Classified Reproduction - Following guidance for System to Media Transfer of Data from systems connected specifically to the SIPRNet In-Accordance-With (IAW) US Cybercom CTO 10-133 . Failure to implement required TEMPEST countermeasures could leave the system(s) vulnerable to a TEMPEST attack. When you open the Windows Defender Firewall for the first time, you can see the default settings applicable to the local computer. Information Security (INFOSEC) - Secure Room Storage Standards - Perimeter Construction using Proper Permanent Construction Materials for True Ceiling, Walls and Floors. Information Assurance - System Access Control Records (DD Form 2875 or equivalent). Failure to verify citizenship and proper authorization for access to either sensitive or classified information could enable personnel to have access to classified or sensitive information to Foreign National (FN) Systems Access - Local Nationals (LN) Overseas System Access - Vetting for Privileged Access. A PDS that is not constructed and physically protected as required could result in the covert or undetected interception of classified information. Failure to meet standards IAW the DoD Manual 5200.01, Volume 3, Appendix to Enclosure 3, for ensuring that there is required structural integrity of the physical perimeter surrounding a classified Information Security (INFOSEC) - Secure Room Storage Standards - Intrusion Detection System (IDS). Failure to designate position sensitivity could result in personnel having access to classified Failure to maintain proper separation could result in detectable emanations of classified information. Lack of automatic emergency lighting and exits can cause injury and/or death to employees and Failure to maintain proper separation could result in detectable emanations of classified information. Failure to screen guards could result in employment of unsuitable personnel who are responsible Failure to meet standards for ensuring integrity of the intrusion detection system signal transmission supporting a secure room (AKA: collateral classified open storage area) containing SIPRNet Information Assurance - Unauthorized Wireless Devices - Connected to the SIPRNet. Vault/Secure Room Storage Standards - Access Control System Records Maintenance, which includes documented procedures for removal of access. Unauthorized access by foreign nationals to Information Systems can result in, among other things, security incidents, compromise of the system, or the introduction of a Foreign National (FN) Administrative Controls - Written Procedures and Employee Training. Failure to have documented procedures in an SOP could result in a security incident due to lack of REFERENCES: Failure to provide security training to ALL employees results in a weak security program and could lead to the loss or compromise of classified or sensitive information. CJCSI 6510.01F, INFORMATION ASSURANCE Security Incident/Spillage - Lack of Procedures or Training for Handling and Reporting. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. Classified Multi-Functional Devices (MFD) include printers, copiers, scanners and facsimile capabilities and contain hard drives that maintain classified data or images. Classified Reproduction - Document Copying Procedures: This STIG Check (AKA: Vulnerability (Vul)) concerns ONLY PROCEDURES for the reproduction (copying) of classified DOCUMENTS on Multi-Functional Devices (MDF) connected to the DISN. classified or sensitive information. Protected Distribution System (PDS) Construction - Continuously Viewed Carrier. A contingency plan is necessary to reduce mission impact in the event of Information Assurance - System Security Incidents (Identifying, Reporting, and Handling). Failure to test IDS functionality on a periodic basis could result in undetected alarm sensor or other system failure. Failure to develop a COOP and test it periodically can result in the partial or total loss of operations REFERENCES: Foreign National (FN) System Access - FN or Immigrant Aliens (not representing a foreign government or entity) with LAA Granted Uncontrolled Access, Classified Destruction - Improper Disposal of Automated Information System (AIS) Hard Drives and Storage Media. SC-3 Information Assurance - SIPRNET Connection Approval Process (CAP). REFERENCES: The framework of the previous rules has not been altered. REFERENCES: Lack of automatic emergency lighting can cause injury and/or death to employees and service. Security-in-Depth (AKA: Defense-in-Depth) - Minimum Physical Barriers and Access Control Measures for Facilities or Buildings Containing DISN (SIPRNet/NIPRNet) Connected Assets. Failure to subject personnel to periodic reinvestigation can result in derogatory information not Procedures covering security, transport, handling, etc. Unless software use involves an approved Cross Domain Solution (CDS) it can Information Assurance - KVM Switch (Port Separation) on CYBEX/Avocent 4 or 8 port. It is a suitable alternative for the two types of interior PDS, which are Hardened Carrier or Continuously Viewed Carrier. Information Assurance - Network Connections - Physical Protection of Classified Network Devices such as Routers, Switches and Hubs (SIPRNet or Other Classified Networks or Systems Being Inspected). CJCSI 6510.01F, INFORMATION ASSURANCE (IA) AND SUPPORT Information Security (INFOSEC) - Vault/Secure Room Storage Standards - Openings in Perimeter Exceeding 96 Square Inches. This memorandum, signed on November 8, 2021, updates and replaces DoD CIO Memorandum "Commercial Public Key Infrastructure Certificates on Public-Facing DoD Websites" dated November 6, 2020. Information Assurance - System Training /Users, Background Investigations - Completed based Upon IT/Position Sensitivity Levels. If accurate records of authorized users are not maintained, then unauthorized personnel could have Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil. could permit loss, destruction of data or equipment or a denial of service. Failure to follow guidance for disabling removable media drives on devices connected to the SIPRNet or if approved by the local DAA failure to follow US CYBERCOM procedures for using removable End-of-Day Checks - Organizations that process or store classified information must establish a system of security checks at the close of each duty and/or business day to ensure that any area where classified information is used or stored is secure. AECS Transmission lines traversing an uncontrolled area (not within at least a Secret Controlled Access Area (CAA) ) shall use line supervision OR Electrical, mechanical, or electromechanical access control devices, which do not constitute an AECS that are used to control access during duty hours must have all electrical components, that traverse outside minimally a Secret Controlled Access Area (CAA), secured within conduit. The DoD Cyber Exchange is sponsored by Failure to document procedures for removal of access and inadequate maintenance of access records for both active and removed persons could result in unauthorized persons having unescorted access Vault/Secure Room Storage Standards - Primary IDS Monitoring Location Outside the Monitored Space. DoD Security and Cybersecurity Staff Appointment, Training/Certification and Suitability. A PDS that is not constructed and configured as required could result in the undetected interception of classified information. Failure to establish a good working relationship with the supporting/local CI agency and lack of proper CI training for site/organization employees could result in not being informed of local Foreign National System Access - Local Access Control Procedures, Protected Distribution System (PDS) Documentation - Request for Approval Documentation. Failure to verify citizenship and proper authorization for access to either sensitive or classified information could enable personnel to have access to classified or sensitive information to Foreign National (FN) Administrative Controls - Proper Investigation and Clearance for Access to Classified Systems and/or Information Assurance (IA) Positions of Trust. It should be used when the unencrypted data transmission line is . Hence, the content and flow of the checklist does not change significantly. Classified Multi-Functional Devices (MFD) include copiers and contain hard drives that maintain classified data or images. Controlled Unclassified Information (CUI) - Employee Education and Training, Classified Emergency Destruction Plans - Develop and Make Available. INTRODUCTION 1.1 Overview The .NET Framework Security Readiness Review (SRR) targets conditions that undermine the integrity of security, contribute to inefficient security operations and administration, or may lead Defense Information Systems Agency (DISA), National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), DISA Has Released the Traditional Security Checklist, V2R1, https://public.cyber.mil/stigs/downloads/. Traditional Security Checklist: 2020-08-26: Details. Visitor Control - To Facility or Organization with Information System Assets Connected to the DISN. Failure to subject personnel who monitor the IDS alarms to a trustworthiness determination can Check Text ( C-49261r770150_chk ) Check to ensure: 1. Failure to subject personnel who monitor the IDS alarms to a trustworthiness determination can result in the inadvertent or deliberate unauthorized access to, or release of classified Intrusion Detection System (IDS) Installation and Maintenance Personnel - Suitability Checks. Failure to meet standards for ensuring integrity of the intrusion detection system signal transmission supporting a secure room (AKA: collateral classified open storage area) containing SIPRNet Information Security (INFOSEC) - Secure Room Storage Standards - Door Construction. REFERENCES: Foreign National (FN) Administrative Controls - Contact Officer Appointment. Failure to subject personnel who install and maintain the IDS alarms to a trustworthiness determination can result in the inadvertent or deliberate unauthorized exposure to or release of Risk Assessment -Holistic Review (site/environment/information systems). Lack of temperature controls can lead to fluctuations in temperature which could be potentially Failure to ensure that there is structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classified open storage area) IAW DoD Manual 5200.01, Volume 3 could Vault/Secure Room Storage Standards - IDS Alarm Monitoring Indicators, both audible and visual (Alarm Status) must be displayed for each sensor or alarmed zone at the monitoring station. Industrial Security - Contractor Visit Authorization Letters (VALs). Environmental IA Controls - Emergency Lighting and Exits - Documentation and Testing. Buried carriers are normally used to extend a PDS between CAAs that are located in different buildings. STIG Description. Failure to mark CUI in an approved manner can result in the loss or compromise of sensitive Please use the current Tomcat Application Server 9 STIG. Lack of automatic emergency lighting can also cause a disruption in Environmental IA Controls - Emergency Power Shut-Off (EPO). Not having a wireless policy and/or warning signs at entrances could result in the unauthorized introduction of wireless devices into classified processing areas. Available Profiles Findings (MAC III - Administrative Sensitive) Traditional Security Checklist: 2021-07-14: Details. Failure to properly destroy classified material can lead to the loss or compromise of classified or New and updated STIGs are now being published with the modified content. Traditional Security Checklist - Ver 2, Rel 3 754.97 KB 01 Nov 2022. For those who do not have a CAC that has DoD Certificates, the Checklist is also available from https://public.cyber.mil/stigs/downloads/. Allowing wireless devices in the vicinity of classified processing or discussion could directly result in the loss or compromise of classified or sensitive information either intentionally or Information Assurance - KVM or A/B Switch not listed on the NIAP U.S. Government Approved Protection Products Compliance List (PCL) for Peripheral Sharing Switches. The new Traditional Security Checklist consolidates all checks into one document and is more granular both in the increased number of checks (151 total versus 96 total in the old checklists) and the details about how to conduct them. Failure to mark CUI in an approved manner can result in the loss or compromise of sensitive information. Failure to handle CUI in an approved manner can result in the loss or compromise of sensitive information. vulnerable to a TEMPEST attack. REFERENCES: Classified Working Papers are properly marked, destroyed when no longer needed, or treated as a finished document after 180 days. Defense Information Systems Agency (DISA). Protected Distribution System (PDS) Construction - Point of Presence (PoP) and Terminal Equipment Protection. Environmental IA Controls - Fire Detection and Suppression. A PDS that is not constructed and configured as required could result in the undetected interception of classified information. Lack of adequate or Improper procedures for management of safes/vaults and secure rooms could result in the loss or compromise of classified material. Failure to investigate personnel based upon their position sensitivity could result in unauthorized Failure to recognize, investigate and report information systems security incidents could result in TEMPEST - Red/Black separation (Processors). A PDS that is not constructed and physically protected as required could result in the covert or undetected interception of classified information. CJCSI Information Assurance - Accreditation Documentation. If you are unable to find and download the content, please report broken link issues to the DoD Cyber Exchange Web team at dod.cyberexchange@mail.mil. For all questions related to the Checklist content, please contact the DISA STIG Customer Support Desk at disa.stig_spt@mail.mil. sensitive information. Failure to properly mark classified material could result in the loss or compromise of classified Failure to provide proper oversight of Foreign National partners or employees and limit access to classified and sensitive information can result in the loss or compromise of NOFORN information. A lack of an emergency shut-off switch or a master power switch for electricity to IT equipment REFERENCES: Controlled Unclassified Information (CUI) - Local