Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-8534 | AD.0180 | SV-9031r1_rule | ECIC-1 | High |
Description |
---|
If a robust cross-domain solution is not used, then it could permit unauthorized access to classified data. To support secure access between resources of different classification levels, the solution must meet discretionary access control requirements. There are currently, no DOD- approved solutions. Further Policy Details: Do not define trust relationships between domains, forests, or realms with resources at different classification levels. The configuration of a trust relationship is one of the steps used to allow users in one AD domain to access resources in another domain, forest, or Kerberos realm. (This check does not apply to trusts with non-DoD organizations since these trusts are examined in a previous check.) |
STIG | Date |
---|---|
Active Directory Domain Security Technical Implementation Guide (STIG) | 2014-01-07 |
Check Text ( C-7698r1_chk ) |
---|
1. Refer to the list of identified trusts and the trust documentation provided by the site representative. (Obtained in V-8530) 2. For each of the identified trusts between DoD organizations, compare the classification level (unclassified, confidential, secret, and top secret) of the domain being reviewed with the classification level of the other trust party as noted in the documentation. 3. If the classification level of the domain being reviewed is different than the classification level of any of the entities for which a trust relationship is defined, then this is a finding. |
Fix Text (F-8063r1_fix) |
---|
Delete the trust relationship that is defined between entities with resources at different DoD classification levels. |