IIST-SV-000131 - IIS 10.0 Web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.

Information

As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. This is in addition to the anonymous web user account. The resources to which these accounts have access must also be closely monitored and controlled. Only the SA needs access to all the system's capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files. The anonymous web user account must not have access to system resources as that account could then control the server.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.

All non-administrator access to shell scripts and operating system functions must be mission essential and documented.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y22M01_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-2, CAT|I, CCI|CCI-001082, Rule-ID|SV-218802r561041_rule, STIG-ID|IIST-SV-000131, STIG-Legacy|SV-109243, STIG-Legacy|V-100139, Vuln-ID|V-218802

Plugin: Windows

Control ID: 6c519aad25c30e85157929cf2ffbb4d21ef637c3d4916d24221a408e7b4b064d