1.006 - Users with administrative privilege must be documented and have separate accounts for administrative duties and normal operational tasks.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges. The rule of least privilege must always be enforced.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Create necessary documentation that identifies members of the Administrators group, to be maintained with the ISSO.

Create unique administrator accounts, separate from the built-in 'Administrator' account for each user with administrative privileges.

Create separate accounts for performing normal (non-administrative) functions for each user with administrative privileges.

Properly train users with administrative privileges.

Do not allow the use of the built-in Administrator account.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_7_V1R32_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000366, Rule-ID|SV-24997r3_rule, STIG-ID|1.006, Vuln-ID|V-1140

Plugin: Windows

Control ID: f647c85bdf6751051cc2869e6fdd9fb3a0b8b3e10f49bd7ac4718a79182015fa