Skip to main content
CUI

OCA Hostname Mapping

SIPR How it works: Each hostname can have multiple STIGs (e.g., a server might have Windows Server STIG, IIS STIG, and SQL Server STIG). Each hostname + STIG combination needs to be mapped to the appropriate OCA assessment area. For example, "WEBSERVER01" + "IIS STIG" maps to "Web Server" area, while "WEBSERVER01" + "Windows Server STIG" maps to "Windows OS" area.

20 hostname+STIG combinations  ·  All mapped ✓ 20 mapped · 0 need attention

Bulk Map by STIG Benchmark

Quickly map all hostnames using the same STIG benchmark.

Add/Edit Mapping

Map a hostname + STIG combination to an OCA assessment area

✓ Auto-mapped — 20 combinations
Hostname STIG Current Area Override Remove
MONT-SW-89108 Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide Windows OS
MONT-SW-89108 Google Chrome Current Windows Security Technical Implementation Guide Windows OS
MONT-SW-89108 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-SW-89108 Microsoft Edge Security Technical Implementation Guide Windows OS
MONT-SW-89108 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-SW-89108 Microsoft Office 365 ProPlus Security Technical Implementation Guide Windows OS
MONT-SW-89108 Microsoft Office 365 ProPlus Security Technical Implementation Guide Windows OS
MONT-SW-89108 Microsoft Windows 10 Security Technical Implementation Guide Windows OS
MONT-SW-89108 Microsoft Windows 10 Security Technical Implementation Guide Windows OS
MONT-SW-89108 Mozilla Firefox Security Technical Implementation Guide Windows OS
MONT-SW-89134 Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide Windows OS
MONT-SW-89134 Google Chrome Current Windows Security Technical Implementation Guide Windows OS
MONT-SW-89134 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-SW-89134 Microsoft Edge Security Technical Implementation Guide Windows OS
MONT-SW-89134 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-SW-89134 Microsoft Office 365 ProPlus Security Technical Implementation Guide Windows OS
MONT-SW-89134 Microsoft Office 365 ProPlus Security Technical Implementation Guide Windows OS
MONT-SW-89134 Microsoft Windows 10 Security Technical Implementation Guide Windows OS
MONT-SW-89134 Microsoft Windows 10 Security Technical Implementation Guide Windows OS
MONT-SW-89134 Mozilla Firefox Security Technical Implementation Guide Windows OS

OCA Assessment Areas Reference

Boundary Security
Firewalls, DMZ, perimeter security
Internal Network
Internal network switches, routers, VLANs
Combined Vulnerability Scan
ACAS/Nessus vulnerability scan results
Domain Name System
DNS servers and configuration
Host Based Security System
HBSS/Trellix endpoint security
Traditional Security
Physical security, access control
Wireless Communications/Mobility
WiFi, mobile devices
Cross Domain Solutions - Admin
CDS administrative controls
Cross Domain Solutions - Technical
CDS technical implementation
Exchange
Microsoft Exchange email servers
Web Server
IIS, Apache, web applications
Database
SQL Server, Oracle, database security
Video and Voice Over Internet Protocol (VVOIP)
VoIP phones, video conferencing
Windows OS
Windows workstations and servers
Unix OS
Linux, Unix, macOS systems
Releaseable Networks
Networks for coalition/external use
Virtual Environment
VMware, Hyper-V, containers
Other Review
Uncategorized or specialized systems
CUI