1.1.3.1 Configure Authorization

Information

Command authorization allows restricting specific users to specific command sets that they can use on the device. Command authorization is a complex endeavor and is very rarely implemented. Usually, the TACACS+ protocol is used with a central AAA server.

Command authorization allows the implementation of fine-grained role-based access control concepts.

Solution

Currently CIS makes no recommendations how to implement command authorization. Roles and access-privileges should be defined in collaboration with your operations and security teams.

Impact:

Prevent users from issuing certain commands.

See Also

https://workbench.cisecurity.org/benchmarks/10473

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3

Plugin: Cisco

Control ID: 35be15c17d024798b0ddb83ed7bdfa9cbd59490a3795150222bc7eb627c751f5