Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-18010 | 4.005 | SV-29588r1_rule | High |
Description |
---|
This is a Category 1 finding as it provides access to the kernel with complete access to sensitive and critical operating system components. |
STIG | Date |
---|---|
Windows Vista Security Technical Implementation Guide | 2016-06-03 |
Check Text ( C-20665r1_chk ) |
---|
Analyze the system using the Security Configuration and Analysis snap-in. Expand the Security Configuration and Analysis tree view. Navigate to Local Policies -> User Rights Assignment. If any user accounts, or groups, (to include administrators) are granted the “Debug programs” right, then this is a finding. If Administrators require this right for troubleshooting or application issues, it should be assigned on a temporary basis as needed. Documentable Explanation: Some applications may require this right to function such as the Windows 2003 Cluster service account. Any exception needs to be documented with the IAO. Acceptable forms of documentation include vendor published documents and application owner confirmation. |
Fix Text (F-18585r1_fix) |
---|
Configure the system to remove any accounts from the "Debug programs" user right. |