STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 7 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

HPE 3PAR StoreServ 3.2.x Security Technical Implementation Guide

Version

V2R1

Release Date

Nov 23, 2021

SCAP Benchmark ID

HPE_3PAR_StoreServ_3.2.x_STIG

Total Checks

19

Tags

other
CAT I: 7CAT II: 8CAT III: 4

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (19)

V-237812MEDIUMThe storage system must be operated at the latest maintenance update available from the vendor.V-237813HIGHThe storage system in a hardened configuration must be configured to disable the Remote Copy feature, unless needed.V-237814MEDIUMThe CIM service must be disabled, unless needed.V-237815MEDIUMThe storage system must terminate all network connections associated with a communications session at the end of the session, at shutdown, or after 10 minutes of inactivity.V-237817HIGHThe CIM service must use DoD-approved encryption.V-237818HIGHDoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.V-237819LOWThe storage system must implement cryptographic mechanisms to prevent unauthorized modification or disclosure of all information at rest on all storage system components.V-237820MEDIUMSNMP must be changed from default settings and must be configured on the storage system to provide alerts of critical events that impact system security.V-237821MEDIUMThe SNMP service on the storage system must use only SNMPv3 or its successors.V-237822MEDIUMThe SNMP service on the storage system must require the use of a FIPS 140-2 approved cryptographic hash algorithm as part of its authentication and integrity methods.V-237823LOWThe storage system must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).V-237824HIGHThe storage system must be configured to have only 1 emergency account which can be accessed without LDAP, and which has full administrator capabilities.V-237825HIGHThe storage system must only be operated in conjunction with an LDAP server in a trusted environment if an Active Directory server is not available.V-237826HIGHUser credentials which would allow remote access to the system by the Service Processor must be removed from the storage system.V-237827HIGHThe storage system must only be operated in conjunction with an Active Directory server in a trusted environment if an LDAP server is not available.V-237828MEDIUMThe storage system must require passwords contain a minimum of 15 characters, after an administrator has set the minimum password length to that value.V-237829LOWThe Standard Mandatory DoD Notice and Consent Banner must be displayed until users acknowledge the usage conditions and take explicit actions to log on for further access.V-237830MEDIUMThe storage system must allocate audit record storage capacity to store at least one weeks worth of audit records, when audit records are not immediately sent to a central audit record storage facility.V-237831LOWThe storage system must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).