Downloads:

665

Downloads of v 2.15:

34

Last Update:

11 Sep 2021

Package Maintainer(s):

Software Author(s):

  • IASE

Tags:

security defense harden

STIG Viewer

  • 1
  • 2
  • 3

2.15 | Updated: 11 Sep 2021

Downloads:

665

Downloads of v 2.15:

34

Maintainer(s):

Software Author(s):

  • IASE

  • 1
  • 2
  • 3
STIG Viewer 2.15

  • 1
  • 2
  • 3

All Checks are Passing

3 Passing Tests


Validation Testing Passed


Verification Testing Passed

Details

Scan Testing Successful:

No detections found in any package files

Details

To install STIG Viewer, run the following command from the command line or from PowerShell:

>

To upgrade STIG Viewer, run the following command from the command line or from PowerShell:

>

To uninstall STIG Viewer, run the following command from the command line or from PowerShell:

>

NOTE: This applies to both open source and commercial editions of Chocolatey.

1. Ensure you are set for organizational deployment

Please see the organizational deployment guide

  • Open Source or Commercial:
    • Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://community.chocolatey.org/api/v2. Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information.
    • You can also just download the package and push it to a repository Download

3. Enter your internal repository url

(this should look similar to https://community.chocolatey.org/api/v2)

4. Choose your deployment method:


choco upgrade stigviewer -y --source="'STEP 3 URL'" [other options]

See options you can pass to upgrade.

See best practices for scripting.

Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes.

If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures:


choco upgrade stigviewer -y --source="'STEP 3 URL'"
$exitCode = $LASTEXITCODE

Write-Verbose "Exit code was $exitCode"
$validExitCodes = @(0, 1605, 1614, 1641, 3010)
if ($validExitCodes -contains $exitCode) {
  Exit 0
}

Exit $exitCode

- name: Ensure stigviewer installed
  win_chocolatey:
    name: stigviewer
    state: present
    version: 2.15
    source: STEP 3 URL

See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html.


chocolatey_package 'stigviewer' do
  action    :install
  version  '2.15'
  source   'STEP 3 URL'
end

See docs at https://docs.chef.io/resource_chocolatey_package.html.


Chocolatey::Ensure-Package
(
    Name: stigviewer,
    Version: 2.15,
    Source: STEP 3 URL
);

Requires Otter Chocolatey Extension. See docs at https://inedo.com/den/otter/chocolatey.


cChocoPackageInstaller stigviewer
{
   Name     = 'stigviewer'
   Ensure   = 'Present'
   Version  = '2.15'
   Source   = 'STEP 3 URL'
}

Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco.


package { 'stigviewer':
  provider => 'chocolatey',
  ensure   => '2.15',
  source   => 'STEP 3 URL',
}

Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey.


salt '*' chocolatey.install stigviewer version="2.15" source="STEP 3 URL"

See docs at https://docs.saltstack.com/en/latest/ref/modules/all/salt.modules.chocolatey.html.

5. If applicable - Chocolatey configuration/installation

See infrastructure management matrix for Chocolatey configuration elements and examples.

Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! Learn more...

This package was approved by moderator TheCakeIsNaOH on 11 Sep 2021.

Description

The DoD/DISA STIG Viewer tool provides the capability to view one or more XCCDF (Extensible Configuration Checklist Description Format) formatted STIGs in an easy-to navigate, human-readable format. It is compatible with STIGs developed and published by DISA for the DoD. The purpose of the STIG Viewer is to provide an intuitive graphical user interface that allows ease of access to the STIG content, along with additional search and sort functionality unavailable with the current method of viewing the STIGs (using a style sheet in a web browser).

