Check: IISW-SV-000117
Microsoft IIS 8.5 Server STIG:
IISW-SV-000117
(in versions v2 r7 through v1 r1)
Title
The IIS 8.5 web server must not perform user management for hosted applications. (Cat II impact)
Discussion
User management and authentication can be an essential part of any application hosted by the web server. Along with authenticating users, the user management function must perform several other tasks like password complexity, locking users after a configurable number of failed logons, and management of temporary and emergency accounts; and all of this must be done enterprise-wide. The web server contains a minimal user management function, but the web server user management function does not offer enterprise-wide user management, and user management is not the primary function of the web server. User management for the hosted applications should be done through a facility that is built for enterprise-wide user management, like LDAP and Active Directory.
Check Content
Interview the System Administrator about the role of the IIS 8.5 web server. If the IIS 8.5 web server is hosting an application, have the SA provide supporting documentation on how the application's user management is accomplished outside of the IIS 8.5 web server. If the IIS 8.5 web server is not hosting an application, this is Not Applicable. If the IIS web server is performing user management for hosted applications, this is a finding. If the IIS 8.5 web server is hosting an application and the SA cannot provide supporting documentation on how the application's user management is accomplished outside of the IIS 8.5 web server, this is a finding.
Fix Text
Reconfigure any hosted applications on the IIS 8.5 web server to perform user management outside the IIS 8.5 web server. Document how the hosted application user management is accomplished.
Additional Identifiers
Rule ID: SV-214407r879587_rule
Vulnerability ID: V-214407
Group Title: SRG-APP-000141-WSR-000015
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |