IIST-SV-000144 - IIS 10.0 web server system files must conform to minimum file permission requirements.

Information

This check verifies the key web server system configuration files are owned by the SA or the web administrator controlled account. These same files that control the configuration of the web server, and thus its behavior, must also be accessible by the account running the web service. If these files are altered by a malicious user, the web server would no longer be under the control of its managers and owners; properties in the web server configuration could be altered to compromise the entire server platform.

Solution

Open Explorer and navigate to the inetpub directory.
Right-click 'inetpub' and select 'Properties'.
Click the 'Security' tab.

Set the following permissions:
System: Full control
Administrators: Full control
TrustedInstaller: Full control
ALL APPLICATION PACKAGES (built-in security group): Read and execute
ALL RESTRICTED APPLICATION PACKAGES (built-in security group): Read and execute
Users: Read and execute, list folder contents
CREATOR OWNER: Full Control, Subfolders and files only

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y24M10_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10), CAT|II, CCI|CCI-002235, Rule-ID|SV-218814r1022658_rule, STIG-ID|IIST-SV-000144, STIG-Legacy|SV-109267, STIG-Legacy|V-100163, Vuln-ID|V-218814

Plugin: Windows

Control ID: 9974abf370a730437c2910a477b38df8ef4ed06d6de949026cfb07976c88b1c7