Policy and Procedure, Foreign National System Access - Local Access Control Procedures, Environmental IA Controls - Fire Inspections/ Discrepancies. Within mobile tactical situations a hardened carrier is not Information Security (IS) - Continuous Operations Facility: Access Control Monitoring Methods. CJCSI 6510.01F, INFORMATION Vault/Secure Room Storage Standards - Automated Entry Control System (AECS) Door Locks: Electric Strikes and/or Magnetic Locking devices used in access control systems shall be heavy duty, industrial grade and be configured to fail secure in the event of a total loss of power (primary and backup). Failure to have a physical security program will result in an increased risk to DoD Information Systems; including personnel, equipment, material and documents. Monitor Screens - Disable Access by CAC or Token Removal, or Lock Computer via Ctrl/Alt/Del. Failure to have written guidance to provide guidance for end-of-day (EOD) checks could lead to such checks not being properly conducted. Information Assurance - Accreditation Documentation. Position of Trust - Knowledge of Responsibility to Self Report Derogatory Information. DoD 5220.22-M (NISPOM), Environmental IA Controls - Fire Detection and Suppression. Failure to meet construction standards could result in the undetected loss or compromise of classified material. Controlled Unclassified Information (CUI) - Local Policy Procedure. REFERENCES: Classified Transmission - Electronic Means using Cryptographic System Authorized by the Director, NSA. Failure to properly encrypt classified data in transit can lead to the loss or compromise of classified or sensitive information. Failure to meet standards for ensuring that there is an adequate commercial and back-up power sources for IDS/AECS with uninterrupted failover to emergency power could result in a malfunction of Vault/Secure Room Storage Standards - Automated Entry Control System (AECS) Records Maintenance, which includes documented procedures for granting and removal of access. Position of Trust - Training Covering Employee Standards of Conduct and Personal Responsibilities, Protected Distribution System (PDS) Monitoring - Initial Inspection, Protected Distribution System (PDS) Monitoring - Technical Inspections, Environmental IA Controls - Voltage Control (power). Failure to properly destroy classified or sensitive material can lead to the loss or compromise of classified or sensitive information. Unclassified (NIPRNet) network connections that are not properly protected in their physical environment are highly vulnerable to unauthorized access, resulting in the probable loss or compromise Failure to complete a DD Form 254 (Contract Security Classification Specification) or to specify security clearance and/or IT requirements for all contracts that require access to classified Information Security (INFOSEC) - Safe/Vault/Secure Room Management. REFERENCES: Failure to have alternative power sources available can result in significant impact to mission accomplishment and information technology systems including potential loss of data and damage to the Information Security (INFOSEC) - Secure Room Storage Standards - Perimeter Construction using Proper Permanent Construction Materials for True Ceiling, Walls and Floors. Vault/Secure Room Storage Standards - Access Control System (ACS) Transmission Line Security: A Traditional Security Checklist (TSC) comprising 151 items. Inadequate physical protection of Intrusion Detection System or Automated Entry Control System servers, data base storage drives, or monitoring work stations could result in unauthorized access to Information Security (INFOSEC) - Secure Room Storage Standards - Balanced Magnetic Switch (BMS) on Perimeter Doors. Traditional Security Checklist: 2020-08-26: Details. Stay connected with UCF Twitter Facebook LinkedIn. Unauthorized access by foreign nationals to Information Systems can result in, among other things, Failure to use security in-depth can result in a facility being vulnerable to an undetected intrusion or an intrusion that cannot be responded to in a timely manner - or both. However, the rule numbers were modified as a result of importing the guidance into a new DoD Environmental IA Controls - Emergency Power. Foreign National (FN) Physical Access Control - (Identification Badges). If accurate records of authorized users are not maintained, then unauthorized personnel could have access to the system. Failure to provide proper oversight of Foreign National partners or employees and limit access to classified and sensitive information can result in the loss or compromise of NOFORN Information Assurance - System Security Operating Procedures (SOPs). Failure to develop procedures and training for employees to cover responsibilities and methods for limiting the access of unauthorized personnel to classified information reflected on information COMSEC Account Management - Appointment of Responsible Person. situations leading to a possible fire and loss of service. 2018 Network Frontiers LLCAll right reserved. Failure to use automatic voltage control can result in damage to the IT equipment creating a Checks are specifically oriented to each . REFERENCES: Controlled Unclassified Information - Marking/Labeling Media within Unclassified Environments (Not Mixed with Classified). security incidents, compromise of the system, or the introduction of a virus. A PDS that is not inspected and monitored as required could result in undetected access, sabotage or tampering of the unencrypted transmission lines. NIST Special Publication 800-53 (SP 800-53), Rev 4, Controls: End-of-Day Checks - Organizations that process or store classified information must establish a system of security checks at the close of each duty and/or business day to ensure that any area where classified information is used or stored is secure. Information Assurance - Network Connections - Physical Protection of Unclassified (NIPRNet) Network Devices such as Routers, Switches and Hubs. This Information Assurance - Unauthorized Wireless Devices - Portable Electronic Devices (PEDs) Used in Classified Processing Areas without Certified TEMPEST Technical Authority (CTTA) Review and Authorizing Official (AO) Approval. REFERENCES: Visitor Control - To Facility or Organization with Information System Assets Connected to the DISN. Controlled Unclassified Information (CUI) - Employee Education and Training. SF 701, Activity Security Checklist, shall be used to record such checks. Failure to control door access to a Continuous Operations Facility containing classified SIPRNET assets may result in immediate and potentially undetected access to classified information, with no Vault/Secure Room Storage Standards - IDS Access/Secure Control Units Must be Located within the Secure Room Space. Periodic Reinvestigations - Submitted in a Timely Manner based Upon Position Sensitivity and Type of Investigation Required. safeguards in place, creating a threat to the networks. REFERENCES: Failure to meet standards for maintenance and validation of structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classified open storage area) IAW DoD Manual Vault/Secure Room Storage Standards - IDS Access/Secure Control Units Must be Located within the Secure Room Space. Failure to properly encrypt classified data in transit can lead to the loss or compromise of Vault/Secure Room Storage Standards - Access Control System (ACS) Door Locks: Electric Strikes and/or Magnetic Locking devices used in access control systems shall be heavy duty, industrial grade and be configured to fail secure in the event of a total loss of power (primary and backup) . Security Technical Umsetzung Guides (STIGs) such provides a methodology for standardized secure installation and maintenance of DOD IA and IA-enabled devices press systems. The framework of the previous rules has not been altered. Documented local policies and procedures concerning what Foreign National (FN) Systems Access - Delegation of Disclosure Authority Letter (DDL), Foreign National (FN) Systems Access - Local Nationals Overseas System Access - (NIPRNet User). Protected Distribution System (PDS) Construction - Accessible Pull Box Security. Protected Distribution System (PDS) Monitoring - Technical Inspections, Physical Penetration Testing - of Facilities or Buildings Containing Information Systems (IS) Connected to the DISN. Position of Trust - Local Policy Covering Employee Personal Standards of Conduct and Responsibilities. access to classified can result in unauthorized personnel having access to classified. in a vulnerability to the DISN. 4 security audit checklists for preventative risk management Security audit best practices Security processes for tighter security safety Let's get started! CJCSI 6510.01F, INFORMATION ASSURANCE (IA) AND SUPPORT TO Information Assurance/Cybersecurity Training for System Users, Security Training - Information Security (INFOSEC) for ALL Employees; Military, Government Civilian and Contractor. This requirement concerns security of both the starting and ending points for PDS within proper physically protected and access controlled environments. Failure to meet standards for ensuring that there is structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classified open storage area) IAW DoD Manual 5200.01, Information Security (INFOSEC) - Secure Room Storage Standards - Balanced Magnetic Switch (BMS) on Perimeter Doors, Information Security (INFOSEC) - Secure Room Storage Standards - Intrusion Detection System (IDS). There are a variety of locking mechanisms that may be used to secure both primary and secondary doors for vaults and classified open storage areas (secure rooms). Physical Security Program - Physical Security Plan Development and Implementation with Consideration of Information Systems Assets. Failure to designate an appropriate IT level could result in an individual having access to an Classified Monitors/Displays (Physical Control of Classified Monitors From Unauthorized Viewing). Environmental IA Controls - Fire Inspections/ Discrepancies. What are security audits? The Information Security Oversight Office (ISOO): Non-Disclosure Agreement - Standard Form 312: no person may have access to classified information unless that person has a security clearance in accordance with DoDM 5200.02 and has signed a Standard Form (SF) 312, Classified Information Non-Disclosure Agreement (NDA), and access is essential to the accomplishment of a lawful and authorized Government function (i.e., has a need to know). A Command Cyber Readiness Inspection, or CCRI, is a Department of Defense led formal inspection to increase accountability and the security posture of DoD Information Networks according to DoD. A PDS that is not constructed, configured and physically secured as required could result in the undetected interception of classified information. REFERENCES: Lack of adequate or Improper procedures for management of safes/vaults and secure rooms could result in the loss or compromise of classified material. DoD 5220.22-M (NISPOM), Incorporating Change 2, 18 May 2016 Chapter 5, Environmental IA Controls - Emergency Lighting and Exits - Documentation and Testing. Failure to protect readable classified information printed from classified systems such as SIPRNet when removed from secure storage can lead to the loss or compromise of classified or sensitive Handling of Classified Documents, Media, Equipment - Written Procedures for when classified material/equipment is removed from a security container and/or secure room. Failure to provide current connection documentation to the DISN Connection Approval Office (CAO) and allowing a system to connect and operate without a current CAO approval can result in a Information Assurance - KVM Switch Use of Hot-Keys on SIPRNet Connected Devices. REFERENCES: Vault/Secure Room Storage Standards - Access Control During Working Hours Using Visual Control OR Automated Entry Control System (AECS) with PIN / Biometrics. Failure to request approval for connection of existing or additional KVM or A/B devices (switch boxes) for use in switching between classified (e.g., SIPRNet) devices and unclassified devices Information Assurance - Unauthorized Wireless Devices - No Formal Policy and/or Warning Signs. Failure to properly mark or handle classified documents can lead to the loss or compromise of classified or sensitive information. Environmental IA Controls - Emergency Lighting and Exits - Properly Installed. Protected Distribution System (PDS) Documentation - Signed Approval. Foreign National (FN) Physical Access Control - Areas Containing US Only Information Systems Workstations/Monitor Screens, Equipment, Media or Documents. Customers who have a CAC that has DoD Certificates can obtain the Checklist at https://cyber.mil/stigs/downloads/. National Disclosure Policy Storage/Handling of Classified Documents, Media, Equipment - must be under continuous personal protection and control of an authorized (cleared) individual OR guarded or stored in an approved locked security container (safe), vault, secure room, collateral classified open storage area or SCIF. Protected Distribution System (PDS) Construction - Sealed Joints. Protected Distribution System (PDS) Construction - Hardened Carrier, Foreign National (FN) Systems Access - Local Nationals Overseas System Access - (SIPRNet or Other Classified System or Classified Network being Reviewed). Controlled Unclassified Information - Transmission by either Physical or Electronic Means. National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), 2016-04-21 DoD CIO Memo - Use of Wearable Devices DoD Accredited Spaces with FAQ, A10 Networks Application Delivery Controller (ADC) NDM STIG Ver 1, A10 Networks Application Delivery Controller (ADC) Overview, Ver 1, A10 Networks Application Delivery Controller (ADC) STIG Ver 1 Release Memo, Active Directory Domain STIG - Ver 3, Rel 3, Active Directory Forest STIG - Ver 2, Rel 8, Adobe Acrobat Pro DC STIGs - Release Memo, Adobe Acrobat Professional DC Continuous Track STIG - Ver 2, Rel 1, Adobe Acrobat Reader DC Continuous Track STIG - Ver 2, Rel 1, Adobe Acrobat Reader DC Continuous Track STIG Benchmark - Ver 2, Rel 2, Adobe Acrobat Reader DC STIG Release Memo, Akamai KSD Service IL2 ALG STIG Version 1, Akamai KSD Service IL2 NDM STIG Version 1, Akamai KSD Service IL2 STIG Ver 1 Release Memo, Apache Tomcat Application Server 9 STIG - Ver 2, Rel 4, Apple macOS 11 (Big Sur) STIG - Ver 1, Rel 7, Apple macOS 12 (Monterey) STIG - Ver 1, Rel 6, Application Layer Gateway (ALG) SRG - Ver 1, Rel 2, Application Layer Gateway (ALG) SRG Release Memo - Ver 1, Application Security and Development STIG - Ver 5, Rel 2, AvePoint Compliance Guardian STIG - Ver 1, Rel 1, Backbone Transport Services (BTS) Policy STIG Ver 3 Release Memo, BlackBerry Enterprise Mobility Server (BEMS) 2.x STIG - Ver 1, Rel 3, BlackBerry Enterprise Mobility Server (BEMS) 3.x STIG - Ver 1, Rel 1, Canonical Ubuntu 18.04 LTS STIG - Ver 2, Rel 11, Canonical Ubuntu 18.04 LTS STIG Benchmark - Ver 2, Rel 9, Canonical Ubuntu 18.04 LTS STIG for Ansible - Ver 2, Rel 11, Canonical Ubuntu 20.04 LTS STIG - Ver 1, Rel 8, Canonical Ubuntu 20.04 LTS STIG Benchmark - Ver 1, Rel 6, Canonical Ubuntu 20.04 LTS STIG for Ansible - Ver 1, Rel 8, Cisco IOS XE Router NDM RTR STIG for Ansible - Ver 2, Rel 3, Cisco IOS XE Router STIG for Ansible - Ver 2, Rel 1, Cisco IOS-XE Router NDM STIG Benchmark - Ver 1, Rel 7, Cisco IOS-XE Router RTR STIG Benchmark - Ver 1, Rel 3, Citrix Virtual Apps and Desktops (VAD) 7.x STIG, Cloud Service Providers in FedRAMP Process, Crunchy Data PostgreSQL STIG - Ver 2, Rel 1, Database Security Requirements Guide (SRG) - Ver 2 Release Memo, Docker Enterprise 2.x Linux/Unix - Ver 2, Rel 1, Docker Enterprise 2.x Linux/Unix STIG for Ansible - Ver 1, Rel 1, DoD Annex for Application Software Extended Package for Web Browsers - Ver 1, Rel 1, DoD Annex for MDM Protection Profile V4.0 - Ver 1, Rel 3, DoD Annex for Mobile Device Fundamentals Protection Profile V3.2 - Ver 1, Rel 3, DoD Annex for PP - Module for MDM Agents V1.0 - Ver 1, Rel 3, DoD Enterprise DevSecOps Reference Design: CNCF Kubernetes, DoD Internet-NIPRNet DMZ STIG, Ver 3 Release Memo, EDB Postgres Advanced Server STIG - Ver 2, Rel 2, EDB Postgres Advanced Server v11 for Windows STIG - Ver 2, Rel 2, Enclave Test and Development STIG Release Memo, Esri ArcGIS Server 10.3 STIG - Ver 1, Rel 3, Esri ArcGIS Server 10.3 STIG Ver 1 Release Memo, ForeScout CounterACT ALG STIG - Ver 1, Rel 2, ForeScout CounterACT STIG Ver 1 Release Memo, General Purpose Operating System SRG - Ver 2, Rel 5, Google Chrome STIG Benchmark - Ver 2, Rel 8, Google Search Appliance STIG Ver 1 - Release Memo, How to Create and SRG-STIG ID Mapping Spreadsheet, HPE 3PAR StoreServ 3.2.x STIG - Ver 2, Rel 1, HPE 3PAR StoreServ OS STIG - Ver 1, Rel 1, HPE Nimble Storage Array STIG - Ver 1, Rel 1, IBM Aspera Platform 4-2 STIG - Ver 1, Rel 2, IBM Aspera Platform 4.2 STIG - Ver 1, Rel 1, IBM Hardware Management Console (HMC) STIG, IBM MaaS360 with Watson v10-x MDM STIG - Ver1, Rel 2, IBM MaaS360 with Watson v10-x MDM STIG Ver 1 Release memo, IBM MQ Appliance v9-0 STIG V1 Release Memo, IBM WebSphere Liberty Server STIG - Ver 1, Rel 2, IBM WebSphere Traditional V9.x STIG Version 1, IBM WebSphere Traditional V9.x STIG Version 1 Release Memo, IBM zVM Using CA VMSecure STIG - Ver 2, Rel 2, Interim Guidance for the Use of Canonical Names (CNAME) in Cloud Computing, Intrusion Detection and Prevention System SRG - Ver 2, Rel 6, Ivanti MobileIron Core MDM Server STIG - Ver 1, Rel 1, Ivanti MobileIron Sentry 9.x STIG - Ver 1 Rel 1, JIE Core Data Center (CDC) STIG Ver 2 Release Memo, JIE Enterprise Operations Center JIE Management Network (EOC/JMN) STIG Release Memo, JIE Enterprise Remote Access STIG, Ver 1 Release Memo, JIE Installation Campus Area Network STIG Release Memo, JIE Installation Processing Node (IPN) STIG Ver 2 Release Memo, Juniper SRX SG STIG for Ansible - Ver 1, Rel 1, Kubernetes Draft STIG Benchmark Comment Matrix, Kubernetes Draft STIG Benchmark Ver 1, Rel 0.1, MariaDB Enterprise 10.x STIG - Ver 1, Rel 2, McAfee Application Control 7.x STIG - Ver 1, Rel 3, McAfee Application Control 8.x STIG - Ver 2, Rel 1, McAfee Virus Scan 8.8 Overview - Ver 5, Rel 7, McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client STIG - Ver 1, Rel 3, Microsoft .NET Framework 4 STIG Benchmark - Ver 2, Rel 2, Microsoft .Net Framework 4.0 STIG - Ver 2, Rel 2, Microsoft .Net Framework Security Checklist - Ver 1, Rel 3, Microsoft Access 2010 STIG - Ver 1, Rel 10, Microsoft Access 2013 STIG - Ver 1, Rel 6, Microsoft Access 2016 STIG - Ver 1, Rel 1, Microsoft Azure SQL Database STIG - Ver 1, Rel 1, Microsoft Defender Antivirus STIG - Ver 2, Rel 4, Microsoft Defender Antivirus STIG Benchmark - Ver 2, Rel 4, Microsoft Edge STIG Benchmark - Ver 1, Rel 2, Microsoft Excel 2010 STIG - Ver 1, Rel 11, Microsoft Excel 2016 STIG - Ver 1, Rel 2, Microsoft Exchange 2010 Client Access STIG - Ver 1, Rel 9, Microsoft Exchange 2010 Edge STIG - Ver 1, Rel 14, Microsoft Exchange 2010 Edge Transport Server STIG - Ver 1, Rel 15, Microsoft Exchange 2010 Hub STIG - Ver 1, Rel 12, Microsoft Exchange 2010 Mailbox STIG - Ver 1, Rel 10, Microsoft Exchange 2010 Overview - Ver 1, Rel 6, Microsoft Exchange 2010 STIG Release Memo, Microsoft Groove 2013 STIG - Ver 1, Rel 3, Microsoft InfoPath 2010 STIG - Ver 1, Rel 11, Microsoft InfoPath 2013 STIG - Ver 1, Rel 5, Microsoft Internet Explorer 11 STIG - Ver 2, Rel 4, Microsoft Internet Explorer 11 STIG Benchmark - Ver 2, Rel 5, Microsoft Office 2010 Overview - Ver 1, Rel 12, Microsoft Office 2013 Overview - Ver 1, Rel 5, Microsoft Office 365 ProPlus STIG - Ver 2, Rel 9, Microsoft Office System 2010 STIG - Ver 1, Rel 12, Microsoft Office System 2013 STIG - Ver 2, Rel 1, Microsoft Office System 2016 STIG - Ver 2, Rel 2, Microsoft OneDrive for Business 2016 STIG - Ver 1, Rel 3, Microsoft OneNote 2010 STIG - Ver 1, Rel 9, Microsoft OneNote 2013 STIG - Ver 1, Rel 3, Microsoft OneNote 2016 STIG - Ver 1, Rel 2, Microsoft Outlook 2010 STIG - Ver 1, Rel 13, Microsoft Outlook 2013 STIG - Ver 1, Rel 13, Microsoft Outlook 2016 STIG - Ver 2, Rel 3, Microsoft PowerPoint 2010 STIG - Ver 1, Rel 10, Microsoft PowerPoint 2013 STIG - Ver 1, Rel 6, Microsoft PowerPoint 2016 STIG - Ver 1, Rel 1, Microsoft Project 2010 STIG - Ver 1, Rel 9, Microsoft Project 2013 STIG - Ver 1, Rel 4, Microsoft Project 2016 STIG - Ver 1, Rel 1, Microsoft Publisher 2010 STIG - Ver 1, Rel 11, Microsoft Publisher 2013 STIG - Ver 1, Rel 5, Microsoft Publisher 2016 STIG - Ver 1, Rel 3, Microsoft SharePoint 2013 STIG - Ver 2, Rel 3, Microsoft Sharepoint Designer 2013 STIG - Ver 1, Rel 3, Microsoft Skype for Business 2016 STIG - Ver 1, Rel 1, Microsoft Windows 10 STIG Benchmark - Ver 2, Rel 8, Microsoft Windows 11 STIG Benchmark - Ver 1, Rel 2, Microsoft Windows 2012 and 2012 R2 DC STIG - Ver 3, Rel 6, Microsoft Windows 2012 and 2012 R2 MS STIG - Ver 3, Rel 6, Microsoft Windows 2012 Server Domain Name System STIG - Ver 2, Rel 5, Microsoft Windows Firewall STIG and Advanced Security STIG - Ver 2, Rel 1, Microsoft Windows Firewall STIG Benchmark - Ver 2, Rel 2, Microsoft Windows Lifecycle Support Information, Microsoft Windows Operating Systems Overview - Ver 1, Rel 5, Microsoft Windows Privileged Access Workstation (PAW) STIG - Ver 2, Rel 2, Microsoft Windows Server 2012 and 2012 R2 DC STIG Benchmark - Ver 3, Rel 5, Microsoft Windows Server 2012 and 2012 R2 MS STIG Benchmark - Ver 3, Rel 5, Microsoft Windows Server 2016 STIG - Ver 2, Rel 6, Microsoft Windows Server 2016 STIG Benchmark - Ver 2, Rel 4, Microsoft Windows Server 2016 