Test and Development Zone B Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD100
- Vuln IDs
-
- V-3918
- Rule IDs
-
- SV-3918r1_rule
Checks: C-3621r1_chk
Interview the IAO to determine if they have a policy in place that isolates test and development traffic and/or hardware and software testing from production systems. Network reviewer to validate based on network diagrams.
Fix: F-3851r1_fix
The IAO will ensure that all systems supporting testing, application development, software and hardware testing, and OS maintenance are connected to an isolated network separated from production systems.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD110
- Vuln IDs
-
- V-3919
- Rule IDs
-
- SV-3919r1_rule
Checks: C-3613r1_chk
Interview the IAO to determine if they have a policy in place that requires the use of out-of-band methods to access a Test and Development network from outside of the enclave. Coordinate this response with the Network reviewer.
Fix: F-3852r1_fix
The IAO will ensure that out-of-band access is utilized if outside access to the test and development systems is required
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000379
- Version
- ENTD120
- Vuln IDs
-
- V-14306
- Rule IDs
-
- SV-14919r2_rule
Checks: C-11923r2_chk
Interview the IAO to determine if a process and procedure is in place and documented that prohibits developing applications or software in a non-STIG compliant infrastructure or on non-STIG compliant platforms.
Fix: F-13782r1_fix
The IAO will ensure Development is performed on STIG compliant systems within a STIG compliant infrastructure. Reference the Application Security and Development and Application Services STIGs.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD130
- Vuln IDs
-
- V-14307
- Rule IDs
-
- SV-14920r1_rule
Checks: C-11924r1_chk
Work with the network reviewer to determine compliance. Interview the IAO to make sure there is a connection approval process in place for network infrastructure devices to be secured in compliance with STIGs prior to connection.
Fix: F-13783r1_fix
The IAO will ensure network infrastructure devices used to support test and development environments are STIG compliant.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD140
- Vuln IDs
-
- V-14308
- Rule IDs
-
- SV-14921r1_rule
Checks: C-11925r1_chk
Review the documentation for systems residing in a T&D environment. The documentation should include at a minimum: - Description and function of the system - the Zone the system resides in - SA of the system - Applications and OS of the system - Hardware components - Baseline or image detail of the system
Fix: F-13784r1_fix
The IAO will ensure each system residing within a T&D environment has the appropriate documentation to describe the function of the system, the “Zone” the system is located in, and the security baseline established for the system for Certification and Accreditation decisions.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD150
- Vuln IDs
-
- V-14309
- Rule IDs
-
- SV-14922r1_rule
Checks: C-11926r1_chk
Work with the IAO to determine if systems in test and development zones are connected to a DoD production network. If they are connected, all security rules must be applied. Ask to view the Connection Approval Process (CAP) which must be used prior to connection to a DoD network. A system should, at a minimum, be scanned, reviewed for STIG compliancy, entered into a vulnerability tracking system, and documented.
Fix: F-13785r1_fix
The IAO will ensure systems in test and development zones are not connected to a DoD production network until security controls, as required by the appropriate STIGs, are configured and validated. A Connection Approval Process (CAP) will be used prior to connection to a DoD network.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD160
- Vuln IDs
-
- V-14310
- Rule IDs
-
- SV-14923r1_rule
Checks: C-12369r1_chk
Ask the IAO what the connection approval policy is on the installation of operating systems within the T&D zone. The policy must include either physically disconnecting or blocking the system at the firewall in order to achieve complete isolation from malicious network traffic.
Fix: F-13786r1_fix
The IAO will ensure the test or development system is physically disconnected or blocked at the firewall from any external network during the installation of an operating system.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD230
- Vuln IDs
-
- V-14380
- Rule IDs
-
- SV-14993r1_rule
Checks: C-12080r1_chk
Work with the network reviewer to determine compliance. All Zone B traffic that needs to traverse a Zone A, DISN, or Enclave network boundary must be isolated and/or segregated from any DoD production traffic.
Fix: F-13862r1_fix
The IAO will ensure all incoming/outgoing network connections are strictly controlled via network infrastructure devices to include the establishment of a VPN, VLAN or TACLANE.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD240
- Vuln IDs
-
- V-14381
- Rule IDs
-
- SV-14994r1_rule
Checks: C-12081r1_chk
Interview the IAO to determine if there is a DMZ with gateway in place for Internet access from a Zone B environment. Work with the network reviewer to determine if there is a DMZ in place for such purposes and that the traffic is restricted from Zone B to/from the DMZ only.
Fix: F-13863r1_fix
The IAO will ensure a Network Infrastructure STIG compliant DMZ is established for the downloading of applicable software, if necessary.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD250
- Vuln IDs
-
- V-14434
- Rule IDs
-
- SV-15048r1_rule
Checks: C-12375r1_chk
Work with the network reviewer to determine if any connections are allowed from the external interface to the Zone B environment. No external initiated connection should be allowed to enter the environment. Due to the nature of the test environment, SAs may believe it is acceptable to allow inbound traffic to certain systems. This is strictly forbidden as there may be other systems that reside within the same environment that may be compromised.
Fix: F-13887r1_fix
The IAO will ensure no external to internal (ingress) network initiated connections are permitted (denied by default).
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD260
- Vuln IDs
-
- V-14457
- Rule IDs
-
- SV-15071r1_rule
Checks: C-12368r1_chk
Work with the network reviewer to determine if ACLs are in place to restrict egress traffic from a Zone B test environment. ACLs as well as PPS are restricted to only allow for system testing via a gateway.
Fix: F-13888r1_fix
The IAO will ensure external (egress) outbound traffic from the test environment is restricted by source and destination ACLs as well as ports and protocols and is only permitted to facilitate system testing.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD310
- Vuln IDs
-
- V-14464
- Rule IDs
-
- SV-15078r1_rule
Checks: C-12374r1_chk
Review the connection approval documentation and the remote access policy to determine if DoD production (LAN) client workstations are allowed to connect to non-STIG’d Zone B systems. If they are allowed, this is a finding. Zone B requires non-production system connectivity to systems that are not in a secure state.
Fix: F-13906r1_fix
The IAO will ensure, if remote access is required to a non STIG compliant system in Zone B, dedicated clients (non-production) are utilized to access Zone B systems from a VPN or dialup connection. No connectivity will occur from a production STIG compliant client (e.g., STIG’d Government Furnished Equipment) to a non-STIG’d system in Zone B.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD320
- Vuln IDs
-
- V-14465
- Rule IDs
-
- SV-15079r1_rule
Checks: C-12364r1_chk
Interview the IAM to determine if a process/procedure is in place to ensure STIG compliant production devices are not in any way connected to non-STIG compliant devices even via a remote access solution. This check does not apply to Zone A systems as they should be STIG compliant, nor does it apply to Zone C systems as they are only communicating with another Test facility with no remote access solution.
Fix: F-13897r1_fix
The IAO will ensure non-STIG’d systems do not connect or communicate with STIG compliant systems, even if located in the same T&D zone.
- RMF Control
- Severity
- H
- CCI
- Version
- ENTD330
- Vuln IDs
-
- V-14466
- Rule IDs
-
- SV-15080r1_rule
Checks: C-12365r1_chk
Interview the IAO to determine the configuration requirements for the remote access solution. If a virtual machine environment is employed for remote access, ensure that the IAO and SA are aware of the requirement that it is configured such that a "guest" OS cannot in any way communicate with the host OS.
Fix: F-13898r1_fix
The IAO will ensure Virtual Machine “guest” operating systems, which are used to access a T&D zone, do not communicate with the host OS or any production OS.
- RMF Control
- Severity
- H
- CCI
- Version
- ENTD340
- Vuln IDs
-
- V-14467
- Rule IDs
-
- SV-15081r1_rule
Checks: C-12366r1_chk
Work with the network reviewer to determine if remote access network traffic (utilizing virtual machine systems/clients) is completely isolated and contained such that it can only flow to/from the T&D environment.
Fix: F-13899r1_fix
The IAO will ensure T&D client traffic is restricted such that all network traffic can only flow to and from the T&D Zone.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD350
- Vuln IDs
-
- V-14468
- Rule IDs
-
- SV-15082r1_rule
Checks: C-12367r1_chk
Work with the network reviewer to determine if the is a VPN solution in place for virtual machine remote access solutions into a T&D environment. An OS reviewer may have to review the system to determine if the "guest" is configured to only communicate with zone perimeter devices via a tunnel (VPN) rather than using the LAN as a transport mechanism.
Fix: F-13900r1_fix
The IAO will ensure non-production virtual machine “guests” only communicate with the zone perimeter access devices via a tunnel (VPN). There is no DoD network connectivity via the LAN.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0010
- Vuln IDs
-
- V-39344
- Rule IDs
-
- SV-51202r1_rule
Checks: C-46619r2_chk
Review the accreditation package documentation to verify the test and development environment is correctly documented within the network diagrams and site security plan. If the organization's accreditation package does not include the test and development infrastructure in the network diagrams and system security plan, this is a finding.
Fix: F-44359r2_fix
Document network infrastructure and systems supporting the test and development environment, then include it with the accreditation package.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0020
- Vuln IDs
-
- V-39345
- Rule IDs
-
- SV-51203r1_rule
Checks: C-46707r5_chk
Review the accreditation package documentation to verify the test and development environment has been granted an IATO to connect to the DISN. If an IATO has not been granted, this is a finding. If the zone environment does not have any connectivity to the DISN or commercial ISP, this requirement is not applicable.
Fix: F-44662r1_fix
Certify and accredit the test and development infrastructure and supporting systems connecting to the DISN. Keep the IATO with the organization's accreditation package.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0030
- Vuln IDs
-
- V-39433
- Rule IDs
-
- SV-51291r1_rule
Checks: C-46812r1_chk
Determine whether all systems and network infrastructure devices supporting the test and development environment are registered in an asset management system. If any systems and network infrastructure devices supporting the test and development environment are not registered in an asset management system, this is a finding.
Fix: F-44446r2_fix
Register the network infrastructure and systems supporting the test and development environment in a DoD asset management program.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0040
- Vuln IDs
-
- V-39434
- Rule IDs
-
- SV-51292r1_rule
Checks: C-46708r2_chk
Review the network diagrams to determine whether a management network has been established to manage the network infrastructure and systems supporting the test and development environment. If a management network has not been established to manage the test and development environment infrastructure, this is a finding.
Fix: F-44447r2_fix
Engineer a management network solution and document it within the test and development network diagrams.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0050
- Vuln IDs
-
- V-39435
- Rule IDs
-
- SV-51293r1_rule
Checks: C-46709r3_chk
Review documentation for impersistent connections or devices to ensure the risk has been thoroughly assessed and approved by the Authorizing Official. If no documented approval is available for impersistent connections, this is a finding.
Fix: F-44448r4_fix
Create and have on file up-to-date documentation of the authorized risk approval for impersistent connections or devices.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0060
- Vuln IDs
-
- V-39436
- Rule IDs
-
- SV-51294r1_rule
Checks: C-46711r5_chk
Review the organization's network diagrams to determine whether network segments for development have been established and outlined in the documentation. If application development occurs on DoD operational networks, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44449r1_fix
Designate network segments for applications and systems development. Document these designated network segments in the network diagrams for the T&D environment.
- RMF Control
- Severity
- H
- CCI
- Version
- ENTD0070
- Vuln IDs
-
- V-39437
- Rule IDs
-
- SV-51295r1_rule
Checks: C-46712r3_chk
Review development images to determine whether antivirus is installed and configured with current signatures. If antivirus is missing on development systems, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44450r2_fix
Install antivirus with current signatures on development systems.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0080
- Vuln IDs
-
- V-39438
- Rule IDs
-
- SV-51296r1_rule
Checks: C-46713r3_chk
Review the development images to determine whether a HIDS or HIPS application is installed and configured. If a HIDS or HIPS application is not installed and configured on the development image, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44451r2_fix
Install and configure a HIDS or HIPS application on development system images.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0090
- Vuln IDs
-
- V-39439
- Rule IDs
-
- SV-51297r1_rule
Checks: C-46714r3_chk
Review the development images to determine whether the OS or a third party firewall has been installed, configured, and enabled. If a firewall is not installed, configured, and enabled, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44452r2_fix
Install, configure, and enable either the OS or a third party firewall on the development system.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0100
- Vuln IDs
-
- V-39440
- Rule IDs
-
- SV-51298r1_rule
Checks: C-46715r3_chk
Determine whether the organization has a patch management solution in place to apply security patches released by the vendor. If a patch management solution has not been implemented and is not functioning to update development systems with the latest patches, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44453r2_fix
