UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Cisco ISE must enforce posture status assessment for posture required clients defined in the NAC System Security Plan (SSP). This is required for compliance with C2C Step 3.


Overview

Finding ID Version Rule ID IA Controls Severity
V-242605 CSCO-NC-000310 SV-242605r812792_rule High
Description
Posture assessments can reduce the risk that clients impose on networks by restricting or preventing access of noncompliant clients. If the posture assessment is not enforced, then access of clients not complying is not restricted allowing the risk of vulnerabilities being exposed.
STIG Date
Cisco ISE NAC Security Technical Implementation Guide 2022-09-14

Details

Check Text ( C-45880r812791_chk )
If DoD is not at C2C Step 3 or higher, this is not a finding.
If not required by the NAC SSP, this is not a finding.

Verify the authorization policy will enforce posture assessment status for posture required clients.

1. Navigate to Work Centers >> Network Access >> Policy Sets.
2. Choose ">" on the applicable policy set.
3. Expand the Authorization Policy.
4. Verify that a rule with the condition "Session-PostureStatus EQUALS NonCompliant" is present and will apply to posture required devices by analyzing other conditions used on the same policy.
5. Ensure the result that is used for remediation access is a restricted VLAN, ACL, SGT, or any combination used to restrict the access.

If there is not an authorization policy for NonCompliant clients that are posture required, this is a finding.

If the authorization policy does not restrict the access of NonCompliant clients that are posture required, this is a finding.
Fix Text (F-45837r803568_fix)
If required by the NAC SSP, configure the authorization policy to enforce posture assessment status for posture required clients.

1. Edit the Policy Set to enforce the posture assessment.
2. Navigate to Work Centers >> Network Access >> Policy Sets.
3. Choose ">" on the applicable policy set.
4. Expand the Authorization Policy.
5. Click on Actions Gear below to location where the new Authorization Policy will be inserted.
6. Choose "Insert new role above", or if there is an Authorization Policy made for the device type that posture will be applied to, choose "Duplicate above".
7. Click on the name of the policy and define a desirable name.
8 Either click on the "+" icon or click on the existing Conditions to open the Conditions Studio.
9. Choose "New" under the editor.
10. Choose "Click to add an attribute".
11. Under Dictionary, select "Session" in the drop-down menu.
12. Under Attribute, select "PostureStatus".
13. Ensure "Equals" is selected as the operator.
14. Select "Compliant" in the drop-down menu.
15. Choose "New".
16. Add a condition to flag the device type that should be postured.
17. Choose "Use".
18. Name the rule accordingly.
19. Select the desired result.
20. Click on Actions Gear on the Authorization Policy just created.
21. Select Duplicate below in the drop-down.
22. Click on the conditions of the copy.
23. Change the PostureStatus variable form "Compliant" to "NonCompliant".
24. Choose "Use".
25. Name the rule accordingly.
26. Select a result that is used for remediation access, which should be a result that is configured for a restricted VLAN, ACL, SGT, or any combination used to restrict the access.
27. Choose "Save".