U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Microsoft Office System 2013 STIG Version 2, Release 1 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Office System 2013 cpe:/a:microsoft:office_system:2013 (View CVEs)

Checklist Highlights

Checklist Name:
Microsoft Office System 2013 STIG
Checklist ID:
536
Version:
Version 2, Release 1
Type:
Compliance
Review Status:
Final
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
01/28/2015

Checklist Summary:

This Microsoft Office Technology Overview, along with the associated Security Technical Implementation Guide (STIG), provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration. Unfortunately, this presence also brings about dependence and vulnerabilities. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Where applications do offer security options, the default settings typically do not provide a strong security posture.

Checklist Role:

  • Desktop Client

Known Issues:

Not Provided

Target Audience:

Developed for the DOD. This checklist has been created for IT professionals, particularly Windows system administrators and information security personnel. The document assumes that the reader has experience installing and administering applications on Windows-based systems in domain or standalone configurations.

Target Operational Environment:

  • Managed

Testing Information:

Not Provided

Regulatory Compliance:

DOD Directive 8500.1

Comments/Warnings/Miscellaneous:

Not Provided

Disclaimer:

Not Provided

Product Support:

disa.stig_spt@mail.mil

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not Provided

Licensing:

Not Provided

Change History:

Version 1, Release 2 Benchmark - 05 August 2015
Updated status from "under review" to "final" - 22 June 2015
Benchmark - Version 1, Release 1 - 18 May 2015
Changed status from "under review" to "final" - 11 September 2015
Updated URL to reflect change to the DISA website - http --> https
corrected resource title - 1/24/2018
updated to v1,r6- 4/25/18
corrected resource title - 5/24/18
updated to FINAL - 6/22/18
Added GPOs - 8/6/18
Updated to FINAL - 9/6/2018
Updated to Version 1, Release 7 - 10/25/18
Updated to FINAL - 11/26/18
Updated GPO Resource - 11/29/2018
Corrected SHA for GPO file - 12/19/2018
updated GPO file - 2/8/19
Status Updated to FINAL - 3/8/19
updated to Version 1, Release 8 - 4/30/19
Updated GPO resource - 5/2/19
Updated to FINAL  - 6/4/19
Updated URLs - 6/26/19
Updated URLs - 8/29/19
Updated GPO file - 10/31/19
updated URLs - 11/1/19
Updated GPO file per DISA - 1/29/2020
Updated GPO file per DISA - 2/3/2020
updated GPO file - 3/6/2020
updated resource title per DISA - 3/12/2020
updated GPO file - 4/27/2020

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 04/27/2020