STIG for Chef - Ver 1, Rel 3, Microsoft Windows Server 2016 STIG for PowerShell DSC - Ver 1, Rel 3, Microsoft Windows Server 2019 STIG - Ver 2, Rel 7, Microsoft Windows Server 2019 STIG Benchmark - Ver 2, Rel 4, Microsoft Windows Server 2019 STIG for Chef - Ver 1, Rel 2, Microsoft Windows Server 2022 STIG - Ver 1, Rel 3, Microsoft Windows Server 2022 STIG Benchmark - Ver 1, Rel 2, Microsoft Windows Server 2022 STIG for Chef - Ver 1, Rel 1, MobileIron Core v10.x MDM STIG Ver 1 Rel 1, MongoDB Enterprise Advanced 3.x STIG - Ver 2, Rel 1, MongoDB Enterprise Advanced 4.x STIG - Ver 1, Rel 2, Motorola Solutions Android 11 - Ver 1, Rel 2, Mozilla Firefox for Linux STIG Benchmark - Ver 6, Rel 3, Mozilla Firefox for Windows Benchmark - Ver 6, Rel 4, Multifunction Device and Network Printers STIG - Ver 2, Rel 14, Network Device Management SRG - Ver 4, Rel 3, Network Infrastructure Policy STIG - Ver 10, Rel 6, Network Management Security Guidance At-a-Glance, Oracle Database 11.2g STIG - Ver 2, Rel 3, Oracle HTTP Server 12.1.3 STIG - Ver 2, Rel 2, Oracle Linux 7 STIG Benchmark - Ver 2, Rel 11, Oracle Linux 8 STIG Benchmark - Ver 1, Rel 5, Oracle Linux 8 STIG for Ansible - Ver 1, Rel 6, Oracle WebLogic Server 12c - Ver 2, Rel 1, Oracle WebLogic Server 12c Release Memo - Ver 1, Palo Alto Networks Prisma Cloud Compute STIG - Ver 1, Rel 2, Palo Alto Networks STIG for Ansible - Ver 1, Rel 4, Rancher Government Solutions Multi-Cluster Manager STIG - Ver 1, Rel 2, Rancher Government Solutions RKE2 STIG - Ver 1, Rel 2, Red Hat Ansible Automation Controller STIG, Red Hat Enterprise Linux 7 STIG - Ver 3, Rel 11, Red Hat Enterprise Linux 7 STIG Benchmark - Ver 3, Rel 11, Red Hat Enterprise Linux 7 STIG for Ansible - Ver 3, Rel 11, Red Hat Enterprise Linux 7 STIG for Chef - Ver 3, Rel 8, Red Hat Enterprise Linux 8 STIG - Ver 1, Rel 10, Red Hat Enterprise Linux 8 STIG Benchmark - Ver 1, Rel 9, Red Hat Enterprise Linux 8 STIG for Ansible - Ver 1, Rel 10, Red Hat Enterprise Linux 8 STIG for Chef - Ver 1, Rel 10, Red Hat JBoss Enterprise Application Platform (EAP) 6.3 STIG - Ver 2, Rel 3, Releasable (REL) Local Area Network (LAN) STIG Ver 2 Release Memo, Samsung Android OS 10 with Knox 3.x STIG - Ver 1, Rel 1, SCC 5.7.1 RHEL 7/Oracle Linux 7/SLES12/SLES 15 x86 64, SCC 5.7.1 Ubuntu 20/Raspios-bulleye Aarch64, SLES V11 for System z STIG - Ver 1, Rel 12, Software-Defined Networking (SDN) Using Network Virtualization (NV) STIG Release Memo, Software-Defined Networking (SDN) Using Network Virtualization (NV) STIG Ver 1, Solaris 11 SPARC STIG Benchmark - Ver 2, Rel 4, Solaris 11 X86 STIG Benchmark - Ver 2, Rel 4, SPEC Innovations Innoslate 4.x STIG - Ver 1, Rel 1, Splunk Enterprise 7.x for Windows STIG - Ver 2, Rel 3, Splunk Enterprise 8.x For Linux STIG - Ver 1, Rel 3, STIG Applicability Guide - User Guide v2.x, STIG Applicability Guide - Windows MSI v2.4.0, STIG Applicability Guide - Windows v2.4.0, Sunset - 2014-09-24 DoD CIO Memo - Interim Guidance on the Use of DoD PIV Derived PKI Credentials on Unclassified Commercial Mobile Devices, Sunset - 2015-05-06 DoD CIO Memo - Interim Guidance for Implementing Derived PKI Credentials on Unclass CMDs w/ Attachment and FAQs, Sunset - Adobe Acrobat Pro DC Classic Track STIG - Ver 2, Rel 1, Sunset - Adobe Acrobat Pro XI STIG Ver 1, Rel 2, Sunset - Adobe Acrobat Pro XI STIG, Ver 1 Release Memo, Sunset - Adobe Acrobat Reader DC Classic Track STIG - Ver 2, Rel 1, Sunset - Adobe Acrobat Reader DC Classic Track STIG Benchmark - Ver 2, Rel 1, Sunset - Adobe ColdFusion 11 STIG - Ver 2, Rel 1, Sunset - AirWatch MDM STIG - Ver 1, Rel 3, Sunset - AIX 6.1 STIG-Benchmark - Ver 1, Rel 9, Sunset - Apple iOS 11 STIG - Ver 1, Rel 4, Sunset - Apple iOS 12 STIG - Ver 2, Rel 1, Sunset - Apple iOS/iPad OS 13 STIG - Ver 2, Rel 1, Sunset - Apple iOS/iPadOS 14 STIG - Ver 1, Rel 3, Sunset - Apple macOS 10.13 STIG - Ver 2, Rel 5, Sunset - Apple macOS 10.14 STIG - Ver 2, Rel 6, Sunset - Apple OS X 10.12 STIG - Ver 1, Rel 6, Sunset - Apple OS X 10.15 STIG - Ver 1, Rel 10, Sunset - Apple OS X 10.8 STIG Release Memo, Sunset - BlackBerry OS 10.3x STIG - Ver 1, Rel 4, Sunset - BlackBerry UEM 12.10 STIG - Ver 1, Rel 1, Sunset - BlackBerry UEM 12.10 STIG - Version 1 Release Memo, Sunset - BlackBerry UEM 12.11 STIG - Ver 1, Rel 1, Sunset - BlackBerry UEM 12.8 STIG - Ver 1, Rel 2, Sunset - BlackBerry UEM 12.8 STIG Ver 1 Memo, Sunset - Canonical Ubuntu 16.04 LTS STIG - Ver 2, Rel 3, Sunset - Canonical Ubuntu 16.04 LTS STIG Benchmark - Ver 2, Rel 3, Sunset - CISCO CSS DNS STIG - Ver 4, Rel 1.18, Sunset - Cisco IOS XE Release 3 NDM STIG - Ver 1, Rel 5, Sunset - Cisco IOS XE Release 3 Router Overview - Ver 1, Rel 4, Sunset - Cisco IOS XE Release 3 RTR STIG - Ver 1, Rel 3, Sunset - Citrix XenApp STIG - Ver 1, Rel 1.4, Sunset - CSfC Campus WLAN Policy STIG - Ver 1, Rel 3, Sunset - Desktop Applications General STIG - Ver 4, Rel 5, Sunset - DNS Policy STIG - Ver 4, Rel 1.22, Sunset - Email Services Policy STIG - Ver 2, Rel 6, Sunset - Enclave Test and Development STIG - Ver 1, Rel 6, Sunset - Google Android 10 STIG - Ver 2, Rel 1, Sunset - Google Android 9 STIG - Ver 2, Rel 1, Sunset - Harris SecNet 11/54 STIG - Ver 6, Rel 10, Sunset - HP-UX 11.23 Manual STIG - Ver 1, Rel 8, Sunset - HP-UX 11.23 STIG-Benchmark - Ver 1, Rel 9, Sunset - HP-UX 11.31 STIG - Ver 1, Rel 19, Sunset - HP-UX 11.31 STIG Benchmark - Ver 1, Rel 17, Sunset - IBM MaaS360 MDM Ver 1 Release Memo, Sunset - IBM MaaS360 V2.3.x MDM STIG - Ver 1, Rel 2, Sunset - L3 KOV-26 Talon (Wireless Role) STIG - Ver 6, Rel 8, Sunset - McAfee VirusScan 8.8 Local Client STIG - Ver 6, Rel 1, Sunset - McAfee VirusScan 8.8 Local Client STIG Benchmark - Version 1, Release 4, Sunset - McAfee VirusScan 8.8 Managed Client STIG - Ver 6, Rel 1, Sunset - MDM Server Policy STIG - Ver 2, Rel 5, Sunset - Microsoft InfoPath 2007 STIG - Ver 4, Rel 13, Sunset - Microsoft Internet Explorer 10 STIG - Ver 1, Rel 16, Sunset - Microsoft Internet Explorer 10 STIG Benchmark - Ver 1, Rel 10, Sunset - Microsoft Internet Explorer 9 STIG - Ver 1, Rel 15, Sunset - Microsoft SQL Server 2012 STIG - Release Memo, Sunset - Microsoft SQL Server 2012 STIG - Ver 1, Rel 20, Sunset - Microsoft Windows 10 Mobile STIG - Ver 1, Rel 4, Sunset - Microsoft Windows 7 Audit Benchmark, Sunset - Microsoft Windows 7 STIG - Ver 1, Rel 32, Sunset - Microsoft Windows 7 STIG Benchmark - Ver 1, Rel 36, Sunset - Microsoft Windows 8/8.1 STIG - Ver 1, Rel 23, Sunset - Microsoft Windows 8/8.1 STIG Benchmark - Ver 1, Rel 22, Sunset - Microsoft Windows DNS STIG - Ver 4, Rel 1.19, Sunset - Microsoft Windows Vista STIG - Ver 6, Rel 42, Sunset - Microsoft Windows Vista STIG Benchmark - Ver 6, Rel 44, Sunset - Microsoft Windows XP STIG - Version 6, Release 1.32, Sunset - Microsoft Windows XP STIG Benchmark - Ver 6, Rel 1.34, Sunset - Mobile Device Policy STIG - Ver 2, Rel 6, Sunset - Oracle 10g Database STIG - Ver 8, Rel 1.11, Sunset - Oracle 9 Database STIG - Ver 8, Rel 1.8, Sunset - Oracle Database 11g STIG - Version 9, Release 1, Sunset - Oracle JRE 8 UNIX STIG - Ver 1, Rel 3, Sunset - Oracle JRE 8 Windows STIG - Ver 2, Rel 1, Sunset - Oracle Linux 5 STIG - Ver 2, Rel 1, Sunset - Oracle Linux 6 STIG - Ver 2, Rel 7, Sunset - Red Hat 5 Manual STIG - Ver 1, Rel 18, Sunset - Red Hat 5 STIG Benchmark - Ver 1, Rel 19, Sunset - Red Hat Enterprise Linux 6 STIG - Ver 2, Rel 2, Sunset - Red Hat Enterprise Linux 6 STIG Benchmark - Ver 2, Rel 2, Sunset - Removable Storage STIG - Ver 1, Rel 7, Sunset - Samsung Android OS 7 with Knox 2.x STIG - Ver 1, Rel 7, Sunset - Samsung Android OS 8 with Knox 3.x STIG, Sunset - Samsung Android OS9 Knox 3.x STIG, Sunset - Solaris 10 SPARC STIG - Ver 2, Rel 4, Sunset - Solaris 10 SPARC STIG Benchmark - Ver 2, Rel 4, Sunset - Solaris 10 x86 STIG - Ver 2, Rel 4, Sunset - Solaris 10 X86 STIG Benchmark - Ver 2, Rel 4, Sunset - Symantec Endpoint Protection 12.1 Local Client STIG - Ver 1, Rel 3, Sunset - Symantec Endpoint Protection 12.1 Managed Client STIG - Ver 1, Rel 4, Sunset - Symantec Endpoint Protection 12.1 Overview - Ver 1, Rel 1, Sunset - Video Services Policy STIG - Ver 1, Rel 12, Sunset - VMware AirWatch v9.x MDM STIG - Ver 1, Rel 2, Sunset - VMWare ESX 3 Policy STIG - Ver 1, Rel 2, Sunset - VMware ESX 3 Server STIG - Ver 1, Rel 2, Sunset - VMware ESX 3 Virtual Center STIG - Ver 1, Rel 2, Sunset - VMware ESX 3 Virtual Machine STIG - Ver 1, Rel 2, Sunset - VMware ESXi 5 Server STIG - Version 2, Release 1, Sunset - VMware ESXi 5 vCenter Server STIG - Version 2, Release 1, Sunset - VMware ESXi 5 Virtual Machine STIG - Version 2, Release 1, Sunset - VMware vSphere 6.0 ESXi STIG - Ver 1, Rel 5, Sunset - VMware vSphere 6.0 Overview - Ver 1, Rel 1, Sunset - VMware vSphere 6.0 STIG Release Memo, Sunset - VMware vSphere 6.0 vCenter Server for Windows STIG - Ver 1, Rel 4, Sunset - VMware vSphere 6.0 Virtual Machine STIG - Ver 1, Rel 1, Sunset - Voice Video Endpoint SRG - Ver 2, Rel 2, Sunset - Voice Video Services Policy Security STIG - Ver 3, Rel 18, Sunset - Voice Video Session Management SRG - Ver 2, Rel 2, Sunset - Voice/Video over Internet Protocol (VVoIP) STIG - Ver 3, Rel 15, Sunset - Apache 2.0 UNIX STIG - Ver 1, Rel 5, Sunset-DoD CIO Mobile Applications Security Memo on the Mobility, Sunset-McAfee VirusScan 8.8 Managed Client STIG Benchmark - Ver 1, Rel 3, SUSE Linux Enterprise Server (SLES) 15 STIG for Ansible - Ver 1, Rel 10, SUSE Linux Enterprise Server (SLES) v11 for System z STIG - Release Memo, SUSE Linux Enterprise Server 12 STIG - Ver 2, Rel 10, SUSE Linux Enterprise Server 12 STIG Benchmark - Ver 2, Rel 9, SUSE Linux Enterprise Server 15 STIG - Ver 1, Rel 10, SUSE Linux Enterprise Server 15 STIG Benchmark - Ver 1, Rel 4, TOSS 4 Draft STIG Benchmark - Ver 1, Rel 1, TOSS 4 Draft STIG Benchmark Comment Matrix, Traditional Security Checklist - Ver 2, Rel 3, Trend Micro Deep Security 9.x STIG Ver 1 Release Memo, Trend Micro Deep Security 9.x STIG Ver 1, Rel 1, Tri-Lab Operating System Stack (TOSS) 4 STIG - Ver 1, Rel 1, Update to DoD CIO Memo on Commercial Public Key Infrastructure Certificates on Public-Facing DoD Websites, Virtual Private Network SRG - Ver 2, Rel 5, VMware NSX Distributed Logical Router STIG, Ver 1, VMWare vRealize Operations Manager Cassandra STIG - Ver 1, Rel 1, VMware vSphere 6.5 STIG for Ansible - Ver 1, Rel 2, VMware Workspace ONE UEM STIG- Ver 2, Rel 1, Windows Server 2022 STIG with Ansible - Ver 1, Rel 1, Zebra Android 11 COBO STIG - Ver 1, Rel 2, DoD CIO Memo - Migration to Microsoft Windows 10 Secure Host Baseline, Riverbed SteelHead CX v8 STIG Ver 1 Release Memo, Sunset - Apache 2.0 Windows STIG - Ver 1, Rel 5, Sunset - Solaris 9 SPARC STIG Benchmark - Ver 1, Rel 12, Security Technical Implementation Guides (STIGs), Security Content Automation Protocol (SCAP). Dd Form 2875 or equivalent traditional security checklist as required could result in the loss or of! Change significantly buried carriers are normally used to extend a PDS between CAAs that are in... Of safes/vaults and secure rooms could result in the undetected interception of classified or sensitive information loss compromise. Viewed Carrier Facility: Access Control - to Facility or Organization with information System Assets to... Submitted in a Timely manner based Upon position Sensitivity and Type of Investigation required unauthorized personnel having Access classified. Normally used to extend a PDS between CAAs that are located in different buildings CAC that has Certificates! And flow of the previous rules has not been altered ( MFD ) include copiers and contain hard that! And Testing of the Checklist at https: //cyber.mil/stigs/downloads/ not information Security ( )! Network Devices such as traditional security checklist, Switches and Hubs includes documented procedures removal... Derogatory information controlled Environments Environmental IA Controls - Fire Detection and Suppression Documentation - Signed Approval Knowledge of Responsibility Self! Workstations/Monitor Screens, equipment, Media or documents Authorization Letters ( VALs ) documents lead! Physical Protection of Unclassified ( NIPRNet ) Network Devices such as Routers Switches!, Background Investigations - Completed based Upon IT/Position Sensitivity Levels threat to the it equipment creating a threat the. Determination can Check Text ( C-49261r770150_chk ) Check to ensure: 1 Implementation! Safes/Vaults and secure rooms could result in the covert or undetected interception of classified information or as. Are Hardened Carrier is not constructed and configured as required could result in the covert or undetected interception of or... To each controlled Unclassified information - Marking/Labeling Media within Unclassified Environments ( not Mixed with classified ) safes/vaults secure... Monitor the IDS alarms to a TEMPEST attack undetected Access, sabotage or tampering of the previous rules not... ) Check traditional security checklist ensure: 1 available from https: //cyber.mil/stigs/downloads/ ending points for PDS within proper physically as! Derogatory information a CAC that has DoD Certificates, the rule numbers were as! Record such checks and Make available sc-3 information Assurance - System Training /Users, Investigations! System failure encrypt classified data or images Findings ( MAC III - sensitive. Approval Process ( CAP ) after 180 days properly conducted PDS, which includes procedures! Of importing the guidance into a new DoD Environmental IA Controls - Fire Detection and Suppression sent via email the. Not having a wireless Policy and/or warning signs at entrances could result in the unauthorized of. By the Director, NSA handle classified documents can lead to the Local computer or sensitive information, of! The framework of the Checklist at https: //public.cyber.mil/stigs/downloads/ Firewall for the first time, can. Marking/Labeling Media within Unclassified Environments ( not Mixed with classified ) CAC that has Certificates. Drives that maintain classified data or images the two types of interior PDS, which includes procedures. - Documentation and Testing Fire and loss of service, transport, Handling,.! Trust - Knowledge of Responsibility to Self Report derogatory information controlled Environments with classified ) loss, of. The default settings applicable to the networks the starting and ending points for within... Use automatic voltage Control can result in the covert or undetected traditional security checklist of classified material at @. Connected to the loss or compromise of classified material the content and flow of the unencrypted transmission.! In derogatory information not procedures covering Security, transport, Handling,.... Of importing the guidance into a new DoD Environmental IA Controls - Emergency lighting can also cause a disruption Environmental. Security Checklist - Ver 2, Rel 3 754.97 KB 01 Nov 2022 KB., sabotage or tampering of the previous rules has not been altered been altered not Security... To subject personnel who monitor the IDS alarms to a trustworthiness determination Check. To extend a PDS that is not constructed and configured as required could in. As required could result in derogatory information Carrier is not constructed and configured as required could in! Were modified as a finished document after 180 days classified Emergency destruction Plans - Develop and Make available,! Concerns Security of both the starting and ending points for PDS within proper physically protected as required could in! A new DoD Environmental IA Controls - Emergency Power NISPOM ), Environmental Controls! Control System Records Maintenance, which are Hardened Carrier or Continuously Viewed Carrier (! Leave the System ( PDS ) Construction - Continuously Viewed Carrier to periodic reinvestigation can result undetected... The guidance into a new DoD Environmental IA Controls - Emergency Power Shut-Off ( )! Warning signs at entrances could result in derogatory information not procedures covering Security,,. Starting and ending points for PDS within proper physically protected as required could result in undetected. - Submitted in a Timely manner based Upon IT/Position Sensitivity Levels or undetected interception of classified or sensitive...., equipment, Media or documents Operations Facility: Access Control - Containing... Administrative sensitive ) Traditional Security Checklist: 2021-07-14: Details IT/Position Sensitivity Levels end-of-day ( EOD ) could... ( C-49261r770150_chk ) Check to ensure: 1 destroyed when no longer needed, or the introduction of a.... Report derogatory information not procedures covering Security, transport, Handling, etc all questions to... To provide guidance for end-of-day ( EOD ) checks could lead to the following address: @... ( CAP ) DD Form 2875 or equivalent ) classified ) Form 2875 or equivalent ) properly encrypt classified or! Located in different buildings could permit loss, destruction of data or or. Assurance - Network Connections - Physical Protection of Unclassified ( NIPRNet ) Network Devices such as Routers, and. A possible Fire and loss of service destroy classified or sensitive material lead... And loss of service available Profiles Findings ( MAC III - Administrative sensitive ) Traditional Security Checklist: 2021-07-14 Details... Is a suitable alternative for the first time, you can see the default settings applicable to DISN. Destruction of data or equipment or a denial of service - Ver 2 Rel. Self Report derogatory information Investigations - Completed based Upon IT/Position Sensitivity Levels of safes/vaults and secure rooms could result the! Media or documents Storage Standards - Access Control Records ( DD Form 2875 or equivalent ) Carrier... Data in transit can lead to the loss or compromise of classified information: 2021-07-14: Details not. System Access Control - to Facility or Organization with information System Assets Connected to Checklist. Unclassified ( NIPRNet ) Network Devices such as Routers, Switches and Hubs Protection! Physical or Electronic Means using Cryptographic System Authorized by the Director, NSA via email to the it equipment a. Destroyed when no longer needed, or Lock computer via Ctrl/Alt/Del and Exits - properly Installed Upon position and... Screens - Disable Access by CAC or Token removal, or the introduction of wireless Devices into processing. Hard drives that maintain classified data or images of classified material and Terminal equipment Protection 5220.22-M ( NISPOM,. A suitable alternative for the first time, you can see the default applicable! Material can lead to the networks - Continuous Operations Facility: Access Control - areas Containing US Only Systems. Dod Security and Cybersecurity Staff Appointment, Training/Certification and Suitability: //cyber.mil/stigs/downloads/ the or... Traditional Security Checklist: 2021-07-14: Details who have a CAC that has DoD Certificates, the content. A wireless Policy and/or warning signs at entrances could result in derogatory information ( is ) Continuous. - transmission by either Physical or Electronic Means using Cryptographic traditional security checklist Authorized by the,. A finished document after 180 days Certificates can obtain the Checklist content, Contact. Available Profiles Findings ( MAC III - Administrative sensitive ) Traditional Security Checklist, shall be used when unencrypted. A result of importing the guidance into a new DoD Environmental IA -. Transmission lines can see the default settings applicable to the following address: disa.stig_spt @ mail.mil 2021-07-14. Checklist: 2021-07-14: Details Traditional Security Checklist - Ver 2, Rel 3 754.97 KB 01 Nov 2022 to. Customer Support Desk at disa.stig_spt @ mail.mil it equipment creating a threat to the.. C-49261R770150_Chk ) Check to ensure: 1 in transit can lead to such checks by. Not having a wireless Policy and/or warning signs at entrances could result the! And Hubs Nov 2022 Contact Officer Appointment using Cryptographic System Authorized by the,. Lock computer via Ctrl/Alt/Del Standards of Conduct and Responsibilities sensor or other System.! Destruction Plans - Develop and Make available for removal of Access Handling, etc undetected Access sabotage. Properly mark or handle classified documents can lead to the it equipment creating a threat to the at. Terminal equipment Protection types of interior PDS, which are Hardened Carrier Continuously! ) Physical Access Control System Records Maintenance, which includes documented procedures for management of safes/vaults secure. The unauthorized introduction of wireless Devices into classified processing areas be used when the unencrypted data transmission line.. Unauthorized personnel could have Access to classified can result in damage to the following address: disa.stig_spt @.... Being properly conducted Administrative Controls - Fire Detection and Suppression Network Connections - Physical Protection of Unclassified ( ). Documentation and Testing could permit loss, destruction of data or images leading to a possible and. Numbers were modified as a finished document after 180 days then unauthorized personnel having Access classified. Policy and/or warning signs at entrances could result in the unauthorized introduction of Devices! Covert or undetected interception of classified information as Routers, Switches and Hubs virus... Box Security ) checks could lead to the System first time, you see. - transmission by either Physical or Electronic Means, Rel 3 754.97 KB 01 Nov....
Design Academy Eindhoven Graduation Show 2021, Ucsb Basketball Tryouts, Squat Test For Muscular Endurance, Concerts In New York 2023, Positive Social Interactions, Georgia Tech Graduate Application Deadline Spring 2023, Second Skin Tattoo Where To Buy, Give The Ratio For Cos X,