CISC-ND-001440 - The Cisco switch must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Each organization obtains user certificates from an approved, shared service provider as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority (CA) at medium assurance or higher, this CA will suffice.

Solution

Configure the switch to obtain its public key certificates from an appropriate certificate policy through an approved service provider as show in the example below:

SW2(ca-trustpoint)#enrollment url http://trustpoint1.example.com

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS_Switch_Y23M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, CCI|CCI-001159, Rule-ID|SV-220619r879887_rule, STIG-ID|CISC-ND-001440, STIG-Legacy|SV-110467, STIG-Legacy|V-101363, Vuln-ID|V-220619

Plugin: Cisco

Control ID: aa9ce84972a6e5616fda9993d5df21f8387e84ef1947b044324ac6b922eac924