Unisys STIG Checklist Version 7 Release 2 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Prose - Unisys Checklist - Version 7, Release 2.
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Unisys 2200 6.1 | cpe:/o:unisys:unisys_2200:6.1 (View CVEs) |
Unisys 2200 8.1 | cpe:/o:unisys:unisys_2200:8.1 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Unisys STIG Checklist
- Checklist ID:
- 62
- Version:
- Version 7 Release 2
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 11/24/2006
Checklist Summary:
This Unisys Security Checklist provides the procedures for conducting a review to determine compliance with the requirements in the Unisys Security Technical Implementation Guide and must be used together. This Unisys security checklist covers the Unisys Executive and Standard system software. Additionally, this checklist ensures the site has a properly installed and implemented specific operating system and associated software application configurations and that it is being managed in a way that is secure, efficient, and effective, through procedures outlined in the checklist.
Checklist Role:
- Mainframe Operating System
Known Issues:
Not provided.
Target Audience:
Developped for the DOD. The requirements set forth in this document are designed to assist Information Assurance Officers (IAOs) and System Administrators (SAs) in support of protecting DOD network infrastructures and resources. It assumes that the reader has knowledge of the Unisys Executive and Standard system software and is familiar with common computer terminology.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DOD Directive 8500.
Comments/Warnings/Miscellaneous:
Please refer to the Checklist or the README.txt files provided with the scripts for any comments, warnings, or detailed instructions.
Disclaimer:
Not provided.
Product Support:
It should be noted that FSO Support for the STIGs, Checklists, and Tools is only available to DOD Customers.
Point of Contact:
Not provided.
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
14 April 2006 Added VMS 6.0 review procedures. 14 April 2006 Added VMS 6.0 Vulnerability Key to each checklist item. 24 November 2006 Added new vulnerabilities to match Unisys STIG V7R2, 28 August 2006
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|