skip to Main Content
  • Content Types

  • Content Types

  • Topics

  • ConfigOS Concept of Operations

    The Department of Defense (DoD) protects its 15,000 networks by defining, implementing,
    and auditing “best practices” for installation and maintenance of its information
    technology resources. The Defense Information Systems Agency (DISA) develops and
    publishes policy, in the form of the Security Technical Information Guides (STIGs), which
    are used when hardening secure systems used in the DoD. While significant advances have
    been made in the areas of threat definition and vulnerability monitoring, little progress has
    been made in automating the arduous tasks of implementing and maintaining STIG policy
    on the hundreds of thousands of systems operated by the DoD.

    Download PDF

    Share This: