WIN2K Checklist v2111 - Section 3 MSE安全攻防资料_第1页
WIN2K Checklist v2111 - Section 3 MSE安全攻防资料_第2页
WIN2K Checklist v2111 - Section 3 MSE安全攻防资料_第3页
WIN2K Checklist v2111 - Section 3 MSE安全攻防资料_第4页
WIN2K Checklist v2111 - Section 3 MSE安全攻防资料_第5页
免费预览已结束,剩余1页可下载查看

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

UNCLASSIFIED Windows 2000 Security Checklist 2 1 11Field Security Operations Section 3Defense Information Systems Agency 3 1 UNCLASSIFIED 3SYSTEM ADMINISTRATOR ISSO INTERVIEW QUESTIONS This section lists questions that must be asked of the System Administrator or the Information Systems Security Officer ISSO in an interview prior to the SRR 3SYSTEM ADMINISTRATOR ISSO INTERVIEW QUESTIONS 3 1 3 1Controlling Access to Automated Information Systems AISs 3 2 3 2Users with Administrative Privileges 3 2 3 3Users with Backup Operator Privileges 3 3 3 4Shared Accounts 3 3 3 5Access to Security Event Log 3 3 3 6CMOS Configuration 3 3 3 7Emergency Repair Disk ERD 3 4 3 8Windows Security Configuration Tools 3 5 3 9Active Directory Backup Policy Windows 2000 domain controllers 3 5 3 10 System Configuration Changes Future Check 3 5 3 11 Unencrypted Remote Access Future Check 3 6 3 12 Intrusion Detection Servers Future Check 3 6 A symbol appearing in a section title indicates a Platinum Standard setting The label Future Check next to a section title is to alert sites that this is a new check that will become active in the near future This is meant to give sites sufficient time to incorporate these changes prior to being held accountable in a Security Readiness Review UNCLASSIFIED Windows 2000 Security Checklist 2 1 11Field Security Operations Section 3Defense Information Systems Agency 3 2 UNCLASSIFIED 3 1Controlling Access to Automated Information Systems AISs This check verifies by observation that the equipment and all ancillary devices are adequately protected Note Critical servers should be located in rooms or locked cabinets that are accessible only to authorized systems personnel User workstations containing sensitive data should be in access controlled areas Category II PDI 1 001 Physical security of Windows NT Server Workstation does not meet DISA requirements Reference NSA WIN2K Guide File Disk Resources Chap 4 p 17 3 2Users with Administrative Privileges This check verifies that each user with administrative privileges has been assigned a unique account separate from the built in Administrator account This implementation permits the auditing of administrative actions by individual This check also verifies that the default Administrator account is not being used The ISSO will maintain a list of all users belonging to the Administrator s group and any other group with special privileges If any of the following conditions are true then this is a finding Each System Administrator does not have a unique userid dedicated for administering the system Each System Administrator does not have a separate account for normal user tasks The built in Administrator account is used to administer the system The ISSO does not maintain a list of users belonging to the Administrator s group Category II PDI 1 006 Users with Administrative privilege are not documented or do not have separate accounts for administrative duties and normal operational tasks Reference NSA NT Guide Chap 13 P 87 UNCLASSIFIED Windows 2000 Security Checklist 2 1 11Field Security Operations Section 3Defense Information Systems Agency 3 3 UNCLASSIFIED 3 3Users with Backup Operator Privileges This check verifies that each user with backup operator privileges has been assigned a unique account with membership in the Backup Operators group separate from their standard user account Category II PDI 1 007 Members of the Backup Operators group do not have separate accounts for backup duties and normal operational tasks Reference NSA WIN2K Guide File Disk Resources Chap 5 p 22 3 4Shared Accounts This check verifies that all shared accounts on the system are documented and justified Note A shared account may be permitted for a help desk or site security personnel machine if that machine is stand alone and has no access to the network Category II PDI 1 008 Shared user accounts are permitted on the system Reference NSA NT Guide Chap 13 P 86 3 5Access to Security Event Log This check verifies that access to the Security Event Log is restricted to members of