UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Cisco ISE must prohibit the use of cached authenticators after an organization-defined time period.


Overview

Finding ID Version Rule ID IA Controls Severity
V-242652 CSCO-NM-000470 SV-242652r714266_rule Medium
Description
Some authentication implementations can be configured to use cached authenticators. If cached authentication information is out-of-date, the validity of the authentication information may be questionable. The organization-defined time period should be established for each device depending on the nature of the device; for example, a device with just a few administrators in a facility with spotty network connectivity may merit a longer caching time period than a device with many administrators.
STIG Date
Cisco ISE NDM Security Technical Implementation Guide 2021-09-27

Details

Check Text ( C-45927r714264_chk )
View the SSP for the required value.

Navigate to Administration >> System >> Admin Access >> Authentication >> Password Policy.

Verify the SSP required value matches the "Password cached for" field.

If the Cisco ISE does not prohibit the use of cached authenticators after an organization-defined time period, this is a finding.
Fix Text (F-45884r714265_fix)
Navigate to Administration >> System >> Admin Access >> Authentication >> Password Policy.

Set the "Password cached for" field to the organization-defined value available in the SSP.