STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-18 (1)
System and Communications Protection
Rev 5
Mobile Code
CCI Identifiers (4)
CCI-001166
Identify organization-defined unacceptable mobile code.
CCI-001662
Take organization-defined corrective action when organization-defined unacceptable mobile code is identified.
CCI-002457
Defines the corrective actions to be taken when organization-defined unacceptable mobile code is identified.
CCI-002458
Defines what constitutes unacceptable mobile code by using corrective actions.
Linked STIG Checks (168)
Across 35 STIGs. Click to expand.
▶
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
8 checks
▶
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
1 check
▶
Application Layer Gateway Security Requirements Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
Application Server Security Requirements Guide
1 check
▶
CA API Gateway ALG Security Technical Implementation Guide
1 check
▶
Cisco ASA IPS Security Technical Implementation Guide
2 checks
▶
Dragos Platform 2.x Security Technical Implementation Guide
1 check
▶
F5 NGINX Security Technical Implementation Guide
1 check
▶
Google Chrome Current Windows Security Technical Implementation Guide
9 checks
▶
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
2 checks
▶
Intrusion Detection and Prevention Systems Security Requirements Guide
2 checks
▶
Juniper SRX Services Gateway IDPS Security Technical Implementation Guide
2 checks
▶
Juniper SRX SG IDPS Security Technical Implementation Guide
4 checks
▶
Mainframe Product Security Requirements Guide
2 checks
▶
Microsoft Access 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Defender Antivirus Security Technical Implementation Guide
4 checks
▶
Microsoft Defender for Endpoint Security Technical Implementation Guide
1 check
▶
Microsoft Excel 2016 Security Technical Implementation Guide
18 checks
▶
Microsoft IIS 10.0 Server Security Technical Implementation Guide
1 check
▶
Microsoft Internet Explorer 11 Security Technical Implementation Guide
12 checks
▶
Microsoft Office 365 ProPlus Security Technical Implementation Guide
52 checks
▶
Microsoft Office System 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft OneDrive Security Technical Implementation Guide
2 checks
▶
Microsoft OneNote 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Outlook 2016 Security Technical Implementation Guide
6 checks
▶
Microsoft PowerPoint 2016 Security Technical Implementation Guide
6 checks
▶
Microsoft Project 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Publisher 2016 Security Technical Implementation Guide
3 checks
▶
Microsoft Visio 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Word 2016 Security Technical Implementation Guide
10 checks
▶
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
1 check
▶
Palo Alto Networks IDPS Security Technical Implementation Guide
1 check
▶
Trend Micro TippingPoint IDPS Security Technical Implementation Guide
2 checks
▶
Web Server Security Requirements Guide
1 check