STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Dragos Platform 2.x Security Technical Implementation Guide

Version

V1R6

Release Date

Feb 18, 2026

SCAP Benchmark ID

Dragos_Platform_2-x_STIG

Total Checks

19

Tags

other
CAT I: 1CAT II: 18CAT III: 0

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (19)

V-270904MEDIUMDragos must configure idle timeouts at 10 minutes.V-270910MEDIUMDragos Platform must use an Identity Provider (IDP) for authentication and authorization processes.V-270916MEDIUMThe Dragos Platform must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.V-270917MEDIUMThe publicly accessible Dragos Platform application must display the Standard Mandatory DOD Notice and Consent Banner before granting access to Dragos Platform.V-270919MEDIUMThe Dragos Platform must only allow local administrative and service user accounts.V-270932MEDIUMThe Dragos Platform must have notification and audit services installed.V-270944MEDIUMThe Dragos Platform must be configured to send backup audit records.V-270945MEDIUMThe Dragos Platform must have disk encryption enabled on a virtual machines (VMs).V-270947HIGHDragos Platforms must limit privileges and not allow the ability to run shell.V-270952MEDIUMDragos must allow only the individuals appointed by the information system security manager (ISSM) to have full admin rights to the system.V-270955MEDIUMThe Dragos Platform must configure local password policies.V-270978MEDIUMDragos must use FIPS-validated encryption and hashing algorithms to protect the confidentiality and integrity of application configuration files and user-generated data stored or aggregated on the device.V-270993MEDIUMThe Dragos Platform must notify system administrators and information system security officer (ISSO) of local account activity.V-271008MEDIUMDragos Platform must allocate audit record storage retention length.V-271027MEDIUMThe Syslog client must use TCP connections.V-271034MEDIUMDragos Platform must accept the DOD CAC or other PKI credential for identity management and personal authentication.V-271049MEDIUMThe Dragos Platform must only allow the use of DOD PKI established certificate authorities for verification of the establishment of protected sessions.V-271070MEDIUMThe Dragos Platform must alert the information system security officer (ISSO), information system security manager (ISSM), and other individuals designated by the local organization when events are detected that indicate a compromise or potential for compromise.V-271105MEDIUMBefore establishing a network connection with a Network Time Protocol (NTP) server, Dragos Platform must authenticate using a bidirectional, cryptographically based authentication method that uses a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the NTP server.