Version | Date | Finding Count (2) | ||
---|---|---|---|---|
6 | 2022-10-10 | CAT I (High): 0 | CAT II (Med): 2 | CAT III (Low): 0 |
STIG Description |
---|
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Finding ID | Severity | Title | Description |
---|---|---|---|
V-224648 | Medium | Catalog Solutions resources must be properly defined and protected. | Catalog Solutions can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the compromise... |
V-224647 | Medium | Catalog Solution Install data sets are not properly protected. | Catalog Solutions is a very powerful tool that can pose risks if not properly controlled. If security is not properly implemented, the users of the product could present data integrity exposures,... |