Test and Development Zone D Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −15 ✎ 1
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 15
- V-14306 Medium Development is performed on platforms that are not STIG compliant and/or within a non-STIG compliant infrastructure.
- V-14307 Medium Network infrastructure devices, such as router, switches, firewalls, etc., that support the Test/Development enclave are not STIG compliant.
- V-14308 Medium Documentation which details the description and function of each system, the zone the system resides in, the SA of the system, applications, OS, and hardware of the system is incomplete or missing.
- V-14309 Medium Systems in test and development zones are connected to a DoD production network without security controls, as required by the appropriate STIGs. A Connection Approval Process (CAP) has not been used prior to connection to a DoD network.
- V-14310 Medium Test and development systems are not physically disconnected or blocked at the firewall from external networks during the installation of an operating system.
- V-14311 Medium Development is performed in a Zone D test enclave.
- V-14312 High Zone D systems have direct connectivity to a DoD network.
- V-14371 High Zone D systems contain production or “live” DoD data or privacy act information and are connected to an external network.
- V-14372 High DoD client workstations/laptops, used for DoD official business, interact or connect (to include remote access) to a Zone D system or network.
- V-14465 Medium Non-STIG’d systems connect or communicate with STIG compliant production systems via a remote access solution.
- V-14466 High Virtual machine guest operating systems (OS) which are used to access a T&D zone communicate with the host OS or a production OS.
- V-14467 High In a virtual machine remote access solution, T&D client traffic is not restricted such that all network traffic can only flow to and from the T&D zone.
- V-14468 Medium Non-production “guests” communicate with DoD networks via the LAN.
- V-3918 Medium Test and development systems are not connected to an isolated network separated from production systems.
- V-3919 Medium Out of band access is not utilized to access a test and development enclave remotely.
Content changes 1
- V-39621 Medium description The organization must sanitize data transferred to test and development environments from DoD operational networks for testing to remove personal and sensitive information exempt from the Freedom of Information Act.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0010
- Vuln IDs
-
- V-39344
- Rule IDs
-
- SV-51202r1_rule
Checks: C-46619r2_chk
Review the accreditation package documentation to verify the test and development environment is correctly documented within the network diagrams and site security plan. If the organization's accreditation package does not include the test and development infrastructure in the network diagrams and system security plan, this is a finding.
Fix: F-44359r2_fix
Document network infrastructure and systems supporting the test and development environment, then include it with the accreditation package.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0020
- Vuln IDs
-
- V-39345
- Rule IDs
-
- SV-51203r1_rule
Checks: C-46707r5_chk
Review the accreditation package documentation to verify the test and development environment has been granted an IATO to connect to the DISN. If an IATO has not been granted, this is a finding. If the zone environment does not have any connectivity to the DISN or commercial ISP, this requirement is not applicable.
Fix: F-44662r1_fix
Certify and accredit the test and development infrastructure and supporting systems connecting to the DISN. Keep the IATO with the organization's accreditation package.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0030
- Vuln IDs
-
- V-39433
- Rule IDs
-
- SV-51291r1_rule
Checks: C-46812r1_chk
Determine whether all systems and network infrastructure devices supporting the test and development environment are registered in an asset management system. If any systems and network infrastructure devices supporting the test and development environment are not registered in an asset management system, this is a finding.
Fix: F-44446r2_fix
Register the network infrastructure and systems supporting the test and development environment in a DoD asset management program.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0040
- Vuln IDs
-
- V-39434
- Rule IDs
-
- SV-51292r1_rule
Checks: C-46708r2_chk
Review the network diagrams to determine whether a management network has been established to manage the network infrastructure and systems supporting the test and development environment. If a management network has not been established to manage the test and development environment infrastructure, this is a finding.
Fix: F-44447r2_fix
Engineer a management network solution and document it within the test and development network diagrams.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0050
- Vuln IDs
-
- V-39435
- Rule IDs
-
- SV-51293r1_rule
Checks: C-46709r3_chk
Review documentation for impersistent connections or devices to ensure the risk has been thoroughly assessed and approved by the Authorizing Official. If no documented approval is available for impersistent connections, this is a finding.
