Check: EX16-ED-000580
Microsoft Exchange 2016 Edge Transport Server STIG:
EX16-ED-000580
(in versions v2 r6 through v1 r1)
Title
The Exchange application directory must be protected from unauthorized access. (Cat II impact)
Discussion
Default product installations may provide more generous access permissions than are necessary to run the application. By examining and tailoring access permissions to more closely provide the least amount of privilege possible, attack vectors that align with user permissions are less likely to access more highly secured areas.
Check Content
Review the Email Domain Security Plan (EDSP). Determine the authorized groups and users that have access to the Exchange application directories. Determine if the access permissions on the directory match the access permissions listed in the EDSP. If any group or user has different access permissions than listed in the EDSP, this is a finding. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
Fix Text
Update the EDSP to reflect the authorized groups and users that have access to the Exchange application directories. Navigate to the Exchange application directory and remove or modify the group or user access permissions. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
Additional Identifiers
Rule ID: SV-221254r961455_rule
Vulnerability ID: V-221254
Group Title: SRG-APP-000378
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001812 |
The information system prohibits user installation of software without explicit privileged status. |
Controls
Number | Title |
---|---|
CM-11(2) |
Prohibit Installation Without Privileged Status |