Google Search Appliance STIG Version 1, Release 1 Checklist Details (Checklist Revisions)
The Google Search Appliance STIG provides the technical security policies, requirements, and implementation details for applying security concepts to Google Search Appliance.
The requirements and recommendations set forth in this document will assist ISSOs and ISSMs in protecting desktop applications in DoD locations hereafter referred to as sites. The responsible Configuration Control Board (CCB) will approve revisions to site systems that could have a security impact. Therefore, before implementing desktop application security measures, the ISSO will submit a change notice to the CCB for review and approval.
Google Search Appliance does not have the capability to have anti-virus software installed on the underlying operating system, PKI-based authentication has not been implemented and auditing capabilities are limited.
- Business Productivity Application
- Specialized Security-Limited Functionality (SSLF)
Parties within the DoD and Federal Government's computing environments can obtain the applicable STIG from the Information Assurance Support Environment (IASE) website. This site contains the latest copies of any STIGs, SRGs, and other related security information. The address for the IASE site is http://iase.disa.mil/.
Updated to FINAL - 4/30/18
Updated URLs - 6/6/19
Sunset per DISA - 6/17/19
updated URLs - 9/11/19
NIST checklist record last modified on 09/11/2019