Security Enhancements
This section lists enhancements introduced to support Cisco Product Security Requirements and the Product Security Baseline (PSB). For more information about Cisco Product Security Requirements, refer to: https://www.cisco.com/c/en/us/about/security-center/security-programs/secure-development-lifecycle/sdl-process.html
PSB Requirements for 21.1.0 Release
Feature Summary and Revision History
| Applicable Product(s) or Functional Area | CPS/vDRA | 
| Applicable Platform(s) | Not Applicable | 
| Default Setting | Enabled - Always-on | 
| Related Changes in This Release | Not Applicable | 
| Related Documentation | Not Applicable | 
| Revision Details | Release | 
|---|---|
| First introduced | 21.1.0 | 
Feature Description
CPS PCRF meets the Cisco security guidelines and is aligned with the security features for 21.1.0 release. CPS now supports the following PSB requirements:
| PSB Item | Description | 
|---|---|
| CT1942: SEC-ASU-SCAN-3 | Evaluate the attack surface of an operational offering using automated scanning tools. | 
| CT1933: SEC-OFF-DEFT-4 | Disable non-essential services by default. | 
| CT1902: SEC-RUN-ASLR-3 | Randomize program address space layout. | 
| CT1884: SEC-RUN-XSPACE-3 | Mutually exclude segment write and execute. | 
| CT1940: SEC-VAL-INLDAP | Prevent LDAP injection flows in applications. | 
| CT1935: SEC-WEB-ID-4 | Use secure Session Tokens (session IDs/state tokens). | 
| CT1893: SEC-WEB-XSS-3 | Prevent cross-site scripting vulnerabilities. | 
| CT1937: SEC-SCR-CONFLEAK-3 | Do not expose critical data. | 
| CT1903: SEC-AUT-DEFROOT-2 | Do not include non-essential authentication roots. | 
| CT1892: SEC-CRY-PRIM-5 | Use approved cryptographic primitives and parameters. | 
| CT1930: SEC-CRY-RANDOM-3 | Use approved, well seeded random number generation. | 
| CT1901: SEC-CRE-NOBACK-2 | Do not permit undocumented ways of gaining access to the offering. | 
| CT1886: SEC-LOG-NOSENS-3 | Do not log sensitive data, passwords, credentials, crypto keys, and so on. | 
| CT1934: SEC-AUT-ANCHOR-2 | Anchor authentication trust chains. | 
| CT1140: SEC-CRY-LOG | Log cryptographic connection setup and teardown. | 
| CT1723: SEC-HRD-OS | Harden production components. | 
| CT1741: SEC-PRV-DSRIGHTS | Rights of Personally Identifiable Information's Data Subject. | 
| CT1814: SEC-PWD-CONFIG | Provide configuration options for customer password complexity policy. | 
| CT1929: SEC-LOG-CHANGES | Log system and configuration changes. | 
CPS vDRA meets the Cisco security guidelines and is aligned with the security features for 21.1.0 release. vDRA now supports the following PSB requirements:
| PSB Item | Description | 
|---|---|
| CT1942: SEC-ASU-SCAN-3 | Evaluate the attack surface of an operational offering using automated scanning tools. | 
| CT1934: SEC-AUT-ANCHOR-2 | Anchor authentication trust chains. | 
| CT1930: SEC-CRY-RANDOM-3 | Use approved, well seeded random number generation. | 
| CT1933: SEC-OFF-DEFT-4 | Disable non-essential services by default. | 
| CT1937: SEC-SCR-CONFLEAK-3 | Do not expose critical data. | 
| CT1940: SEC-VAL-INLDAP | Prevent LDAP Injection flows in applications. | 
| CT1935: SEC-WEB-ID-4 | Use secure Session Tokens (session IDs/state tokens). | 
| CT1943: SEC-AUT-AUTH-5 | Authenticate and authorize remote agents seeking access. | 
| CT1945: SEC-UPS-NOBACK-2 | Protect against Supplier backdoors, malware, or known vulnerabilities. | 
| CT672: SEC-DOC-PLATSRV | List needed user platform TCP/IP services. | 
| CT1929: SEC-LOG-CHANGES | Log system and configuration changes. | 
| CT1815: SEC-OUT-CRED-3 | No fixed or forced null outbound credentials. | 
| CT578: SEC-DSP-PROC | Display the active TCP/IP services (including open ports). | 
| CT602: SEC-OFF-PROC | Selectively enable TCP/IP SERVICEs/OPEN PORTS. | 
 Feedback
Feedback