IIST-SI-000237 - The IIS 10.0 website must provide the capability to immediately disconnect or disable remote access to the hosted applications.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

During an attack on the web server or any of the hosted applications, the system administrator may need to disconnect or disable access by users to stop the attack.

The web server must provide a capability to disconnect users to a hosted application without compromising other hosted applications unless deemed necessary to stop the attack. Methods to disconnect or disable connections are to stop the application service for a specified hosted application, stop the web server, or block all connections through web server access list.

The web server capabilities used to disconnect or disable users from connecting to hosted applications and the web server must be documented to make certain that during an attack, the proper action is taken to conserve connectivity to any other hosted application if possible and to make certain log data is conserved for later forensic analysis.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Prepare documented procedures for shutting down an IIS 10.0 website in the event of an attack. The procedure should, at a minimum, provide the following steps:

Determine the respective website for the application at risk of an attack.

Access the IIS 10.0 web server IIS 10.0 Manager.

Select the respective website.

In the 'Actions' pane, under 'Manage Website', click 'Stop'.

If necessary, stop all websites.

If necessary, stop the IIS 10.0 web server by selecting the web server in the IIS 10.0 Manager.

In the 'Actions' pane, under 'Manage Server', click 'Stop'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y23M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002322, Rule-ID|SV-218764r879693_rule, STIG-ID|IIST-SI-000237, STIG-Legacy|SV-109353, STIG-Legacy|V-100249, Vuln-ID|V-218764

Plugin: Windows

Control ID: 1962a2e22b1d771c0c37655b144018d7e24b61530f4158515f0f9f15a41ca6a0