WPAW-00-001600 - The Windows PAW must be configured to enforce two-factor authentication and use Active Directory for authentication management.

Information

Due to the highly privileged functions of a PAW, a high level of trust must be implemented for access to the PAW, including nonrepudiation of the user session. One-factor authentication, including username and password and shared administrator accounts, does not provide adequate assurance.

Solution

In Active Directory, configure group policy to enable either smart card or another DOD-approved two-factor authentication method for all PAWs.

- Go to Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options.
- Set 'Interactive logon: Require Windows Hello for Business or smart card' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_PAW_V3R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(1), 800-53|IA-2(3), CAT|II, CCI|CCI-000765, CCI|CCI-000767, Rule-ID|SV-243457r1015765_rule, STIG-ID|WPAW-00-001600, STIG-Legacy|SV-92881, STIG-Legacy|V-78175, Vuln-ID|V-243457

Plugin: Windows

Control ID: e1c9af7cad18732b301d3a97e1906c973dfcafc485d50ee55bd6297bd2bcc2ee