1.6.3 Ensure 'RSA key pair' is greater than or equal to 2048 bits

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Generates an RSA key pair used by SSH protocol of at least 2048 bits

Rationale:

Secure Shell (SSH) is a secure remote-login protocol. The ASA allows SSH connections to the ASA for management purposes and supports the SSH DES and 3DES ciphers. SSH uses a key-exchange method based on Rivest-Shamir-Adleman (RSA) public-key. Since RSA 1024-bit keys are likely to become crackable, it is recommended to have RSA keys of at least 2048 bits.

Solution

* Step 1: Acquire the enterprise standard RSA key size greater or equal than 2048 bits
* Step 2: If the audit procedure revealed existing non-compliant key pairs, run the following to remove them:

HOSTNAME(CONFIG)#CRYPTO KEY ZEROIZE RSA

* Step 3: Run the following to generate compliant RSA key pair:

HOSTNAME(CONFIG)# CRYPTO KEY GENERATE RSA MODULUS_<enterprise_RSA_key_size>_

* Step 4: Run the following to save the RSA keys to persistent Flash memory

hostname(config)# WRITE MEMORY

See Also

https://benchmarks.cisecurity.org/tools2/cisco/CIS_Cisco_Firewall_Benchmark_v4.0.0.pdf