I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
Group -
Domain-joined systems must use Windows 10 Enterprise Edition 64-bit version.
Features such as Credential Guard use virtualization-based security to protect information that could be used in credential theft attacks if compromised. A number of system requirements must be met...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows 10 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
Credential Guard uses virtualization-based security to protect information that could be used in credential theft attacks if compromised. A number of system requirements must be met for Credential ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows 10 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
UEFI provides additional security features in comparison to legacy BIOS firmware, including Secure Boot. UEFI is required to support additional security features in Windows 10, including Virtualiza...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Secure Boot must be enabled on Windows 10 systems.
Secure Boot is a standard that ensures systems boot only to a trusted operating system. Secure Boot is required to support additional security features in Windows 10, including Virtualization Based...Rule Low Severity -
SRG-OS-000191-GPOS-00080
Group -
Windows 10 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
An approved tool for continuous network scanning must be installed and configured to run. Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, ...Rule Medium Severity -
SRG-OS-000185-GPOS-00079
Group -
Windows 10 information systems must use BitLocker to encrypt all disks to protect the confidentiality and integrity of all information at rest.
If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data access, an adversary can remove non-volatile memory and read it directly, t...Rule High Severity -
SRG-OS-000185-GPOS-00079
Group -
Windows 10 systems must use a BitLocker PIN for pre-boot authentication.
If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data access, an adversary can remove non-volatile memory and read it directly, t...Rule High Severity -
SRG-OS-000185-GPOS-00079
Group -
Windows 10 systems must use a BitLocker PIN with a minimum length of six digits for pre-boot authentication.
If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data access, an adversary can remove non-volatile memory and read it directly, t...Rule High Severity -
SRG-OS-000370-GPOS-00155
Group -
The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
Utilizing an allowlist provides a configuration management method for allowing the execution of only authorized software. Using only authorized software decreases risk by limiting the number of pot...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Windows 10 systems must be maintained at a supported servicing level.
Windows 10 is maintained by Microsoft at servicing levels for specific periods of time to support Windows as a Service. Systems at unsupported servicing levels or releases will not receive security...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
The Windows 10 system must use an anti-virus program.
Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this type of software will aid in elimination of the software from the operati...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
Local volumes must be formatted using NTFS.
The ability to set access permissions and auditing is critical to maintaining the security and proper access controls of a system. To support this, volumes must be formatted using the NTFS file sy...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Alternate operating systems must not be permitted on the same system.
Allowing other operating systems to run on a secure system may allow security to be circumvented.Rule Medium Severity -
SRG-OS-000138-GPOS-00069
Group -
Non system-created file shares on a system must limit access to groups that require it.
Shares which provide network access, should not typically exist on a workstation except for system-created administrative shares, and could potentially expose sensitive information. If a share is ...Rule Medium Severity -
SRG-OS-000118-GPOS-00060
Group -
Unused accounts must be disabled or removed from the system after 35 days of inactivity.
Outdated or unused accounts provide penetration points that may go undetected. Inactive accounts must be deleted if no longer necessary or, if still required, disabled until needed.Rule Low Severity -
SRG-OS-000324-GPOS-00125
Group -
Only accounts responsible for the administration of a system must have Administrator rights on the system.
An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account to bypass or modify required security restrictions on that machine and ma...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
Only accounts responsible for the backup operations must be members of the Backup Operators group.
Backup Operators are able to read and write to any file in the system, regardless of the rights assigned to it. Backup and restore rights permit users to circumvent the file access restrictions pr...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
Only authorized user accounts must be allowed to create or run virtual machines on Windows 10 systems.
Allowing other operating systems to run on a secure system may allow users to circumvent security. For Hyper-V, preventing unauthorized users from being assigned to the Hyper-V Administrators group...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Standard local user accounts must not exist on a system in a domain.
To minimize potential points of attack, local user accounts, other than built-in accounts and local administrator accounts, must not exist on a workstation in a domain. Users must log on to worksta...Rule Low Severity -
SRG-OS-000076-GPOS-00044
Group -
Accounts must be configured to require password expiration.
Passwords that do not expire increase exposure with a greater probability of being discovered or cracked.Rule Medium Severity -
SRG-OS-000312-GPOS-00122
Group -
Permissions for system files and directories must conform to minimum requirements.
Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the operating system and installed applications.Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
Internet Information System (IIS) or its subcomponents must not be installed on a workstation.
Installation of Internet Information System (IIS) may allow unauthorized internet services to be hosted. Websites must only be hosted on servers that have been designed for that purpose and can be...Rule High Severity -
SRG-OS-000096-GPOS-00050
Group -
Simple Network Management Protocol (SNMP) must not be installed on the system.
Some protocols and services do not support required security features, such as encrypting passwords or traffic.Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
Simple TCP/IP Services must not be installed on the system.
Some protocols and services do not support required security features, such as encrypting passwords or traffic.Rule Medium Severity -
SRG-OS-000096-GPOS-00050
Group -
The Telnet Client must not be installed on the system.
Some protocols and services do not support required security features, such as encrypting passwords or traffic.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.