UCF STIG Viewer Logo

Remote access to the IIS 10.0 web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.


Finding ID Version Rule ID IA Controls Severity
V-218811 IIST-SV-000141 SV-218811r561041_rule High
Logging into a web server remotely using an unencrypted protocol or service when performing updates and maintenance is a major risk. Data, such as user account, is transmitted in plaintext and can easily be compromised. When performing remote administrative tasks, a protocol or service that encrypts the communication channel must be used.
Microsoft IIS 10.0 Server Security Technical Implementation Guide 2021-06-23


Check Text ( C-20283r505279_chk )
If web administration is performed at the console, this check is NA.

If web administration is performed remotely, the following checks will apply:

If administration of the server is performed remotely, it will only be performed securely by system administrators.

If website administration or web application administration has been delegated, those users will be documented and approved by the ISSO.

Remote administration must be in compliance with any requirements contained within the Windows Server STIGs and any applicable Network STIGs.

Remote administration of any kind will be restricted to documented and authorized personnel.

All users performing remote administration must be authenticated.

All remote sessions will be encrypted and utilize FIPS 140-2-approved protocols.

FIPS 140-2-approved TLS versions include TLS V1.2 or greater.

Review with site management how remote administration is configured on the website, if applicable.

If remote management meets the criteria listed above, this is not a finding.

If remote management is utilized and does not meet the criteria listed above, this is a finding.
Fix Text (F-20281r505280_fix)
Ensure the web server administration is only performed over a secure path.