National Vulnerability Database

National Vulnerability Database

National Vulnerability

Microsoft Word 2010 STIG Ver 1, Rel 11 Checklist Details (Checklist Revisions)

Supporting Resources:


Target CPE Name
Microsoft Word 2010 cpe:/a:microsoft:word:2010 (View CVEs)

Checklist Highlights

Checklist Name:
Microsoft Word 2010 STIG
Checklist ID:
Ver 1, Rel 11
Review Status:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:

Checklist Summary:

This Microsoft Office Word 2010 Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration. Unfortunately, this presence also brings about dependence and vulnerabilities. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Where applications do offer security options, the default settings typically do not provide a strong security posture. The requirements and recommendations set forth in this document will assist Information Assurance Officers (ISSOs) and Information Assurance Managers (ISSMs) in protecting desktop applications in DoD locations hereafter referred to as sites. The responsible Configuration Control Board (CCB) will approve revisions to site systems that could have a security impact. Therefore, before implementing desktop application security measures, the ISSO will submit a change notice to the CCB for review and approval. Although there are a few different operating system platforms for desktop environments, the security requirements detailed in this document target to applications installed on Microsoft Windows 7 platforms only. This STIG contains security technical implementation guidance for Microsoft Office Word 2010 only.

Checklist Role:

  • Office Software

Known Issues:

Not provided.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DOD Directive 8500.01


Not provided.


Not provided.

Product Support:

Not provided.

Point of Contact:

Comments or proposed revisions to this document should be sent via email to the following address: DISA will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA maintenance release schedule.


Not provided.


Not provided.

Change History:

Moved to FINAL - 03/30/2018
updated to v1,r11 - 4/25/18
Updated to FINAL - 5/27/18
Updated URLs - 6/12/19
Removed Unsupported Content Link 8/30/2019


URL Description


Reference URL Description

NIST checklist record last modified on 08/30/2019