WN12-00-000011 - Windows 2012/2012 R2 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.

Information

Setting application accounts to expire may cause applications to stop functioning. However, not changing them on a regular basis exposes them to attack. If managed service accounts are used, this alleviates the need to manually change application account passwords.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change passwords for manually managed application/service accounts at least annually or when an administrator with knowledge of the password leaves the organization.

It is recommended that system-managed service accounts be used where possible.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_MS_V3R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-225248r569185_rule, STIG-ID|WN12-00-000011, STIG-Legacy|SV-51580, STIG-Legacy|V-36662, Vuln-ID|V-225248

Plugin: Windows

Control ID: 03a0a1e3800f2b5d5a37f5295d8b5451a5ad53931370fcdc1be5694798068a87