This is not the current revision of this Checklist, view the current revision.
| Target | CPE Name |
|---|---|
| L3 KOV-26 Talon | cpe:/h:l3t:kov-26_talon (View CVEs) |
The KOV-26 Talon Wireless Role Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. This document is meant for use in conjunction with the Enclave, Network Infrastructure, Secure Remote Computing, and appropriate Operating System (OS) STIGs.
Not provided.
Parties within the DoD and Federal Government's computing environments can obtain the applicable STIG from the Information Assurance Support Environment (IASE) website. This site contains the latest copies of any STIGs, SRGs, and other related security information. The address for the IASE site is http://iase.disa.mil/.
Not provided.
DoDI 8500.01
Not provided.
Not provided.
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule.
disa.stig_spt@mail.mil
Not provided.
Not provided.
Moved to FINAL - 03/30/2018 moved to archive status - 4/15/19
| URL | Description |
|---|
| Reference URL | Description |
|---|