STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide

Version

V2R1

Release Date

May 30, 2024

SCAP Benchmark ID

HPE_3PAR_StoreServ_3.3.x_STIG

Total Checks

30

Tags

other
CAT I: 7CAT II: 23CAT III: 0

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (30)

V-255270MEDIUMThe HPE 3PAR OS must be configured to disable nonessential web-services.V-255271MEDIUMThe HPE 3PAR OS must be configured to terminate all network connections associated with a communications session at the end of the session, or after 10 minutes of inactivity.V-255272HIGHThe HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.V-255273HIGHThe HPE 3PAR OS must be configured to initialize its FIPS module to use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.V-255274MEDIUMThe HPE 3PAR OS must be configured to implement cryptographic mechanisms to prevent the unauthorized modification or disclosure of all information at rest on all operating system components.V-255275MEDIUMThe HPE 3PAR OS must be configured to send SNMP alerts to alert in the event of an audit processing failure.V-255276MEDIUMThe HPE 3PAR OS must provide an immediate real-time alert to the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.V-255277MEDIUMThe HPE 3PAR OS must, for networked systems, compare internal information system clocks at least every 24 hours with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).V-255278MEDIUMThe HPE 3PAR OS must be configured for centralized account management functions via LDAP.V-255279MEDIUMThe HPE 3PAR OS must be configured to have only one emergency account that can be accessed without LDAP and that has full administrator privileges.V-255280MEDIUMThe HPE 3PAR OS must be configured to enforce a minimum 15-character password length.V-255281MEDIUMThe HPE 3PAR OS must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.V-255282MEDIUMThe HPE 3PAR operating system must be configured to allocate audit record storage capacity to store at least one week of audit records, even though all audit records are immediately sent to a centralized audit record storage system (SIEM).V-255283MEDIUMThe HPE 3PAR OS must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).V-255284MEDIUMThe HPE 3PAR OS must be configured to offload audit records onto a different system or media from the system being audited.V-255285MEDIUMThe HPE 3PAR OS must be configured to implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.V-255286HIGHThe HPE 3PAR OS must map the authenticated identity to the user account for PKI-based authentication.V-255287MEDIUMThe HPE 3PAR OS must be configured to only allow the use of DOD PKI-established certificate authorities for authentication in the establishment of protected sessions to the operating system.V-255288MEDIUMThe HPE 3PAR OS must provide automated mechanisms for supporting account management functions via AD.V-255289MEDIUMThe HPE 3PAR OS syslog-sec-client must be configured to perform mutual TLS authentication using a CA-signed client certificate.V-255290MEDIUMThe HPE 3PAR OS must be configured to disable nonessential Common Information Model services.V-255291HIGHThe HPE 3PAR OS CIMserver process must be configured to use approved encryption and communications protocols to protect the confidentiality of remote access sessions.V-255292HIGHThe HPE 3PAR OS cimserver process must be properly configured to operate in FIPS mode in order to use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.V-255293MEDIUMThe HPE 3PAR OS must be configured to only use DOD PKI established certificate authorities for authentication in the establishment of protected sessions to the operating system with an External Key Manager.V-255294MEDIUMThe HPE 3PAR OS must be configured to disable nonessential VASA VVol services.V-255295HIGHThe HPE 3PAR OS WSAPI process must be configured to use approved encryption and communications protocols to protect the confidentiality of remote access sessions.V-255296HIGHThe HPE 3PAR OS WSAPI process must be properly configured to operate in FIPS mode in order to use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.V-255297MEDIUMThe HPE 3PAR OS must be configured to perform mutual TLS authentication using a CA-signed client certificate when communicating with an External Key Manager.V-255298MEDIUMThe HPE 3PAR OS must be configured to disable nonessential Remote Copy services.V-255299MEDIUMThe HPE 3PAR OS must be configured to only use DOD PKI established certificate authorities for authentication in the establishment of protected sessions to the operating system with a centralized account management server.