SUSE Linux Enterprise Micro 5 STIG Ver 1, Rel 1 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - SUSE Linux Enterprise Micro 5 STIG - Ver 1, Rel 1
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
SUSE Linux Enterprise Micro 5.1 | cpe:/o:suse:linux_enterprise_micro:5.1::~~~-~~ (View CVEs) |
SUSE Linux Enterprise Micro 5.2 | cpe:/o:suse:linux_enterprise_micro:5.2::~~~-~~ (View CVEs) |
SUSE Linux Enterprise Micro 5.3 | cpe:/o:suse:linux_enterprise_micro:5.3::~~~-~~ (View CVEs) |
SUSE Linux Enterprise Micro 5.4 | cpe:/o:suse:linux_enterprise_micro:5.4::~~~-~~ (View CVEs) |
SUSE Linux Enterprise Micro 5.5 | cpe:/o:suse:linux_enterprise_micro:5.5::~~~-~~ (View CVEs) |
Checklist Highlights
- Checklist Name:
- SUSE Linux Enterprise Micro 5 STIG
- Checklist ID:
- 1243
- Version:
- Ver 1, Rel 1
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 08/20/2024
Checklist Summary:
The SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements were developed from the General Purpose Operating System Security Requirements Guide (GPOS SRG)
Checklist Role:
- Operating System
Known Issues:
Not provided
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA will coordinate all change requests with the relevant DOD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA maintenance release schedule.
Disclaimer:
The existence of a STIG does not equate to DOD approval for the procurement or use of a product. STIGs provide configurable operational security guidance for products being used by the DOD. STIGs, along with vendor confidential documentation, also provide a basis for assessing compliance with cybersecurity controls/control enhancements, which supports system assessment and authorization (A&A) under the DOD Risk Management Framework (RMF). Department of Defense AOs may request available vendor confidential documentation for a product that has a STIG for product evaluation and RMF purposes from disa.stig_spt@mail.mil. This documentation is not published for general access to protect the vendor’s proprietary information
Product Support:
Parties within the DOD and federal government’s computing environments can obtain the applicable STIG from the DOD Cyber Exchange website at https://cyber.mil/. This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DOD Certificates can obtain the STIG from https://public.cyber.mil/.
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Initial Candidate Submission - 08/272024 Status Changed to Final - 09/23/2024
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|