CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
Rationale:
A BitLocker-protected computer may be vulnerable to Direct Memory Access (DMA) attacks when the computer is turned on or is in the Standby power state - this includes when the workstation is locked.
BitLocker with TPM-only authentication lets a computer enter the power-on state without any pre-boot authentication. Therefore, an attacker may be able to perform DMA attacks.
This issue is documented in Microsoft Knowledge Base article 2516445: Blocking the SBP-2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as prescribed. This group policy setting is backed by the following registry location:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\Restrict ions:DenyDeviceIDsRetroactive
Remediation:
To establish the recommended configuration via GP, set the following UI path to Enabled , and check the Also apply to matching devices that are already installed. checkbox:
Computer Configuration\Policies\Administrative Templates\System\Device Installation\Device Installation Restrictions\Prevent installation of devices that match any of these device IDs
Note: This Group Policy path is provided by the Group Policy template DeviceInstallation.admx/adml that is included with all versions of the Microsoft Windows Administrative Templates.
Impact:
Existing devices (that match the device IDs specified) that were previously installed prior to the hardening will be disabled or removed.
Default Value:
False (unchecked). (Pre-existing devices matching the device IDs will not be disabled or removed.)
642 | P a g e
Made with FlippingBook - Online magazine maker