SV-9033r2_rule
V-8536
Trust - Non-DoD
AD.0181
CAT I
10
Obtain DAA approval and document external, forest, or realm trust relationship. Or obtain documentation of the network connection approval and explicit trust approval by the DAA.
1. Refer to the list of identified trusts obtained in a previous check (V8530).
2. For each of the identified trusts, determine if the other trust party is a non-DoD entity. For example, if the fully qualified domain name of the other party does not end in “.mil”, the other party is probably not a DoD entity.
3. Review the local documentation approving the external network connection and documentation indicating explicit approval of the trust by the DAA.
4. The external network connection documentation is maintained by the IAO\NSO for compliance with the Network Infrastructure STIG.
5. If any trust is defined with a non-DoD system and there is no documentation indicating approval of the external network connection and explicit DAA approval of the trust, then this is a finding.
V-8536
False
AD.0181
1. Refer to the list of identified trusts obtained in a previous check (V8530).
2. For each of the identified trusts, determine if the other trust party is a non-DoD entity. For example, if the fully qualified domain name of the other party does not end in “.mil”, the other party is probably not a DoD entity.
3. Review the local documentation approving the external network connection and documentation indicating explicit approval of the trust by the DAA.
4. The external network connection documentation is maintained by the IAO\NSO for compliance with the Network Infrastructure STIG.
5. If any trust is defined with a non-DoD system and there is no documentation indicating approval of the external network connection and explicit DAA approval of the trust, then this is a finding.
M
Information Assurance Officer
870