STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2019 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

Windows Server 2019 shared user accounts must not be permitted.

DISA Rule

SV-205699r569188_rule

Vulnerability Number

V-205699

Group Title

SRG-OS-000104-GPOS-00051

Rule Version

WN19-00-000070

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove unapproved shared accounts from the system.

Document required shared accounts with the ISSO. Documentation must include the reason for the account, who has access to the account, and how the risk of using the shared account is mitigated to include monitoring account activity.

Check Contents

Determine whether any shared accounts exist. If no shared accounts exist, this is NA.

Shared accounts, such as required by an application, may be approved by the organization. This must be documented with the ISSO. Documentation must include the reason for the account, who has access to the account, and how the risk of using the shared account is mitigated to include monitoring account activity.

If unapproved shared accounts exist, this is a finding.

Vulnerability Number

V-205699

Documentable

False

Rule Version

WN19-00-000070

Severity Override Guidance

Determine whether any shared accounts exist. If no shared accounts exist, this is NA.

Shared accounts, such as required by an application, may be approved by the organization. This must be documented with the ISSO. Documentation must include the reason for the account, who has access to the account, and how the risk of using the shared account is mitigated to include monitoring account activity.

If unapproved shared accounts exist, this is a finding.

Check Content Reference

M

Target Key

2907

Comments