Project 2010 STIG Version 1, Release 10 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Sunset - Microsoft Project 2010 STIG - Ver 1, Rel 10
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Microsoft Project 2010 | cpe:/a:microsoft:project:2010 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Project 2010 STIG
- Checklist ID:
- 566
- Version:
- Version 1, Release 10
- Type:
- Compliance
- Review Status:
- Archived
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 02/09/2015
Checklist Summary:
This Microsoft Office Project 2010 Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration. Unfortunately, this presence also brings about dependence and vulnerabilities. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Where applications do offer security options, the default settings typically do not provide a strong security posture. The requirements and recommendations set forth in this document will assist Information Assurance Officers (ISSO) and Information Assurance Managers (ISSMs) in protecting desktop applications in DoD locations hereafter referred to as sites. The responsible Configuration Control Board (CCB) will approve revisions to site systems that could have a security impact. Therefore, before implementing desktop application security measures, the ISSO will submit a change notice to the CCB for review and approval. Although there are a few different operating system platforms for desktop environments, the security requirements detailed in this document target to applications installed on Microsoft Windows 7 platforms only. This STIG contains security technical implementation guidance for Microsoft Office Project 2010 only. There are multiple STIG packages for Microsoft Office 2010; each contains technology-specific guidelines for the respective package that are to be applied along with the overall Microsoft Office System requirements. The individual packages are: ? Microsoft Access 2010 ? Microsoft Excel 2010 ? Microsoft InfoPath 2010 ? Microsoft Office System 2010 ? Microsoft OneNote 2010 ? Microsoft Outlook 2010 ? Microsoft PowerPoint 2010 ? Microsoft Project 2010 ? Microsoft Publisher 2010 ? Microsoft Word 2010
Checklist Role:
- Office Software
Known Issues:
Not Provided
Target Audience:
Not Provided
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not Provided
Regulatory Compliance:
DOD Directive 8500.01
Comments/Warnings/Miscellaneous:
Not Provided
Disclaimer:
Not Provided
Product Support:
Not Provided
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not Provided
Licensing:
Not Provided
Change History:
Updated status from "Under Review" to "Final" - 21 July 2015 Benchmark - Version 1, Release 1 - 19 June 2015 null Updated URL to reflect change to the DISA website - http --> https updated to v1,r9 - 4/25/18 Updated to FINAL - 5/25/18 Updated URLs - 6/11/19 Removed Unsupported Content Link 8/30/2019 Updated resource - 08/15/2024
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|