IIST-SV-000100 - The IIS 10.0 web server remote authors or content providers must only use secure encrypted logons and connections to upload web server content.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Logging onto a web server remotely using an unencrypted protocol or service when performing updates and maintenance is a major risk. Data, such as user account, is transmitted in plaintext and can easily be compromised. When performing remote administrative tasks, a protocol or service that encrypts the communication channel must be used.

An alternative to remote administration of the web server is to perform web server administration locally at the console. Local administration at the console implies physical access to the server.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure the web server administration is only performed over a secure path.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y22M01_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001453, Rule-ID|SV-218784r561041_rule, STIG-ID|IIST-SV-000100, STIG-Legacy|SV-109207, STIG-Legacy|V-100103, Vuln-ID|V-218784

Plugin: Windows

Control ID: 75728a8eb18af7c4a7e23f0514053e7f4cc3dd14f47756b9c6b89f08d9afa34e