National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Google Search Appliance STIG Version 1, Release 1 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Google Search Appliance cpe:/h:google:search_appliance (View CVEs)

Checklist Highlights

Checklist Name:
Google Search Appliance STIG
Checklist ID:
840
Version:
Version 1, Release 1
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
03/30/2018

Checklist Summary:

The Google Search Appliance STIG provides the technical security policies, requirements, and implementation details for applying security concepts to Google Search Appliance. The requirements and recommendations set forth in this document will assist ISSOs and ISSMs in protecting desktop applications in DoD locations hereafter referred to as sites. The responsible Configuration Control Board (CCB) will approve revisions to site systems that could have a security impact. Therefore, before implementing desktop application security measures, the ISSO will submit a change notice to the CCB for review and approval. Google Search Appliance does not have the capability to have anti-virus software installed on the underlying operating system, PKI-based authentication has not been implemented and auditing capabilities are limited.

Checklist Role:

  • Business Productivity Application

Known Issues:

Not provided.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoDI 8500.01

Comments/Warnings/Miscellaneous:

All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component Authorizing Official (AO) personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil. 1.6

Disclaimer:

Not provided.

Product Support:

Parties within the DoD and Federal Government's computing environments can obtain the applicable STIG from the Information Assurance Support Environment (IASE) website. This site contains the latest copies of any STIGs, SRGs, and other related security information. The address for the IASE site is http://iase.disa.mil/.

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Updated to FINAL - 4/30/18
Updated URLs - 6/6/19
Sunset per DISA - 6/17/19
updated URLs - 9/11/19

Dependency/Requirements:

URL Description

References:

Reference URL Description
https://dl.dod.cyber.mil/wp-content/uploads/stigs/pdf/U_Google_Search_Appliance_STIG_V1R1_Release_Memo.pdf Google Search Appliance STIG Ver 1 - Release Memo

NIST checklist record last modified on 09/11/2019