General Cyber Exchange Announcements

Supplemental Automation Content has been updated for July 2020

This content leverages Configuration Management tools to enforce STIG requirements. These tools allow for customization and use a STIG-centric approach.

The Supplemental Automation Content can be found on the Cyber Exchange website on the Supplemental Automation Content tab located at:
https://cyber.mil/stigs/supplemental-automation-content/

For users who do not have a CAC that has DoD Certificates, the Supplemental Automation Content is also available from:
https://public.cyber.mil/stigs/supplemental-automation-content/

McAfee Home Use Solutions

McAfee has announced a “Work from Home (WFH)” program that provides free access to their Total Protection solution for 60-days. Under McAfee WFH, anyone can download their premier anti-virus and secure virtual private networking solutions to better protect their systems in response to the heightened mission need to support telework requirements. Click here to learn more about McAfee’s corporate Work from Home program.

The DoD Home Use program provides an annual subscription to McAfee’s Internet Security product for approved DoD employees via this website: https://www.disa.mil/Cybersecurity/Network-Defense/Antivirus/Home-Use.

SRGs/STIGs Announcements

STIG Update-DISA releases the Microsoft Exchange 2013, Microsoft Exchange 2016, and Microsoft Outlook 2016 Security Technical Implementation Guides.

The Defense Information Systems Agency recently released the Microsoft Exchange 2013, Microsoft Exchange 2016, and Microsoft Outlook 2016 V2R2 Security Technical Implementation Guides, which are effective immediately upon release.
Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the STIG from the DOD Cyber Exchange website at https://cyber.mil/stigs/downloads/. The STIG is also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.
Users who are unable to find and download the guide or other content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

STIG Update-DISA releases Palo Alto Networks STIG with Ansible

The Defense Information Systems Agency recently released the Palo Alto Networks Security Technical Implementation Guide (STIG) with Ansible. This content is published as a resource to assist in the application of security guidance to systems.

Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the file from the DOD Cyber Exchange website at https://cyber.mil/stigs/supplemental-automation-content/. The file is also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/supplemental-automation-content/.

Users who are unable to find and download the content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

STIG Update-DISA releases the Splunk Enterprise 8.x for Linux Security Technical Implementation Guide

The Defense Information Systems Agency recently released the Splunk Enterprise 8.x for Linux Security Technical Implementation Guide (STIG), which is effective immediately upon release.

Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the STIG from the DOD Cyber Exchange website at https://cyber.mil/stigs/downloads/. The STIG is also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.

Users who are unable to find and download the guide or other content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

Request for comments - DISA releases draft Canonical Ubuntu 20.04 LTS STIG SCAP benchmark for review

The Defense Information Systems Agency recently released the draft Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide (STIG) Security Content Automation Protocol (SCAP) benchmark for review.

Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can submit comments and/or recommended changes to the draft benchmark by 31 December 2021 on the comment matrix spreadsheet, which is located with the benchmark at https://cyber.mil/stigs/downloads/.

The draft benchmark and comment matrix are also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.

Please email comments to disa.stig_spt@mail.mil and include the title and version of the benchmark in the subject line.

Users who are unable to find and download these files or other content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil.

STIG Update - DISA releases the Redis Enterprise 6.x Security Technical Implementation Guide

DISA releases the Redis Enterprise 6.x Security Technical Implementation Guide

The Defense Information Systems Agency recently released the Redis Enterprise 6.x Security Technical Implementation Guide (STIG), which is effective immediately upon release.

Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the STIG from the DOD Cyber Exchange website at https://cyber.mil/stigs/downloads/. The STIG is also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.

Users who are unable to find and download the guide or other content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

STIG Update: DISA releases the Mozilla Firefox Security Technical Implementation Guide Version 6

The Defense Information Systems Agency recently released the Mozilla Firefox Security Technical Implementation Guide (STIG) Version 6, which is effective immediately upon release.

Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the STIG from the DOD Cyber Exchange website at https://cyber.mil/stigs/downloads/. The STIG is also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.

Users who are unable to find and download the guide or other content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

STIG Update - DISA Releases the Ivanti MobileIron Core MDM Server Security Technical Implementation Guide

The Defense Information Systems Agency recently released the Ivanti MobileIron Core MDM Server Security Technical Implementation Guide (STIG), which is effective immediately upon release.

Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the STIG from the DOD Cyber Exchange website at https://cyber.mil/stigs/downloads/. The STIG is also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.

Users who are unable to find and download the guide or other content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

STIG Update - DISA releases the VMware Workspace ONE UEM Security Technical Implementation Guide, V2R1

The Defense Information Systems Agency recently released the VMware Workspace ONE UEM Security Technical Implementation Guide (STIG), Version 2, Release 1, which is effective immediately upon release.

Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the STIG from the DOD Cyber Exchange website at https://cyber.mil/stigs/downloads/. The STIG is also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.

Users who are unable to find and download the guide or other content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

DISA releases the CA IDMS Security Technical Implementation Guide

The Defense Information Systems Agency recently released the CA IDMS Security Technical Implementation Guide (STIG), which is effective immediately upon release.

Customers that possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the STIG from the DOD Cyber Exchange website at https://cyber.mil/stigs/downloads/. The STIG is also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.

Users who are unable to find and download the guide or other content can report their issue to the Cyber Exchange web team at dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

DISA releases revised Microsoft Windows STIGs

The Defense Information Systems Agency has released the following out-of-cycle Security Technical Implementation Guide (STIG) and benchmark updates, which become effective immediately upon release:

Active Directory Domain STIG – Ver 3, Rel 1
Microsoft OneDrive STIG – Ver 2, Rel 2
Microsoft Windows 10 STIG – Ver 2, Rel 3
Microsoft Windows 2012 and 2012 R2 DC STIG – Ver 3, Rel 3
Microsoft Windows 2012 and 2012 R2 MS STIG – Ver 3, Rel 3
Microsoft Windows 2012 Server Domain Name Server (DNS) STIG – Ver 2, Rel 4
Microsoft Windows Defender Antivirus STIG – Ver 2, Rel 3
Microsoft Windows Firewall STIG – Ver 2, Rel 1
Microsoft Windows Privileged Access Workstation (PAW) STIG – Ver 2, Rel 1
Microsoft Windows Server 2016 STIG – Ver 2, Rel 3
Microsoft Windows Server 2019 STIG – Ver 2, Rel 3

Microsoft Windows 10 STIG Benchmark – Ver 2, Rel 3
Microsoft Windows Defender Antivirus STIG Benchmark – Ver 2, Rel 2
Microsoft Windows Firewall STIG Benchmark – Ver 2, Rel 1
Microsoft Windows Server 2012 and 2012 R2 DC STIG Benchmark – Ver 3, Rel 2
Microsoft Windows Server 2012 and 2012 R2 MS STIG Benchmark – Ver 3, Rel 2

The General Purpose Operating System Security Requirements Guide (SRG), Ver 2, Rel 2, is also being released in this out-of-cycle update.

Customers who possess a Common Access Card (CAC) that has valid Department of Defense (DOD) certificates can obtain the files from the DOD Cyber Exchange website at https://cyber.mil/stigs/downloads/. The files are also available on the Cyber Exchange public site at https://public.cyber.mil/stigs/downloads/.

Users who are unable to find and download the files can report their issue to the Cyber Exchange web team at  dod.cyberexchange@mail.mil. Individuals who have further questions related to STIG content should email the DISA STIG customer support desk at disa.stig_spt@mail.mil.

Request for Comments - DISA Has Released the Draft SLES 15 STIG SCAP Benchmark for Review

DISA has released the Draft SLES 15 Security Technical Implementation Guide (STIG) SCAP Benchmark for review.

Customers with a CAC that has DOD certificates can submit comments, recommended changes, and/or additions to the draft benchmark by 01 December 2021 on the Comment Matrix spreadsheet, located with the benchmark at https://cyber.mil/stigs/downloads/.

For those without a CAC that has DOD certificates, the Comment Matrix spreadsheet is located with the benchmark at https://public.cyber.mil/stigs/downloads/.

If you are unable to find and download the content, please report the issue to the DoD Cyber Exchange Web team at dod.cyberx@mail.mil. For all questions related to the content, please contact the DISA STIG Customer Support Desk at disa.stig_spt@mail.mil.

Please email comments to disa.stig_spt@mail.mil and include the title and version of the benchmark in the subject line.

Group Policy Objects (GPOs) have been updated for October 2021.

Group Policy Objects (GPOs) have been updated for October 2021. See the Change Log document included in the zip file for additional information.

DISA Risk Management Executive is posting the GPOs for use by system administrators to ease the burden in securing systems within their environment.

The GPOs can be found on Cyber Exchange website on the Group Policy Objects tab located at https://cyber.mil/stigs/gpo/. For users who do not have a CAC that has DoD certificates, the GPO is also available from https://public.cyber.mil/stigs/gpo/.

List of GPOs currently in the package:

Office Products
Access 2013
Access 2016
Excel 2013
Excel 2016
InfoPath 2013
Lync 2013
Office 365 ProPlus
Office System 2013
Office System 2016
OneDrive for Business 2016
OneNote 2013
OneNote 2016
Outlook 2013
Outlook 2016
PowerPoint 2013
PowerPoint 2016
Project 2013
Project 2016
Publisher 2013
Publisher 2016
SharePoint 2010
SharePoint Designer 2013
Skype for Business 2016
Visio 2013
Visio 2016
Word 2013
Word 2016

Browsers
Edge
Google Chrome
Internet Explorer 11

Antivirus
Windows Defender AV

Adobe Acrobat
Adobe Acrobat Pro DC Continuous
Adobe Acrobat Reader DC Continuous

Operating Systems
Windows 10
Windows Firewall
Windows 2012 R2 DC
Windows 2012 R2 MS
Windows Server 2016 (MS and DC)
Windows Server 2019 (MS and DC)

PKI/PKE Announcements

New WCF CAs released - Certificate Bundle v5.12

The WCF PKI has recently deployed updated WCF Signing CAs 1-10. These new certificates are now available in the WCF PKI PKCS#7 Certificate Bundle v5.12.