IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.0

Information

Transport Layer Security (TLS) encryption is a required security setting for a private web server. Encryption of private information is essential to ensuring data confidentiality. If private information is not encrypted, it can be intercepted and easily read by an unauthorized party. A private web server must use a FIPS 140-2-approved TLS version, and all non-FIPS-approved SSL versions must be disabled.

NIST SP 800-52 specifies the preferred configurations for government systems.

Solution

Access the IIS 8.5 Web Server.

Access an administrator command prompt and type 'regedit <enter>' to access the server's registry.

Navigate to the following registry paths and configure the REG_DWORD with the appropriate values:

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server

With a REG_DWORD value of '1' for 'Enabled'

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server

With a REG_DWORD value of '1' for 'DisabledByDefault'

With a REG_DWORD value of '0' for 'Enabled'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_8-5_Y22M01_STIG.zip

Item Details

References: CAT|I, CCI|CCI-002418, Rule-ID|SV-214436r695334_rule, STIG-ID|IISW-SV-000153, STIG-Legacy|SV-91455, STIG-Legacy|V-76759, Vuln-ID|V-214436

Plugin: Windows

Control ID: ee8b012213d08840335987991eaaac7813e899c791b802a6fb69489feb07dbfa