WN10-00-000032 - Windows 10 systems must use a BitLocker PIN with a minimum length of six digits for pre-boot authentication.

Information

If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data access, an adversary can remove non-volatile memory and read it directly, thereby circumventing operating system controls. Encrypting the data ensures that confidentiality is protected even when the operating system is not running. Pre-boot authentication prevents unauthorized users from accessing encrypted drives. Increasing the PIN length requires a greater number of guesses for an attacker.

Solution

Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> BitLocker Drive Encryption >> Operating System Drives 'Configure minimum PIN length for startup' to 'Enabled' with 'Minimum characters:' set to '6' or greater.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_10_V2R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001199, CCI|CCI-002445, CCI|CCI-002446, Rule-ID|SV-220704r819655_rule, STIG-ID|WN10-00-000032, STIG-Legacy|SV-104691, STIG-Legacy|V-94861, Vuln-ID|V-220704

Plugin: Windows

Control ID: 0f05f05680b3c3ce893b2fd1260c369b8564fd3356a1131d41a036e1be4e1621