Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-242604 | CSCO-NC-000300 | SV-242604r714122_rule | Medium |
Description |
---|
Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. Currently, DoD requires the use of AES for bidirectional authentication since it is the only FIPS-validated AES cipher block algorithm. Because of the challenges of applying this requirement on a large scale, organizations are encouraged to apply the requirement only to those limited number (and type) of devices that truly need to support this capability. |
STIG | Date |
---|---|
Cisco ISE NAC Security Technical Implementation Guide | 2021-04-14 |
Check Text ( C-45879r714120_chk ) |
---|
From the Web Admin portal: 1. Navigate to Administration >> System >> Settings >> Security Settings. 2. Ensure "Allow TLS1.0", "Allow TLS1.1", and "Allow legacy unsafe TLS renegotiation for ISE as a client" are unchecked. If TLS 1.0 or 1.1 is enabled, this is a finding. |
Fix Text (F-45836r714121_fix) |
---|
From the Web Admin portal: 1. Navigate to Administration >> System >> Settings >> Security Settings. 2. Ensure "Allow TLS1.0", "Allow TLS1.1", and "Allow legacy unsafe TLS renegotiation for ISE as a client" are unchecked. |