National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Microsoft Office 2007 STIG Version 4, Release 1 Checklist Details (Checklist Revisions)

SCAP 1.0 Content:

Machine-Readable CCE to 800-53 Data Stream

Supporting Resources:

    Target:

    Target CPE Name
    Microsoft Outlook 2007 cpe:/a:microsoft:outlook:2007 (View CVEs)
    Microsoft Word 2007 cpe:/a:microsoft:word:2007 (View CVEs)
    Microsoft Office 2007 cpe:/a:microsoft:office:2007 (View CVEs)
    Microsoft Access 2007 cpe:/a:microsoft:access:2007 (View CVEs)
    Microsoft Excel 2007 cpe:/a:microsoft:excel:2007 (View CVEs)
    Microsoft Infopath 2007 cpe:/a:microsoft:infopath:2007 (View CVEs)
    Microsoft PowerPoint 2007 cpe:/a:microsoft:powerpoint:2007 (View CVEs)
    Microsoft Visio 2007 cpe:/a:microsoft:visio:2007 (View CVEs)

    Checklist Highlights

    Checklist Name:
    Microsoft Office 2007 STIG
    Checklist ID:
    292
    Version:
    Version 4, Release 1
    Type:
    Compliance
    Review Status:
    Archived
    Authority:
    Governmental Authority: Defense Information Systems Agency
    Original Publication Date:
    12/03/2009

    Checklist Summary:

    This Microsoft Office Technology Overview, along with the associated Security Technical Implementation Guide (STIG), provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration. Unfortunately, this presence also brings about dependence and vulnerabilities. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Where applications do offer security options, the default settings typically do not provide a strong security posture.

    Checklist Role:

    • Desktop Client

    Known Issues:

    Not provided.

    Target Audience:

    Developed for the DOD. This checklist has been created for IT professionals, particularly Windows system administrators and information security personnel. The document assumes that the reader has experience installing and administering applications on Windows-based systems in domain or standalone configurations.

    Target Operational Environment:

    • Managed
    • Specialized Security-Limited Functionality (SSLF)

    Testing Information:

    Not provided.

    Regulatory Compliance:

    DOD Directive 8500.

    Comments/Warnings/Miscellaneous:

    All Microsoft Office 2007 users who are consuming the provided SCAP content must first run the Microsoft Office System 2007 SCAP Content which provides generic Office checks. Then the user should run the SCAP bundle for each Microsoft Office product running on the user's systems.

    Disclaimer:

    Not provided.

    Product Support:

    Not provided.

    Point of Contact:

    disa.stig_spt@mail.mil

    Sponsor:

    Not provided.

    Licensing:

    Not provided.

    Change History:

    2010-03-19 - SCAP content posted (generated from GoldDisk version 2.9.8.84)
    2010-04-19 - Minor SCAP bug fixes posted, SCAP content now validates against version 1.1.1 of the SCAP Content Validation Tool.
    Updated "Point of Contact" - 07 January 2015
    null
    moved to archive status - 4/15/19

    Dependency/Requirements:

    URL Description
    http://scap.nist.gov/revision/1.0/index.html#tools This is a link to the SCAP Content Validation Tool designed to validate SCAP 1.0 source content.

    References:

    Reference URL Description

    NIST checklist record last modified on 04/15/2019