Check: CISR-ND-000047
Cisco ISR 4000 Series NDM STIG:
CISR-ND-000047
(in version v1 r1)
Title
The Cisco ISR 4000 Series router must be configured to prohibit the use of all unnecessary or non-secure ports, protocols, or services. (Cat II impact)
Discussion
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused or unnecessary physical and logical ports/protocols on information systems. Network devices are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., email and web services); however, doing so increases risk over limiting the services provided by any one component. To support the requirements and principles of least functionality, the network device must support the organizational requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved. Some network devices have capabilities enabled by default; if these capabilities are not necessary, they must be disabled. If a particular capability is used, then it must be documented and approved.
Check Content
Verify that the Cisco ISR 4000 Series router does not have any unnecessary or non-secure ports, protocols and services enabled. For example, the following commands should not be in the configuration: ip bootp server ip dns server ip identd ip finger ip http-server ip rcmd rcp-enable ip rcmd rsh-enable service config service finger service tcp-small-servers service udp-small-servers service pad If any unnecessary or non-secure ports, protocols, or services are enabled, this is a finding.
Fix Text
Disable all unnecessary or non-secure ports, protocols, and services. If any of the following commands are in the configuration, remove them. ip bootp server ip dns server ip identd ip finger ip http-server ip rcmd rcp-enable ip rcmd rsh-enable service config service finger service tcp-small-servers service udp-small-servers service pad
Additional Identifiers
Rule ID:
Vulnerability ID: V-74007
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000382 |
The organization configures the information system to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |