Cloud Computing Mission Owner Network Security Requirements Guide

Overview

VersionDateFinding Count (9)Downloads
12024-12-20CAT I (High): 5CAT II (Medium): 4CAT III (Low): 0
STIG Description
This Security Requirements Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-259863
LOWMEDIUMHIGH
The Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must implement a security stack that restricts traffic flow inbound and outbound between the IaaS and the Boundary Cloud Access Point (BCAP) or Internal Cloud Access Point (ICAP) connection.DOD users on the internet may first connect to their assigned Defense Information Systems Network (DISN) Virtual Private Network (VPN) before accessin...
V-259864
LOWMEDIUMHIGH
The Mission Owner's internet-facing applications must be configured to traverse the Cloud Access Point (CAP) and Virtual Datacenter Security Stack (VDSS) prior to communicating with the internet.The CAP and VDSS architectures mitigate potential damages to the Defense Information Systems Network (DISN) and provide the ability to detect and prev...
V-259867
LOWMEDIUMHIGH
For Infrastructure as a Service (IaaS)/Platform as a Service (PaaS), the Mission Owner must configure an intrusion detection and prevention system (IDPS) to protect DOD virtual machines (VMs), services, and applications.Network environments and applications installed using an IaaS/PaaS cloud service offering where the Mission Owner has control over the environment mus...
V-259870
LOWMEDIUMHIGH
The Mission Owner must configure the Infrastructure as a Service (IaaS)/Platform to use certificate path validation to ensure revoked user credentials are prohibited from establishing a user or machine session.A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path vali...
V-259871
LOWMEDIUMHIGH
The Mission Owner must configure the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) Cloud Service to use DOD-approved OCSP responder or CRL to validate certificates used for PKI-based authentication.To provide assurances that certificates are validated by the correct responders, the Mission Owner must ensure they are using a valid DOD OCSP respond...
V-259865
LOWMEDIUMHIGH
The Mission Owner of the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must configure scanning using an Assured Compliance Assessment Solution (ACAS) server or solution that meets DOD scanning and reporting requirements.Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating system or other system compone...
V-259866
LOWMEDIUMHIGH
The Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must be configured to maintain separation of all management and data traffic.The Virtual Datacenter Management system provides a management plane for privileged access and communications. Separation of management and user traff...
V-259868
LOWMEDIUMHIGH
The Mission Owner of the Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) must continuously monitor and protect inbound communications from external systems, other IaaS within the same cloud service environment, or collocated mission applications for unusual or unauthorized activities or conditions.Evidence of malicious code is used to identify potentially compromised information systems or information system components. Unusual/unauthorized ac...
V-259869
LOWMEDIUMHIGH
The Mission Owner of the Infrastructure as a Service (IaaS) must continuously monitor outbound communications to other systems and enclaves for unusual or unauthorized activities or conditions.Evidence of malicious code is used to identify potentially compromised information systems or information system components. Unusual/unauthorized act...