1.1.3.1 Configure Authorization

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Command authorization allows restricting specific users to specific command sets that they can use on the device. Command authorization is a complex endeavor and is very rarely implemented. Usually, the TACACS+ protocol is used with a central AAA server.

Command authorization allows the implementation of fine-grained role-based access control concepts.

Solution

Currently CIS makes no recommendations how to implement command authorization. Roles and access-privileges should be defined in collaboration with your operations and security teams.

Impact:

Prevent users from issuing certain commands.

See Also

https://workbench.cisecurity.org/benchmarks/10473