Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

STIG Report (by Severity)

by Josef Weiss
January 22, 2015

The Department of Defense (DoD) uses STIG audits to analyze risk and identify configuration vulnerabilities, as part of the proper IA controls. This report presents the analyst with vulnerability data utilizing STIG Severity Codes in an easy to understand method. Pass/Fail compliance related audit data is located in SecurityCenter by either MAC or CAT Level code identification.

A Security Technical Implementation Guide or STIG is a methodology for standardized secure installation and maintenance of computer software and hardware. The term was coined by DISA, which creates configuration documents in support of the United States Department of Defense (DoD). The implementation guidelines include recommended administrative processes and span the devices' lifecycle.

The DISA STIG assigns a Severity Code to each system IA security weakness to indicate the risk level associated with the IA security weakness and the urgency with which the corrective action must be completed.

This report presents the analyst with vulnerability information within the environment. Data is presented on the number of STIG Severity vulnerability concerns, networks that have STIG vulnerability results, when audits have been performed, IP summary, and a failing items STIG vulnerability summary.

The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the SecurityCenter Feed under the category Threat Detection & Vulnerability Assessments. The report requirements are:

  • SecurityCenter 4.7
  • Nessus 5.2.7

SecurityCenter Continuous View (CV) allows for the most comprehensive and integrated view of network health. SecurityCenter CV provides a unique combination of detection, reporting, and pattern recognition utilizing industry recognized algorithms and models. SecurityCenter CV also enables the analyst to react to advanced threats, zero-day vulnerabilities, and new forms of regulatory compliance. The report contains the following chapters:

  • Audit Summary - This chapter displays an indication of STIG Nessus scans present over the last 7, 30, or more than 30 days via the Audits Performed component. The component contains regex filters that look for STIG Severity results that are of a specified age. An icon is displayed in the appropriate column if results are found, displaying a green check for any results found within the time frame. If no results are found, “None” is displayed in the column. Networks with Failed Audit Results displays data on Class C networks that contain compliance results for STIG Severity Levels. The Class C network, total, and vulnerability severity levels are displayed via bar graph. This allows the analyst to determine which Class C networks contain STIG vulnerability results and the total counts of those results. IP Summary displays an IP Summary of STIG Severity vulnerability results and total counts by host. The component utilizes the IP Summary tool with a filter for the term for STIG Severity results. This allows the analyst to view STIG Severity Level vulnerability results quickly for a specific IP address or hostname.
  • Severity I - This chapter displays the failed compliance results for STIG Severity Level I. STIG Severity Levels are assigned to specific vulnerabilities to indicate the associated risk level. The Severity Level can assist in determining the urgency with which the corrective action must be completed. The Severity I table provides details if vulnerability results exist for the specified Severity level. This is accomplished utilizing the Vulnerability Summary – IP Detail tool, and regex queries. Results are sorted by severity.
  • Severity II - This chapter displays the failed compliance results for STIG Severity Level II. STIG Severity Levels are assigned to specific vulnerabilities to indicate the associated risk level. The Severity Level can assist in determining the urgency with which the corrective action must be completed. The Severity I table provides details if vulnerability results exist for the specified Severity level. This is accomplished utilizing the Vulnerability Summary – IP Detail tool and regex queries. Results are sorted by severity.
  • Severity III - This chapter displays the failed compliance results for STIG Severity Level III. STIG Severity Levels are assigned to specific vulnerabilities to indicate the associated risk level. The Severity Level can assist in determining the urgency with which the corrective action must be completed. The Severity I table provides details if vulnerability results exist for the specified Severity level. This is accomplished utilizing the Vulnerability Summary – IP Detail tool and regex queries. Results are sorted by severity.