DISA STIG Cisco IOS Switch NDM v2r8

Audit Details

Name: DISA STIG Cisco IOS Switch NDM v2r8

Updated: 4/9/2024

Authority: DISA STIG

Plugin: Cisco

Revision: 1.1

Estimated Item Count: 44

File Details

Filename: DISA_STIG_Cisco_IOS_Switch_NDM_v2r8.audit

Size: 114 kB

MD5: fada376fa0f797601b6fb56f9da9d800
SHA256: f2660d463a0427abb9ff9fe0ce6bf01c466aa97d3887bcdb6c18388bd565bd0f

Audit Changelog

 
Revision 1.1

Apr 9, 2024

Functional Update
  • CISC-ND-001370 - The Cisco switch must be configured to use at least two authentication servers to authenticate users prior to granting administrative access.
Miscellaneous
  • References updated.
  • Variables updated.
Added
  • CISC-ND-001150 - The Cisco switch must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.
  • CISC-ND-001200 - The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.
  • CISC-ND-001220 - The Cisco switch must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.
Removed
  • CISC-ND-001150 - The Cisco switch must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based - NTP sources using authentication that is cryptographically based
  • CISC-ND-001200 - The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions - HMAC to protect the integrity of remote maintenance sessions
  • CISC-ND-001220 - The Cisco switch must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards - DoS attacks by employing organization-defined security safeguards