STIGQter STIGQter: STIG Summary: Microsoft IIS 8.5 Server Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The IIS 8.5 web server remote authors or content providers must only use secure encrypted logons and connections to upload web server content.

DISA Rule

SV-214399r508658_rule

Vulnerability Number

V-214399

Group Title

SRG-APP-000015-WSR-000014

Rule Version

IISW-SV-000100

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure the web server administration is only performed over a secure path.

Check Contents

If web administration is performed at the console, this check is NA.

If web administration is performed remotely the following checks will apply:

If administration of the server is performed remotely, it will only be performed securely by system administrators.

If website administration or web application administration has been delegated, those users will be documented and approved by the ISSO.

Remote administration must be in compliance with any requirements contained within the Windows Server STIGs, and any applicable Network STIGs.

Remote administration of any kind will be restricted to documented and authorized personnel.

All users performing remote administration must be authenticated.

All remote sessions will be encrypted and they will utilize FIPS 140-2-approved protocols.

FIPS 140-2-approved TLS versions include TLS V1.1 or greater.

Review with site management how remote administration, if applicable, is configured on the website.

If remote management meets the criteria listed above, this is not a finding.

If remote management is utilized and does not meet the criteria listed above, this is a finding.

Vulnerability Number

V-214399

Documentable

False

Rule Version

IISW-SV-000100

Severity Override Guidance

If web administration is performed at the console, this check is NA.

If web administration is performed remotely the following checks will apply:

If administration of the server is performed remotely, it will only be performed securely by system administrators.

If website administration or web application administration has been delegated, those users will be documented and approved by the ISSO.

Remote administration must be in compliance with any requirements contained within the Windows Server STIGs, and any applicable Network STIGs.

Remote administration of any kind will be restricted to documented and authorized personnel.

All users performing remote administration must be authenticated.

All remote sessions will be encrypted and they will utilize FIPS 140-2-approved protocols.

FIPS 140-2-approved TLS versions include TLS V1.1 or greater.

Review with site management how remote administration, if applicable, is configured on the website.

If remote management meets the criteria listed above, this is not a finding.

If remote management is utilized and does not meet the criteria listed above, this is a finding.

Check Content Reference

M

Target Key

4000

Comments