II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000324-GPOS-00125
Group -
The Active Directory SYSVOL directory must have the proper access control permissions.
Improper access permissions for directory data files could allow unauthorized users to read, modify, or delete directory data. The SYSVOL directory contains public files (to the domain) such as po...Rule High Severity -
SRG-OS-000324-GPOS-00125
Group -
Active Directory Group Policy objects must have proper access control permissions.
When directory service database objects do not have appropriate access control permissions, it may be possible for malicious users to create, read, update, or delete the objects and degrade or dest...Rule High Severity -
SRG-OS-000324-GPOS-00125
Group -
The Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.
When Active Directory objects do not have appropriate access control permissions, it may be possible for malicious users to create, read, update, or delete the objects and degrade or destroy the in...Rule High Severity -
SRG-OS-000324-GPOS-00125
Group -
Domain-created Active Directory Organizational Unit (OU) objects must have proper access control permissions.
When directory service database objects do not have appropriate access control permissions, it may be possible for malicious users to create, read, update, or delete the objects and degrade or dest...Rule High Severity -
SRG-OS-000138-GPOS-00069
Group -
Data files owned by users must be on a different logical partition from the directory server data files.
When directory service data files, especially for directories used for identification, authentication, or authorization, reside on the same logical partition as user-owned files, the directory serv...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
Domain controllers must run on a machine dedicated to that function.
Executing application servers on the same host machine with a directory server may substantially weaken the security of the directory server. Web or database server applications usually require the...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
Group -
Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
Directory data that is not appropriately encrypted is subject to compromise. Commercial-grade encryption does not provide adequate protection when the classification level of directory data in tran...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
To the extent that anonymous access to directory data (outside the root DSE) is permitted, read access control of the data is effectively disabled. If other means of controlling access (such as net...Rule High Severity -
SRG-OS-000163-GPOS-00072
Group -
The directory service must be configured to terminate LDAP-based network connections to the directory server after 5 minutes of inactivity.
The failure to terminate inactive network connections increases the risk of a successful attack on the directory server. The longer an established session is in progress, the more time an attacker ...Rule Low Severity -
SRG-OS-000327-GPOS-00127
Group -
Active Directory Group Policy objects must be configured with proper audit settings.
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
The Active Directory Domain object must be configured with proper audit settings.
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
The Active Directory Infrastructure object must be configured with proper audit settings.
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
The Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
The Active Directory AdminSDHolder object must be configured with proper audit settings.
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
The Active Directory RID Manager$ object must be configured with proper audit settings.
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
Windows Server 2016 must be configured to audit Account Management - Computer Account Management successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
Windows Server 2016 must be configured to audit DS Access - Directory Service Access successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
Windows Server 2016 must be configured to audit DS Access - Directory Service Access failures.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
Windows Server 2016 must be configured to audit DS Access - Directory Service Changes successes.
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
Group -
Domain controllers must have a PKI server certificate.
Domain controllers are part of the chain of trust for PKI authentications. Without the appropriate certificate, the authenticity of the domain controller cannot be verified. Domain controllers must...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
Group -
Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).
A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is secure. Without proper practices, the certificates issued by a CA have li...Rule High Severity -
SRG-OS-000066-GPOS-00034
Group -
PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA).
A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is secure. Without proper practices, the certificates issued by a CA have li...Rule High Severity -
SRG-OS-000105-GPOS-00052
Group -
Active Directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.
Smart cards such as the CAC support a two-factor authentication technique. This provides a higher level of trust in the asserted identity than use of the username and password for authentication. ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
Domain controllers must require LDAP access signing.
Unsigned network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server and the client and modifies them before forwarding them to the client. In...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Domain controllers must be configured to allow reset of machine account passwords.
Enabling this setting on all domain controllers in a domain prevents domain members from changing their computer account passwords. If these passwords are weak or compromised, the inability to chan...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.