WN16-DC-000401 - Windows Server 2016 must be configured for name-based strong mappings for certificates.

Information

Weak mappings give rise to security vulnerabilities and demand hardening measures. Certificate names must be correctly mapped to the intended user account in Active Directory. A lack of strong name-based mappings allows certain weak certificate mappings, such as Issuer/Subject AltSecID and User Principal Names (UPN) mappings, to be treated as strong mappings.

Solution

For servers acting as a domain controller, upgrade the operating system to Microsoft Server 2019 or greater.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2016_V2R10_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CAT|I, CCI|CCI-000213, Rule-ID|SV-271430r1059573_rule, STIG-ID|WN16-DC-000401, Vuln-ID|V-271430

Plugin: Windows

Control ID: c6f461917c094a69660d2d46459f68d0a995d9fd8b288d9f4a4f14cd5d891ca2