1.17 WN19-00-000170

Information

Windows Server 2019 default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.

GROUP ID:V-205737
RULE ID:SV-205737r958726

The registry is integral to the function, security, and stability of the Windows system. Changing the system's registry permissions allows the possibility of unauthorized and anonymous modification to the operating system.

Solution

Maintain the default permissions for the HKEY_LOCAL_MACHINE registry hive.

The default permissions of the higher-level keys are noted below.

HKEY_LOCAL_MACHINE\SECURITY

Type - 'Allow' for allInherited from - 'None' for allPrincipal - Access - Applies toSYSTEM - Full Control - This key and subkeysAdministrators - Special - This key and subkeys

HKEY_LOCAL_MACHINE\SOFTWARE

Type - 'Allow' for allInherited from - 'None' for allPrincipal - Access - Applies toUsers - Read - This key and subkeysAdministrators - Full Control - This key and subkeysSYSTEM - Full Control - This key and subkeysCREATOR OWNER - Full Control - This key and subkeysALL APPLICATION PACKAGES - Read - This key and subkeys

HKEY_LOCAL_MACHINE\SYSTEM

Type - 'Allow' for allInherited from - 'None' for allPrincipal - Access - Applies toUsers - Read - This key and subkeysAdministrators - Full Control - This key and subkeysSYSTEM - Full Control - This key and subkeysCREATOR OWNER - Full Control - Subkeys onlyALL APPLICATION PACKAGES - Read - This key and subkeysServer Operators - Read - This Key and subkeys (Domain controllers only)

Microsoft has also given Read permission to the SOFTWARE and SYSTEM registry keys in Windows Server 2019 to the following SID.S-1-15-3-1024-1065365936-1281604716-3511738428-1654721687-432734479-3232135806-4053264122-3456934681

See Also

https://workbench.cisecurity.org/benchmarks/22176

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6(7)(b), 800-53|CM-6b.

Plugin: Windows

Control ID: 2c3c99d109eca1c97d4e39b7dfd1fd3d72e3edd33e12ff1082817beef5e49bd2