The Federal Desktop Core Configuration is a list of
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
settings recommended by the
National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
for general-purpose
microcomputers
A microcomputer is a small, relatively inexpensive computer having a central processing unit (CPU) made out of a microprocessor. The computer also includes memory and input/output (I/O) circuitry together mounted on a printed circuit board (P ...
that are connected directly to the network of a
United States government agency.
The FDCC is a list of agreed upon Microsoft Windows operating system common core system functions, applications, files, and services that are changed in their configuration around which a framework for a more secure, and security-reliable MS Windows operating system was created. The standards were then made mandatory for every federal government computer effective Feb 1, 2008. If you wanted to connect to a federal office computer network your system had to meet or exceed the FDCC standard or you were denied access.
FDCC applied only to
Windows XP
Windows XP is a major release of Microsoft's Windows NT operating system. It was release to manufacturing, released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Wind ...
and
Vista
Vista usually refers to a distant view.
Vista may also refer to:
Software
*Windows Vista, the line of Microsoft Windows client operating systems released in 2006 and 2007
* VistA, (Veterans Health Information Systems and Technology Architecture) ...
desktop and laptop computers and was replaced by the
United States Government Configuration Baseline (USGCB), which included settings for Windows 7 and Red Hat Enterprise Linux 5.
For Windows 7, the NIST changed the naming convention to the US Government Computer Baseline (USGCB ver 2.0). In addition to un-classifying a general Windows settings guide, the NIST also publishes guides specifically for Windows Firewall, Internet Explorer, and a guide (Vista-Energy, for example) created to capture settings that adhere to energy conservation policies.
History
On 20 March 2007, the
Office of Management and Budget
The Office of Management and Budget (OMB) is the largest office within the Executive Office of the President of the United States (EOP). OMB's most prominent function is to produce the president's budget, but it also examines agency programs, pol ...
issued a memorandum instructing United States government agencies to develop plans for using the Microsoft Windows XP and Vista security configurations.
The
United States Air Force
The United States Air Force (USAF) is the air service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States. Originally created on 1 August 1907, as a part of the United States Army S ...
common security configurations for Windows XP were proposed as an early model on which standards could be developed.
The FDCC baseline was developed (and is maintained) by the
National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
in collaboration with
OMB,
DHS
The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
,
DOI,
DISA
Disa is the heroine of a Swedish legendary saga, which was documented by Olaus Magnus, in 1555. It is believed to be from the Middle Ages, but includes Old Norse themes.
It was elaborated by Johannes Messenius in his drama ''Disa'', which was t ...
,
NSA
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
,
USAF
The United States Air Force (USAF) is the Aerial warfare, air military branch, service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States. Originally created on 1 August 1907, as a part ...
and
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
,
with input from
public comment
In public relations and communication science, publics are groups of individual people, and the public (a.k.a. the general public) is the totality of such groupings. This is a different concept to the sociological concept of the ''Öffentlichke ...
.
It applies to Windows XP Professional and Vista systems only—these security policies are not tested (and according to the NIST, will not work) on Windows 9''x''/ME/NT/2000 or Windows Server 2003.
Major Version 1.1 (released 31 October 2008) had no new or changed settings, but expanded SCAP reporting options.
As with all previous versions, the standard is applicable to general-purpose workstations and laptops for
end user
In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users who support or maintain the product, such as sysops, system administrat ...
s. Windows XP and Vista systems in use as servers are exempt from this standard. Also exempt are
embedded computer
An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system. It is ''embedded'' as ...
s and "special purpose" systems (defined as specialized
scientific
Science is a systematic endeavor that builds and organizes knowledge in the form of testable explanations and predictions about the universe.
Science may be as old as the human species, and some of the earliest archeological evidence ...
,
medical
Medicine is the science and practice of caring for a patient, managing the diagnosis, prognosis, prevention, treatment, palliation of their injury or disease, and promoting their health. Medicine encompasses a variety of health care practi ...
,
process control
An industrial process control in continuous production processes is a discipline that uses industrial control systems to achieve a production level of consistency, economy and safety which could not be achieved purely by human manual control. ...
, and experimental systems), though still recommends that FDCC security configuration be considered "where feasible and appropriate".
The FDCC settings, generally speaking, block open connections in operating systems, disables functions, disables rarely used applications in the SOHO environment, disables unnecessary services, changes permissions on items, changes the way log files are collected and recorded, affects Group Policy Object (GPO) settings, and alters entries in the Windows system registry.
InfoWeek introduced the FDCC to mostly administrators and engineers with the article titled ‘The Feds Don’t Allow It. Should You?’ written by Kelly Jackson Higgins of DarkReading.com and published on February 4, 2008.
Due to the complexity of the guidelines response initially was slow. Implementation took time while the settings were internally researched by both government and enterprise implementation techs. The NIST and the NSA published guidelines in hundreds-of-page texts and introduced what they called SCAP files for applications. (See Wikipedia SCAP page)
The Windows platform was built for easy interoperability and networking and therefore left opportunities within the operating systems for all types of auto- and semi-automatic connections to other computers. These weren’t flaws or programming mistakes, it was purposefully built that way. An example of this can be found by looking at the Windows Remote Connection program which is ''enabled by default'' after a typical Windows operating system installation. The FDCC/USGCB configuration, for instance, reverses that setting so that you have to manually re-enable to allow remote connections.
Requirements
Organizations required to document FDCC
compliance
Compliance can mean:
Healthcare
* Compliance (medicine), a patient's (or doctor's) adherence to a recommended course of treatment
* Compliance (physiology), the tendency of a hollow organ to resist recoil toward its original dimensions (this is a ...
can do so by using
SCAP
SCAP may refer to:
* S.C.A.P., an early French manufacturer of cars and engines
* Security Content Automation Protocol
* ''The Shackled City Adventure Path'', a role-playing game
* SREBP cleavage activating protein
* Supervisory Capital Assessment ...
tools.
There are 600+ settings in the average FDCC/USGCB document – but not all of them are usable for the average small or home office (SOHO) computer. For instance, released on 20 June 2008, FDCC Major Version 1.0 specifies 674 settings.
For example, "all wireless interfaces should be disabled".
In recognition that not all recommended settings will be practical for every system, exceptions (such as "authorized enterprise wireless networks") can be made if documented in an FDCC deviation report.
Strict implementation of all of the recommended settings has been known to cause usability issues. The NIST publishes a list of known issues and it can be found here (
https://usgcb.nist.gov/usgcb/microsoft_content.html). There are a few third-party software vendors that have emerged that claim to have tested settings in a SOHO environment however, at this time, the general public still remains relatively unaware of the FDCC and USGCB security settings developed and put forward by the NIST.
External links
*
References
{{Reflist
Computer security