WN12-00-000011 - Windows 2012/2012 R2 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Setting application accounts to expire may cause applications to stop functioning. However, not changing them on a regular basis exposes them to attack. If managed service accounts are used, this alleviates the need to manually change application account passwords.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change passwords for manually managed application/service accounts at least annually or when an administrator with knowledge of the password leaves the organization.

It is recommended that system-managed service accounts be used where possible.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_MS_V3R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-225248r569185_rule, STIG-ID|WN12-00-000011, STIG-Legacy|SV-51580, STIG-Legacy|V-36662, Vuln-ID|V-225248

Plugin: Windows

Control ID: be269f5b1128244618e857f3c9dc7e2a6db0803de33a0c4c98c15eb2d497ae1d