Implement a patch management solution to keep development systems up to date with the latest security patches released by the vendor.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0110
- Vuln IDs
-
- V-39441
- Rule IDs
-
- SV-51299r1_rule
Checks: C-46716r3_chk
Interview the ISSM/ISSO to determine whether a current Change Control Management policy has been implemented in the organization. If a change management policy has not been created and implemented for the organization, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44454r2_fix
Create a change management policy for the organization for application and system development.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0120
- Vuln IDs
-
- V-39611
- Rule IDs
-
- SV-51469r1_rule
Checks: C-46796r3_chk
Review the change control documentation for the environment to determine whether the organization has prior approval to move data from the test and development environment to the operational network after final testing. If the organization does not keep a change control log or the log exists but is not current, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44627r2_fix
Create a policy to document all finalized projects to gain approval by the Change Control Authority prior to deploying finalized projects to a DoD operational network.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0130
- Vuln IDs
-
- V-39614
- Rule IDs
-
- SV-51472r1_rule
Checks: C-46813r2_chk
Determine whether there is a policy in place for code review prior to applications being deployed into a DoD operational network. If a code review policy has not been established, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44666r1_fix
Implement a code review policy for applications before deployment into DoD operational networks.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0140
- Vuln IDs
-
- V-39619
- Rule IDs
-
- SV-51477r1_rule
Checks: C-46797r3_chk
Review the organization's site security plan and documentation to determine whether there is a list of current authorized users. If a current list of authorized users is missing from the site security plan for the test and development environment, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44630r2_fix
Document all authorized users with access to the development environment and access to source code. If the documentation exists but is not current, bring the documentation up to date.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0150
- Vuln IDs
-
- V-39621
- Rule IDs
-
- SV-51479r1_rule
Checks: C-46799r3_chk
Determine the data type on systems within the test and development environment. Interview the ISSM or ISSO regarding the connection approval process for housing DoD live operational data or Privacy Act information on any test or development system. If the test and development environment is using live DoD data or Privacy Act information, this is a finding.
Fix: F-44637r2_fix
Create organizational policies and procedures to prohibit the use of any live operational DoD data or Privacy Act information in the test and development environment.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0160
- Vuln IDs
-
- V-39627
- Rule IDs
-
- SV-51485r1_rule
Checks: C-46800r2_chk
Review the network diagrams and physically check to see whether the organization has a gateway implemented for the test and development environment. If the organization has not documented or implemented a gateway for the test and development environment, this is a finding.
Fix: F-44639r2_fix
Install a gateway to separate the test and development environment from the DoD operational network. Document it in the test and development network diagrams.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0170
- Vuln IDs
-
- V-39629
- Rule IDs
-
- SV-51487r1_rule
Checks: C-46801r2_chk
Review the latest version of the PPS CAL for those ports, protocols, and services visible to DoD-managed components. If the organization is using ports, protocols, or services deemed not acceptable by the PPS CAL or requiring Authorization Official approval without proper documentation, this is a finding.
Fix: F-44640r2_fix
Configure all ports, protocols, and services visible to DoD-managed components as described in the DoDI 8551.1 PPSM policy.
- RMF Control
- Severity
- H
- CCI
- Version
- ENTD0180
- Vuln IDs
-
- V-39636
- Rule IDs
-
- SV-51494r1_rule
Checks: C-46802r2_chk
Install and configure a firewall to separate DoD operational and test and development environments.
Fix: F-44643r2_fix
Install and configure a firewall to separate DoD operational and test and development environments.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0190
- Vuln IDs
-
- V-39658
- Rule IDs
-
- SV-51525r1_rule
Checks: C-46798r2_chk
Determine whether there is a DMZ properly configured for traffic entering and leaving the test and development environment. If a DMZ for traffic entering and leaving the test and development environment is not implemented, this is a finding.
Fix: F-44633r2_fix
Configure and implement a DMZ for traffic entering and leaving the test and development environment.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0220
- Vuln IDs
-
- V-39661
- Rule IDs
-
- SV-51528r1_rule
Checks: C-46816r1_chk
Determine whether logical separation is present between test and development network segments. Review the test and development network diagrams to ensure they have been properly documented. If logical separation has not been established and documented between test and development network segments in the environment, this is a finding.
Fix: F-44669r1_fix
Establish logical separation between test and development network segments in the environment. Document the logical separation on the network diagrams.
