1.4.4.1 Ensure 'aaa command authorization' is configured correctly

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Defines the source of authorization for the commands entered by an administrator/user

Rationale:

Requiring authorization for commands enforces separation of duties and provides least privilege access for specific job roles.

Solution

Run the following to determine the remote the TACACS+/RADIUS servers (server_group_name) as source of authorization and the local database (LOCAL) as fallback method if the remote servers are not available.

HOSTNAME(CONFIG)# AAA AUTHORIZATION COMMAND _<server-group_name>_ LOCAL

This implies that locally, each privilege has its sets of commands configured and username associated just in accordance with the privilege and command definition in the remote servers.

See Also

https://workbench.cisecurity.org/files/1903

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6

Plugin: Cisco

Control ID: 7a3571d8295dc7346bb821db27bbc51428d6c306646ca34845d87b301d3d4fbf