Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-36434 | AD.0004 | SV-47840r2_rule | Medium |
Description |
---|
Personnel who are system administrators must log on to domain systems only using accounts with the minimum level of authority necessary. Only system administrator accounts used exclusively to manage domain workstations may be members of an administrators group for domain workstations. A separation of administrator responsibilities helps mitigate the risk of privilege escalation resulting from credential theft attacks. |
STIG | Date |
---|---|
Active Directory Domain Security Technical Implementation Guide (STIG) | 2017-12-15 |
Check Text ( C-44676r3_chk ) |
---|
Review the membership groups in Active Directory Users and Computers. Membership groups must be designated at the domain level specifically for domain workstation administrators. Domain workstation administrator groups and any accounts that are members of the groups must be documented with the IAO. Each domain workstation administrator must have a separate unique account specifically for managing domain workstations. If any account listed in a domain workstation administrator group is a member of other administrator groups including the Enterprise Admins group, the Domain Admins group, or domain member server administrator groups, this is a finding. |
Fix Text (F-40966r3_fix) |
---|
Create the necessary documentation that identifies the members of domain workstation administrator groups. Ensure that each member has a separate unique account that can only be used to manage domain workstations. Remove any domain workstation administrator accounts from other administrator groups. |