CISC-ND-000460 - The Cisco switch must be configured to limit privileges to change the software resident within software libraries.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Changes to any software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network device for implementing any changes or upgrades.

If the network device were to enable unauthorized users to make changes to software libraries, those changes could be implemented without undergoing testing, validation, and approval.

Solution

If persistent logging is enabled, configure the switch to only allow administrators with privilege level '15' access to the file system as shown in the example below:

SW4(config)#file privilege 15

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS_Switch_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001499, Rule-ID|SV-220585r521267_rule, STIG-ID|CISC-ND-000460, STIG-Legacy|SV-110399, STIG-Legacy|V-101295, Vuln-ID|V-220585

Plugin: Cisco

Control ID: be84b18f1057042c5174a0ca95283bb78fe90143ad1266771c934019f93c25e3