WPAW-00-002600 - If several PAWs are set up in virtual machines (VMs) on a host server, domain administrative accounts used to manage high-value IT resources must not have access to the VM host operating system (OS) (only domain administrative accounts designated to manage PAWs should be able to access the VM host OS).

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The VM host OS should be protected from high-value IT resource administrators accidently or deliberately modifying the security settings of the host OS. Therefore, high-value IT resource administrators must not have the ability to perform maintenance functions on the VM host OS platform.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the VM host OS so only domain administrative accounts designated to manage PAWs have administrative rights on the VM host OS.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_PAW_V2R2_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-243465r722970_rule, STIG-ID|WPAW-00-002600, STIG-Legacy|SV-92893, STIG-Legacy|V-78187, Vuln-ID|V-243465

Plugin: Windows

Control ID: 4c75b9c6328a1db8ab2619bcf07b4312417642c9b7ea6c80e057635c810f93ec