20.58 Ensure 'Server employs automated mechanisms to determine the state of system components with regard to flaw remediation'

Information

This policy setting ensures that the server employs automated mechanisms to determine the state of system components with regard to flaw remediation.

The recommended STIG state for this setting is: Continuously where Host Based Security System (HBSS) is used, 30 days for any additional internal network scans not covered by HBSS, and Annually for external scans by Computer Network Defense Service Provider (CNDSP).

Rationale:

Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating system or other system components may remain vulnerable to the exploits presented by undetected software flaws. The operating system may have an integrated solution incorporating continuous scanning using HBSS and periodic scanning using other tools.

Impact:

None

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Install a DoD-approved ESS software and ensure it is operating continuously.




Default Value:

N/A

Additional Information:

Microsoft Windows Server 2016 Security Technical Implementation Guide:

Version 2, Release 2, Benchmark Date: May 04, 2021



Vul ID: V-224847

Rule ID: SV-224847r569186_rule

STIG ID: WN16-00-000320

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/3476

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3, CSCv7|8.1

Plugin: Windows

Control ID: e5a1d30e93d9b25e921479b314b1b38cd931d9b74f1becfe1ae9fee1447a951d