on
10-30-2020
02:02 AM
- edited on
03-17-2025
04:04 PM
by
thomas
Contents
This document covers information regarding security, hardening and testing of Identity Services Engine (ISE). Information included such as TLS & Software versions, our testing processes, how is it hardened, upgraded paths, password policies, best practices and plus much more. Version-specific capabilities will be identified where appropriate.
For the current ISE Suggested Release based on the software quality, stability, and longevity,
See the Cisco Identity Services Engine (ISE) Software Downloads page (cs.co/ise-software) on software.cisco.com.
See the Cisco Identity Services Engine (ISE) End-of-Life and End-of-Sale Notices page (cs.co/ise-eol) for all ISE-related announcements, dates, and more information.
The ISE underlying OS is based on Redhat Linux but access to underlying OS is not provided. Only required ports open, and rest closed through a firewall.
There is no official hardening document, but we provide this as general guidance:
Refer to the Cisco ISE Installation Guides' (cs.co/ise-docs) ISE Ports Reference section for your version of ISE for all network ports, protocols, and any required Internet URLs.
ISE has different tables for local user management of:
ISE Admin and Internal Users are stored in the Oracle database with below mechanisms for security. ISE CLI users are going to be stored in the Linxux OS and hashed for protection.
ISE does not always use salt. The password of an internal admin users is using salt but not for the internal network access users.
ISE follows the Cisco Secure Development Lifecycle (CSDL) process and vulnerability testing is also performed.
Cisco completes CSDL process testing and verification on all cisco ISE releases before making it available for customers. We fix reported PSIRTs in patches based on the severity and impact. Hotfixes may also be available for some critical fixes via TAC before a patch is released.
Cisco ISE conforms to various protocol standards, Requests for Comments (RFCs), and IETF drafts. See the ISE Compatibility Guides (cs.co/ise-compatibility) for your respective ISE version for a detailed support list.
See the respective ISE Compatibility Guides (cs.co/ise-compatibility) for the specific TLS versions and cipher suites supported per version of the product. It is recommended that clients/servers negotiate to use a higher version of TLS for enhanced security. ISE has configurable options to disable specific TLS versions and ciphers.
Cisco Identity Services Engine provides configuration of password policies for ISE admin users (UI/CLI) and ISE internal users. Cisco ISE already provides default configuration for password policies which enhances your security. Refer to Administration > Settings > Admin > password policies for ISE admin users’ password policies, account disable policies and lock/suspend settings and Administration > Identity management > settings > User authentication settings for ISE internal user’s password policies and Account disable policies.
It is recommended to disable “Disclose invalid usernames” for enhanced security. By default Cisco ISE is disabled to show invalid usernames in case of authentication failures. You can enable this settings to show invalid usernames during debugging scenarios for certain duration or always.
ISE has two independent types of network limits:
Network Limit Notes:
hi all,
Thanks for the document.
As for DISA, I couldn't find ISE in the latest certified products. ISE2.0 and Identity Service Engine got archived back in 2017.
Any idea, if the new ISE versions will be added in the current certified products?
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: