IIST-SV-000141 - Remote access to the IIS 10.0 web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Logging into a web server remotely using an unencrypted protocol or service when performing updates and maintenance is a major risk. Data, such as user account, is transmitted in plaintext and can easily be compromised. When performing remote administrative tasks, a protocol or service that encrypts the communication channel must be used.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure the web server administration is only performed over a secure path.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y22M01_STIG.zip

Item Details

References: CAT|I, CCI|CCI-002314, Rule-ID|SV-218811r561041_rule, STIG-ID|IIST-SV-000141, STIG-Legacy|SV-109261, STIG-Legacy|V-100157, Vuln-ID|V-218811

Plugin: Windows

Control ID: 224e2cddbc478a76405ce2d9f8b66ce78de2fc1defdc2c6d698ad9102d109710