NAS Security:
A technical guide to NSA, C2, E3-FC2, and CC Security
Compliancy
1
Introduction ................................................................................................................................. 3
1.1
1.2
1.3
2
NSA Security Compliancy ............................................................................................................. 4
2.1
2.2
Time Synchronization ............................................................................................................ 6
2.3
2.4
2.5
2.6
2.7
2.8
Baseline Level ..................................................................................................................... 17
2.8.1
Audit Policy .................................................................................................................. 17
2.8.2
User Rights Assignments ................................................................................................. 27
2.8.3
Security Options............................................................................................................ 37
2.8.4
Event Log...................................................................................................................... 55
2.8.5
System Services............................................................................................................. 58
2.8.6
2.8.7
2.9
Hardening File Servers....................................................................................................... 111
2.9.1
Audit Policy Settings .................................................................................................... 112
2.9.2
2.9.3
Security Options.......................................................................................................... 113
2.9.4
Event Log Settings........................................................................................................ 117
2.9.5
System Services........................................................................................................... 117
2.9.6
2.9.7
2.10
Hardening Print Servers .................................................................................................. 130
2.10.1
Audit Policy Settings ................................................................................................. 130
2.10.2
User Rights Assignments ............................................................................................ 130
2.10.3
Security Options....................................................................................................... 131
2.10.4
Event Log Settings..................................................................................................... 131
2.10.5
System Services........................................................................................................ 131