19.07.2013 Views

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Active Directory Checklist, V1R1.2 Field Security Operations<br />

22 September 2006 Defense Information Systems Agency<br />

DS05.0380 Synch\Maint Privileged Remote Access Control<br />

STIG ID \ V-Key DS05.0380 \ V0011774<br />

Severity Cat II<br />

Short Name Synch\Maint Privileged Remote Access Control<br />

IA Controls EBRP-1<br />

MAC /Conf 1-CS, 2-CS, 3-CS<br />

References AD STIG 2.3.4<br />

Long Name: Privileged remote access to a synch\maint implementation is not implemented<br />

through a managed access control point and with increased session security<br />

mechanisms.<br />

Checks:<br />

• Interview the Application SA.<br />

• With the assistance of the SA, NSO, or network reviewer as required, review the<br />

site network diagram(s) and application documentation to determine if the<br />

synch\maint implementation supports and utilizes *privileged* remote access.<br />

- For example, determine if the application SA located in one enclave can access<br />

the server hosting the synch\maint implementation in another enclave.<br />

[Retain this remote access information for use in a subsequent check.]<br />

• If the synch\maint implementation does *not* support privileged remote access,<br />

then this check is Not Applicable.<br />

• If the synch\maint implementation *does* support and utilize privileged remote<br />

access, review the site network diagram(s) with the assistance of the SA, NSO, or<br />

network reviewer as required, to determine if a managed access control point with<br />

increased session security mechanisms (such as two-factor authentication) is used.<br />

- A remote access server (RAS) located in a DMZ is an example of a compliant<br />

solution. Additional information for remote access solutions is located in the<br />

Network Infrastructure STIG.<br />

• If the synch\maint implementation supports and utilizes privileged remote access<br />

and the appropriate access controls are not used, then this is a Finding.<br />

UNCLASSIFIED<br />

3-26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!