Fix: F-44448r4_fix
Create and have on file up-to-date documentation of the authorized risk approval for impersistent connections or devices.
- RMF Control
- Severity
- H
- CCI
- Version
- ENTD0070
- Vuln IDs
-
- V-39437
- Rule IDs
-
- SV-51295r1_rule
Checks: C-46712r3_chk
Review development images to determine whether antivirus is installed and configured with current signatures. If antivirus is missing on development systems, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44450r2_fix
Install antivirus with current signatures on development systems.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0080
- Vuln IDs
-
- V-39438
- Rule IDs
-
- SV-51296r1_rule
Checks: C-46713r3_chk
Review the development images to determine whether a HIDS or HIPS application is installed and configured. If a HIDS or HIPS application is not installed and configured on the development image, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44451r2_fix
Install and configure a HIDS or HIPS application on development system images.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0090
- Vuln IDs
-
- V-39439
- Rule IDs
-
- SV-51297r1_rule
Checks: C-46714r3_chk
Review the development images to determine whether the OS or a third party firewall has been installed, configured, and enabled. If a firewall is not installed, configured, and enabled, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44452r2_fix
Install, configure, and enable either the OS or a third party firewall on the development system.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0100
- Vuln IDs
-
- V-39440
- Rule IDs
-
- SV-51298r1_rule
Checks: C-46715r3_chk
Determine whether the organization has a patch management solution in place to apply security patches released by the vendor. If a patch management solution has not been implemented and is not functioning to update development systems with the latest patches, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44453r2_fix
Implement a patch management solution to keep development systems up to date with the latest security patches released by the vendor.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0110
- Vuln IDs
-
- V-39441
- Rule IDs
-
- SV-51299r1_rule
Checks: C-46716r3_chk
Interview the ISSM/ISSO to determine whether a current Change Control Management policy has been implemented in the organization. If a change management policy has not been created and implemented for the organization, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44454r2_fix
Create a change management policy for the organization for application and system development.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0120
- Vuln IDs
-
- V-39611
- Rule IDs
-
- SV-51469r1_rule
Checks: C-46796r3_chk
Review the change control documentation for the environment to determine whether the organization has prior approval to move data from the test and development environment to the operational network after final testing. If the organization does not keep a change control log or the log exists but is not current, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44627r2_fix
Create a policy to document all finalized projects to gain approval by the Change Control Authority prior to deploying finalized projects to a DoD operational network.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0130
- Vuln IDs
-
- V-39614
- Rule IDs
-
- SV-51472r1_rule
Checks: C-46813r2_chk
Determine whether there is a policy in place for code review prior to applications being deployed into a DoD operational network. If a code review policy has not been established, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44666r1_fix
Implement a code review policy for applications before deployment into DoD operational networks.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0140
- Vuln IDs
-
- V-39619
- Rule IDs
-
- SV-51477r1_rule
Checks: C-46797r3_chk
Review the organization's site security plan and documentation to determine whether there is a list of current authorized users. If a current list of authorized users is missing from the site security plan for the test and development environment, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix: F-44630r2_fix
Document all authorized users with access to the development environment and access to source code. If the documentation exists but is not current, bring the documentation up to date.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0150
- Vuln IDs
-
- V-39621
- Rule IDs
-
- SV-51479r2_rule
Checks: C-46799r3_chk
Determine the data type on systems within the test and development environment. Interview the ISSM or ISSO regarding the connection approval process for housing DoD live operational data or Privacy Act information on any test or development system. If the test and development environment is using live DoD data or Privacy Act information, this is a finding.
Fix: F-44637r2_fix
Create organizational policies and procedures to prohibit the use of any live operational DoD data or Privacy Act information in the test and development environment.
- RMF Control
- Severity
- H
- CCI
- Version
- ENTD0200
- Vuln IDs
-
- V-39659
- Rule IDs
-
- SV-51526r2_rule
Checks: C-46814r3_chk
Review the organization's network diagrams for the Zone D test and development environment and work with the network reviewer to determine whether the environment is physically separate and isolated from any DoD operational network. If physical separation or isolation is not shown for the Zone D test and development environment on the network diagrams, this is a finding.
