Skip to main content
CUI

Vulnerability V-243483

Back

V-243483

CAT I

A controlled interface must have interconnections among DoD information systems operating between DoD and non-DoD systems or networks.

Ships Affected
1
Total Findings
1
Open
0
Closed
0

Check Text

1. Refer to the list of identified trusts obtained in a previous check (V8530). 2. For each of the identified trusts, determine if the other trust party is a non-DoD entity. For example, if the fully qualified domain name of the other party does not end in ".mil", the other party is probably not a DoD entity. 3. Review the local documentation approving the external network connection and documentation indicating explicit approval of the trust by the DAA. 4. The external network connection documentation is maintained by the IAO\NSO for compliance with the Network Infrastructure STIG. 5. If any trust is defined with a non-DoD system and there is no documentation indicating approval of the external network connection and explicit DAA approval of the trust, then this is a finding.

Fix Text

Obtain DAA approval and document external, forest, or realm trust relationship. Or obtain documentation of the network connection approval and explicit trust approval by the DAA.

STIG Reference

STIG
Active Directory Domain Security Technical Implementation Guide
Version
3
Release
7
Rule ID
SV-243483r959010_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_ADDomain_V3R5_20251023-171837.ckl
Unassigned 2026-01-14T12:57:36.435963 View in Context
CUI