Check: 3.061
Windows XP STIG:
3.061
(in versions v6 r1.32 through v1 r0)
Title
Unencrypted remote access is permitted to system services. (Cat I impact)
Discussion
This is a category 1 finding because when unencrypted access to system services is permitted, an intruder can intercept user identification and passwords that are being transmitted in clear text. This could give an intruder unlimited access to the network.
Check Content
Interview the IAO to ensure that encryption of userid and password information is required, and data is encrypted according to DoD policy. If the user account used for unencrypted remote access within the enclave (premise router) has administrator privileges, then this is a finding. If userid and password information used for remote access to system services from outside the enclave is not encrypted, then this is a finding.
Fix Text
Encryption of userid and password information is required. Encryption of the user data inside the network firewall is also highly recommended. Encryption of user data coming from or going outside the network firewall is required. Encryption for administrator data is always required. Refer to the Enclave Security STIG section on “FTP and Telnet,” for detailed information on its use.
Additional Identifiers
Rule ID: SV-29693r1_rule
Vulnerability ID: V-2908
Group Title: Unencrypted Remote Access
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |