The Windows PAW must be configured with a vendor-supported version of Windows 10 and applicable security patches that are DoD approved. (Cat II impact)
Older versions of operating systems usually contain vulnerabilities that have been fixed in later released versions. In addition, most operating system patches contain fixes for recently discovered security vulnerabilities. Due to the highly privileged activities of a PAW, it must be maintained at the highest security posture possible and therefore must have one of the current vendor-supported operating system versions installed.
Determine the current approved versions of Windows 10. Talk to the Authorizing Official (AO) staff, Information System Security Manager (ISSM), or PAW system administrator to determine the approved versions of Windows 10. Review the configuration of the PAW and determine which version of Windows is installed on the PAW. Verify the installed Windows 10 version is an approved version. If the installed Windows 10 version on the PAW is not the same as an approved version, this is a finding.
Install one of the current vendor-supported versions of Windows 10 on site PAWs, including the most recently released patches. Note: There is no central list in the DoD of "approved" operating system versions. The Microsoft website will list supported versions of Windows 10 and patches. If a STIG is available for one or more of the vendor-supported versions of Windows 10, the version can be considered to be DoD approved. Local AOs usually have implemented a procedure for testing Windows updates before they are deployed. Check with the local AO's staff to determine the latest approved version of Windows 10.
Rule ID: SV-243447r722912_rule
Vulnerability ID: V-243447
Group Title: SRG-OS-000480-GPOS-00227
The organization implements the security configuration settings.