Network Other Devices Version 8, Release 23 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Network Other Devices - Version 8, Release 14
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Cisco Content Services Switch 11000 | cpe:/h:cisco:content_services_switch_11000:- (View CVEs) |
ISC Bind 9.3.1 | cpe:/a:isc:bind:9.3.1 (View CVEs) |
ISC Bind 9.3.2 | cpe:/a:isc:bind:9.3.2 (View CVEs) |
Microsoft Windows 2000 | cpe:/o:microsoft:windows_2000 (View CVEs) |
Microsoft Windows Server 2000 | cpe:/o:microsoft:windows_2000:-:-:server (View CVEs) |
Microsoft Windows Server 2003 | cpe:/o:microsoft:windows_2003_server:- (View CVEs) |
Microsoft Windows XP | cpe:/o:microsoft:windows_xp (View CVEs) |
Checklist Highlights
- Checklist Name:
- Network Other Devices
- Checklist ID:
- 35
- Version:
- Version 8, Release 23
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 04/29/2011
Checklist Summary:
This Network Infrastructure Security Checklist provides the procedures for conducting a Security Readiness Review (SRR) to determine compliance with the requirements in the Network Infrastructure Security Technical Implementation Guide (STIG). This Checklist document must be used together with the corresponding version of the STIG document. This guide focuses strictly on perimeter network components and concepts which protect a DoD private LAN. This checklist ensures the site has properly installed and implemented specific network components and that it is being managed in a way that is secure, efficient, and effective, through procedures outlined in the checklist. The items reviewed are based on standards and requirements published by DISA in the Security Handbook and the Network Infrastructure Security Technical Implementation Guide. The procedures in this document are part of the effort to ensure that the security configuration guidelines required by Department of Defense (DOD) Directive 8500.1, Information Assurance, and other relevant guidance have been properly implemented.
Checklist Role:
- Router
Known Issues:
Not provided.
Target Audience:
This checklist has been created for IT professionals, particularly network system administrators and information security personnel. The document assumes that the reader has experience installing and administering various network security devices.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
Please refer to the Checklist or the README.txt files provided with the scripts for any comments, warnings, or detailed instructions.
Disclaimer:
Not provided.
Product Support:
Not provided.
Point of Contact:
Not provided.
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Version 8, Release 14 - 2013-04-26 Version 8, Release 13 - 2013-01-25 Version 8, Release 11 - 2012-07-27 Version 8, Release 10 - 2012-04-27 Version 8, Release 9 - 2012-01-24 Version 8, Release 8 - 2011-10-28 Version 8, Release 7 - 2011-07-29 Version 8, Release 6 - 2011-04-29 Version 8, Release 5 - 2010-08-27 Version 7 Release 1.5 - 2008-07-18 Version 7 Release 1.2 - 2008-03-28 Version 7 Release 1.1 - 2007-11-20 Version 5 Release 2.3 - 2005-02-25
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|