Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-221257 | EX16-ED-000620 | SV-221257r612603_rule | Medium |
Description |
---|
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subsequent exploit to one application can lead to an exploit of other applications sharing the same security context. For example, an exploit to a web server process that leads to unauthorized administrative access to the host system can most likely lead to a compromise of all applications hosted by the same system. Email services should be installed on a partition that does not host other applications. Email services should never be installed on a Domain Controller/Directory Services server. |
STIG | Date |
---|---|
Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide | 2020-12-10 |
Check Text ( C-22972r411897_chk ) |
---|
Review the Email Domain Security Plan (EDSP). Determine the directory where Exchange is installed. Open Windows Explorer. Navigate to the location where Exchange is installed. If Exchange resides on a directory or partition other than that of the OS and does not have other applications installed (without associated approval from the ISSO), this is not a finding. |
Fix Text (F-22961r411898_fix) |
---|
Update the EDSP to reflect the directory where Exchange is installed. Install Exchange on a dedicated application directory or partition separate than that of the OS. |