Checked | Name | Title |
---|---|---|
☐ | SV-225223r615940_rule | Digital signatures assigned to strongly named assemblies must be verified. |
☐ | SV-225224r615940_rule | The Trust Providers Software Publishing State must be set to 0x23C00. |
☐ | SV-225225r615940_rule | Developer certificates used with the .NET Publisher Membership Condition must be approved by the IAO. |
☐ | SV-225226r615940_rule | Encryption keys used for the .NET Strong Name Membership Condition must be protected. |
☐ | SV-225227r615940_rule | CAS and policy configuration files must be backed up. |
☐ | SV-225228r615940_rule | Remoting Services HTTP channels must utilize authentication and encryption. |
☐ | SV-225229r615940_rule | .Net Framework versions installed on the system must be supported. |
☐ | SV-225230r615940_rule | The .NET CLR must be configured to use FIPS approved encryption modules. |
☐ | SV-225231r615940_rule | .NET must be configured to validate strong names on full-trust assemblies. |
☐ | SV-225232r615940_rule | .Net applications that invoke NetFx40_LegacySecurityPolicy must apply previous versions of .NET STIG guidance. |
☐ | SV-225233r615940_rule | Trust must be established prior to enabling the loading of remote code in .Net 4. |
☐ | SV-225234r615940_rule | .NET default proxy settings must be reviewed and approved. |
☐ | SV-225235r615940_rule | Event tracing for Windows (ETW) for Common Language Runtime events must be enabled. |
☐ | SV-225236r615940_rule | Software utilizing .Net 4.0 must be identified and relevant access controls configured. |
☐ | SV-225237r615940_rule | Remoting Services TCP channels must utilize authentication and encryption. |
☐ | SV-225238r615940_rule | Disable TLS RC4 cipher in .Net |