Microsoft Access 2013 STIG Version 1, Release 7 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
SCAP 1.1 Content:
-
Download SCAP 1.1 Content - Microsoft Access 2013 STIG Benchmark - Ver 1, Rel 2 (SCC tool use only)
- Author: Defense Information Systems Agency
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Microsoft Access 2013 STIG - Ver 1, Rel 6
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Access 2013 | cpe:/a:microsoft:access:2013 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Microsoft Access 2013 STIG
- Checklist ID:
- 522
- Version:
- Version 1, Release 7
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 04/28/2017
Checklist Summary:
This Microsoft Office Technology Overview, along with the associated Security Technical Implementation Guide (STIG), provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration. Unfortunately, this presence also brings about dependence and vulnerabilities. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Where applications do offer security options, the default settings typically do not provide a strong security posture.
Checklist Role:
- Desktop Client
- Office Software
Known Issues:
Not Provided
Target Audience:
Developed for the DOD. This checklist has been created for IT professionals, particularly Windows system administrators and information security personnel. The document assumes that the reader has experience installing and administering applications on Windows-based systems in domain or standalone configurations.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not Provided
Regulatory Compliance:
DOD Directive 8500.
Comments/Warnings/Miscellaneous:
Not Provided
Disclaimer:
Not Provided
Product Support:
disa.stig_spt@mail.mil
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not Provided
Licensing:
Not Provided
Change History:
Updated status from "under review" to "final" - 22 June 2015 Make Visible to Public - 28 January 2015 Benchmark - Version 1, Release 1 - 18 May 2015 Updated STIG to V1, R3 updated to FINAL - 12-07-2016 Updated to Version 1, Release 4 - 01/27/2017 Updated to FINAL - 03/08/2017 Updated - Version 1, Release 5 - 04/24/2017 Updated to FINAL - 05/22/2017 null Updated URL to reflect change to the DISA website - http --> https updated to v1,r6 - 4/25/18 Updated to FINAL - 5/25/18
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|