19.07.2013 Views

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Active Directory Checklist, V1R1.2 Field Security Operations<br />

22 September 2006 Defense Information Systems Agency<br />

DS10.0170 Trust Relationship Need<br />

STIG ID \ V-Key DS10.0170 \ V0008533<br />

Severity Cat II<br />

Short Name Trust Relationship Need<br />

IA Controls ECAN-1, ECCD-1, ECCD-2<br />

MAC /Conf 1-CS, 2-CS, 3-CSP<br />

References AD STIG 2.3.3.2<br />

Long Name: An external, forest, or realm AD trust relationship is defined where access<br />

requirements do not support the need.<br />

Checks:<br />

• Refer to the list of actual trusts obtained in check DS10.0100.<br />

• For each of the actual trusts, review the local documentation maintained by the<br />

IAO to confirm that the trust supports a known access requirement.<br />

Note: The objective of this check is verification that there is a *current* need for<br />

the trust to exist.<br />

• If it cannot be confirmed that each trust supports a known access requirement,<br />

then this is a Finding.<br />

DS10.0180 Trust Relationship Inter-Classification Levels<br />

STIG ID \ V-Key DS10.0180 \ V0008534<br />

Severity Cat I<br />

Short Name Trust Relationship Inter-Classification Levels<br />

IA Controls ECIC-1<br />

MAC /Conf 1-CS, 2-CS, 3-CS<br />

References AD STIG 2.3.3.2<br />

Long Name: An external, forest, or realm AD trust relationship is defined between systems at<br />

different classification levels.<br />

Checks:<br />

• Refer to the list of actual trusts obtained in check DS10.0100 and the trust<br />

documentation maintained by the IAO. Disregard any trusts with non-DoD<br />

organizations as these trusts are examined in check DS10.0181.<br />

• For each of the actual trusts between DoD organizations, compare the<br />

classification level (unclassified, confidential, secret, top secret) of the domain<br />

being reviewed with the classification level of the other trust party as noted in the<br />

IAO documentation.<br />

• If the classification level of the domain being reviewed is different than the<br />

classification level of any of the entities for which a trust relationship is defined,<br />

then this is a Finding.<br />

UNCLASSIFIED<br />

5-17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!