Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-33625 | Exch-3-807 | SV-44045r1_rule | ECSC-1 | Medium |
Description |
---|
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subsequent exploit to one application can lead to an exploit of other applications sharing the same security context. For example, an exploit to a web server process that leads to unauthorized administrative access to the host system can most likely lead to a compromise of all applications hosted by the same system. Email services should be installed on a partition that does not host other applications. Email services should never be installed on a Domain Controller / Directory Services server. |
STIG | Date |
---|---|
Exchange 2010 Client Access Server STIG | 2014-03-11 |
Check Text ( C-41732r1_chk ) |
---|
Access Windows Explorer and identify the OS partition. Navigate to configured partitions, and access the ‘Program Files’ directory. Note the installation partition for Microsoft Exchange. If Exchange resides on a partition other than that of the OS, and does not have other applications installed (without associated approval from the IAO), this is not a finding. |
Fix Text (F-37517r1_fix) |
---|
Install Exchange on a dedicated application partition separate than that of the OS. |