Check: WPAW-00-002300
Microsoft Windows PAW STIG:
WPAW-00-002300
(in versions v2 r3 through v1 r1)
Title
The local Administrators group on the Windows PAW must only include groups with accounts specifically designated to administer the PAW. (Cat II impact)
Discussion
A main security architectural construct of a PAW is to restrict access to the PAW from only specific privileged accounts designated for managing the high-value IT resources the PAW has been designated to manage. If unauthorized standard user accounts or unauthorized high-value administrative accounts are able to access a specific PAW, high-value IT resources and critical DoD information could be compromised.
Check Content
Verify the PAW is configured to restrict access to privileged accounts specifically designated to administer the PAW: - On the Windows PAW, verify the membership of the local Administrators group. - Verify the only members in the local Administrators group are the group specifically designated for managing the PAW and local administrator(s). If the local Administrators group includes any members not members of the specifically designated group for managing the PAW and local administrator(s), this is a finding.
Fix Text
Restrict membership of the local Administrators group to only include members of the group specifically designated to manage the PAW and local administrator(s). See the Microsoft PAW paper (https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/privileged-access-workstations) for more information (go to PAW Installation instructions).
Additional Identifiers
Rule ID: SV-243462r722957_rule
Vulnerability ID: V-243462
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |