18.4.5 Ensure 'LSA Protection' is set to 'Enabled'

Information

This policy setting controls whether the Local Security Authority Server Service (LSASS) process runs protected. The Local Security Authority (LSA), which includes the Local Security Authority Server Service (LSASS) process, validates users for local and remote sign-ins and enforces local security policies.

The recommended state for this setting is: Enabled.

Note: This setting only applies to Windows 8.1 (and newer) except for Windows 11 (and newer). See policy setting Configure LSASS to run as a protected process.

Rationale:

The Windows 8.1 operating system (and newer) provides additional protection for the LSA to prevent reading memory and code injection by non-protected processes. Enabling this setting provides added security for the credentials that LSA stores and manages.

Impact:

If additional LSA protection is enabled, Administrators will not be able to debug a custom LSA plugin. A debugger cannot be attached to LSASS when it's a protected process. In general, there's no supported way to debug a running protected process.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled:

Computer Configuration\Policies\Administrative Templates\MS Security Guide\LSA Protection

Note: This Group Policy path does not exist by default. An additional Group Policy template (SecGuide.admx/adml) is required - it is available from Microsoft at this link.




Default Value:

Disabled. (The LSASS process run unprotected.), except when the following conditions are met:

OS is Windows 11, 22H2 (and newer)

Install is new (not upgraded from previous release)

OS is enterprise joined (Active Directory, Azure Active Directory, or hybrid joined)

The hardware is HVCI (Hypervisor-protected Code Integrity) capable

See Also

https://workbench.cisecurity.org/benchmarks/13204

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-7

Plugin: Windows

Control ID: ec9ddf9dc7f67c97cddc80e38fde23d2f51221c45dd1ce82b7b38d2bc9ad15b7