Please review the following resources before beginning this assignment:
DISA STIG Repository
Using the DoD STIG and SCAP Tool Basic Rundown
For this assignment, we are going to run the DISA STIG against our own operating system. You do not necessarily have to make the changes if you do not desire to. But you must notate the answers to the checks.
If the operating system on your computer is Windows 10, please download the latest Windows 10 STIG. If you use macOS, download the latest macOS STIG, and for Linux, download the closest Linux STIG (if you use Ubuntu, use the ubuntu STIG, etc…).
You must also download the latest STIG viewer available as well.
It is recommended that you download the latest SCAP Compliance Checker (SCC) as well, and the applicable SCAP 1.2 or 1.3 content for your operating system (if one exists).
For this lab, you will conduct the following:
Using the SCAP Content Checker, run a scan with only the operating system benchmark chosen (if one exists). This will export an XCCDF file.
Open DISA STIG Viewer and then create a Checklist using the zip file for your operating system that you downloaded.
If you were able to run SCC on your device, import the XCCDF into the STIG Viewer and you’ll see a large variety of STIGs are already completed.
For any Not Reviewed checks, complete them.
For any Open checks, provide an explanation in the comments on what this finding means for your security.
For any Not a Finding checks, nothing is needed.
At the end of this, if SCC was not used, you must have at least 50 items that are in the status of either Open, Not a Finding, or Not Reviewed.
If SCC was used, there should be no Not Reviewed checks. All checks should be Open, Not a Finding, or Not Applicable.
If there are not 50 items, this assignment will be marked as Not complete.
For the submission, you must save the checklist file as a .ckl file and submit the ckl file itself.Please review the following resources before beginning this assignment:
DISA STIG Repository
Using the DoD STIG and SCAP Tool Basic Rundown
For this assignment, we are going to run the DISA STIG against our own operating system. You do not necessarily have to make the changes if you do not desire to. But you must notate the answers to the checks.
If the operating system on your computer is Windows 10, please download the latest Windows 10 STIG. If you use macOS, download the latest macOS STIG, and for Linux, download the closest Linux STIG (if you use Ubuntu, use the ubuntu STIG, etc…).
You must also download the latest STIG viewer available as well.
It is recommended that you download the latest SCAP Compliance Checker (SCC) as well, and the applicable SCAP 1.2 or 1.3 content for your operating system (if one exists).
For this lab, you will conduct the following:
Using the SCAP Content Checker, run a scan with only the operating system benchmark chosen (if one exists). This will export an XCCDF file.
Open DISA STIG Viewer and then create a Checklist using the zip file for your operating system that you downloaded.
If you were able to run SCC on your device, import the XCCDF into the STIG Viewer and you’ll see a large variety of STIGs are already completed.
For any Not Reviewed checks, complete them.
For any Open checks, provide an explanation in the comments on what this finding means for your security.
For any Not a Finding checks, nothing is needed.
At the end of this, if SCC was not used, you must have at least 50 items that are in the status of either Open, Not a Finding, or Not Reviewed.
If SCC was used, there should be no Not Reviewed checks. All checks should be Open, Not a Finding, or Not Applicable.
If there are not 50 items, this assignment will be marked as Not complete.
For the submission, you must save the checklist file as a .ckl file and submit the ckl file itself.
https://public.cyber.mil/stigs/downloads/https://public.cyber.mil/stigs/downloads/
https://www.youtube.com/watch?v=dtHmpqevumQhttps://www.youtube.com/watch?v=dtHmpqevumQ
https://public.cyber.mil/stigs/srg-stig-tools/https://public.cyber.mil/stigs/srg-stig-tools/
https://public.cyber.mil/stigs/scap/https://public.cyber.mil/stigs/scap/