Fix: F-44667r3_fix
Physically separate and isolate the Zone D test and development environment from any DoD operational network.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0210
- Vuln IDs
-
- V-39660
- Rule IDs
-
- SV-51527r1_rule
Checks: C-46815r1_chk
Determine whether there are procedures in place to prohibit non-IA-compliant systems or devices from accessing any DoD operational network. If no procedure is in place to prohibit connection to any DoD operational network by non-IA-compliant systems, this is a finding.
Fix: F-44668r1_fix
Prohibit non-IA-compliant systems or devices in the test and development environment from accessing any DoD operational network or live data.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0300
- Vuln IDs
-
- V-39669
- Rule IDs
-
- SV-51536r1_rule
Checks: C-46824r1_chk
Determine whether split tunneling is prohibited for remote access VPNs connecting to the test and development environment. If the VPN policy allows split tunneling, this is a finding.
Fix: F-44677r1_fix
Configure VPNs to prohibit split tunneling when connecting to the test and development environment.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0310
- Vuln IDs
-
- V-39670
- Rule IDs
-
- SV-51537r1_rule
Checks: C-46825r1_chk
Determine whether remote access to the test and development environment from any DoD operational network segment has been prohibited. If no procedures exist to prohibit remote access to the test and development environment from any DoD operational network, this is a finding.
Fix: F-44678r1_fix
Prohibit remote access from DoD operational networks.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0330
- Vuln IDs
-
- V-39672
- Rule IDs
-
- SV-51539r1_rule
Checks: C-46827r1_chk
Review the system plan to determine whether physical hosts are sharing DoD operational and test and development virtual machines.
Fix: F-44680r2_fix
Engineer a solution to use separate physical hosts for DoD operational and T&D virtual machines.
- RMF Control
- Severity
- L
- CCI
- Version
- ENTD0350
- Vuln IDs
-
- V-39674
- Rule IDs
-
- SV-51541r1_rule
Checks: C-46829r1_chk
Verify the organization has an ISP GIG Waiver for any Internet connection. The documentation should be up to date and included with the accreditation package. If no ISP GIG Waiver has been obtained or is not up to date, this is a finding.
Fix: F-44682r1_fix
Obtain an ISP GIG Waiver for any Internet connection into the test and development environment.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0360
- Vuln IDs
-
- V-41494
- Rule IDs
-
- SV-54070r1_rule
Checks: C-48011r6_chk
1. Verify an IA-compliant system has been deployed to scan downloaded data prior to deployment into the T&D environment. Also, review the zone diagrams to ensure the workstation is documented appropriately. 2. Determine if the organization has a NIPRNet connection. A. If the organization has a NIPRNet connection; data must be downloaded through the DoD IAP. B. If the organization does not have a NIPRNet connection, data must be downloaded through a secure, IA-compliant connection. If the organization does not download and scan the downloaded data to a dedicated IA-system and secure IA-compliant connection, this is a finding.
Fix: F-46950r4_fix
1. Deploy an IA-compliant system to download data. 2. Configure the IA-compliant system to download data through a secure, IA-compliant connection. A. If your organization has a NIPRNet or connection; data must be downloaded through the DoD IAP. B. If your organization does not have a NIPRNet or connection, data must be downloaded through a secure, IA-compliant connection.
- RMF Control
- Severity
- M
- CCI
- Version
- ENTD0370
- Vuln IDs
-
- V-43317
- Rule IDs
-
- SV-56070r1_rule
Checks: C-49290r2_chk
Review the organization's policies and procedures document to ensure proper handling of data being transported into the test and development environment. This document must include information for physical and electronic migration of data. If the organization does not have a policy and procedures document created or available for review, this is a finding.
Fix: F-48944r1_fix
Create a policy for, and document the procedure of, proper handling of data transported into the test and development environment. This document must include information for physical and electronic handling and migration of data.