NNT CIS Microsoft Windows 7 Benchmark V2.1.0 Level 1+Bit Locker
Total Page:16
File Type:pdf, Size:1020Kb
NNT CIS Microsoft Windows 7 Benchmark v2.1.0 Level 1+Bit Locker.xml NNT CIS Microsoft Windows 7 Benchmark v2.1.0 Level 1+Bit Locker: CIS-WIN7-IP45 On CIS-WIN7-IP45 - By admin for time period 28/07/2014 12:35:06 to 28/07/2014 12:35:06 NNT CIS Microsoft Windows 7 Benchmark v2.1.0 Level 1+Bit Locker Total score: 0.00% 0 out of 256 rules passed 0 out of 256 rules did not pass completely 256 out of 256 rules failed Computer Configuration Administrative Templates Windows Components-BitLocker Drive Encryption-Operating System Drives Rules 1.1.1.1.1.1 Set 'Configure minimum PIN length for startup' to 'Enabled:7' Description: This policy setting allows you to configure a minimum length for a Trusted Platform Module (TPM) startup PIN. This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of 4 digits and can have a maximum length of 20 digits. If you enable this policy setting, you can require a minimum number of digits to be used when setting the startup PIN. If you disable or do not configure this policy setting, users can configure a startup PIN of any length between 4 and 20 digits. Rationale: BitLocker requires the use of the function keys Unrecognized variable: F1-F10 for PIN entry since the PIN is entered in the pre-OS environment before locationalization support is available. This limits each PIN digit to one of ten possibilities. The TPM has an anti-hammering feature that includes a mechanism to exponentially increase the delay for PIN retry attempts; however, using a PIN that is short in length improves an attacker's chances of guessing the correct PIN. No data collected for oval:org.cisecurity.benchmarks.o_microsoft:obj:1002 (Check that 'Configure minimum PIN length for startup' is configured to 'Enabled'). 28/07/2014 12:38:31 1 NNT CIS Microsoft Windows 7 Benchmark v2.1.0 Level 1+Bit Locker.xml 1.1.1.1.1.2 Set 'Require additional authentication at startup' to 'Enabled:False' Description: This policy setting allows you to configure whether BitLocker requires additional authentication each time the computer starts and whether you are using BitLocker with or without a Trusted Platform Module (TPM). This policy setting is applied when you turn on BitLocker. Note: Only one of the additional authentication options can be required at startup, otherwise a policy error occurs. If you want to use BitLocker on a omputer without a TPM, select the Allow BitLocker without a compatible TPM check box. In this mode a USB drive is required for start-up and the key information used to encrypt the drive is stored on the USB drive, creating a USB key. When the USB key is inserted the access to the drive is authenticated and the drive is accessible. If the USB key is lost or unavailable you will need to use one of the BitLocker recovery options to access the drive. On a computer with a compatible TPM, four types of authentication methods can be used at startup to provide added protection for encrypted data. When the computer starts, it can use only the TPM for authentication, or it can also require insertion of a USB flash drive containing a startup key, the entry of a 4-digit to 20-digit personal identification number (PIN), or both. If you enable this policy setting, users can configure advanced startup options in the BitLocker setup wizard. If you disable or do not configure this policy setting, users can configure only basic options on computers with a TPM. Note: If you want to require the use of a startup PIN and a USB flash drive, you must configure BitLocker settings using the command-line tool manage-bde instead of the BitLocker Drive Encryption setup wizard. Rationale: TPM without use of a PIN will only validate early boot components and does not require a user to enter any additional authentication information. If a computer is lost or stolen in this configuration, BitLocker will not provide any additional measure of protection beyond what is provided by native Windows authentication unless the early boot components are tampered with or the encrtypted drive is removed from the machine. No data collected for oval:org.cisecurity.benchmarks.o_microsoft:obj:1003 (Check that 'Require additional authentication at startup' is configured to 'Enabled'). 1.1.1.1.1.3 Set 'Allow BitLocker without a compatible TPM' to 'False' Description: If you want to use BitLocker on acomputer without a TPM, select the Allow BitLocker without a compatibleTPM check box. In this mode a USB drive is required for start-up and thekey information used to encrypt the drive is stored on the USB drive,creating a USB key. When the USB key is inserted the access to the driveis authenticated and the drive is accessible. If the USB key is lost orunavailable you will need to use one of the BitLocker recovery options to access the drive. Rationale: TPM without use of a PIN will onlyvalidate early boot components and does not require a user to enterany additional authentication information. If a computer is lost orstolen in this configuration, BitLocker will not provide anyadditional measure of protection beyond what is provided by nativeWindows authentication unless the early boot components are tamperedwith or the encrtypted drive is removed from the machine. No data collected for oval:org.cisecurity.benchmarks.o_microsoft:obj:1004 (Check that 'ConfigureNonTPMStartupKeyUsage_Name' is configured to 'False'). 