U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

HPE 3PAR StoreServ 3.2.x STIG version 2, release 1 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
HPE 3PAR StoreServ 3.2.x cpe:/h:hp:3par_storeserv (View CVEs)

Checklist Highlights

Checklist Name:
HPE 3PAR StoreServ 3.2.x STIG
Checklist ID:
683
Version:
version 2, release 1
Type:
Compliance
Review Status:
Final
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
01/27/2017

Checklist Summary:

The Hewlett Packard Enterprise (HPE) 3PAR StoreServ 3.2.x Security Technical Implementation Guide (STIG) is published as a tool to improve the security of the Department of Defense (DoD) information systems. The requirements were developed from Federal and DoD consensus based on the General Purpose Operating System Security Requirements Guide (GPOS SRG). The vulnerabilities discussed in this document are applicable to HPE 3PAR StoreServ 3.2.x storage systems. The vulnerabilities discussed in this STIG are applicable to the default HPE 3PAR Operating System (OS) installed on the HPE 3PAR StoreServ proprietary hardware platform. The server may be configured to use a remote authentication method (LDAP or Active Directory), run basic system services, and use basic remote management (sshd). This document is meant for use in conjunction with the Enclave and Network Infrastructure STIGs.

Checklist Role:

  • Server Operating System

Known Issues:

Not Provided

Target Audience:

Not Provided

Target Operational Environment:

  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not Provided

Regulatory Compliance:

All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component Authorizing Official (AO) personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil.

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule.

Disclaimer:

Not Provided

Product Support:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule.

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Developed by DISA for the DoD

Licensing:

Not Provided

Change History:

Updated to FINAL - 09/12/2016
Updated to v1, r2 - 01/27/2017
Updated to FINAL - 03/08/2017
null
Updated URL to reflect change to the DISA website - http --> https
Updated URLs - 6/6/19
updated URLs - 1/26/2022

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 01/26/2022