Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • The Active Directory SYSVOL directory must have the proper access control permissions.

    &lt;VulnDiscussion&gt;Improper access permissions for directory data files could allow unauthorized users to read, modify, or delete directory data...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Active Directory Group Policy objects must have proper access control permissions.

    &lt;VulnDiscussion&gt;When directory service database objects do not have appropriate access control permissions, it may be possible for malicious ...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • The Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.

    &lt;VulnDiscussion&gt;When Active Directory objects do not have appropriate access control permissions, it may be possible for malicious users to c...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Domain-created Active Directory Organizational Unit (OU) objects must have proper access control permissions.

    &lt;VulnDiscussion&gt;When directory service database objects do not have appropriate access control permissions, it may be possible for malicious ...
    Rule High Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Data files owned by users must be on a different logical partition from the directory server data files.

    &lt;VulnDiscussion&gt;When directory service data files, especially for directories used for identification, authentication, or authorization, resi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Domain controllers must run on a machine dedicated to that function.

    &lt;VulnDiscussion&gt;Executing application servers on the same host machine with a directory server may substantially weaken the security of the d...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.

    &lt;VulnDiscussion&gt;Directory data that is not appropriately encrypted is subject to compromise. Commercial-grade encryption does not provide ade...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.

    &lt;VulnDiscussion&gt;To the extent that anonymous access to directory data (outside the root DSE) is permitted, read access control of the data is...
    Rule High Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The directory service must be configured to terminate LDAP-based network connections to the directory server after 5 minutes of inactivity.

    &lt;VulnDiscussion&gt;The failure to terminate inactive network connections increases the risk of a successful attack on the directory server. The ...
    Rule Low Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • Active Directory Group Policy objects must be configured with proper audit settings.

    &lt;VulnDiscussion&gt;When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or pro...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • The Active Directory Domain object must be configured with proper audit settings.

    &lt;VulnDiscussion&gt;When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or pro...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • The Active Directory Infrastructure object must be configured with proper audit settings.

    &lt;VulnDiscussion&gt;When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or pro...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • The Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.

    &lt;VulnDiscussion&gt;When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or pro...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • The Active Directory AdminSDHolder object must be configured with proper audit settings.

    &lt;VulnDiscussion&gt;When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or pro...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • The Active Directory RID Manager$ object must be configured with proper audit settings.

    &lt;VulnDiscussion&gt;When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or pro...
    Rule Medium Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2016 must be configured to audit Account Management - Computer Account Management successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2016 must be configured to audit DS Access - Directory Service Access successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2016 must be configured to audit DS Access - Directory Service Access failures.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2016 must be configured to audit DS Access - Directory Service Changes successes.

    &lt;VulnDiscussion&gt;Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, ...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • Domain controllers must have a PKI server certificate.

    &lt;VulnDiscussion&gt;Domain controllers are part of the chain of trust for PKI authentications. Without the appropriate certificate, the authentic...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).

    &lt;VulnDiscussion&gt;A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is s...
    Rule High Severity
  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA).

    &lt;VulnDiscussion&gt;A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is s...
    Rule High Severity
  • SRG-OS-000105-GPOS-00052

    <GroupDescription></GroupDescription>
    Group
  • Active Directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.

    &lt;VulnDiscussion&gt;Smart cards such as the CAC support a two-factor authentication technique. This provides a higher level of trust in the asser...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • Domain controllers must require LDAP access signing.

    &lt;VulnDiscussion&gt;Unsigned network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server a...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Domain controllers must be configured to allow reset of machine account passwords.

    &lt;VulnDiscussion&gt;Enabling this setting on all domain controllers in a domain prevents domain members from changing their computer account pass...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules