WN12-00-000011 - Windows 2012/2012 R2 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Setting application accounts to expire may cause applications to stop functioning. However, not changing them on a regular basis exposes them to attack. If managed service accounts are used, this alleviates the need to manually change application account passwords.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change passwords for manually managed application/service accounts at least annually or when an administrator with knowledge of the password leaves the organization.

It is recommended that system-managed service accounts be used where possible.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-226038r794376_rule, STIG-ID|WN12-00-000011, STIG-Legacy|SV-51580, STIG-Legacy|V-36662, Vuln-ID|V-226038

Plugin: Windows

Control ID: b632c813ce4abf7a20074256d16be16b12aa9b31da2df226b5cecacbdfd55547