central event log. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000089-NAC-000450

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must continue to queue traffic log records locally when communication with the central log server is lost and there is an audit archival failure. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;It is critical that when the network element is at risk of failing to process traffic logs as required, it takes action to mi...
    Rule Medium Severity
  • SRG-NET-000512-NAC-002310

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must perform continuous detection and tracking of endpoint devices attached to the network. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Continuous scanning capabilities on the Cisco ISE provide visibility of devices that are connected to the switch ports. The C...
    Rule Medium Severity
  • SRG-NET-000148-NAC-000620

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Iden...
    Rule Medium Severity
  • SRG-NET-000343-NAC-001460

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must authenticate all endpoint devices before establishing a connection and proceeding with posture assessment. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. H...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules