{
"stig": {
"date": "2014-10-05",
"description": "The Java Runtime Environment (JRE) is a bundle developed and offered by Oracle Corporation which includes the Java Virtual Machine (JVM), class libraries, and other components necessary to run Java applications and applets. Certain default settings within the JRE pose a security risk so it is necessary to deploy system wide properties to ensure a higher degree of security when utilizing the JRE.\nGuidance placed on sunset list 10/24/2014. XP OS no longer supported by vendor.",
"findings": {
"V-32828": {
"checkid": "C-41506r8_chk",
"checktext": "If the system is on the SIPRNET, this requirement is NA.\n\nNavigate to the 'deployment.properties' file for Java.\n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nIf the key 'deployment.security.askgrantdialog.notinca=false' is not present, this is a finding.\n\nIf the key 'deployment.security.askgrantdialog.notinca' exists and is set to true, this is a finding. \n",
"description": "Java applets exist in both signed and unsigned forms. Although signed applets allow for authentication of the author in order to establish trust, even signed applets can potentially contain malware. Applet sources considered trusted will normally have their certificate information populated into the browser. This enables Java to validate applets against trusted sources automatically. Permitting users to grant execution permissions to Java applets signed by un-trusted authorities may result in malware executing on the system. This risks system confidentiality, integrity and availability. ",
"fixid": "F-37142r9_fix",
"fixtext": "Disable the 'Allow user to grant permissions to content from an un-trusted authority' feature.\n\nNavigate to the 'deployment.properties' file for Java.\n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nAdd or update the key, 'deployment.security.askgrantdialog.notinca' set the value to 'false'. \n",
"iacontrols": [
"DCBP-1"
],
"id": "V-32828",
"ruleID": "SV-43207r2_rule",
"severity": "medium",
"title": "The dialog enabling users to grant permissions to execute signed content from an un-trusted authority must be disabled. ",
"version": "JRE0001-J6XP"
},
"V-32829": {
"checkid": "C-41508r4_chk",
"checktext": "Navigate to the 'deployment.properties' file for Java. \n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nIf the key 'deployment.security.askgrantdialog.notinca.locked' is not present, this is a finding.\n",
"description": "Java applets exist in both signed and unsigned forms. Although signed applets allow for authentication of the author in order to establish trust, even signed applets can potentially contain malware. Applet sources considered trusted will normally have their certificate information populated into the browser. This enables Java to validate applets against trusted sources automatically. Permitting users to grant execution permissions to Java applets signed by un-trusted authorities may result in malware executing on the system. This risks system confidentiality, integrity and availability. This option must be locked so the user cannot make changes.\n\nEnsuring users cannot change settings contributes to a more consistent security profile. \n",
"fixid": "F-37144r6_fix",
"fixtext": "Lock the 'Allow user to grant permissions to content from an un-trusted authority' feature. \nNavigate to the 'deployment.properties' file for Java.\n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nAdd the key 'deployment.security.askgrantdialog.notinca.locked' to the deployment.properties file. ",
"iacontrols": [
"DCBP-1"
],
"id": "V-32829",
"ruleID": "SV-43210r2_rule",
"severity": "medium",
"title": "The dialog enabling users to grant permissions to execute signed content from an un-trusted authority must be locked. ",
"version": "JRE0010-J6XP"
},
"V-32830": {
"checkid": "C-41510r6_chk",
"checktext": "If the system is on the SIPRNET, this requirement is NA.\n\nNavigate to the 'deployment.properties' file for Java.\n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\n\nIf the key 'deployment.security.validation.crl' is not present within the deployment.properties file, this is a finding. \nIf the key 'deployment.security.validation.crl' is set to 'false', this is a finding.\n",
"description": "A certificate revocation list is a directory which contains a list of certificates that have been revoked for various reasons. Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found on a CRL should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service. ",
"fixid": "F-37146r6_fix",
"fixtext": "If the system is on the SIPRNET, this requirement is NA.\n\nEnable the 'Check certificates for revocation using Certificate Revocation Lists (CRL)' option.\n\nNavigate to the 'deployment.properties' file for Java. \n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n \nAdd or update the key \n'deployment.security.validation.crl' in the deployment.properties file. Set the value to 'true'. \n",
"iacontrols": [
"DCBP-1"
],
"id": "V-32830",
"ruleID": "SV-43213r2_rule",
"severity": "medium",
"title": "The dialog to enable users to check publisher certificates for revocation must be enabled. \n",
"version": "JRE0020-J6XP"
