Check: WN10-EP-000310
Microsoft Windows 10 STIG:
WN10-EP-000310
(in versions v2 r9 through v1 r20)
Title
Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled. (Cat II impact)
Discussion
Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderboltâ„¢ 3 ports. Drive-by DMA attacks can lead to disclosure of sensitive information residing on a PC, or even injection of malware that allows attackers to bypass the lock screen or control PCs remotely.
Check Content
This is NA prior to v1803 of Windows 10. If the following registry value does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\Kernel DMA Protection Value Name: DeviceEnumerationPolicy Value Type: REG_DWORD Value: 0
Fix Text
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Kernel DMA Protection >> "Enumeration policy for external devices incompatible with Kernel DMA Protection" to "Enabled" with "Enumeration Policy" set to "Block All".
Additional Identifiers
Rule ID: SV-220902r569187_rule
Vulnerability ID: V-220902
Group Title: SRG-OS-000138-GPOS-00069
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001090 |
The information system prevents unauthorized and unintended information transfer via shared system resources. |
Controls
Number | Title |
---|---|
SC-4 |
Information In Shared Resources |