CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
2.3.14 System cryptography
This section contains recommendations related to system cryptography.
2.3.14.1 (L2) Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User is prompted when the key is first used' or higher (Scored)
ProfileApplicability:
Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)
Description:
This policy setting determines whether users' private keys (such as their S-MIME keys) require a password to be used. The recommended state for this setting is: User is prompted when the key is first used . Configuring this setting to User must enter a password each time they use a key also conforms to the benchmark.
Rationale:
If a user's account is compromised or their computer is inadvertently left unsecured the malicious user can use the keys stored for the user to access protected resources. You can configure this policy setting so that users must provide a password that is distinct from their domain password every time they use a key. This configuration makes it more difficult for an attacker to access locally stored user keys, even if the attacker takes control of the user's computer and determines their logon password.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as prescribed. This group policy setting is backed by the following registry location:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography:ForceKeyProtectio n
273 | P a g e
Made with FlippingBook - Online magazine maker