28/07/2014 12:38:31 2 NNT CIS Microsoft Windows 7 Benchmark v2.1.0 Level 1+Bit Locker.xml 1.1.1.1.1.4 Set 'Configure TPM Startup' to 'Do not allow TPM' Description: On a computer with a compatible TPM,four types of authentication methods can be used at startup to provideadded protection for encrypted data. When the computer starts, it can useonly the TPM for authentication, or it can also require insertion of a USB flash drive containing a startup key, the entry of a 4-digit to 20-digit personal identification number (PIN), or both. Rationale: TPM without use of a PIN will onlyvalidate early boot components and does not require a user to enterany additional authentication information. If a computer is lost orstolen in this configuration, BitLocker will not provide anyadditional measure of protection beyond what is provided by nativeWindows authentication unless the early boot components are tamperedwith or the encrtypted drive is removed from the machine. No data collected for oval:org.cisecurity.benchmarks.o_microsoft:obj:1005 (Check that 'ConfigureTPMUsageDropDown_Name' is configured to '$(string.ConfigureTPMUsageDropDown_Disallow)'). 1.1.1.1.1.5 Set 'Configure TPM startup PIN:' to 'Require startup PIN with TPM' Description: On a computer with a compatible TPM,four types of authentication methods can be used at startup to provideadded protection for encrypted data. When the computer starts, it can useonly the TPM for authentication, or it can also require insertion of aUSB flash drive containing a startup key, the entry of a 4-digit to20-digit personal identification number (PIN), or both. Rationale: TPM without use of a PIN will onlyvalidate early boot components and does not require a user to enterany additional authentication information. If a computer is lost orstolen in this configuration, BitLocker will not provide anyadditional measure of protection beyond what is provided by nativeWindows authentication unless the early boot components are tamperedwith or the encrtypted drive is removed from the machine. No data collected for oval:org.cisecurity.benchmarks.o_microsoft:obj:1006 (Check that 'ConfigurePINUsageDropDown_Name' is configured to '$(string.ConfigurePINUsageDropDown_Require)'). 1.1.1.1.1.6 Set 'Configure TPM startup key:' to 'Do not allow startup key with TPM' Description: On a computer with a compatible TPM,four types of authentication methods can be used at startup to provideadded protection for encrypted data. When the computer starts, it can useonly the TPM for authentication, or it can also require insertion of aUSB flash drive containing a startup key, the entry of a 4-digit to20-digit personal identification number (PIN), or both. Rationale: TPM without use of a PIN will onlyvalidate early boot components and does not require a user to enterany additional authentication information. If a computer is lost orstolen in this configuration, BitLocker will not provide anyadditional measure of protection beyond what is provided by nativeWindows authentication unless the early boot components are tamperedwith or the encrtypted drive is removed from the machine. No data collected for oval:org.cisecurity.benchmarks.o_microsoft:obj:1007 (Check that 'ConfigureTPMStartupKeyUsageDropDown_Name' is configured to '$(string.ConfigureTPMStartupKeyUsageDropDown_Disallow)'). 28/07/2014 12:38:31 3 NNT CIS Microsoft Windows 7 Benchmark v2.1.0 Level 1+Bit Locker.xml 1.1.1.1.1.7 Set 'Configure TPM startup key and PIN:' to 'Do not allow startup key and PIN with TPM' Description: On a computer with a compatible TPM,four types of authentication methods can be used at startup to provideadded protection for encrypted data. When the computer starts, it can useonly the TPM for authentication, or it can also require insertion of aUSB flash drive containing a startup key, the entry of a 4-digit to20-digit personal identification number (PIN), or both. Rationale: TPM without use of a PIN will onlyvalidate early boot components and does not require a user to enterany additional authentication information. If a computer is lost orstolen in this configuration, BitLocker will not provide anyadditional measure of protection beyond what is provided by nativeWindows authentication unless the early boot components are tamperedwith or the encrtypted drive is removed from the machine.