1.4.1 Set 'password' for 'enable secret'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Use the enable secret command to provide an additional layer of security over the enable password. The enable secret command provides better security by storing the enable secret password using a nonreversible cryptographic function. The added layer of security encryption provides is useful in environments where the password crosses the network or is stored on a TFTP server.

Rationale:

Requiring the enable secret setting protects privileged EXEC mode. By default, a strong password is not required, a user can just press the Enter key at the Password prompt to start privileged mode. The enable password command causes the device to enforce use of a password to access privileged mode. Enable secrets use a one-way cryptographic hash (MD5). This is preferred to Level 7 enable passwords that use a weak, well-known, and easily reversible encryption algorithm.

Impact:

Organizations should protect privileged EXEC mode through policies requiring the 'enabling secret' setting, which enforces a one-way cryptographic hash (MD5).

Solution

Configure a strong, enable secret password.

hostname(config)#enable secret {ENABLE_SECRET_PASSWORD}

Default Value:

No enable secret password setup by default

See Also

https://workbench.cisecurity.org/files/2936

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1), CSCv6|5.8, CSCv7|4.3

Plugin: Cisco

Control ID: 70a175ea3bfd0243f7d568e1cda3a3ee3ac4b3233acd34469bb27a7142b5320c