19.07.2013 Views

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Active Directory Checklist, V1R1.2 Field Security Operations<br />

22 September 2006 Defense Information Systems Agency<br />

DS05.0200 Synch\Maint Code \ Data File Locations<br />

STIG ID \ V-Key DS05.0200 \ V0011786<br />

Severity Cat III<br />

Short Name Synch\Maint Code \ Data File Locations<br />

IA Controls DCSP-1<br />

MAC /Conf 1-CSP, 2-CSP<br />

References AD STIG 2.3.1.5<br />

Long Name: The source code for a directory synchronization or maintenance application is<br />

located in the same directory as data that is input to or output from the<br />

application.<br />

Checks:<br />

• With the assistance of the application SA, determine the directories containing<br />

synchronization or maintenance program *source* files and a list of the<br />

directories containing *data* files read or written by the synchronization or<br />

maintenance application.<br />

[Retain this *data* file location information for use in subsequent checks.]<br />

• Compare the names of directories containing program source files with those<br />

containing input or output data.<br />

• If synchronization or maintenance program source files are contained in the same<br />

directory as input or output data, then this is a Finding.<br />

Note: This check *does* apply to cases where COTS applications have been<br />

extended or modified by the addition of local programs. For example, locally written<br />

Management Agents (MAs) for MIIS are included in the scope of this check.<br />

UNCLASSIFIED<br />

5-35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!