<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>CDM &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/cdm/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:46:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>CDM &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>White Paper: Realizing the Promise of Zero Trust</title>
		<link>https://www.steelcloud.com/white-paper-realizing-the-promise-of-zero-trust/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 20 Aug 2024 20:25:26 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[White Papers]]></category>
		<category><![CDATA[Asset Management]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[dashview splunk]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[FISHMA]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[siem data]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86626</guid>

					<description><![CDATA[Hardening is foundational with Zero Trust. Automation helps.  Establishing Zero Trust goes beyond protecting your perimeter. You also need to put a metal detector at the entrance, secure the locker room, and provide continual surveillance. And ZT is not a one-size-fits-all approach. Instead, the result will be a continuum of solutions and outcomes tailored to ...]]></description>
		
		
		
			</item>
		<item>
		<title>Establishing a System Hardening Baseline</title>
		<link>https://www.steelcloud.com/establishing-a-system-hardening-baseline/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 06 Apr 2024 21:29:36 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82266</guid>

					<description><![CDATA[Securing your enterprise against internal and external threats requires several critical steps to establish a system hardening baseline. Systems hardening is a collection of tools, techniques, and best practices to reduce vulnerability in technology applications, systems, infrastructure, firmware, and other areas. The goal of systems hardening is to reduce security risk by eliminating potential attack ...]]></description>
		
		
		
			</item>
		<item>
		<title>Take Control of Your Information with DevSecOps Automation</title>
		<link>https://www.steelcloud.com/take-control-of-your-information-with-devsecops-automation/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Mon, 16 Jan 2023 14:47:03 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[Contiunous Diagnostics Mitigation]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[FISMA]]></category>
		<category><![CDATA[rmf accreditation]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87872</guid>

					<description><![CDATA[DevSecOps: Build Security at Every Step of the Process The demands of modern work put pressure on professionals and engineers to deliver quick and proficient solutions. That expectation is growing as technologies, mandates, and cybercriminals get more complex and sophisticated. Case in point: Federal agencies have until September 30, 2023, to report at least 80 ...]]></description>
		
		
		
			</item>
		<item>
		<title>What&#8217;s the Scorecard on FITARA?</title>
		<link>https://www.steelcloud.com/whats-the-scorecard-on-fitara/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 23 Nov 2022 17:44:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[continuous diagnostic mitigation]]></category>
		<category><![CDATA[FISMA]]></category>
		<category><![CDATA[FITARA]]></category>
		<category><![CDATA[IT modernization]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87707</guid>

					<description><![CDATA[Where you land on FITARA&#8217;s scorecard in 2023 may be more important than you think. To be relevant or not? That is the question. There is a direct correlation between technology modernization and the ability to quickly adapt to the advancement in technologies and innovation needed to thrive amidst a lack of resources, a shortage ...]]></description>
		
		
		
			</item>
		<item>
		<title>Research: Cyber EO Drives Increased CDM Importance and Initiatives</title>
		<link>https://www.steelcloud.com/research-cyber-eo-drives-increased-cdm-importance-and-initiatives/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 16 May 2022 18:35:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[Continuous Diagnostics and Mitigation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86677</guid>

					<description><![CDATA[Cyber pros see improved Federal cyber resilience due to the CDM program Ninety-three percent of Federal and industry Continuous Diagnostics and Mitigation (CDM) stakeholders say the CDM Program has improved Federal cyber resilience in the past year, according to CDM: The Multitool in Your Cyber Kit, a new study from MeriTalk, a public-private partnership focused ...]]></description>
		
		
		
			</item>
		<item>
		<title>eMASS Automation and Uniting the Missing Security Compliance Data</title>
		<link>https://www.steelcloud.com/emass-automation-and-uniting-the-missing-security-compliance-data/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 11 Jan 2022 15:55:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance drift]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[disa stigs]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system drift]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82869</guid>

					<description><![CDATA[How eMASS Automation Unites the Missing Security Compliance Data eMASS, or the Enterprise Mission Assurance Support Service, was developed by the DoD, in part, as a repository that unites technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel.  Traditionally the “uniting” process is accomplished by completing a STIG Viewer Checklist ...]]></description>
		
		
		
			</item>
		<item>
		<title>Toast the Holidays with Our “Triple-Sec” Gift!</title>
		<link>https://www.steelcloud.com/toast-the-holidays-without-our-triple-sec-gift/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 18:29:17 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system drift]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82818</guid>

					<description><![CDATA[It wouldn&#8217;t be the Holidays without Our “Triple-Sec” Gift!  As 2021 comes to a close, we wanted to offer our readers something special—our top three cybersecurity resources for 2021. Every DoD and contractor library should be stocked with these reports defining and describing your security mission and how to accomplish it effectively and efficiently. With ...]]></description>
		
		
		
			</item>
		<item>
		<title>Stop the Drift &#8211; How to Spot and Stop Compliance Drift</title>
		<link>https://www.steelcloud.com/get-the-drift-how-to-spot-and-stop-compliance-drift/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 22 Oct 2021 14:34:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance drift]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[disa stigs]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system drift]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82589</guid>

					<description><![CDATA[“No man ever steps in the same river twice, for it&#8217;s not the same river and he&#8217;s not the same man.” Heraclitus The same thing is true when it comes to your IT infrastructure. Catching your STIGs from compliance drift means the minute you make one change, you are dealing with a different network and ...]]></description>
		
		
		
			</item>
		<item>
		<title>Gain Confidence in Your Data &#8211; STOP System Drift</title>
		<link>https://www.steelcloud.com/gain-confidence-in-your-data-stop-system-drift/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 27 Aug 2021 18:15:26 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system drift]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82317</guid>

					<description><![CDATA[Today&#8217;s cyber hygiene requirements have never been more crucial in advancing the process for assessing industry compliance. Configuration drift and lack of visibility into critical security metrics mean CISO&#8217;s will push for more advanced security software/tools. In addition, enterprise reporting will continue to replace legacy reporting tools. The end goal, of course, for any contractor is ...]]></description>
		
		
		
			</item>
		<item>
		<title>Vitamin C for your Infrastructure – Cyber Hygiene Governance</title>
		<link>https://www.steelcloud.com/vitamin-c-for-your-infrastructure-cyber-hygiene-governance/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Thu, 12 Aug 2021 13:54:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82282</guid>

					<description><![CDATA[How to best maintain cyber hygiene governance with documented processes. Today, technology is driving change in organizations more than ever before. As a result, we’re highly dependent on numerous electronic devices—laptops, smartphones, and tablets. The additional electronic devices create complexity in your IT environment, which results in a lack of visibility and gaps in protection. ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
