<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>secure infrastructure &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/secure-infrastructure/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:49:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>secure infrastructure &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Video: Building Compliance into DevOps Process</title>
		<link>https://www.steelcloud.com/overview-building-compliance-into-devops-process/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 05 Jul 2021 13:25:35 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[mitigate threats]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[secure infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80325</guid>

					<description><![CDATA[Integrating policy compliance into DevOps is not a new concept to SteelCloud. With our patented policy remediation software, ConfigOS, you can easily integrate STIG or CIS policy compliance into every step of the DevOps process – from unit testing in development to ongoing sustainment in production.]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Policy Compliance in Classified Environments</title>
		<link>https://www.steelcloud.com/interview-policy-compliance-in-classified-environments/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 05 Jul 2021 13:20:37 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[lot vulnerabilities]]></category>
		<category><![CDATA[mitigate threats]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[secure infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[system hardening]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81436</guid>

					<description><![CDATA[In this CyberSecurity TV episode, Brian Hajost, SteelCloud CEO, focuses on policy compliance challenges for both unclassified and classified environments and how the security stack differs. Learn why secure and air-gapped clients need to do more with less as IA resources are limited. For this reason, automation is key for classified environments to enable IA ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: STIGs and DevOps</title>
		<link>https://www.steelcloud.com/interview-stigs-and-devops/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 05 Jul 2021 13:00:20 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[mitigate threats]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[secure infrastructure]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80293</guid>

					<description><![CDATA[In this episode of CyberSecurity TV, Brian Hajost talks about the DevOps process for applications that are developed for use by the Department of Defense and addresses several concerns that vendors have with the costs of testing. &#160; Learn how to harden any system in about an hour, eliminating weeks of effort quickly establish a ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
