STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cisco ISE NDM Security Technical Implementation Guide

V-242608

CAT II (Medium)

The Cisco ISE must change the password for the local CLI and web-based account when members who have access to the password leave the role and are no longer authorized access.

Rule ID

SV-242608r1018744_rule

STIG

Cisco ISE NDM Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-004045, CCI-002142

Discussion

If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can still gain access even though they are no longer authorized. There may also be instances when specific user actions need to be performed on the network device without unique administrator identification or authentication. A shared/group account credential is a shared form of authentication that allows multiple individuals to access the network device using a single account. Cisco ISE introduces a Generate Password option on the user and administrator creation page to generate instant password adhering to Cisco ISE password policies. This helps the users or administrators to use the password generated by Cisco ISE than spending time in thinking of a safe password to be configured.

Check Content

Verify by viewing site SSP to view that there is a procedure that requires password change with administrators leave the group.

If Cisco ISE does not change the password for the local CLI and web-based account when members who have access to the password leave the role and are no longer authorized access, this is a finding.

Fix Text

Generate Automatic Password for Users and Administrators (or generate using other encryption method). 

Navigate to Administrators—Administration >> System >> Admin Access >> Administrators >> Admin Users.

Select the CLI and the web Admin users and select the option to generate the password.

Document the generated password and secure it for emergency use as an Account of Last Resort. Do not share with other Admins unless necessary.