STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cisco ACI NDM Security Technical Implementation Guide

V-271922

CAT II (Medium)

The Cisco ACI must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

Rule ID

SV-271922r1168360_rule

STIG

Cisco ACI NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001159

Discussion

After the Cisco ACI is initialized, it uses the self-signed certificate as the SSL certificate for HTTPS. This self-signed certificate is neither appropriate nor approved for use in DOD.

Check Content

From the GUI menu bar:
1. Navigate to Admin >> AAA >> Security >> Certificate Authorities.
2. Verify the Issuer is an approved CA.

If the Cisco ACI does not obtain its public key certificates from an approved certificate policy through an approved service provider, this is a finding.

Fix Text

From the GUI menu bar:
1. Navigate to Admin >> AAA >> Security >> Certificate Authorities.
2. Complete the form to configure CA root certificate. 
3. Click "Submit".