- RMF Control
- Severity
- L
- CCI
- Version
- ENTD0230
- Vuln IDs
-
- V-39662
- Rule IDs
-
- SV-51529r1_rule
Checks: C-46817r1_chk
Determine whether a deny-by-default security posture has been implemented for both ingress and egress traffic for the test and development environment. If the organization is not using a deny-by-default security posture for ingress and ingress traffic for the test and development environment, this is a finding.
Fix: F-44670r1_fix
Implement a deny-by-default security posture for both ingress and egress traffic between network segments in the test and development environment.
- RMF Control
- Severity
- H
- CCI
- Version
- ENTD0240
- Vuln IDs
-
- V-39663
- Rule IDs
-
- SV-51530r1_rule
Checks: C-46818r1_chk
Determine whether a deny-by-default security posture has been implemented for both ingress and egress traffic between the test and development environment and DoD operational networks. If the organization is not using a deny-by-default security posture for traffic between the test and development environment and DoD operational networks, this is a finding.
Fix: F-44671r1_fix
Implement a deny-by-default security posture for both ingress and egress traffic between the test and development environment and DoD operational networks.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0250
- Vuln IDs
-
- V-39664
- Rule IDs
-
- SV-51531r1_rule
Checks: C-46819r1_chk
Determine whether a deny-by-default security posture has been implemented for both ingress and egress traffic between the test and development environments. If the organization is not using a deny-by-default security posture for traffic between the test and development environments, this is a finding.
Fix: F-44672r1_fix
Implement a deny-by-default security posture for both ingress and egress traffic between test and development environments.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0280
- Vuln IDs
-
- V-39667
- Rule IDs
-
- SV-51534r1_rule
Checks: C-46822r1_chk
Determine whether the proper encryption standard is deployed for the classification of the network where remote access is performed. Unclassified/FOUO or any need-to-know data will need to use a FIPS 140-2 validated cryptographic module. Classified traffic must use an NSA approved encryption standard. If the proper encryption standard is not in use for remote access, this is a finding.
Fix: F-44675r1_fix
Implement an approved encryption mechanism for the classification of the network for remote access. Unclassified/FOUO or any need-to-know data will need to use a FIPS 140-2 validated cryptographic module. Classified traffic must use an NSA approved encryption standard.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0300
- Vuln IDs
-
- V-39669
- Rule IDs
-
- SV-51536r1_rule
Checks: C-46824r1_chk
Determine whether split tunneling is prohibited for remote access VPNs connecting to the test and development environment. If the VPN policy allows split tunneling, this is a finding.
Fix: F-44677r1_fix
Configure VPNs to prohibit split tunneling when connecting to the test and development environment.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0330
- Vuln IDs
-
- V-39672
- Rule IDs
-
- SV-51539r1_rule
Checks: C-46827r1_chk
Review the system plan to determine whether physical hosts are sharing DoD operational and test and development virtual machines.
Fix: F-44680r2_fix
Engineer a solution to use separate physical hosts for DoD operational and T&D virtual machines.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0360
- Vuln IDs
-
- V-41494
- Rule IDs
-
- SV-54070r1_rule
Checks: C-48011r6_chk
1. Verify an IA-compliant system has been deployed to scan downloaded data prior to deployment into the T&D environment. Also, review the zone diagrams to ensure the workstation is documented appropriately. 2. Determine if the organization has a NIPRNet connection. A. If the organization has a NIPRNet connection; data must be downloaded through the DoD IAP. B. If the organization does not have a NIPRNet connection, data must be downloaded through a secure, IA-compliant connection. If the organization does not download and scan the downloaded data to a dedicated IA-system and secure IA-compliant connection, this is a finding.
Fix: F-46950r4_fix
1. Deploy an IA-compliant system to download data. 2. Configure the IA-compliant system to download data through a secure, IA-compliant connection. A. If your organization has a NIPRNet or connection; data must be downloaded through the DoD IAP. B. If your organization does not have a NIPRNet or connection, data must be downloaded through a secure, IA-compliant connection.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0370
- Vuln IDs
-
- V-43317
- Rule IDs
-
- SV-56070r1_rule
Checks: C-49290r2_chk
Review the organization's policies and procedures document to ensure proper handling of data being transported into the test and development environment. This document must include information for physical and electronic migration of data. If the organization does not have a policy and procedures document created or available for review, this is a finding.
Fix: F-48944r1_fix
Create a policy for, and document the procedure of, proper handling of data transported into the test and development environment. This document must include information for physical and electronic handling and migration of data.