• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

STIG Update – DISA has released the following updated Security Guidance, Security Readiness Review Scripts and Benchmarks

November 3, 2017 by Bruce Brown Leave a Comment

STIG Update – DISA has released the following updated Security Guidance, Security Readiness Review Scripts and Benchmarks


DISA has released the following updated Security Guidance, Security Readiness Review Scripts and Benchmarks:

Unclassified SRGs: http://iase.disa.mil/stigs/Pages/a-z.aspx
Network Device Management SRG – Ver 2, Rel 12
Voice Video Endpoint SRG – Ver 1, Rel 6

Unclassified Application STIGs: http://iase.disa.mil/stigs/app-security/Pages/index.aspx
Apache 2.2 STIG Windows – Ver 1, Rel 12
Apache 2.2 STIG UNIX – Ver 1, Rel 9
Application Security and Development STIG – Ver 4, Rel 4
Google Chrome Browser STIG – Ver 1, Rel 10
IIS 7.0 STIG – Ver 1, Rel 15
McAfee Virus Scan Enterprise for Linux 1.2x/2.0x Managed Client STIG – Ver 1, Rel 3
Microsoft Excel 2016 STIG – Ver 1, Rel 2
Microsoft Outlook 2013 STIG – Ver 1, Rel 11
Oracle HTTP Server 12.1.3 STIG – Ver 1, Rel 2
Oracle JRE 8 UNIX STIG – Ver 1, Rel 3
Oracle WebLogic Server 12c STIG – Ver 1, Rel 3

Unclassified Mobility STIG: http://iase.disa.mil/stigs/mobility/Pages/index.aspx
Microsoft Windows 10 Mobile STIG – Ver 1, Rel 3

Unclassified Network STIGs and Overviews: http://iase.disa.mil/stigs/net_perimeter/Pages/index.aspx
Cisco IOS XE Release 3 Router Overview – Ver 1, Rel 3
Cisco IOS XE Release 3 NDM STG – Ver 1, Rel 3
DNS Policy STIG – Ver 4, Rel 1.21
IBM DataPower NDM STIG – Ver 1, Rel 2
IPSEC VPN Gateway STIG – Ver 1, Rel 13
Juniper SRX Services Gateway (SG) Virtual Private Network (VPN) STIG – Ver 1, Rel 2
Network Firewall STIG – Ver 8, Rel 24
Network Infrastructure Policy STIG – Ver 9, Rel 4
Network Infrastruture Router L3 Switch STIG – Ver 8, Rel 24
Network L2 Switch STIG – Ver 8, Rel 22
Network Perimeter Router L3 Switch STIG – Ver 8, Rel 27
Removable Storage STIG – Ver 1, Rel 7

Unclassified HBSS STIGs: https://iase.disa.mil/stigs/hbss/Pages/index.aspx
McAfee Application Control STIG – Ver 1, Rel 2

Unclassified Operating System STIGs: http://iase.disa.mil/stigs/os/Pages/index.aspx
AIX 6.1 STIG – Ver 1, Rel 11
HP-UX 11.31 Manual STIG – Ver 1, Rel 15
IBM Hardware Management Console (HMC) STIG – Ver 1, Rel 5
Microsoft Windows 2008 DC STIG – Ver 6, Rel 38
Microsoft Windows 2008 MS STIG – Ver 6, Rel 38
Microsoft Windows 2008 R2 DC STIG – Ver 1, Rel 24
Microsoft Windows 2008 R2 MS STIG – Ver 1, Rel 24
Microsoft Windows 2012 and 2012 R2 DC STIG – Ver 2, Rel 10
Microsoft Windows 2012 and 2012 R2 MS STIG – Ver 2, Rel 10
Microsoft Windows 7 STIG – Ver 1, Rel 28
Microsoft Windows 8/8.1 STIG – Ver 1, Rel 19
Oracle Linux 6 Manual STIG – Ver 1, Rel 11
Red Hat 6 STIG – Ver 1, Rel 17
Red Hat 7 STIG – Ver 1, Rel 3
Solaris 10 SPARC Manual STIG – Ver 1, Rel 20
Solaris 10 x86 Manual STIG – Ver 1, Rel 20
Solaris 11 SPARC Manual STIG – Ver 1, Rel 13
Solaris 11 x86 Manual STIG – Ver 1, Rel 13
SUSE Linux Enterprise Server (SLES) v11 for System z STIG – Ver 1, Rel 11
zOS ACF2 STIG – Ver 6, Rel 33
zOS RACF STIG – Ver 6, Rel 33
zOS TSS STIG – Ver 6, Rel 33

FOUO Network STIGs: http://iase.disa.mil/stigs/net_perimeter/Pages/index.aspx
NOTE: DoD PKI Certificate Required
JIE Core Data Center (CDC) STIG – Ver 2, Rel 3
JIE Installation Processing Node (IPN) STIG – Ver 2, Rel 3

Benchmarks: http://iase.disa.mil/stigs/scap/Pages/index.aspx
Google Chrome for Windows STIG Benchmark Ver 1, Rel 5
HP-UX 11.31 STIG Benchmark – Ver 1, Rel 15
Microsoft Excel 2016 STIG Benchmark – Ver 1, Rel 2 (SCC tool use only)
Microsoft Outlook 2013 STIG Benchmark – Ver 1, Rel 6 (SCC tool use only)
Microsoft Outlook 2016 STIG Benchmark – Ver 1, Rel 3 (SCC tool use only)
Microsoft Windows 2008 DC STIG Benchmark – Ver 6, Rel 40
Microsoft Windows 2008 MS STIG Benchmark – Ver 6, Rel 40
Microsoft Windows 2008 R2 DC STIG Benchmark – Ver 1, Rel 26
Microsoft Windows 2008 R2 MS STIG Benchmark – Ver 1, Rel 27
Microsoft Windows 2012 and 2012 R2 DC STIG Benchmark – Ver 2, Rel 10
Microsoft Windows 2012 and 2012 R2 MS STIG Benchmark – Ver 2, Rel 10
Microsoft Windows 7 STIG Benchmark – Ver 1, Rel 34
Microsoft Windows 8/8.1 STIG Benchmark – Ver 1, Rel 20
Microsoft Windows Server 2016 STIG Benchmark – Ver 1, Rel 3
Red Hat 5 STIG Benchmark – Ver 1, Rel 19
Red Hat 6 STIG Benchmark – Ver 1, Rel 17
Solaris 10 SPARC STIG Benchmark – Ver 1, Rel 19
Solaris 10 x86 STIG Benchmark – Ver 1, Rel 19
Solaris 11 SPARC STIG Benchmark – Ver 1, Rel 8
Solaris 11 x86 STIG Benchmark – Ver 1, Rel 8

No Longer Supported: http://iase.disa.mil/stigs/sunset/Pages/index.aspx
BlackBerry for the OS 7 STIG – Ver 2, Rel 11
Good for Enterprise 8.x STIG – Ver 1, Rel 2
Microsoft Access 2007 STIG – Ver 4, Rel 15
Microsoft Excel 2007 STIG – Ver 4, Rel 13
Microsoft Infopath 2007 STIG – Ver 4, Rel 13
Microsoft Office System 2007 STIG – Ver 4, Rel 16
Microsoft Outlook 2007 STIG – Ver 4, Rel 16
Microsoft PowerPoint 2007 STIG – Ver 4, Rel 16
Microsoft Word 2007 STIG – Ver 4, Rel 15

 

Filed Under: diarmf - implement, STIGS Tagged With: STIG

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

Cyber Security How to make up to 6 Figures
6 figures in Cyber Security

This course explains how I have been able to consistently make 6 figures doing cyber security. There is a method that I have used during my development in cyber security. I am presenting that method to you.

View Course

Teleworking - IT Remote Work
Teleworking – IT Remote Work

Teleworking is something I have been doing for the last 5 years. This is how I did it.

Find Teleworking IT Jobs

View Course

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • RMF / security compliance beginner reading list NIST 800-37 NIST 800-53 and NIST 800-12
  • IT to cybersecurity jobs
  • Access Control Family: What is NIST Access Control (part1)
  • RMF Security Controls when the operating system changes
  • Cybersecurity Convocourses: Control Correlation Identifier (CCI), CIS and STIGS

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce HBSS IA implement implementation info assurance information assurance information security ISSO it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows

Copyright © 2022 · Author Pro on Genesis Framework · WordPress · Log in

Posting....