GUIDE TO SECURING MICROSOFT WINDOWS XP SYSTEMS FOR IT PROFESSIONALS
for example, the loss of confidentiality, integrity, or availability might (i) cause a severe
degradation in or loss of mission capability to an extent and duration that the organization
is not able to perform one or more of its primary functions; (ii) result in major damage to
organizational assets; (iii) result in major financial loss; or (iv) result in severe or
catastrophic harm to individuals involving loss of life or serious life threatening injuries.”
Each system should be protected based on the potential impact to the system of a loss of confidentiality,
integrity, or availability. Protection measures (otherwise known as security controls) tend to fall into two
categories. First, security weaknesses in the system need to be resolved. For example, if a system has a
known vulnerability that attackers could exploit, the system should be patched so that the vulnerability is
removed or mitigated. Second, the system should offer only the required functionality to each authorized
user, so that no one can use functions that are not necessary. This principle is known as least privilege.
Limiting functionality and resolving security weaknesses have a common goal: give attackers as few
opportunities as possible to breach a system.
Although each system should ideally be made as secure as possible, this is generally not feasible because
the system needs to meet the functional requirements of the system’s users. Another common problem
with security controls is that they often make systems less convenient or more difficult to use. When
usability is an issue, many users will attempt to circumvent security controls; for example, if passwords
must be long and complex, users may write them down. Balancing security, functionality, and usability is
often a challenge. This guide attempts to strike a proper balance and make recommendations that provide
a reasonably secure solution while offering the functionality and usability that users require.
Another fundamental principle endorsed by this guide is using multiple layers of security. For example, a
host may be protected from external attack by several controls, including a network-based firewall, a
host-based firewall, and OS patching. The motivation for having multiple layers is that if one layer fails
or otherwise cannot counteract a certain threat, other layers might prevent the threat from successfully
breaching the system. A combination of network-based and host-based controls is generally most
effective at providing consistent protection for systems.
NIST SP 800-53 Revision 2, Recommended Security Controls for Federal Information Systems, proposes
minimum baseline management, operational, and technical security controls for information systems.
8
These controls are to be implemented based on the security categorizations proposed by FIPS 199, as
described earlier in this section. This guidance should assist agencies in meeting baseline requirements
for Windows XP Professional systems deployed in their environments.
2.3 Baseline Security Controls and Threat Analysis Refinement
To secure a system, it is essential first to define the threats that need to be mitigated. This knowledge of
threats is also key to understanding the reasons the various configuration options have been chosen in this
guide. Most threats against data and resources are possible because of mistakes—either bugs in operating
system and application software that create exploitable vulnerabilities, or errors made by users and
administrators. Threats may involve intentional actors (e.g., an attacker who wants to access credit cards
on a system) or unintentional actors (e.g., an administrator who forgets to disable user accounts of a
terminated employee). Threats can be local, such as a disgruntled employee, or remote, such as an
attacker in another country. The following sections describe each major threat category, list possible
controls, provide examples of threats, and summarize the potential impact of the threat. The list of threats
is not exhaustive; it simply represents the major threat categories that were considered during the
selection of the security controls as described in this guide. Organizations should conduct risk
8
NIST SP 800-53 Revision 2, created in response to FISMA, is available at http://csrc.nist.gov/publications/PubsSPs.html.
2-4