U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Oracle JRE 8 UNIX STIG Ver 1, Rel 3 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Oracle JRE for UNIX cpe:/a:oracle:jre (View CVEs)

Checklist Highlights

Checklist Name:
Oracle JRE 8 UNIX STIG
Checklist ID:
762
Version:
Ver 1, Rel 3
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
04/28/2017

Checklist Summary:

The Java Runtime Environment (JRE) is a bundle developed and offered by Oracle Corporation that contains the Java Virtual Machine (JVM), class libraries, and other components necessary to run Java applications and applets. The JVM converts Java byte code into machine language and executes it. The JRE is both a standalone and a web browser plug-in; the latter allows Java applets to run within a browser. Without the JRE, Java programs and applets cannot be executed. The Oracle Java Runtime Environment (JRE) 8 UNIX Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. This document is meant for use in conjunction with the appropriate UNIX Operating System (OS) STIG. This STIG is intended for desktop installations of the Oracle JRE and is not intended for Java Development Kit (JDK) installations, installs on server systems, or other JRE products.

Checklist Role:

  • Desktop Client
  • Desktop or Mobile Client
  • Business Productivity Application

Known Issues:

Not provided.

Target Audience:

These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), Information Assurance Officers (IAOs), and System Administrators (SAs) with configuring and maintaining security controls.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoDD 8500.1

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Updated to FINAL - 05/30/2017
Updated URL to reflect change to the DISA website - http --> https
Updated - 11/01/2017
Updated to FINAL - 11/27/2017
Updated URLs - 6/13/19
sunset per DISA - 12/2/2020

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 12/02/2020