<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Defense Industrial Base &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/defense-industrial-base/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:40:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Defense Industrial Base &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Seven ways automation seals your CMMC certification with a KISS</title>
		<link>https://www.steelcloud.com/seven-ways-automation-seals-your-cmmc-certification-with-a-kiss/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 22 Nov 2021 14:59:11 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC certification with a KISS]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82669</guid>

					<description><![CDATA[CMMC certification with a KISS in seven steps KISS—Keep It Simple, Stupid—is a design principle noted by the U.S. Navy in 1960. The KISS principle states that most systems work best if they are kept simple rather than made complicated. In other words, simplicity should be a key goal in design and unnecessary complexity should ...]]></description>
		
		
		
			</item>
		<item>
		<title>CMMC 2.0 Opportunities and Challenges</title>
		<link>https://www.steelcloud.com/cmmc-2-0-opportunities-and-challenges/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 15 Nov 2021 20:53:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82630</guid>

					<description><![CDATA[CMMC 2.0 framework offers up a more transparent pathway.  Just when we were all finally wrapping our brains around the Cybersecurity Maturity Model Certification (CMMC) mandate for the defense industrial base (DIB), they went and changed it on us—for the better! In the early morning of November 4, 2021, “Cybersecurity Maturity Model Certification (CMMC) 2.0 Updates and Way ...]]></description>
		
		
		
			</item>
		<item>
		<title>Navigating the CMMC Certification Process</title>
		<link>https://www.steelcloud.com/navigating-the-cmmc-certification-process/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 06 Nov 2021 17:15:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82617</guid>

					<description><![CDATA[Navigating the CMMC Certification Process In 2020, the DoD rolled out its Cybersecurity Maturity Model Certification (CMMC) program. The CMMC certification process requires the defense industrial base (DIB) to attain third-party certification to ensure government contractors practice one of three cybersecurity levels, depending on the kind of data they touch. Although the deadline for CMMC ...]]></description>
		
		
		
			</item>
		<item>
		<title>Tackling the challenges of CMMC compliance in the DIB</title>
		<link>https://www.steelcloud.com/tackling-the-challenges-of-cmmc-compliance-in-the-dib/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 17:28:52 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82607</guid>

					<description><![CDATA[Tackling the challenges of CMMC compliance in the DIB Trying to wrap your arms around CMMC compliance in the DIB? When it comes to cybersecurity and CMMC compliance in the DIB (defense industrial base), the government means business. And the more sensitive the data is that you handle, the more secure you need to be.  ...]]></description>
		
		
		
			</item>
		<item>
		<title>Are You Grappling with Privacy Mandates to Comply with PII &#8211; Personally Identifiable Information?</title>
		<link>https://www.steelcloud.com/are-you-grappling-with-privacy-mandates-to-comply-with-pii-personally-identifiable-information-2/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 13:43:49 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[PII (Personally Identifiable Information)]]></category>
		<category><![CDATA[Privacy mandates]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82020</guid>

					<description><![CDATA[Are You Grappling with Privacy Mandates to Comply with PII – Personally Identifiable Information? Hardening systems is first step in protecting you PII Personally Identifiable Information Modern businesses collect data a lot of data. Regardless of your industry, your company relies on PII Personally Identifiable Information) to provide the best consumer experience possible. This reliance ...]]></description>
		
		
		
			</item>
		<item>
		<title>Mind the Gap: How Air Gapping Can Protect IP</title>
		<link>https://www.steelcloud.com/mind-the-gap-how-air-gapping-can-protect-ip/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 22 Jun 2021 15:55:56 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[air gapping]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cmmc security baselines]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81873</guid>

					<description><![CDATA[Reconsider the value air gapping brings to intellectual property data protection. If you have a machine that is not connected to the internet directly or to any other computers that are connected to the internet, are you truly secure and can it be hacked? Many companies now require that a network or system is secure by ...]]></description>
		
		
		
			</item>
		<item>
		<title>Why is Continuous Monitoring so Complex?</title>
		<link>https://www.steelcloud.com/why-is-continuously-monitoring-cis-benchmarks-so-complex/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 12 May 2021 14:09:17 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[What are the CIS Controls]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81595</guid>

					<description><![CDATA[Continuously Monitoring CIS Benchmarks does not have to be so cumbersome Nearly every cybersecurity law, industry-standard, or framework incorporates continuous monitoring. Malicious actors continuously evolve their threat methodologies, which is why companies need to keep reviewing their controls’ effectiveness. Continuously monitoring CIS Benchmarks may be challenging but equally important as you look to mature your ...]]></description>
		
		
		
			</item>
		<item>
		<title>What are CIS Benchmarks?</title>
		<link>https://www.steelcloud.com/what-are-cis-benchmarks/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 07 May 2021 15:45:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[What are the CIS Controls]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81514</guid>

					<description><![CDATA[What are CIS Benchmarks and Best Practice? Most organizations need to create baseline technical security configurations. However, configuring systems is one thing. Maintaining those security configurations over time is a whole different beast. The Center for Internet Security (CIS) Controls offers companies a way to set a path to maturing their cybersecurity programs as well ...]]></description>
		
		
		
			</item>
		<item>
		<title>Maintaining CMMC Security Configurations for Continuous Assurance</title>
		<link>https://www.steelcloud.com/maintaining-cmmc-security-configurations-for-continuous-assurance/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 07 Apr 2021 18:40:07 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[cmmc security baselines]]></category>
		<category><![CDATA[CMMC Security Configurations]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81444</guid>

					<description><![CDATA[How to keep the conversation going when you talk about audits and CMMC security configurations If you’re looking to clear out a room at a party, utter the word “audit.” While audits are necessary for holding organizations accountable, they require a lot of time and paperwork. When looking to meet and maintain compliance with the ...]]></description>
		
		
		
			</item>
		<item>
		<title>Setting CMMC Security Baselines</title>
		<link>https://www.steelcloud.com/setting-cmmc-security-baselines/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 05 Apr 2021 18:02:15 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[cmmc security baselines]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81403</guid>

					<description><![CDATA[Why CMMC security baselines are so important As you start to figure out how to get your company CMMC compliant, you probably noticed that establishing low-level controls that meet the high-level requirements is far more complicated than you realized. You know that the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 is ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
