Check: WPAW-00-001600
Microsoft Windows PAW STIG:
WPAW-00-001600
(in versions v2 r3 through v2 r2)
Title
The Windows PAW must be configured to enforce two-factor authentication and use Active Directory for authentication management. (Cat II impact)
Discussion
Due to the highly privileged functions of a PAW, a high level of trust must be implemented for access to the PAW, including non-repudiation of the user session. One-factor authentication, including username and password and shared administrator accounts, does not provide adequate assurance.
Check Content
Review the configuration on the PAW. Verify group policy is configured to enable either smart card or another DoD-approved two-factor authentication method for site PAWs. - In Active Directory, go to Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options. - Verify "Interactive logon: Require Windows Hello for Business or smart card" is set to "Enabled". If group policy is not configured to enable either smart card or another DoD-approved two-factor authentication method, this is a finding.
Fix Text
In Active Directory, configure group policy to enable either smart card or another DoD-approved two-factor authentication method for all PAWs. - Go to Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options. - Set "Interactive logon: Require Windows Hello for Business or smart card" to "Enabled".
Additional Identifiers
Rule ID: SV-243457r819679_rule
Vulnerability ID: V-243457
Group Title: SRG-OS-000107-GPOS-00054
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000767 |
The information system implements multifactor authentication for local access to privileged accounts. |
Controls
Number | Title |
---|---|
IA-2(3) |
Local Access to Privileged Accounts |