STIGQter STIGQter: STIG Summary: Cisco IOS Switch NDM Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The Cisco switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.

DISA Rule

SV-220594r521267_rule

Vulnerability Number

V-220594

Group Title

SRG-APP-000170-NDM-000329

Rule Version

CISC-ND-000610

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Cisco switch to enforce password complexity by requiring that when a password is changed, the characters are changed in at least eight of the positions within the password as shown in the example below:

SW1(config)#aaa common-criteria policy PASSWORD_POLICY
SW1(config-cc-policy)#char-changes 8
SW1(config-cc-policy)#exit

Check Contents

Review the Cisco switch configuration to verify that, when a password is changed, it requires the characters to be changed in at least eight of the positions as shown in the example below:

aaa new-model
!
!
aaa common-criteria policy PASSWORD_POLICY
char-changes 8

If the Cisco switch is not configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password, this is a finding.

Vulnerability Number

V-220594

Documentable

False

Rule Version

CISC-ND-000610

Severity Override Guidance

Review the Cisco switch configuration to verify that, when a password is changed, it requires the characters to be changed in at least eight of the positions as shown in the example below:

aaa new-model
!
!
aaa common-criteria policy PASSWORD_POLICY
char-changes 8

If the Cisco switch is not configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password, this is a finding.

Check Content Reference

M

Target Key

4069

Comments