STIGhub
STIGs
RMF Controls
Compare
← SC-18 (1) — Mobile Code
CCI-001166
Definition
Identify organization-defined unacceptable mobile code.
Parent Control
SC-18 (1)
Mobile Code
System and Communications Protection
Linked STIG Checks (42)
V-213168
CAT II
Adobe Reader DC must enable Enhanced Security in a Standalone Application.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213169
CAT II
Adobe Reader DC must enable Enhanced Security in a Browser.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213170
CAT II
Adobe Reader DC must enable Protected Mode.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213171
CAT II
Adobe Reader DC must enable Protected View.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213172
CAT II
Adobe Reader DC must Block Websites.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213173
CAT II
Adobe Reader DC must block access to Unknown Websites.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213174
CAT II
Adobe Reader DC must prevent opening files other than PDF or FDF.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213175
CAT II
Adobe Reader DC must block Flash Content.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-214278
CAT II
The Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
V-204956
CAT II
The ALG must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
Application Layer Gateway Security Requirements Guide
V-222618
CAT II
Unsigned Category 1A mobile code must not be used in the application in accordance with DoD policy.
Application Security and Development Security Technical Implementation Guide
V-204760
CAT II
The application server must identify prohibited mobile code.
Application Server Security Requirements Guide
V-237371
CAT II
The CA API Gateway must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
CA API Gateway ALG Security Technical Implementation Guide
V-239883
CAT II
The Cisco ASA must be configured to use Advanced Malware Protection (AMP) features to detect and block the transmission of malicious software and malware.
Cisco ASA IPS Security Technical Implementation Guide
V-270947
CAT I
Dragos Platforms must limit privileges and not allow the ability to run shell.
Dragos Platform 2.x Security Technical Implementation Guide
V-278393
CAT II
NGINX must identify prohibited mobile code.
F5 NGINX Security Technical Implementation Guide
V-221559
CAT II
Site tracking users location must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-221580
CAT II
Safe Browsing must be enabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-221590
CAT II
Safe Browsing Extended Reporting must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-221597
CAT II
Anonymized data collection must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-221598
CAT II
Collection of WebRTC event logs must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-226401
CAT II
Guest Mode must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-226402
CAT II
AutoFill for credit cards must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-226403
CAT II
AutoFill for addresses must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-226404
CAT II
Import AutoFill form data must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-55343
CAT II
The IDPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
V-206882
CAT II
The IDPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
Intrusion Detection and Prevention Systems Security Requirements Guide
V-66403
CAT II
The Juniper Networks SRX Series Gateway IDPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
Juniper SRX SG IDPS Security Technical Implementation Guide
V-66403
CAT II
The Juniper Networks SRX Series Gateway IDPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
Juniper SRX SG IDPS Security Technical Implementation Guide
V-214617
CAT II
The Juniper Networks SRX Series Gateway IDPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
Juniper SRX Services Gateway IDPS Security Technical Implementation Guide
V-205513
CAT II
The Mainframe Product must identify prohibited mobile code.
Mainframe Product Security Requirements Guide
V-218801
CAT II
Java software installed on a production IIS 10.0 web server must be limited to .class files and the Java Virtual Machine.
Microsoft IIS 10.0 Server Security Technical Implementation Guide
V-223101
CAT II
Internet Explorer Processes for MIME handling must be enforced. (Reserved)
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223102
CAT II
Internet Explorer Processes for MIME handling must be enforced (Explorer).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223103
CAT II
Internet Explorer Processes for MIME handling must be enforced (iexplore).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223104
CAT II
Internet Explorer Processes for MIME sniffing must be enforced (Reserved).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223105
CAT II
Internet Explorer Processes for MIME sniffing must be enforced (Explorer).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223106
CAT II
Internet Explorer Processes for MIME sniffing must be enforced (iexplore).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223125
CAT II
Managing SmartScreen Filter use must be enforced.
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-221494
CAT II
OHS utilizing mobile code must meet DoD-defined mobile code requirements.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-242189
CAT II
The TPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
Trend Micro TippingPoint IDPS Security Technical Implementation Guide
V-206392
CAT II
A web server utilizing mobile code must meet DoD-defined mobile code requirements.
Web Server Security Requirements Guide