U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Windows 8/8.1 STIG Version 1, Release 23 Checklist Details (Checklist Revisions)

SCAP 1.0 Content:

Supporting Resources:

Target:

Target CPE Name
Microsoft Windows 8 x64 (64-bit) cpe:/o:microsoft:windows_8:-:-:x64 (View CVEs)
Microsoft Windows 8 x86 (32-bit) cpe:/o:microsoft:windows_8:-:-:x86 (View CVEs)
Microsoft Windows 8.1 (x64) cpe:/o:microsoft:windows_8.1:-:-:%7e-%7e-%7e-%7ex64%7e (View CVEs)
Microsoft Windows 8.1 (x86) cpe:/o:microsoft:windows_8.1:-:-:%7e-%7e-%7e-%7ex86%7e (View CVEs)

Checklist Highlights

Checklist Name:
Windows 8/8.1 STIG
Checklist ID:
434
Version:
Version 1, Release 23
Type:
Compliance
Review Status:
Under Review
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
02/15/2013

Checklist Summary:

The Windows 8 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as Windows security guidance by Microsoft Corporation. The vulnerabilities discussed in this document are applicable to Windows 8 Professional and Enterprise Editions.

Checklist Role:

  • Operating System

Known Issues:

Not provided

Target Audience:

This document is a requirement for all DoD administered systems and all systems connected to DoD networks. These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), IAOs, and System administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development,implementation, certification, and accreditation efforts.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

The vulnerabilities discussed in this document are applicable to Windows 8 Professional and Enterprise Editions.

Regulatory Compliance:

Department of Defense [DoD] Directive 8500

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via email to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided

Product Support:

Comments or proposed revisions to this document should be sent via email to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Point of Contact:

Comments or proposed revisions to this document should be sent via email to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Sponsor:

Not provided

Licensing:

Not provided

Change History:

Version 1, Release 7 - 25 July 2014 (SCAP 1.0)
Version 1, Release 6 - 25 April 2014 (SCAP 1.0)
Version 1, Release 5 - 25 April 2014 (XCCDF)
Version 1, Release 4 - 24 January 2014
Version 1, Release 3 - 24 November 2013
Version 1, Release 3 - 25 October 2013
Version 1, Release 2 - 24 July 2013
Version 1, Release 1 - 15 February 2013
Version 1, Release 8 - 28 January 2015

Dependency/Requirements:

URL Description
http://iase.disa.mil/stigs/Documents/u_microsoft_windows_8_stig_release_memo.pdf Windows 8 STIG Version 1, Release Memo

References:

Reference URL Description

NIST checklist record last modified on 04/06/2015


* This checklist is still undergoing review for inclusion into the NCP.