STIG Viewer also supports additional functionality using the following features:

  • Allows multiple STIGs to be imported and used when creating checklists.
  • Individually loads one or more XCCDF STIG files.
  • Extracts XCCDF STIG files from zipped STIG packages.
  • Creates a Local Data Cache on a system to store user configuration data and the current set of imported STIGs. This permits the reloading of the last set of loaded STIGs each time the STIG Viewer starts.
  • Deletes the Local Data Cache from the Viewer’s options menu. STIG Viewer can only create one Local Data Cache at a time.
  • Multiple XCCDF STIG files can be simultaneously unzipped and loaded from a .zip file containing one or more folders with zipped STIG packages. STIG Viewer will drill down to find all XCCDF files and load them. It then extracts all XCCDF files to its local folder since a Local Data Cache is required for this operation.
  • Sorts the list of STIG requirements/vulnerabilities by Vulnerability ID, STIG ID, Rule ID, CCI, or Group/Rule Name.
  • Searches or filters all loaded STIG files based on one or more keywords. Searches all fields or individual fields and then returns a filtered list of STIG requirements/vulnerabilities.
  • Searches may also be restricted to Rule Title, STIG ID, Vulnerability ID, Rule ID, Severity, or CCI.
  • Displays CCI data if the CCI reference is contained in the STIG requirements.
  • Prints or exports (HTML and RTF file formats) selected STIG data for use with other programs (i.e., web browsers and Microsoft Word).
  • Bases the printed/exported data on the list of requirements displayed in the center pane of the viewer and formats the output as a table containing each requirement.
  • Imports automated review SCAP (Security Content Automation Protocol) or XCCDF Results into the checklist, populating the checklist with the automated results. The manual portion of the review can be completed and added to the automated results.
  • Exports the checklist as a .CSV file.
  • NOTE: DISA initially developed STIG Viewer in Java and delivered it as a single JAR file for use with the Oracle Java 8 Java Runtime Environment (JRE). With changes in Java licensing and distribution accompanying the release of Java 11, DISA now provides a standalone STIG Viewer application in a ZIP file that does not require the Oracle JRE. This allows the application to run on 64-bit X86 systems running Windows, Linux, and macOS with minimal disruption to existing workflows. This limits the program to running at the permission level of the currently logged-in user.
  • STIG Viewer does not open or use any network connections.
  • Java creates Local Data Caches in the logged-in user’s local directory. This is a different location in each operating system.
  • Under Windows 10, this is in the following directory: %USERPROFILE%\AppData\Local\STIGV_AppData (When clearing the Local Data Cache, Java deletes the folder and the Local Data Cache simultaneously.)
  • The input to the STIG Viewer is XCCDF contained in an XML file. STIG viewer rejects other file types. STIG Viewer is optimized for XCCDF-formatted STIGs produced by DISA for DoD

tools\chocolateyinstall.ps1
$tools = Split-Path -Parent $MyInvocation.MyCommand.Definition
$content = Join-Path -Path (Split-Path -Parent $tools) -ChildPath 'content'
$target = Join-Path -Path $content -ChildPath "STIG Viewer\STIG Viewer.exe"

$shortcutdir = @{$true='CommonPrograms';$false='Programs'}[($PSVersionTable.PSVersion -gt '2.0.0.0')]
$shortcut = Join-Path ([System.Environment]::GetFolderPath($shortcutdir)) 'STIG Viewer.lnk'

Install-ChocolateyZipPackage `
    -PackageName $env:ChocolateyPackageName `
    -UnzipLocation $content `
    -Url 'https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_STIGViewer_2-15_Win64.zip' `
    -Checksum 'AC8CF9E2E0BF73BA0FBD82D151DBC49F387E596ECD060BE84AE5A9C4631D6EF5' `
    -ChecksumType 'SHA256'

Install-ChocolateyShortcut `
    -ShortcutFilePath $shortcut `
    -TargetPath $target
tools\chocolateyuninstall.ps1
$shortcutdir = @{$true='CommonPrograms';$false='Programs'}[($PSVersionTable.PSVersion -gt '2.0.0.0')]
$shortcut = Join-Path ([System.Environment]::GetFolderPath($shortcutdir)) 'STIG Viewer.lnk'

Remove-Item -Path $shortcut -Force | Out-Null

Log in or click on link to see number of positives.

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

Version Downloads Last Updated Status
STIG Viewer 2.14 113 Wednesday, April 28, 2021 Approved
STIG Viewer 2.8 518 Wednesday, December 12, 2018 Approved
Discussion for the STIG Viewer Package

Ground Rules:

  • This discussion is only about STIG Viewer and the STIG Viewer package. If you have feedback for Chocolatey, please contact the Google Group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or STIG Viewer, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.
comments powered by Disqus