DMARC DNS record inheritance and DMARC alignment requirements
To simplify, DMARC is based on the domain
in the 'From:' header, and what policy (if any) that domain specifies.
As I've written about (and rediscovered) more than once (here and here),
DMARC will look up the DNS record for the
DMARC policy in exactly one of two places, either in the exact From:
domain or on the organization's top level domain. In other words,
if a message has a From: of 'someone@breaking.news.example.org', a
receiver will first look for a DMARC TXT DNS record with the name
_dmarc.breaking.news.example.org and then one with the name
_dmarc.example.org.
(But there will be no lookup for _dmarc.news.example.org.)
DMARC also has the concept of policy inheritance, where the example.org DMARC DNS TXT record can specify a different DMARC policy for the organizational domain than for subdomains that don't have their own policy. For example, example.org could specify 'p=reject; sp=none' to say that 'From: user@example.org' should be rejected if it fails DMARC but it has no views on a default for 'From: user@news.example.org'.
If you're an innocent person, you might think that if your organization has 'sp=none' on its organization policy, you don't have to be concerned about the DMARC (and DKIM, and SPF) behavior of sub-names that don't have their own DMARC records, including hosts that send as 'From: local-account@host.dept.example.org'. Your organizational policy says 'sp=none', meaning don't do anything with sub-names for DMARC, and surely everyone will follow that.
This is unfortunately not quite true in an environment where people care about DKIM results regardless of DMARC policy settings. The problem is DKIM (and SPF) alignment. Under relaxed DKIM alignment, a 'From: flash@eng.news.example.org' would pass if it's DKIM signed by anything in example,org, for example 'eng.example.org'. Under strict DKIM alignment, it must be signed specifically by 'eng.news.example.org'.
The choice of what DKIM alignment to require is not a 'policy' and
is not covered by 'p=' or 'sp=' in DMARC DNS TXT records. It's
instead covered by a separate parameter, 'adkim=', and there is no
'sadkim=' parameter that only applies to subdomains. This means
that there's no way for example.org to change the alignment policy
for just 'From: user@example.org'; the moment they set 'adkim=s'
in the _dmarc.example.org DNS TXT record, all sub-names without
their own _dmarc.<whatever> records also switch to strict DKIM
alignment. Even if the top level domain specifies 'sp=none', various
mail systems out there may actively reject your mail because they
no longer consider it properly aligned
or increase their suspicion score a bit due to the lack of alignment
(in some views your mail went from 'properly DKIM signed' to 'not
properly DKIM signed').
The only way to deal with this is the same as with policy inheritance. Any host or domain name within your (sub-)organization that appears in From: headers must have its own valid DMARC DNS TXT record. If you want strict DKIM alignment you need to set that as 'adkim=s'. If you want relaxed alignment in theory that's the default but you might find it clearer to explicitly set 'adkim=r' (and probably 'aspf=r', also for clarity).
(Setting alignment explicitly makes it clear to other people and future you that you're deliberately choosing an alignment that might wind up different from your top level organizational alignment.)
PS: As far as I can see this is the behavior the DMARC RFC implicitly requires for all DMARC settings other than 'p=' (which has the 'sp=' version), but I could be wrong and missing something.