Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
WN08-00-000005 | WN08-00-000005 | WN08-00-000005_rule | Medium |
Description |
---|
Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges. |
STIG | Date |
---|---|
Windows 8 Security Technical Implementation Guide | 2012-11-21 |
Check Text ( C-WN08-00-000005_chk ) |
---|
Review the necessary documentation that identifies the members of the Administrators group. Verify that each user with administrative privileges has been assigned a unique administrative account separate from their standard user account. The IAO will maintain a list of all users belonging to the Administrators group. If any of the following conditions are true, this is a finding: -Each SA does not have a unique userid dedicated for administering the system. -Each SA does not have a separate account for normal user tasks. -The IAO does not maintain a list of users belonging to the Administrators group. |
Fix Text (F-WN08-00-000005_fix) |
---|
Create the necessary documentation that identifies the members of the Administrators group. Ensure that each member has a separate account for user duties and one for his privileged duties. |