5.6 Ensure 'IIS Admin Service (IISADMIN)' is set to 'Disabled' or 'Not Installed'

Information

Enables the server to administer the IIS metabase.

The IIS metabase stores configuration for the SMTP and FTP services.

The recommended state for this setting is: 'Disabled' or 'Not Installed'.

Note: This service is not installed by default.

It is supplied with Windows, but is installed by enabling an optional Windows feature (_Internet Information Services_).

'Note #2:' An organization may choose to selectively grant exceptions to web developers to allow IIS (or another web server) on their workstation, in order for them to locally test & develop web pages.

However, the organization should track those machines and ensure the security controls and mitigations are kept up to date, to reduce risk of compromise.

Rationale:
Hosting a website from a workstation is an increased security risk, as the attack surface of that workstation is then greatly increased.

If proper security mitigations are not followed, the chance of successful attack increases significantly.

Note: This security concern applies to _any_ web server application installed on a workstation, not just IIS.

Solution

To establish the recommended configuration via GP, set the following UI path to: 'Disabled' or ensure the service is not installed.


Computer Configuration\Policies\Windows Settings\Security Settings\System Services\IIS Admin Service


Impact:
IIS will not function, including Web, SMTP or FTP services.

See Also

https://workbench.cisecurity.org/files/1933

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7

Plugin: Windows

Control ID: 6a6983ecfc503c06e3ea81074c810e3f15b3b0df454fc0b4baff59cc266f5070