STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Active Directory Domain Security Technical Implementation Guide

V-243481

CAT II (Medium)

Access to need-to-know information must be restricted to an authorized community of interest.

Rule ID

SV-243481r959010_rule

STIG

Active Directory Domain Security Technical Implementation Guide

Version

V3R7

CCIs

CCI-000366

Discussion

Because trust relationships effectively eliminate a level of authentication in the trusting domain or forest, they represent less stringent access control at the domain or forest level in which the resource resides. To mitigate this risk, trust relationships must be documented so that they can be readily verified during periodic inspections designed to validate only approved trusts are configured in AD.

Check Content

1. Before performing this check, perform V-243494, which validates the trusts within the documentation are current within AD.

2. Obtain documentation of the site's approved trusts from the site representative.  

3. For each of the identified trusts, verify the documentation includes a justification or explanation of the need-to-know basis of the trust. 

4. If the need for the trust is not documented, this is a finding.

Fix Text

Delete the unneeded trust relationship or document the access requirement or mission need for the trust.