U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

SUSE Linux Enterprise Micro 5 STIG Ver 1, Rel 1 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
SUSE Linux Enterprise Micro 5.1 cpe:/o:suse:linux_enterprise_micro:5.1::~~~-~~ (View CVEs)
SUSE Linux Enterprise Micro 5.2 cpe:/o:suse:linux_enterprise_micro:5.2::~~~-~~ (View CVEs)
SUSE Linux Enterprise Micro 5.3 cpe:/o:suse:linux_enterprise_micro:5.3::~~~-~~ (View CVEs)
SUSE Linux Enterprise Micro 5.4 cpe:/o:suse:linux_enterprise_micro:5.4::~~~-~~ (View CVEs)
SUSE Linux Enterprise Micro 5.5 cpe:/o:suse:linux_enterprise_micro:5.5::~~~-~~ (View CVEs)

Checklist Highlights

Checklist Name:
SUSE Linux Enterprise Micro 5 STIG
Checklist ID:
1243
Version:
Ver 1, Rel 1
Type:
Compliance
Review Status:
Final
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
08/20/2024

Checklist Summary:

The SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements were developed from the General Purpose Operating System Security Requirements Guide (GPOS SRG)

Checklist Role:

  • Operating System

Known Issues:

Not provided

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA will coordinate all change requests with the relevant DOD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA maintenance release schedule.

Disclaimer:

The existence of a STIG does not equate to DOD approval for the procurement or use of a product. STIGs provide configurable operational security guidance for products being used by the DOD. STIGs, along with vendor confidential documentation, also provide a basis for assessing compliance with cybersecurity controls/control enhancements, which supports system assessment and authorization (A&A) under the DOD Risk Management Framework (RMF). Department of Defense AOs may request available vendor confidential documentation for a product that has a STIG for product evaluation and RMF purposes from disa.stig_spt@mail.mil. This documentation is not published for general access to protect the vendor’s proprietary information

Product Support:

Parties within the DOD and federal government’s computing environments can obtain the applicable STIG from the DOD Cyber Exchange website at https://cyber.mil/. This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DOD Certificates can obtain the STIG from https://public.cyber.mil/.

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Initial Candidate Submission - 08/272024
Status Changed to Final - 09/23/2024

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 09/23/2024