1. Home
  2. Security Hardening
  3. DISA Windows Server 2016 STIG V2R3
  4. WN16-00-000190 – Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained – HKEY_LOCAL_MACHINESOFTWARE

WN16-00-000190 – Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained – HKEY_LOCAL_MACHINESOFTWARE

Details

The registry is integral to the function, security, and stability of the Windows system. Changing the system’s registry permissions allows the possibility of unauthorized and anonymous modification to the operating system.

Solution

Maintain the default permissions for the HKEY_LOCAL_MACHINE registry hive.

The default permissions of the higher-level keys are noted below.

HKEY_LOCAL_MACHINESECURITY

Type – ‘Allow’ for all
Inherited from – ‘None’ for all
Principal – Access – Applies to
SYSTEM – Full Control – This key and subkeys
Administrators – Special – This key and subkeys

HKEY_LOCAL_MACHINESOFTWARE

Type – ‘Allow’ for all
Inherited from – ‘None’ for all
Principal – Access – Applies to
Users – Read – This key and subkeys
Administrators – Full Control – This key and subkeys
SYSTEM – Full Control – This key and subkeys
CREATOR OWNER – Full Control – This key and subkeys
ALL APPLICATION PACKAGES – Read – This key and subkeys

HKEY_LOCAL_MACHINESYSTEM

Type – ‘Allow’ for all
Inherited from – ‘None’ for all
Principal – Access – Applies to
Users – Read – This key and subkeys
Administrators – Full Control – This key and subkeys
SYSTEM – Full Control – This key and subkeys
CREATOR OWNER – Full Control – Subkeys only
ALL APPLICATION PACKAGES – Read – This key and subkeys
Server Operators – Read – This Key and subkeys (Domain controllers only)

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles