STIGhub
STIGs
RMF Controls
Compare
← SC-18 (3) — Mobile Code
CCI-001695
Definition
Prevent the execution of organization-defined unacceptable mobile code.
Parent Control
SC-18 (3)
Mobile Code
System and Communications Protection
Linked STIG Checks (63)
V-213117
CAT II
Adobe Acrobat Pro DC Continuous Enhanced Security for standalone mode must be enabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213118
CAT II
Adobe Acrobat Pro DC Continuous Enhanced Security for browser mode must be enabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213168
CAT II
Adobe Reader DC must enable Enhanced Security in a Standalone Application.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213169
CAT II
Adobe Reader DC must enable Enhanced Security in a Browser.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213170
CAT II
Adobe Reader DC must enable Protected Mode.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213171
CAT II
Adobe Reader DC must enable Protected View.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213172
CAT II
Adobe Reader DC must Block Websites.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213173
CAT II
Adobe Reader DC must block access to Unknown Websites.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213174
CAT II
Adobe Reader DC must prevent opening files other than PDF or FDF.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213175
CAT II
Adobe Reader DC must block Flash Content.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-204976
CAT II
The ALG providing content filtering must block or restrict detected prohibited mobile code.
Application Layer Gateway Security Requirements Guide
V-237382
CAT II
The CA API Gateway providing content filtering must block or restrict detected prohibited mobile code.
CA API Gateway ALG Security Technical Implementation Guide
V-278387
CAT II
NGINX must prevent the execution of unapproved modules.
F5 NGINX Security Technical Implementation Guide
V-221570
CAT II
Background processing must be disabled.
Google Chrome Current Windows Security Technical Implementation Guide
V-205474
CAT II
The Mainframe Product must prevent the execution of prohibited mobile code.
Mainframe Product Security Requirements Guide
V-238009
CAT II
Enabling IE Bind to Object functionality must be present.
Microsoft Access 2016 Security Technical Implementation Guide
V-238012
CAT II
Scripted Window Security must be enforced.
Microsoft Access 2016 Security Technical Implementation Guide
V-238021
CAT II
Protection from zone elevation must be enforced.
Microsoft Access 2016 Security Technical Implementation Guide
V-213437
CAT II
Microsoft Defender AV must be configured to not allow local override of monitoring for file and program activity.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213438
CAT II
Microsoft Defender AV must be configured to not allow override of monitoring for incoming and outgoing file activity.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-238162
CAT II
Enabling IE Bind to Object functionality must be present.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238169
CAT II
Configuration for file validation must be enforced.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238174
CAT II
Scripted Window Security must be enforced.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238186
CAT II
Protection from zone elevation must be enforced.
Microsoft Excel 2016 Security Technical Implementation Guide
V-223034
CAT II
Internet Explorer Processes Restrict ActiveX Install must be enforced (Explorer).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223035
CAT II
Internet Explorer Processes Restrict ActiveX Install must be enforced (iexplore).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223142
CAT II
Internet Explorer Processes Restrict ActiveX Install must be enforced (Reserved).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223304
CAT II
Protection from zone elevation must be enabled in all Office programs.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223306
CAT II
File Download Restriction must be enabled in all Office programs.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223308
CAT II
Scripted Windows Security restrictions must be enabled in all Office programs.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223334
CAT II
File validation in Excel must be enabled.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223418
CAT II
File validation in Word must be enabled.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-215533
CAT II
Scripted Window Security must be enforced.
Microsoft OneDrive Security Technical Implementation Guide
V-215537
CAT II
Protection from zone elevation must be enforced.
Microsoft OneDrive Security Technical Implementation Guide
V-238045
CAT II
Enabling IE Bind to Object functionality must be present.
Microsoft OneNote 2016 Security Technical Implementation Guide
V-238048
CAT II
Scripted Window Security must be enforced.
Microsoft OneNote 2016 Security Technical Implementation Guide
V-238052
CAT II
Protection from zone elevation must be enforced.
Microsoft OneNote 2016 Security Technical Implementation Guide
V-228420
CAT II
Enabling IE Bind to Object functionality must be present.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228423
CAT II
Scripted Window Security must be enforced.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228427
CAT II
Protection from zone elevation must be enforced.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-238056
CAT II
The Internet Explorer Bind to Object functionality must be enabled in PowerPoint.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238058
CAT II
Configuration for file validation must be enforced.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238061
CAT II
Scripted Window Security must be enforced in PowerPoint.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238072
CAT II
Protection from zone elevation must be enforced in PowerPoint.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238080
CAT II
The Internet Explorer Bind to Object functionality must be enabled in PowerPoint Viewer.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238083
CAT II
Scripted Window Security must be enforced in PowerPoint Viewer.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238087
CAT II
Protection from zone elevation must be enforced in PowerPoint Viewer.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-70705
CAT II
Enabling IE Bind to Object functionality must be present.
Microsoft Project 2016 Security Technical Implementation Guide
V-70711
CAT II
Scripted Window Security must be enforced.
Microsoft Project 2016 Security Technical Implementation Guide
V-70723
CAT II
Protection from zone elevation must be enforced.
Microsoft Project 2016 Security Technical Implementation Guide
V-238483
CAT II
Enabling IE Bind to Object functionality must be present.
Microsoft Publisher 2016 Security Technical Implementation Guide
V-238486
CAT II
Scripted Window Security must be enforced.
Microsoft Publisher 2016 Security Technical Implementation Guide
V-238492
CAT II
Protection from zone elevation must be enforced.
Microsoft Publisher 2016 Security Technical Implementation Guide
V-238109
CAT II
Enabling IE Bind to Object functionality must be present.
Microsoft Visio 2016 Security Technical Implementation Guide
V-238112
CAT II
Scripted Window Security must be enforced.
Microsoft Visio 2016 Security Technical Implementation Guide
V-238118
CAT II
Protection from zone elevation must be enforced.
Microsoft Visio 2016 Security Technical Implementation Guide
V-238123
CAT II
The Internet Explorer Bind to Object functionality must be enabled.
Microsoft Word 2016 Security Technical Implementation Guide
V-238125
CAT II
Configuration for file validation must be enforced.
Microsoft Word 2016 Security Technical Implementation Guide
V-238128
CAT II
Scripted Window Security must be enforced.
Microsoft Word 2016 Security Technical Implementation Guide
V-238139
CAT II
Protection from zone elevation must be enforced.
Microsoft Word 2016 Security Technical Implementation Guide
V-228852
CAT II
The Palo Alto Networks security platform must deny or restrict detected prohibited mobile code.
Palo Alto Networks ALG Security Technical Implementation Guide
V-216464
CAT II
The operating system must prevent the execution of prohibited mobile code.
Solaris 11 SPARC Security Technical Implementation Guide
V-216228
CAT II
The operating system must prevent the execution of prohibited mobile code.
Solaris 11 X86 Security Technical Implementation Guide