},
"V-32831": {
"checkid": "C-41512r8_chk",
"checktext": "If the system is on the SIPRNET, this requirement is NA.\n\nNavigate to the 'deployment.properties' file for Java.\n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nIf the key 'deployment.security.validation.crl.locked' is not present in the deployment.properties file, this is a finding. \n\nIf the key 'deployment.security.revocation.check.locked' is not present in the deployment.properties file, this is a finding.\n\nIf the key 'deployment.security.validation.ocsp.locked' is not present in the deployment.properties file, this is a finding.",
"description": "Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found revoked on a CRL or via Online Certificate Status Protocol (OCSP) should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service.\n \nEnsuring users cannot change these settings assures a more consistent security profile.\n",
"fixid": "F-37148r5_fix",
"fixtext": "Navigate to the 'deployment.properties' file for Java. \n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nAdd the key 'deployment.security.validation.crl.locked' to the deployment.properties file.\n \nAdd the key 'deployment.security.validation.ocsp.locked' to the deployment.properties file. ",
"iacontrols": [
"DCBP-1"
],
"id": "V-32831",
"ruleID": "SV-43216r4_rule",
"severity": "medium",
"title": "The option to enable users to check publisher certificates for revocation must be locked. \n",
"version": "JRE0030-J6XP"
},
"V-32832": {
"checkid": "C-41514r6_chk",
"checktext": "If the system is on the SIPRNET, this requirement is NA.\n\nNavigate to the 'deployment.properties' file for Java.\n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nIf the key 'deployment.security.validation.ocsp' is not present in the deployment.properties file, this is a finding. \nIf the key 'deployment.security.validation.ocsp' is set to 'false', this is a finding.",
"description": "Online certificate validation provides a real-time option to validate a certificate. When enabled, if a certificate is presented, the status of the certificate is requested. The status is sent back as 'current', 'expired', or 'unknown'. Online certificate validation provides a greater degree of validation of certificates when running a signed Java applet. Permitting execution of an applet with an invalid certificate may result in malware, system modification, invasion of privacy, and denial of service. ",
"fixid": "F-37150r6_fix",
"fixtext": "If the system is on the SIPRNET, this requirement is NA.\n\nEnable the 'Enable online certificate validation' option.\n \nNavigate to the 'deployment.properties' file for Java. \n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nAdd or update the key \n'deployment.security.validation.ocsp' in the deployment.properties file. Set the value to 'true'. \n",
"iacontrols": [
"DCBP-1"
],
"id": "V-32832",
"ruleID": "SV-43219r2_rule",
"severity": "medium",
"title": "The option to enable online certificate validation must be enabled. \n",
"version": "JRE0040-J6XP"
},
"V-32833": {
"checkid": "C-41516r6_chk",
"checktext": "If the system is on the SIPRNET, this requirement is NA.\n\nNavigate to the 'deployment.properties' file for Java.\n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nIf the key 'deployment.security.validation.ocsp.locked' is not present in the deployment.properties file, this is a finding. \n",
"description": "Online certificate validation provides a real-time option to validate a certificate. When enabled, if a certificate is presented, the status of the certificate is requested. The status is sent back as 'current', 'expired', or 'unknown'. Online certificate validation provides a greater degree of validation of certificates when running a signed Java applet. Permitting execution of an applet with an invalid certificate may result in malware, system modification, invasion of privacy, and denial of service. \n\nEnsuring users cannot change settings contributes to a more consistent security profile. \n",
"fixid": "F-37152r6_fix",
"fixtext": "If the system is on the SIPRNET, this requirement is NA.\n\nLock the 'Enable online certificate validation' option.\n\nNavigate to the 'deployment.properties' file for Java. \n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n\nAdd the key 'deployment.security.validation.ocsp.locked' to the deployment.properties file.",
"iacontrols": [
"DCBP-1"
],
"id": "V-32833",
"ruleID": "SV-43222r2_rule",
"severity": "medium",
"title": "The option to enable online certificate validation must be locked. \n",
"version": "JRE0050-J6XP"
},
"V-32842": {
"checkid": "C-41518r17_chk",
"checktext": "Navigate to the deployment.config file:\nIf the deployment.config file does not exist, it must be created. The deployment.config file is a text file containing 2 keys. They are:\n\ndeployment.system.config = \ndeployment.system.config.mandatory = \n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.config. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit config files:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.config\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.config \n\nVerify the 'deployment.system.config' key in the deployment.config file is set to the correct path. Note that the characters : and \\ must be delimited by a backslash. \n\nThe path contained in the deployment.config file(s) will depend upon system architecture. The following paths are examples. Drive letters may vary based upon your system.\n\nFor 32 bit systems the path is:\n'file:C\\:\\\\Program Files\\\\Java\\\\jre\\\\lib\\\\deployment.properties'\n\nFor 64 bit systems the paths are:\n'file:C\\:\\\\Program Files\\\\Java\\\\jre\\\\lib\\\\deployment.properties'\n\n'file:C\\:\\\\Program Files (x86)\\\\Java\\\\jre\\\\lib\\\\deployment.properties'\n\nVerify the 'deployment.system.config.mandatory' key in the deployment.config file(s) are set to 'false'.\n\nIf the 'deployment.system.config' key is not set to the correct path and the 'deployment.system.config.mandatory' key is not set to false, \n\nthis is a finding.\n",
"description": "The deployment.config file is used to specify the location of the deployment.properties file and for controlling the launch of the JRE runtime. By default, these two files do not exist, they must both be created. \n\nWithout a proper path to the deployment.properties file, deployment settings will fail. If the path specified in deployment.config does not lead to a deployment.properties file, then the value of the 'deployment.system.config.mandatory' key contained in deployment.config will determine how to handle the situation. If the value of this key is true, JRE will not run if the path to the properties file is invalid. ",
"fixid": "F-37154r14_fix",
"fixtext": "If the deployment.config file does not exist, create the file. The deployment.config file is a text file containing 2 keys. They are:\n\ndeployment.system.config = \ndeployment.system.config.mandatory = \n\nOn 32-bit systems the deployment config file should be located at:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.config\n\nOn 64-bit systems there can be 2 locations for the deployment.config file. One is for 32 bit JRE and the other for 64 bit JRE:\n\n64 bit - C:\\Program Files\\Java\\jre6\\lib\\deployment.config\n32 bit - C:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.config\n\nInclude the following keys and values in the appropriate deployment.config file based upon your system architecture. If you are running both a 32 bit and a 64 bit JRE, you need to check both deployment.config files. The following are examples, drive letters may be vary.\n\n32 bit\n'deployment.system.config=file:C\\:\\\\Program Files (x86)\\\\Java\\\\jre6\\\\lib\\\\deployment.properties'\n'deployment.system.config.mandatory=false'.\n\n64 bit \n'deployment.system.config=file:C\\:\\\\Program Files\\\\Java\\\\jre6\\\\lib\\\\deployment.properties'\n'deployment.system.config.mandatory=false'.\n\n",
"iacontrols": [
"DCBP-1"
],
"id": "V-32842",
"ruleID": "SV-43236r2_rule",
"severity": "medium",
"title": "The configuration file must contain proper keys and values to deploy settings correctly. ",
"version": "JRE0060-J6XP"
},
"V-32901": {
"checkid": "C-41522r6_chk",
"checktext": "On 32-bit systems, verify that one JRE deployment configuration file exists as indicated:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.config\n\nOn 64-bit systems, verify that two JRE deployment configuration files exist as indicated, one for 32 bit and one for 64 bit:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.config \nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.config\n\nIf the configuration files do not exist as indicated, this is a finding.\n",
"description": "The deployment.config file is used for specifying the location and execution of system-level properties for the Java Runtime Environment. By default no deployment.config file exists; thus, no system-wide deployment.properties file exists. 64-bit systems require two copies of the file, one for the 64-bit JRE and the other for the 32-bit JRE. Without the deployment.config file, setting particular options for the Java control panel is impossible.",
"fixid": "F-37158r7_fix",
"fixtext": "On 32-bit systems, create a JRE deployment configuration file as indicated:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.config\n\nOn 64-bit systems, create two JRE deployment configuration files as indicated:\nC:\\Program Files\\Java\\jre6\\lib\\deployment.config \nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.config\n\nThe deployment.config file is a text file containing 2 keys. The keys are:\n\ndeployment.system.config = \ndeployment.system.config.mandatory = \n",
"iacontrols": [
"DCBP-1"
],
"id": "V-32901",
"ruleID": "SV-43295r2_rule",
"severity": "medium",
"title": "A configuration file must be present to deploy properties for JRE. ",
"version": "JRE0070-J6XP"
},
"V-32902": {
"checkid": "C-41524r5_chk",
"checktext": "Locate the deployment.properties files.\n\nFor 32 bit systems the path is:\n\n'C:\\Program Files\\Java\\jre6\\lib\\deployment.properties'\n\nFor 64 bit systems there are 2 potential paths as there can be 2 separate JRE's one 32 bit and one 64 bit:\n\n'C:\\Program Files\\Java\\jre6\\lib\\deployment.properties'\n'C:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties'\n\nIf there are no files entitled 'deployment.properties', this is a finding. \n",
"description": "The deployment.properties file is used for specifying keys for the Java Runtime Environment. Each option in the Java control panel is represented by property keys. These keys adjust the options in the Java control panel based on the value assigned to that key. By default no deployment.properties file exists; thus, no system-wide deployment exists. Without the deployment.properties file, setting particular options for the Java control panel is impossible. ",
"fixid": "F-37160r6_fix",
"fixtext": "Create the Java deployment properties file. The location of this file can vary. \n\nFor 32 bit systems: \nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties. \n\nFor 64 bit systems you must check both the 64 bit and the 32 bit files in order for both runtimes to be affected.\n\nC:\\Program Files\\Java\\jre6\\lib\\deployment.properties\nC:\\Program Files (x86)\\Java\\jre6\\lib\\deployment.properties \n \nCreate a properties file entitled 'deployment.properties'.\n\nAt a minimum, the following keys must be present in the deployment.properties file. \n\ndeployment.security.askgrantdialog.notinca=false\ndeployment.security.askgrantdialog.notinca.locked\ndeployment.security.validation.crl=true\ndeployment.security.validation.crl.locked\ndeployment.security.validation.ocsp=true\ndeployment.security.validation.ocsp.locked\n",
"iacontrols": [
"DCBP-1"
],
"id": "V-32902",
"ruleID": "SV-43298r2_rule",
"severity": "medium",
"title": "A properties file must be present to hold all the keys that establish properties within the Java control panel. ",
"version": "JRE0080-J6XP"
},
"V-39239": {
"checkid": "C-46509r5_chk",
"checktext": "Open a terminal window and type the command;\n\"java -version\" sans quotes.\n\nThe return value should contain Java build information;\n\n\"Java (TM) SE Runtime Environment (build x.x.x.x)\"\n\nCross reference the build information on the system with the Oracle Java site to identify the most recent build available.\n\nhttp://www.oracle.com/technetwork/java/javase/downloads/index.html",
"description": "The JRE is being continually updated by the vendor in order to address identified security vulnerabilities. Running an older version of the JRE can introduce security vulnerabilities to the system.",
"fixid": "F-44218r5_fix",
"fixtext": "Test applications to ensure operational compatability with new version of Java.\n\nInstall latest version of Java JRE.",
"iacontrols": [
"DCBP-1"
],
"id": "V-39239",
"ruleID": "SV-51121r1_rule",
"severity": "medium",
"title": "The version of the JRE running on the system must be the most current available.",
"version": "JRE0090-J6XP"
},
"V-54383": {
"checkid": "C-54999r3_chk",
"checktext": "Check the OS version to ensure it is supported by the vendor.\n\nMicrosoft support for Windows XP ended April 8 2014. If the JRE is installed on an XP system, this is a finding.\n",
"description": "Security updates are the standard method for addressing discovered vulnerabilities. The operating system platform the JRE is installed on must be supported for security updates or the OS becomes a threat vector that can negatively impact the JRE. Organizations must run the JRE on a supported OS version to ensure security updates are available and to mitigate threats to the JRE.",
"fixid": "F-59237r1_fix",
"fixtext": "Upgrade the operating system platform the JRE is installed on to a supported OS version.",
"iacontrols": [
"DCSQ-1"
],
"id": "V-54383",
"ruleID": "SV-68629r1_rule",
"severity": "high",
"title": "The Java Runtime Environment (JRE) must not be installed on an unsupported operating system.",
"version": "JRE9999-UNSPTD-OS"
}
},
"profiles": {
"MAC-1_Classified": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-1_Classified",
"title": "I - Mission Critical Classified"
},
"MAC-1_Public": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-1_Public",
"title": "I - Mission Critical Public"
},
"MAC-1_Sensitive": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-1_Sensitive",
"title": "I - Mission Critical Sensitive"
},
"MAC-2_Classified": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-2_Classified",
"title": "II - Mission Support Classified"
},
"MAC-2_Public": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-2_Public",
"title": "II - Mission Support Public"
},
"MAC-2_Sensitive": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-2_Sensitive",
"title": "II - Mission Support Sensitive"
},
"MAC-3_Classified": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-3_Classified",
"title": "III - Administrative Classified"
},
"MAC-3_Public": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-3_Public",
"title": "III - Administrative Public"
},
"MAC-3_Sensitive": {
"description": "",
"findings": {
"V-32828": "true",
"V-32829": "true",
"V-32830": "true",
"V-32831": "true",
"V-32832": "true",
"V-32833": "true",
"V-32842": "true",
"V-32901": "true",
"V-32902": "true",
"V-39239": "true",
"V-54383": "true"
},
"id": "MAC-3_Sensitive",
"title": "III - Administrative Sensitive"
}
},
"slug": "java_runtime_environment_jre_6_windows_xp",
"title": "Java Runtime Environment (JRE) 6 STIG for Windows XP",
"version": "1"
}
}