2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set

Information

Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User is prompted when the key is first used' or higher

This policy setting determines whether users' private keys (such as their S-MIME keys) require a password to be used.

The recommended state for this setting is: 'User is prompted when the key is first used'.

Configuring this setting to 'User must enter a password each time they use a key' also conforms to the benchmark.

Rationale:

If a user's account is compromised or their computer is inadvertently left unsecured the malicious user can use the keys stored for the user to access protected resources.

You can configure this policy setting so that users must provide a password that is distinct from their domain password every time they use a key.

This configuration makes it more difficult for an attacker to access locally stored user keys, even if the attacker takes control of the user's computer and determines their logon password.

Solution

To establish the recommended configuration via GP, set the following UI path to 'User is prompted when the key is first used' (configuring to ''User must enter a password each time they use a key'' also conforms to the benchmark):


Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\System cryptography: Force strong key protection for user keys stored on the computer


Impact:

Users will have to enter their password the first time they access a key that is stored on their computer.

For example, if users use an S-MIME certificate to digitally sign their e-mail they will be forced to enter the password for that certificate the first time that they send a signed e-mail message.

For even stronger security, the value 'User must enter a password each time they use a key' can be set, but the overhead that is involved using this configuration may be too high for some organizations.

Microsoft does not recommend enforcing this setting on servers due to the significant impact on manageability.

For example, you may not be able to configure Remote Desktop Services to use SSL certificates.

More information is available in the Windows PKI TechNet Blog here: [What is a strong key protection in Windows?](https://blogs.technet.microsoft.com/pki/2009/06/16/what-is-a-strong-key-protection-in-windows/).

See Also

https://workbench.cisecurity.org/files/1933

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2), CCE|CCE-35007-4, CSCv6|16.14

Plugin: Windows

Control ID: 7378e7e0ba2402823b54992d668a8a01a20dc1badeb6e40618648c3725b54fc5