an auditors group or other restricted membership group that serves this purpose Category II PDI 1 010 Access to the Windows NT Security Event Log has not been restricted to an Auditors group Reference DISA FSO NT Addendum Section 6 1 2 NSA WIN2K Guide File Disk Resources Chap 3 p 13 3 6CMOS Configuration This check verifies that the CMOS configuration often treated synonymously with the term BIOS configuration provides a mechanism to restrict how the system may be booted and who may boot the system Do not take a server off line to verify this setting If necessary question the System Administrator and or the ISSO to verify that the CMOS is configured properly Note A CMOS password must always be set If the system BIOS doesn t provide for a CMOS password then a BOOT password must be set to meet the Platinum Standard A BOOT password is not a requirement for workstations or for servers that must remain available on a 24 X 7 basis The CMOS configuration permits the system to boot from a floppy or CD ROM device A password is not required to make configuration changes to the CMOS UNCLASSIFIED Windows 2000 Security Checklist 2 1 11Field Security Operations Section 3Defense Information Systems Agency 3 4 UNCLASSIFIED Category III PDI 1 012 The CMOS configuration does not conform to DISA requirements Reference NSA WIN2K Guide File Disk Resources Chap 4 p 17 18 3 7Emergency Repair Disk ERD This check verifies that an Emergency Repair Disk is maintained in accordance with DISA standards An ERD should be created to include the registry Note If an alternate method is used to capture and backup system recovery data than an ERD would not be required The site does not maintain emergency system recovery data The emergency system recovery data is not protected from destruction and stored in locked storage container There is no emergency system recovery data for each Windows NT system server created at the time of system installation The emergency system recovery data has not been updated following the last system modification Category III PDI 1 013 Emergency Repair Disk s ERD or System information backups are not created updated and protected according to DISA requirements Reference NSA WIN2K Guide File Disk Resources Chap 5 p 23 24 UNCLASSIFIED Windows 2000 Security Checklist 2 1 11Field Security Operations Section 3Defense Information Systems Agency 3 5 UNCLASSIFIED 3 8Windows Security Configuration Tools The Microsoft Security Configuration Toolset that is integrated in Windows 2000 along with the configuration files provided by FSO should be used to configure platforms for C2 compliance If an alternate method is used to configure a system e g manually that achieves the same configured result then this is acceptable NOTE The configuration utility WIN2KSCM EXE can be used to configure new machines Member Server Professional The configuration files included with that tool can also be imported into the Security Configuration Toolset and used to configure the machine Category III PDI 1 016 The Microsoft Security Configuration Manager is not being used to configure platforms to C2 compliance Reference NSA WIN2K Guide Group Policy Security Configuration Toolset Chap 1 10 3 9 Active Directory Backup Policy Windows 2000 domain controllers This check verifies that the Active Directory is backed up in accordance with DISA standards The System State data on each Windows 2000 Domain Controller should be backed up on a frequent basis If the System State data Active Directory and services upon which it is dependent for each Windows 2000 Domain Controller is not included in the Site s daily system backups then this is a finding Category II PDI 1 023 The Active Directory is not being backed up according to DISA requirements Reference NSA WIN2K Guide Active Directory Chap 10 3 10 System Configuration Changes Future Check If the site does not use a tool to compare system files exe and dll on servers against a baseline on a weekly basis then this is a finding Category II PDI 1 024 System files are not checked for unauthorized changes Reference FSO NT WIN2K Addendum Section 2 2 UNCLASSIFIED Windows 2000 Security Checklist 2 1 11Field Security Operations Section 3Defense Information Systems Agency 3 6 UNCLASSIFIED 3 11 Unencrypted Remote Access Future Check This check only applies to

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论