This Microsoft Office Technology Overview, along with the associated Security Technical Implementation Guide (STIG), provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications.
The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration. Unfortunately, this presence also brings about dependence and vulnerabilities. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Where applications do offer security options, the default settings typically do not provide a strong security posture.
Developed for the DOD.
This checklist has been created for IT professionals, particularly Windows system administrators and information security personnel. The document assumes that the reader has experience installing and administering applications on Windows-based systems in domain or standalone configurations.
- Specialized Security-Limited Functionality (SSLF)
DOD Directive 8500.
2010-03-19 - SCAP content posted (generated from GoldDisk version 220.127.116.11)
2010-04-19 - Minor SCAP bug fixes posted, SCAP content now validates against version 1.1.1 of the SCAP Content Validation Tool.
Updated "Point of Contact" - 07 January 2015
moved to archive status - 4/15/19
NIST checklist record last modified on 04/15/2019