WN10-00-000031 - Windows 10 systems must use a BitLocker PIN for pre-boot authentication

Information

If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data access, an adversary can remove non-volatile memory and read it directly, thereby circumventing operating system controls. Encrypting the data ensures that confidentiality is protected even when the operating system is not running. Pre-boot authentication prevents unauthorized users from accessing encrypted drives.

Solution

Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> BitLocker Drive Encryption >> Operating System Drives 'Require additional authentication at startup' to 'Enabled' with 'Configure TPM Startup PIN:' set to 'Require startup PIN with TPM' or with 'Configure TPM startup key and PIN:' set to 'Require startup key and PIN with TPM'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_10_V2R8_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001199, CCI|CCI-002475, CCI|CCI-002476, Rule-ID|SV-220703r859157_rule, STIG-ID|WN10-00-000031, STIG-Legacy|SV-104689, STIG-Legacy|V-94859, Vuln-ID|V-220703

Plugin: Windows

Control ID: 1b6eaf862abb0f885938f651180041ff5d261b1a1f5c1ed824f1ce1422b9e3cf