Details
Changing the system’s file and directory permissions allows the possibility of unauthorized and anonymous modification to the operating system and installed applications.
The default permissions are adequate when the Security Option ‘Network access: Let everyone permissions apply to anonymous users’ is set to ‘Disabled’ (WN16-SO-000290).
Satisfies: SRG-OS-000312-GPOS-00122, SRG-OS-000312-GPOS-00123, SRG-OS-000312-GPOS-00124
Solution
Maintain the default file ACLs and configure the Security Option ‘Network access: Let everyone permissions apply to anonymous users’ to ‘Disabled’ (WN16-SO-000290).
Default permissions:
Type – ‘Allow’ for all
Inherited from – ‘None’ for all
Principal – Access – Applies to
TrustedInstaller – Full control – This folder and subfolders
SYSTEM – Modify – This folder only
SYSTEM – Full control – Subfolders and files only
Administrators – Modify – This folder only
Administrators – Full control – Subfolders and files only
Users – Read & execute – This folder, subfolders, and files
CREATOR OWNER – Full control – Subfolders and files only
ALL APPLICATION PACKAGES – Read & execute – This folder, subfolders, and files
ALL RESTRICTED APPLICATION PACKAGES – Read & execute – This folder, subfolders, and files
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Windows.
References
- 800-53|AC-3(4)
- CAT|II
- CCI|CCI-002165
- CSCv6|3.1
- Rule-ID|SV-224834r569186_rule
- STIG-ID|WN16-00-000180
- STIG-Legacy|SV-87905
- STIG-Legacy|V-73253
- Vuln-ID|V-224834