U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.


Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Word 2013 STIG Version 1, Release 6 Checklist Details (Checklist Revisions)

Supporting Resources:


Target CPE Name
Microsoft Word 2013 cpe:/a:microsoft:word:2013 (View CVEs)

Checklist Highlights

Checklist Name:
Word 2013 STIG
Checklist ID:
Version 1, Release 6
Review Status:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:

Checklist Summary:

This Microsoft Office Technology Overview, along with the associated Security Technical Implementation Guide (STIG), provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration. Unfortunately, this presence also brings about dependence and vulnerabilities. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Where applications do offer security options, the default settings typically do not provide a strong security posture. There are multiple STIG packages for Microsoft Office 2013, each contains technology-specific guidelines for the respective package. The Microsoft Office System 2013 must also be applied when any Office package is installed. The individual packages are: ? Microsoft Access 2013 ? Microsoft Excel 2013 ? Microsoft Groove 2013 ? Microsoft InfoPath 2013 ? Microsoft Lync 2013 ? Microsoft Office System 2013 ? Microsoft OneNote 2013 ? Microsoft Outlook 2013 ? Microsoft PowerPoint 2013 ? Microsoft Project 2013 ? Microsoft Publisher 2013 ? Microsoft SharePoint Designer 2013 ? Microsoft Visio 2013 ? Microsoft Word 2013 This STIG contains security technical implementation guidance for Microsoft Office Word 2013 only.

Checklist Role:

  • Desktop Client

Known Issues:

Not Provided

Target Audience:

Not Provided

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not Provided

Regulatory Compliance:

DOD Directive 8500.01


Not Provided


Not Provided

Product Support:

Not Provided

Point of Contact:



Not Provided


Not Provided

Change History:

Updated status from "under review" to "final" - 22 June 2015
Updated STIG to V1, R4 - 10-28-2016
updated to FINAL - 12/07/2016
Updated to Ver 1, Rel 5 - 01/27/2017
Updated to FINAL - 03/13/2017
Updated benchmark - 04/28/2017
Updated to FINAL - 05/30/2017
Updated URL to reflect change to the DISA website - http --> https
Updated to FINAL - 09/07/2017
updated to v1,r6- 4/25/18
Updated to FINAL - 5/25/18
Added GPOs - 8/6/18
Updated to FINAL - 9/6/2018
Updated GPO Resource - 11/29/2018
Corrected SHA for GPO file - 12/19/2018
Updated URLs - 6/12/19
Removed Unsupported Content Link 8/30/2019
removed GPO file - 12/13/19
Added GPO file as per DISA - 8/5/2020
updated GPO file - 10/29/2020
Updated GPO per DISA - 5/3/22
Updated GPO per DISA - 5/31/22
Updated GPO per DISA - 8/1/22
updated GPO file - 11/7/2022
updated GPO file - 1/31/2023
Updated GPO per DISA - 5/1/23
Updated GPO per DISA - 7/31/23
Updated GPO per DISA - 8/21/23
Updated GPO per DISA - 11/2/23
Corrected SHA discrepancy - 11/3/2023
updated GPO package - 1/31/24
SHA - 2/7/24
Updated Resources - 06/10/2024


URL Description


Reference URL Description

NIST checklist record last modified on 06/10/2024