Check: WPAW-00-002400
Microsoft Windows PAW STIG:
WPAW-00-002400
(in versions v3 r1 through v1 r1)
Title
Local privileged groups (excluding Administrators) on the Windows PAW must be restricted to include no members. (Cat II impact)
Discussion
A main security architectural construct of a PAW is to restrict access to the PAW from only specific privileged accounts designated for managing the high-value IT resources the PAW has been designated to manage. If unauthorized standard user accounts or unauthorized high-value administrative accounts are able to access a specific PAW, high-value IT resources and critical DoD information could be compromised.
Check Content
Verify membership of local admin groups on the PAW are empty: On the Windows PAW, verify there are no members in the following local privileged groups (excluding Administrators)*: - Backup Operators (built-in) - Cryptographic Operators - Hyper-V Administrators - Network Configuration Operators - Power Users - Remote Desktop Users - Replicator If the membership of the following admin groups is not empty, this is a finding: Backup Operators (built-in), Cryptographic Operators, Hyper-V Administrators, Network Configuration Operators, Power Users, Remote Desktop Users, and Replicator. *Allowed exception: If a Hyper-V environment is used, the Hyper-V Administrators group may include members.
Fix Text
Complete the following configuration procedures to restrict access to privileged accounts on the PAW (see the instructions for use of group policy to define membership, PAW Installation instructions in the Microsoft PAW paper). Configure membership of all local privileged groups (except for "Administrators (built-in)" group) so it is empty*. This procedure applies to the following local privileged groups: - Backup Operators (built-in) - Hyper-V Administrators - Network Configuration Operators - Power Users - Remote Desktop Users - Replicator Link the PAW group policy object (GPO) to the appropriate Tier devices Organizational Unit (OU). *Allowed exception: If a Hyper-V environment is used, the Hyper-V Administrators group may include members.
Additional Identifiers
Rule ID: SV-243463r991589_rule
Vulnerability ID: V-243463
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |