19.07.2013 Views

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

ACTIVE DIRECTORY SECURITY CHECKLIST ... - Leet Upload

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Active Directory Checklist, V1R1.2 Field Security Operations<br />

22 September 2006 Defense Information Systems Agency<br />

DS10.0181 Trust Relationship Inter-Organization<br />

STIG ID \ V-Key DS10.0181 \ V0008536<br />

Severity Cat I<br />

Short Name Trust Relationship Inter-Organization<br />

IA Controls ECIC-1<br />

MAC /Conf 1-CS, 2-CS, 3-CS<br />

References AD STIG 2.3.3.2<br />

Network Infrastructure STIG 3.1<br />

Long Name: An external, forest, or realm AD trust relationship is defined between a DoD<br />

system and a non-DoD system without explicit approval of the DAA and<br />

appropriate documentation of the external network connection(s).<br />

Checks:<br />

• Refer to the list of actual trusts obtained in check DS10.0100.<br />

• For each of the actual trusts, determine if the other trust party is a non-DoD entity.<br />

For example, if the fully qualified domain name of the other party does not end in<br />

“.mil”, the other party is probably not a DoD entity.<br />

• Review the local documentation approving the external network connection and<br />

documentation indicating explicit approval of the trust by the DAA.<br />

- The external network connection documentation is maintained by the IAO\NSO<br />

for compliance with the Network Infrastructure STIG.<br />

• If any trust is defined with a non-DoD system and there is no documentation<br />

indicating approval of the external network connection *and* explicit DAA<br />

approval of the trust, then this is a Finding.<br />

UNCLASSIFIED<br />

5-18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!