Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000088-NAC-000440

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must generate a critical alert to be sent to the ISSO and SA (at a minimum) if it is unable to communicate with the central event log. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000089-NAC-000450

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must continue to queue traffic log records locally when communication with the central log server is lost and there is an audit archival failure. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;It is critical that when the network element is at risk of failing to process traffic logs as required, it takes action to mi...
    Rule Medium Severity
  • SRG-NET-000512-NAC-002310

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must perform continuous detection and tracking of endpoint devices attached to the network. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Continuous scanning capabilities on the Cisco ISE provide visibility of devices that are connected to the switch ports. The C...
    Rule Medium Severity
  • SRG-NET-000148-NAC-000620

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Iden...
    Rule Medium Severity
  • SRG-NET-000343-NAC-001460

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must authenticate all endpoint devices before establishing a connection and proceeding with posture assessment. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. H...
    Rule Medium Severity
  • SRG-NET-000343-NAC-001470

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must be configured to dynamically apply restricted access of endpoints that are granted access using MAC Authentication Bypass (MAB). This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;MAB can be defeated by spoofing the MAC address of a valid device. MAB enables port-based access control using the MAC addres...
    Rule Medium Severity
  • SRG-NET-000550-NAC-002470

    <GroupDescription></GroupDescription>
    Group
  • Before establishing a connection with a Network Time Protocol (NTP) server, the Cisco ISE must authenticate using a bidirectional, cryptographically based authentication method that uses a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the NTP server. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;If the NTP server is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to s...
    Rule Medium Severity
  • SRG-NET-000151-NAC-000630

    <GroupDescription></GroupDescription>
    Group
  • Before establishing a local, remote, and/or network connection with any endpoint device, the Cisco ISE must use a bidirectional authentication mechanism configured with a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the endpoint device. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are ...
    Rule Medium Severity
  • SRG-NET-000512-NAC-002310

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must enforce posture status assessment for posture required clients defined in the NAC System Security Plan (SSP). This is required for compliance with C2C Step 3.

    &lt;VulnDiscussion&gt;Posture assessments can reduce the risk that clients impose on networks by restricting or preventing access of noncompliant c...
    Rule High Severity
  • SRG-NET-000512-NAC-002310

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ISE must have a posture policy for posture required clients defined in the NAC System Security Plan (SSP). This is required for compliance with C2C Step 2.

    &lt;VulnDiscussion&gt;Posture assessments can reduce the risk that clients impose on networks. The posture policy is the function that can link req...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules