Please enable JavaScript.
Coggle requires JavaScript to display documents.
Windows Server 2016 Security (Secure OS to run your applications and…
Windows Server 2016 Security
Getting out in front of cyber attacks
How attacks work
Windows Server 2016: Active defense and compliance
PCI DSS 3.2
6.4.2 - Separation of duties between test and production environments
7.1 - System components and cardholder data access restricted to job-based needs
7.1.1 - Define role access needs
7.1.2 - User ID access based on least privileges
7.1.3 - Assigning access to job function and classification
7.1.4 - Documented approval of access privileges
7.2 - User access control on need-to-know basis
7.2.2 - Assigning privileges to job function and classification
7.2.3 - Default "deny-all" setting
10.2.2 - Logging actions by root privileges individual
10.2.5 - User changes logging
12.5.4 - Administer user accounts
12.5.5 - Monitor and control all access to data
ISO 27001:2013 FedRAMP
A.6.1.2 - Segregation of duties
A.9.1 - Business requirement of access control
A.9.1.2 - Access to networks and network services
A.9.2.2 - User access provisioning
A.9.2.3 - Management of privileged access rights
A.9.4.1 - Information access restriction
A.9.4.5 - Access control to program source code
A.12.1.4 - Separation of development, testing, and operational environments
A.12.4.1 - Event logging
A.12.4.3 - Administrator and operator logs
FedRAMP
AC-2 - Account management
AC-2 (4) - Automated audit actions
AC-2 (7) Account role-based schemes
AC-2 (12) - Account monitoring
AC-3 - Access enforcement
AC-5 - Separation of duties
AC-6 - Least privilege
AC-6 (1) - Authorize access to security functions
AC-6 (2) - Non-privileged access for non-security functions
AC-6 (5) - Privileged accounts
AC-6 (9) - Auditing use of privileged functions
AC-6 (10) - Prohibit non-privileged users from executing privileged functions
AU-2 - Audit events
AU-9 (4) - Audit access by subset of privileged users
AU-12 - Audit generation
CM-5 - Access restrictions for change
CM-5 (1) - Automated access enforcement
CM-5 (5) - Limit production / operational privileges
Protect credentials and limit administrator privileges
Credential Guard
Remote Credential Guard
Just Enough and Just-in-Time Administration
Secure OS to run your applications and infrastructure
Device Guard
Control Flow Guard
Windows Defender
Enhanced security auditing
Audit Group Membership
Audit PnP Activity
Secure virtualization
Shielded Virtual Machines
Host Guardian Service
Distributed network firewall using software-defined networking
Security for developers
Hyper-V isolation for containers
Nano Server
Conclusion