NAS Security:
A technical guide to NSA, C2, E3-FC2, and CC Security
Compliancy
1
Introduction ................................................................................................................................. 3
1.1
NSA Security Compliancy Overview ....................................................................................... 3
1.2
C2/CC Security Compliancy Overview ................................................................................... 4
1.3
E3/F-C2 Security Compliancy Overview.................................................................................. 4
2
NSA Security Compliancy ............................................................................................................. 4
2.1
Domain Model Design: Windows NT 4.0, Windows 2000, and Windows 2003 ....................... 5
2.2
Time Synchronization ............................................................................................................ 6
2.3
Organizational Unit (OU) and Group Policy Objects (GPOs) Design........................................... 7
2.4
Domain Level: Hardening the Domain Infrastructure Password Policy.......................................... 9
2.5
Domain Level: Hardening the Domain Infrastructure Account Lockout Policy .............................. 13
2.6
Domain Level: Hardening the Domain Infrastructure Kerberos Policy......................................... 15
2.7
Domain Level: Hardening the Domain Infrastructure Security Options ....................................... 15
2.8
Baseline Level ..................................................................................................................... 17
2.8.1
Audit Policy .................................................................................................................. 17
2.8.2
User Rights Assignments ................................................................................................. 27
2.8.3
Security Options............................................................................................................ 37
2.8.4
Event Log...................................................................................................................... 55
2.8.5
System Services............................................................................................................. 58
2.8.6
Additional Security Settings ............................................................................................ 91
2.8.7
Additional Security Settings (Manual Hardening Procedures) ............................................ 107
2.9
Hardening File Servers....................................................................................................... 111
2.9.1
Audit Policy Settings .................................................................................................... 112
2.9.2
2.9.2 User Rights Assignments..................................................................................... 112
2.9.3
Security Options.......................................................................................................... 113
2.9.4
Event Log Settings........................................................................................................ 117
2.9.5
System Services........................................................................................................... 117
2.9.6
Additional Security Settings .......................................................................................... 125
2.9.7
HP NAS Specific Security Settings ................................................................................. 128
2.10
Hardening Print Servers .................................................................................................. 130
2.10.1
Audit Policy Settings ................................................................................................. 130
2.10.2
User Rights Assignments ............................................................................................ 130
2.10.3
Security Options....................................................................................................... 131
2.10.4
Event Log Settings..................................................................................................... 131
2.10.5
System Services........................................................................................................ 131