1.155 WN19-DC-000090

Information

Windows Server 2019 Active Directory Group Policy objects must have proper access control permissions.

GROUP ID:V-205741
RULE ID:SV-205741r1081998

When directory service database objects do not have appropriate access control permissions, it may be possible for malicious users to create, read, update, or delete the objects and degrade or destroy the integrity of the data. When the directory service is used for identification, authentication, or authorization functions, a compromise of the database objects could lead to a compromise of all systems relying on the directory service.

For Active Directory (AD), the Group Policy objects require special attention. In a distributed administration model (i.e., help desk), Group Policy objects are more likely to have access permissions changed from the secure defaults. If inappropriate access permissions are defined for Group Policy objects, this could allow an intruder to change the security policy applied to all domain client computers (workstations and servers).

Solution

Maintain the permissions on Group Policy objects to not allow greater than 'Read' and 'Apply group policy' for standard user accounts or groups. The default permissions below meet this requirement:

Authenticated Users - Read, Apply group policy, Special permissions

The special permissions for Authenticated Users are for Read-type Properties.

CREATOR OWNER - Special permissionsSYSTEM - Read, Write, Create all child objects, Delete all child objects, Special permissionsDomain Admins - Read, Write, Create all child objects, Delete all child objects, Special permissionsEnterprise Admins - Read, Write, Create all child objects, Delete all child objects, Special permissionsENTERPRISE DOMAIN CONTROLLERS - Read, Special permissions

Document any other access permissions that allow the objects to be updated with the ISSO.

See Also

https://workbench.cisecurity.org/benchmarks/22176