1. Home
  2. Security Hardening
  3. CIS Microsoft Windows Server 2016 STIG MS L1 V1.1.0
  4. Ensure ‘Modify firmware environment values’ is set to ‘Administrators’

Ensure ‘Modify firmware environment values’ is set to ‘Administrators’

Details

This policy setting allows users to configure the system-wide environment variables that affect hardware configuration. This information is typically stored in the Last Known Good Configuration. Modification of these values and could lead to a hardware failure that would result in a denial of service condition.

The recommended state for this setting is: Administrators.

Note: This user right is considered a ‘sensitive privilege’ for the purposes of auditing.

Rationale:

Anyone who is assigned the Modify firmware environment values user right could configure the settings of a hardware component to cause it to fail, which could lead to data corruption or a DoS condition.

Impact:

None – this is the default behavior.

Solution

To establish the recommended configuration via GP, set the following UI path to Administrators:

Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesUser Rights AssignmentModify firmware environment values

Default Value:

Administrators.

Additional Information:

Microsoft Windows Server 2016 Security Technical Implementation Guide:
Version 2, Release 2, Benchmark Date: May 04, 2021

Vul ID: V-225087
Rule ID: SV-225087r569186_rule
STIG ID: WN16-UR-000270
Severity: CAT II

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles