U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Instant Messaging STIG Version 1, Release 2 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Ezenia InfoWorkSpace 2.5.1.3 cpe:/a:ezenia:infoworkspace:2.5.1.3 (View CVEs)
IBM Lotus SameTime 8.5.1 cpe:/a:ibm:lotus_sametime:8.5.1 (View CVEs)
Ipswitch Instant Messaging 2.02 cpe:/a:ipswitch:instant_messaging:2.02 (View CVEs)
Jabber XCP 5.0 cpe:/a:jabber:jabber_xcp:5.0 (View CVEs)
Liquid Communication Systems, LLC Effusia Business Messenger 4.3 cpe:/a:liquidcs:effusia_business_messenger:4.3 (View CVEs)
Liquid Communication Systems, LLC Effusia Business Messenger Server 4.0 cpe:/a:liquidcs:effusia_business_messenger_server:4.0 (View CVEs)
Microsoft Live Communications Server 2005 cpe:/a:microsoft:live_communications_server:2005 (View CVEs)
Microsoft Office Communications Server cpe:/a:microsoft:office_communications_server (View CVEs)
Sigaba Secure Instant Messaging 1.2 cpe:/a:sigaba:secure_instant_messaging:1.2 (View CVEs)
WiredRed e/Pop Instant Messaging 4.5 cpe:/a:wiredred:e%2fpop:4.5 (View CVEs)

Checklist Highlights

Checklist Name:
Instant Messaging STIG
Checklist ID:
456
Version:
Version 1, Release 2
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
02/15/2008

Checklist Summary:

A core mission for the Defense Information Systems Agency (DISA) Field Security Operations(FSO) is to secure Department of Defense (DoD) instant messaging systems. The processes andprocedures outlined in this Security Technica l Information Guide (STIG), when applied, will decrease the risk of unauthorized disclosure of sensitive information. Security is clearly still one of the biggest concerns for our DoD customers (i.e., the warfighter). The intent of this STIG is to include security considerations and to provide an acceptable level of risk for information being transmitted. This STIG was developed to enhance the confidentiality, integrity, and availability of sensitive DoD Automated Information Systems (AIS). Instant messaging systems must provide secure, available, and reliable data for all customers. This document will assist sites in meeting the minimum requirements, standards, controls, and options that must be in place for secure instant messaging environments.

Checklist Role:

  • Business Productivity Application

Known Issues:

Not provided.

Target Audience:

The requirements set forth in this document will assist Information Assurance Managers (IAM),Information Assurance Officers (IAO), Network Security Officers (NSO), and System Administrators (SA) in the support of protecting DoD instant messaging systems.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD Directive 8500.1

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil.DISA FSO will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil.DISA FSO will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Point of Contact:

fso_spt@disa.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Version 1, Release 2 - 15 February 2008

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 05/01/2019