DISA STIGS Viewer

The Cisco ACI must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

Overview

Finding ID Version Rule ID IA Controls Severity
V-271922 CACI-ND-000007 SV-271922r1114181_rule   Medium
Description
After the Cisco ACI is initialized, it uses the self-signed certificate as the SSL certificate for HTTPS. This self-signed certificate is neither appropriate nor approved for use in DOD.
STIG Date
Cisco ACI NDM Security Technical Implementation Guide 2025-06-13

Details

Check Text (C-75972r1063955_chk)
From the GUI menu bar:
1. Navigate to Admin >> AAA >> Security >> Public Key Management >> Certificate Authorities.
2. Verify the Issuer is an approved CA.

If the Cisco ACI does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix Text (F-75879r1063162_fix)
From the GUI menu bar:
1. Navigate to Admin >> AAA >> Security >> Public Key Management >> Certificate Authorities.
2. Fill in the form, including the trusted CA root certificate and CA intermediate certificate. Click "Submit".
3. Navigate to Admin >> AAA >> Security >> Public Key Management >> Key Rings. Fill out the form and click "Submit".
4. Navigate to Admin >> AAA >> Security >> Public Key Management >> Key Rings. Fill out the form and click "Submit".
5. Get the CSR and send it to the CA Organization.
6. On the menu bar, navigate to Admin >> AAA >> Security >> Public Key Management >> Key Rings.
7. Double-click the create Key Ring name and find the Request option. The content in the Request is the CSR. Click "Submit".
8. Update the Signing Certificate on the Web. On the menu bar, navigate to Fabric >> Fabric Policies >> Policies >> Pod >> Management Access >> Default.
9. In the Admin KeyRing drop-down list, choose the desired KeyRing. Click "Submit". After clicking submit, an error occurs due to certificate reasons. Refresh with the new certificate.