UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Administrators must be the only users allowed access to the directory tree, the shell, or other operating system functions and utilities.


Overview

Finding ID Version Rule ID IA Controls Severity
V-2247 WG200 W22 SV-36509r1_rule High
Description
As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. This is in addition to the anonymous web user account. The resources to which these accounts have access must also be closely monitored and controlled. Only the SA needs access to all the system’s capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files. The anonymous web user account must not have access to system resources as that account could then control the server.
STIG Date
APACHE 2.2 Server for Windows Security Technical Implementation Guide 2018-12-24

Details

Check Text ( C-35610r1_chk )
Windows 2008 servers may be impacted by this check. If the SA or the web administrator can demonstrate that this requirement will adversely affect the web server by providing vendor documentation, this check is not applicable.

Search all of the system’s hard drives for the command.com and cmd.exe files. The allowed permissions on these files are:

System Full Control
Administrators Full Control

Examine account access and any group membership access to these files.

If any non-administrator account, group membership, or service ID has any access to any command.com or cmd.exe files and the access is documented as mission critical, this is not a finding.

Examine access to operating system configuration files, scripts, utilities, privileges, and functions.

If any non-administrator account, group membership, or service ID has any access to any of these operating system components and the access is documented as mission critical, this is not a finding.

If any non-administrator account, group membership, or service ID has undocumented access to any listed file or operating system component, this is a finding.
Fix Text (F-30844r1_fix)
Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.