UCF STIG Viewer Logo

The system must not use removable media as the boot loader.


Overview

Finding ID Version Rule ID IA Controls Severity
V-63331 WN10-00-000020 SV-77821r2_rule High
Description
Malicious users with removable boot media can gain access to a system configured to use removable media as the boot loader.
STIG Date
Windows 10 Security Technical Implementation Guide 2016-06-24

Details

Check Text ( C-69223r1_chk )
Verify whether the system firmware or controller allows removable media for the boot loader.

If it does, this is a finding.

If access is restricted by way of hypervisor configuration settings on virtual systems, this would not be a finding.
Fix Text (F-69249r1_fix)
Configure the system to use a boot loader installed on fixed media.