STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cisco ISE NDM Security Technical Implementation Guide

V-242615

CAT I (High)

The Cisco ISE must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

Rule ID

SV-242615r961353_rule

STIG

Cisco ISE NDM Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-002235

Discussion

Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations.

Check Content

Verify that only administrator accounts are located in administrative groups. 

From the web Admin portal:
1. Navigate to Administration >> System >> Admin Access >> Authorization >> Permissions >> Policy.
2. Verify non-administrative users are located in read only or limited access admin groups. If non-adminstrative accounts are in administrative admin groups, this is a finding.

Fix Text

Configure Role Based Access Control to ensure only administrator accounts have admin or super admin rights. 

From web Admin portal: 
1. Navigate to Administration >> System >> Admin Access >> Authorization >> Permissions > Policy.
2. Take note of admin account groups.
3. Navigate to Administration >> System >> Admin Access >> Administrators >> Admin Users.
4. Ensure only admin accounts are placed within admin groups.

Note: If Active Directory is in use for external authentication, verify from AD that only administrative users are in the security group used for ISE admins.