STIGQter STIGQter: STIG Summary: Microsoft IIS 10.0 Server Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

Remote access to the IIS 10.0 web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.

DISA Rule

SV-218811r561041_rule

Vulnerability Number

V-218811

Group Title

SRG-APP-000315-WSR-000003

Rule Version

IIST-SV-000141

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Ensure the web server administration is only performed over a secure path.

Check Contents

If web administration is performed at the console, this check is NA.

If web administration is performed remotely, the following checks will apply:

If administration of the server is performed remotely, it will only be performed securely by system administrators.

If website administration or web application administration has been delegated, those users will be documented and approved by the ISSO.

Remote administration must be in compliance with any requirements contained within the Windows Server STIGs and any applicable Network STIGs.

Remote administration of any kind will be restricted to documented and authorized personnel.

All users performing remote administration must be authenticated.

All remote sessions will be encrypted and utilize FIPS 140-2-approved protocols.

FIPS 140-2-approved TLS versions include TLS V1.2 or greater.

Review with site management how remote administration is configured on the website, if applicable.

If remote management meets the criteria listed above, this is not a finding.

If remote management is utilized and does not meet the criteria listed above, this is a finding.

Vulnerability Number

V-218811

Documentable

False

Rule Version

IIST-SV-000141

Severity Override Guidance

If web administration is performed at the console, this check is NA.

If web administration is performed remotely, the following checks will apply:

If administration of the server is performed remotely, it will only be performed securely by system administrators.

If website administration or web application administration has been delegated, those users will be documented and approved by the ISSO.

Remote administration must be in compliance with any requirements contained within the Windows Server STIGs and any applicable Network STIGs.

Remote administration of any kind will be restricted to documented and authorized personnel.

All users performing remote administration must be authenticated.

All remote sessions will be encrypted and utilize FIPS 140-2-approved protocols.

FIPS 140-2-approved TLS versions include TLS V1.2 or greater.

Review with site management how remote administration is configured on the website, if applicable.

If remote management meets the criteria listed above, this is not a finding.

If remote management is utilized and does not meet the criteria listed above, this is a finding.

Check Content Reference

M

Target Key

4052

Comments