WN10-00-000032 - Windows 10 systems must use a BitLocker PIN with a minimum length of six digits for pre-boot authentication.

Information

If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data access, an adversary can remove non-volatile memory and read it directly, thereby circumventing operating system controls. Encrypting the data ensures that confidentiality is protected even when the operating system is not running. Pre-boot authentication prevents unauthorized users from accessing encrypted drives. Increasing the PIN length requires a greater number of guesses for an attacker.

Solution

Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> BitLocker Drive Encryption >> Operating System Drives 'Configure minimum PIN length for startup' to 'Enabled' with 'Minimum characters:' set to '6' or greater.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_10_V2R8_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001199, CCI|CCI-002475, CCI|CCI-002476, Rule-ID|SV-220704r859297_rule, STIG-ID|WN10-00-000032, STIG-Legacy|SV-104691, STIG-Legacy|V-94861, Vuln-ID|V-220704

Plugin: Windows

Control ID: 1d1870211e6087f9ee3f3b4d3e43e43d8a0d3872ee30933540fdaeee49966bc8