Information
Command authorization allows restricting specific users to specific command sets that they can use on the device. Command authorization is a complex endeavor and is very rarely implemented. Usually, the TACACS+ protocol is used with a central AAA server.
Command authorization allows the implementation of fine-grained role-based access control concepts.
Solution
Currently CIS makes no recommendations how to implement command authorization. Roles and access-privileges should be defined in collaboration with your operations and security teams.
Impact:
Prevent users from issuing certain commands.