Google Search Appliance STIG Version 1, Release 1 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Google Search Appliance STIG
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Google Search Appliance | cpe:/h:google:search_appliance (View CVEs) |
Checklist Highlights
- Checklist Name:
- Google Search Appliance STIG
- Checklist ID:
- 840
- Version:
- Version 1, Release 1
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 03/30/2018
Checklist Summary:
The Google Search Appliance STIG provides the technical security policies, requirements, and implementation details for applying security concepts to Google Search Appliance. The requirements and recommendations set forth in this document will assist ISSOs and ISSMs in protecting desktop applications in DoD locations hereafter referred to as sites. The responsible Configuration Control Board (CCB) will approve revisions to site systems that could have a security impact. Therefore, before implementing desktop application security measures, the ISSO will submit a change notice to the CCB for review and approval. Google Search Appliance does not have the capability to have anti-virus software installed on the underlying operating system, PKI-based authentication has not been implemented and auditing capabilities are limited.
Checklist Role:
- Business Productivity Application
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoDI 8500.01
Comments/Warnings/Miscellaneous:
All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component Authorizing Official (AO) personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil. 1.6
Disclaimer:
Not provided.
Product Support:
Parties within the DoD and Federal Government's computing environments can obtain the applicable STIG from the Information Assurance Support Environment (IASE) website. This site contains the latest copies of any STIGs, SRGs, and other related security information. The address for the IASE site is http://iase.disa.mil/.
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Updated to FINAL - 4/30/18
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|