STIGQter STIGQter: STIG Summary: Windows PAW Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 15 May 2020:

The Windows PAW must be configured so that all outbound connections to the Internet from a PAW are blocked.

DISA Rule

SV-92889r1_rule

Vulnerability Number

V-78183

Group Title

PAW-00-002200

Rule Version

WPAW-00-002200

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the PAW host-based firewall to block outbound connection requests to the Internet gateway or configure the PAW with an Internet proxy address with a loopback address. Allowed exceptions include connections to communicate with IT resources being managed via the PAW, including the management console of authorized public cloud services; with domain controllers; or with a digital credential verification service (for example, OCSP).

If the PAW host-based firewall method is used, configure the firewall to block outbound connection requests to the Internet gateway. The exact configuration procedure will depend on which host-based firewall (for example, Host-Based Security System [HBSS]) is used on the PAW. DoD sites should refer to DoD policies and firewall STIGs to determine acceptable firewalls products.

If the Internet proxy address with a loopback address method is used, consider using the configuration instructions listed in of the Microsoft Privileged Access Workstation paper.

In addition, disable the capability of the administrator to manually override the proxy settings on each PAW.

Check Contents

Review the PAW configuration to verify all outbound connections to the Internet from the PAW are blocked except to communicate with IT resources being managed via the PAW, including the management console of authorized public cloud services; with domain controllers; or with a digital credential verification service (for example, OCSP).

Ask site personnel how outbound connections from the PAW to the Internet have been blocked. Two common methods are to either configure the host-based firewall to block all outbound connection requests to the Internet gateway or to configure the PAW with an Internet proxy address with a loopback address. Based on the method used at the site, review either the configuration of the host-based firewall or the PAW configuration and verify the configuration blocks all outbound Internet connections except to communicate with IT resources being managed via the PAW, with domain controllers, or with a digital credential verification service (for example, OCSP).

If the site has configured the PAW with a loopback address, verify a proxy server group policy has been set up with a loopback address (127.0.0.1) and assigned to the PAW Users group.

If the PAW system has not been configured to block all outbound connections to the Internet from a PAW except to communicate with IT resources being managed via the PAW, with domain controllers, or with a digital credential verification service, this is a finding.

Vulnerability Number

V-78183

Documentable

False

Rule Version

WPAW-00-002200

Severity Override Guidance

Review the PAW configuration to verify all outbound connections to the Internet from the PAW are blocked except to communicate with IT resources being managed via the PAW, including the management console of authorized public cloud services; with domain controllers; or with a digital credential verification service (for example, OCSP).

Ask site personnel how outbound connections from the PAW to the Internet have been blocked. Two common methods are to either configure the host-based firewall to block all outbound connection requests to the Internet gateway or to configure the PAW with an Internet proxy address with a loopback address. Based on the method used at the site, review either the configuration of the host-based firewall or the PAW configuration and verify the configuration blocks all outbound Internet connections except to communicate with IT resources being managed via the PAW, with domain controllers, or with a digital credential verification service (for example, OCSP).

If the site has configured the PAW with a loopback address, verify a proxy server group policy has been set up with a loopback address (127.0.0.1) and assigned to the PAW Users group.

If the PAW system has not been configured to block all outbound connections to the Internet from a PAW except to communicate with IT resources being managed via the PAW, with domain controllers, or with a digital credential verification service, this is a finding.

Check Content Reference

M

Target Key

3283

Comments