UCF STIG Viewer Logo

The Cisco ISE must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.


Overview

Finding ID Version Rule ID IA Controls Severity
V-242615 CSCO-NM-000090 SV-242615r803576_rule High
Description
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations.
STIG Date
Cisco ISE NDM Security Technical Implementation Guide 2021-09-27

Details

Check Text ( C-45890r803574_chk )
Verify that only administrator accounts are located in administrative groups.

From the web Admin portal:
1. Navigate to Administration >> System >> Admin Access >> Authorization >> Permissions >> Policy.
2. Verify non-administrative users are located in read only or limited access admin groups. If non-adminstrative accounts are in administrative admin groups, this is a finding.
Fix Text (F-45847r803575_fix)
Configure Role Based Access Control to ensure only administrator accounts have admin or super admin rights.

From web Admin portal:
1. Navigate to Administration >> System >> Admin Access >> Authorization >> Permissions > Policy.
2. Take note of admin account groups.
3. Navigate to Administration >> System >> Admin Access >> Administrators >> Admin Users.
4. Ensure only admin accounts are placed within admin groups.

Note: If Active Directory is in use for external authentication, verify from AD that only administrative users are in the security group used for ISE admins.