HPE 3PAR StoreServ 3.2.x STIG version 2, release 1 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - HPE 3PAR StoreServ 3.2.x STIG Version 1, Release 1
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
HPE 3PAR StoreServ 3.2.x | cpe:/h:hp:3par_storeserv (View CVEs) |
Checklist Highlights
- Checklist Name:
- HPE 3PAR StoreServ 3.2.x STIG
- Checklist ID:
- 683
- Version:
- version 2, release 1
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 07/25/2016
Checklist Summary:
The Hewlett Packard Enterprise (HPE) 3PAR StoreServ 3.2.x Security Technical Implementation Guide (STIG) is published as a tool to improve the security of the Department of Defense (DoD) information systems. The requirements were developed from Federal and DoD consensus based on the General Purpose Operating System Security Requirements Guide (GPOS SRG). The vulnerabilities discussed in this document are applicable to HPE 3PAR StoreServ 3.2.x storage systems. The vulnerabilities discussed in this STIG are applicable to the default HPE 3PAR Operating System (OS) installed on the HPE 3PAR StoreServ proprietary hardware platform. The server may be configured to use a remote authentication method (LDAP or Active Directory), run basic system services, and use basic remote management (sshd). This document is meant for use in conjunction with the Enclave and Network Infrastructure STIGs.
Checklist Role:
- Server Operating System
Known Issues:
Not Provided
Target Audience:
Not Provided
Target Operational Environment:
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not Provided
Regulatory Compliance:
All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component Authorizing Official (AO) personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil.
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via email to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule.
Disclaimer:
Not Provided
Product Support:
Comments or proposed revisions to this document should be sent via email to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule.
Point of Contact:
disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil
Sponsor:
Developed by DISA for the DoD
Licensing:
Not Provided
Change History:
Updated to FINAL - 09/12/2016
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|