Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

STIG Report (by MAC)

by Josef Weiss
December 11, 2014

The DoD uses Security Technical Implementation Guide (STIG) audits to analyze risk and identify configuration vulnerabilities. As part of the proper Information Assurance (IA) controls, the configuration settings are classified using Mission Assurance Category (MAC) Levels. This report presents the analyst with STIG classification and MAC levels in an easy to understand method.

A Security Technical Implementation Guide (STIG) is a methodology for standardized secure installation and maintenance of computer software and hardware. The term was coined by the Defense Information Systems Agency (DISA), which creates configuration documents in support of the United States Department of Defense (DoD). The implementation guidelines include recommended administrative processes and span the devices' lifecycle.

According to DISA, the determining factor in developing the proper IA control sets for the systems, as well as the confidentiality of the information being passed through the system, is the Mission Assurance Level. DoDI 8580.1 defines the MAC Levels as:

  • MAC I - Systems that handle information that is vital to either the operational readiness or mission effectiveness of deployed and contingency forces in terms of both content and timeliness. The loss of integrity or availability of a MAC I system is unacceptable and could include the immediate and sustained loss of mission effectiveness. Mission Assurance Category I systems require the most stringent protection measures.
  • MAC 2 - Systems that handle information that is important to the support of deployed and contingency forces. The loss of integrity or availability of a MAC II system is difficult to deal with and can only be tolerated for a short time. Any loss could include delay or degradation in providing important support services or commodities that may seriously impact mission effectiveness. Mission Assurance Category II systems require additional safeguards beyond best practices.
  • MAC 3 – Systems that handle information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term. Any MAC III system loss can be tolerated without significant impacts on mission effectiveness or operational readiness. Results of loss may include the delay or degradation of services or commodities enabling routine activities. Mission Assurance Category III systems require protective measures that are generally commensurate with commercial best practices.

Additionally there are three confidentiality levels. Applicable to DoD information systems, the confidentiality level is used to determine access, such as requirements for acceptable methods by which users may access systems, and are determined by the classification level of information the system processes. The DoDI 8500.2 defines these three confidentiality levels as: classified, sensitive, and public.

This report presents the analyst with compliance information from STIG audits that have been conducted within the environment. Data is presented on the number of STIG compliance pass/fails, totals, networks that have STIG compliance results, when audits have been performed, IP summary, and a failed STIG compliance summary.

The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the SecurityCenter Feed under the category Compliance & Configuration Assessment. The report requirements are:

  • SecurityCenter 4.7
  • Nessus 5.2.7
  • STIG Audit Files or SCAP supported packages such as:
  • USGCB STIG benchmark files.

SecurityCenter Continuous View (CV) allows for the most comprehensive and integrated view of network health. SecurityCenter CV provides a unique combination of detection, reporting, and pattern recognition utilizing industry recognized algorithms and models. SecurityCenter CV also enables the analyst to react to advanced threats, zero-day vulnerabilities, and new forms of regulatory compliance.

The report contains the following chapters:

  • Audit Summary - This chapter displays an indication of STIG Nessus scans present over the last 7, 30, or over 30 Days. The component contains filters that look for STIG compliance results (pass or fail) that are of a specified age. An icon is displayed in the appropriate column if results are found, displaying a green check for any results found within the time frame. If no results are found ‘None’ is displayed in the column. The Network With Failed Audit Results bar chart provides a compliance summary of Class C networks containing passing and failing STIG audit results. Allowing the analyst to determine the risk levels and compliance status for networks throughout the organization where STIG compliance audit scans have been conducted. The data is sorted using STIG keyword, compliance severity, and regex search combinations. The IP Summary (Pass/Fail) table provides an IP summary of STIG pass/fail compliance results, and total counts. The table utilizes the IP Summary tool with a filter for the term STIG with filters for compliance results. This allows the analyst to quickly identify the specific IP addresses that have been scanned using USGCB STIG benchmark files.
  • Public Systems - This chapter displays compliance results for all Mission Assurance Levels (MAC I, II, and III) within the Public Classification Level. The confidentiality level is used to determine access, such as requirements for acceptable methods by which users may access systems. The chapter provides results via the Vulnerability Summary - IP Detail tool. If audit results exist for the specified MAC level, the total number of compliance results found, the passing and failing totals, as well as the pass ratio of pass verses fail results. The tables filter on the Vulnerability Summary – IP Detail tool with regex text for each MAC level and severity filters.
  • Sensitive Systems - This chapter displays compliance results for all Mission Assurance Levels (MAC I, II, and III) within the Sensitive Classification Level. The confidentiality level is used to determine access, such as requirements for acceptable methods by which users may access systems. The chapter provides results via the Vulnerability Summary - IP Detail tool. If audit results exist for the specified MAC level, the total number of compliance results found, the passing and failing totals, as well as the pass ratio of pass verses fail results. The tables filter on the Vulnerability Summary – IP Detail tool with regex text for each MAC level, and severity filters.
  • Classified Systems - This chapter displays compliance results for all Mission Assurance Levels (MAC I, II, and III) within the Classified Classification Level. The confidentiality level is used to determine access, such as requirements for acceptable methods by which users may access systems. The chapter provides results via the Vulnerability Summary - IP Detail tool. If audit results exist for the specified MAC level, the total number of compliance results found, the passing and failing totals, as well as the pass ratio of pass verses fail results. The tables filter on the Vulnerability Summary – IP Detail tool with regex text for each MAC level, and severity filters.