I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must have the roles and features required by the system documented.
<VulnDiscussion>Unnecessary roles and features increase the attack surface of a system. Limiting roles and features of a system to only those...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must have a host-based firewall installed and enabled.
<VulnDiscussion>A firewall provides a line of defense against attack, allowing or blocking inbound and outbound connections based on a set of...Rule Medium Severity -
SRG-OS-000191-GPOS-00080
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
<VulnDiscussion>Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating syste...Rule Medium Severity -
SRG-OS-000002-GPOS-00002
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must automatically remove or disable temporary user accounts after 72 hours.
<VulnDiscussion>If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...Rule Medium Severity -
SRG-OS-000123-GPOS-00064
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.
<VulnDiscussion>Emergency administrator accounts are privileged accounts established in response to crisis situations where the need for rapi...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must not have the Fax Server role installed.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must not have the Microsoft FTP service installed unless required by the organization.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must not have the Peer Name Resolution Protocol installed.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must not have Simple TCP/IP Services installed.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must not have the Telnet Client installed.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must not have the TFTP Client installed.
<VulnDiscussion>Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authe...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must not the Server Message Block (SMB) v1 protocol installed.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.
<VulnDiscussion>SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks s...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must not have Windows PowerShell 2.0 installed.
<VulnDiscussion>Windows PowerShell 5.x added advanced logging features that can provide additional detail when malware has been run on a syst...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2022 FTP servers must be configured to prevent anonymous logons.
<VulnDiscussion>The FTP service allows remote users to access shared files and directories. Allowing anonymous FTP connections makes user aud...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2022 FTP servers must be configured to prevent access to the system drive.
<VulnDiscussion>The FTP service allows remote users to access shared files and directories that could provide access to system resources and ...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The Windows Server 2022 time service must synchronize with an appropriate DOD time source.
<VulnDiscussion>The Windows Time Service controls time synchronization settings. Time synchronization is essential for authentication and aud...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must have orphaned security identifiers (SIDs) removed from user rights.
<VulnDiscussion>Accounts or groups given rights on a system may show up as unresolved SIDs for various reasons including deletion of the acco...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2022 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
<VulnDiscussion>UEFI provides additional security features in comparison to legacy BIOS firmware, including Secure Boot. UEFI is required to ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must have Secure Boot enabled.
<VulnDiscussion>Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support ad...Rule Medium Severity -
SRG-OS-000329-GPOS-00128
<GroupDescription></GroupDescription>Group -
Windows Server 2022 account lockout duration must be configured to 15 minutes or greater.
<VulnDiscussion>The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the ...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must have the number of allowed bad logon attempts configured to three or less.
<VulnDiscussion>The account lockout feature, when enabled, prevents brute-force password attacks on the system. The higher this value is, the...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
Windows Server 2022 must have the period of time before the bad logon counter is reset configured to 15 minutes or greater.
<VulnDiscussion>The account lockout feature, when enabled, prevents brute-force password attacks on the system. This parameter specifies the ...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
<GroupDescription></GroupDescription>Group -
Windows Server 2022 password history must be configured to 24 passwords remembered.
<VulnDiscussion>A system is more vulnerable to unauthorized access when system users recycle the same password several times without being re...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.