UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Access to need-to-know information must be restricted to an authorized community of interest.


Overview

Finding ID Version Rule ID IA Controls Severity
V-8533 AD.0170 SV-9030r2_rule ECAN-1 Medium
Description
Because trust relationships effectively eliminate a level of authentication in the trusting domain or forest, they represent less stringent access control at the domain or forest level in which the resource resides. To mitigate this risk, trust relationships must be documented so that they can be readily verified during periodic inspections designed to validate only approved trusts are configured in AD.
STIG Date
Active Directory Domain Security Technical Implementation Guide (STIG) 2014-12-18

Details

Check Text ( C-7696r1_chk )
1. Before performing this check, perform V-8530 which validates the trusts within the documentation are current within AD.

2. Obtain documentation of the site's approved trusts from the site representative.

3. For each of the identified trusts, verify that the documentation includes a justification or explanation of the need-to-know basis of the trust.

4. If the need for the trust is not documented, then this is a finding.
Fix Text (F-8062r1_fix)
Delete the unneeded trust relationship or document the access requirement or mission need for the trust.