<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>compliance mandates &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/compliance-mandates/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:39:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>compliance mandates &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Establishing a System Hardening Baseline</title>
		<link>https://www.steelcloud.com/establishing-a-system-hardening-baseline/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 06 Apr 2024 21:29:36 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82266</guid>

					<description><![CDATA[Securing your enterprise against internal and external threats requires several critical steps to establish a system hardening baseline. Systems hardening is a collection of tools, techniques, and best practices to reduce vulnerability in technology applications, systems, infrastructure, firmware, and other areas. The goal of systems hardening is to reduce security risk by eliminating potential attack ...]]></description>
		
		
		
			</item>
		<item>
		<title>The Best Partnerships Make It Look Easy</title>
		<link>https://www.steelcloud.com/the-best-partnerships-make-it-look-easy/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 25 Apr 2022 16:00:35 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86661</guid>

					<description><![CDATA[Make Cybersecurity EASY with ConfigOS.  ConfigOS is SteelCloud’s patented compliance software. ConfigOS hardens around the application stack to create a secure baseline implementation of any given policy to make it work in your operational or application environment. ConfigOS softwared automation tool is the most trusted and proven cybersecurity in the DoD. Our automation tool delivers ...]]></description>
		
		
		
			</item>
		<item>
		<title>STIG Compliance and ConfigOS: A Partnership Built for Speed</title>
		<link>https://www.steelcloud.com/stig-compliance-and-configos-a-partnership-built-for-speed/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 11 Apr 2022 17:24:05 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86533</guid>

					<description><![CDATA[If really want to increase hardening velocity for STIG compliance, you can&#8217;t go at it alone.  STIG, CIS and CMMC compliance. Continuous diagnostics and mitigation (CDM). Zero Trust. All are essential to creating and maintaining a secure enterprise. But all are slow and tedious to implement—if you go it alone, that is. When you create ...]]></description>
		
		
		
			</item>
		<item>
		<title>To Trust or Not to Trust? The Answer is Both</title>
		<link>https://www.steelcloud.com/to-trust-or-not-to-trust-the-answer-is-both/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 04 Apr 2022 15:20:52 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83154</guid>

					<description><![CDATA[In Cybersecurity partnerships, you have to trust to achieve Zero Trust Our nation’s computer networks are on high alert. There are credible threats to our cybersecurity. And the Department of Defense urges us to take a Zero Trust posture. But before you can have Zero Trust, you’ll need help identifying and prioritizing your most critical ...]]></description>
		
		
		
			</item>
		<item>
		<title>Critical Infrastructure Warning: Lock Your Digital Doors</title>
		<link>https://www.steelcloud.com/critical-infrastructure-warning-lock-your-digital-doors/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 28 Mar 2022 15:16:55 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Agile Development]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT modernization]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83127</guid>

					<description><![CDATA[Companies continuing to use software with identified vulnerabilities opens the door to a cyber incident on critical infrastructure. “To be clear, there is no certainty there will be a cyber incident on critical infrastructure,” Neuberger said, but industry must take action to respond to possible threats. She added that the U.S. has improved its cyber ...]]></description>
		
		
		
			</item>
		<item>
		<title>Why Automation Is Key Your DevSecOps IT Modernization Strategy</title>
		<link>https://www.steelcloud.com/why-automation-is-key-your-devsecops-it-modernization-strategy/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 21 Mar 2022 17:13:30 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Agile Development]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT modernization]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83103</guid>

					<description><![CDATA[DevSecOps IT modernization  &#8211; Why automation matters. Circumstances are conspiring to shine a spotlight on DevSecOps. Software supply chain attacks are on the rise. Funding has surged to record heights with a focus on cloud and DevOps security. The DoD has finalized its Software Modernization Strategy to help enable the delivery of resilient software. And ...]]></description>
		
		
		
			</item>
		<item>
		<title>Mission-Critical Infrastructure Combined with DevSecOps</title>
		<link>https://www.steelcloud.com/securing-mission-critical-infrastructure-with-devsecops/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 17:55:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT modernization]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83097</guid>

					<description><![CDATA[Securing a mission-critical infrastructure means improving DevSecOps process to focus on vulnerabilities. As Gartner recently observed, “Concerns are growing for the security of cyber-physical systems (CPS) in mission-critical infrastructure, whether “brownfield” CPS from OT/IT convergence or “greenfield” CPS from digital efforts.” With cyberattacks increasing 3,900% between 2013 and 2020, organizations need all the help they ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust: How to Adapt Accordingly</title>
		<link>https://www.steelcloud.com/zero-trust-how-to-adapt-accordingly/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 15 Feb 2022 18:03:08 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<category><![CDATA[Zero Trust: How to adapt accordingly]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83009</guid>

					<description><![CDATA[Zero Trust: How to adapt accordingly with secure and compliant baselines using automation January’s OMB Memorandum detailing the White House Executive Order on Zero Trust has government and defense industrial base (DIB) organizations talking. In last week’s Tech Talk Tuesday, we shared some basics of Zero Trust, including a refresher on network access control (NAC) ...]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust, NAC and a New Era of Cybersecurity</title>
		<link>https://www.steelcloud.com/zero-trust-nac-and-a-new-era-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 07 Feb 2022 16:56:18 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defensive line]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitre att&ck]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[Security Technical Implementation Guide]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82984</guid>

					<description><![CDATA[The game is well underway when talking about Zero Trust, NAC and ushering in the new era of cybersecurity In January, the US Office of Management and Budget (OMB) presented its Federal Zero Trust Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. It focuses primarily on a Zero ...]]></description>
		
		
		
			</item>
		<item>
		<title>eMASS Automation and Uniting the Missing Security Compliance Data</title>
		<link>https://www.steelcloud.com/emass-automation-and-uniting-the-missing-security-compliance-data/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 11 Jan 2022 15:55:04 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[compliance drift]]></category>
		<category><![CDATA[compliance mandates]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[configuration drift]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[disa stigs]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[information assurance]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[system drift]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82869</guid>

					<description><![CDATA[How eMASS Automation Unites the Missing Security Compliance Data eMASS, or the Enterprise Mission Assurance Support Service, was developed by the DoD, in part, as a repository that unites technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel.  Traditionally the “uniting” process is accomplished by completing a STIG Viewer Checklist ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
