STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

HPE 3PAR SSMC Operating System Security Technical Implementation Guide

Version

V2R1

Release Date

May 30, 2024

SCAP Benchmark ID

HPE_3PAR_SSMC_GPOS_STIG

Total Checks

14

Tags

other
CAT I: 0CAT II: 12CAT III: 2

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (14)

V-255237MEDIUMAny publicly accessible connection to SSMC must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.V-255238MEDIUMSSMC must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.V-255239MEDIUMSSMC must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.V-255240MEDIUMSSMC must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.V-255241MEDIUMSSMC must enforce a minimum 15-character password length.V-255242MEDIUMSSMC must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.V-255243MEDIUMSSMC must be configured to offload logs to a SIEM that is configured to alert the ISSO or SA when the local built-in admin account (ssmcadmin) is accessed.V-255244MEDIUMSSMC must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.V-255245MEDIUMFor PKI-based authentication, SSMC must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.V-255246LOWSSMC must enforce the limit of three consecutive invalid logon attempts by a nonadministrative user.V-255247MEDIUMSSMC must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.V-255248MEDIUMSSMC must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.V-255249LOWSSMC must provide audit record generation capability for DOD-defined auditable events for all operating system components.V-255250MEDIUMSSMC must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.