<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Security Technical Implementation Guide STIG &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/security-technical-implementation-guide-stig/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:48:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Security Technical Implementation Guide STIG &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>eBook: Making Your Move to the Commercial Cloud</title>
		<link>https://www.steelcloud.com/ebook-making-your-move-to-the-commercial-cloud/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 24 Oct 2023 11:05:43 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cloud migration]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[commercial cloud]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86858</guid>

					<description><![CDATA[Increase your preparedness with continuous security monitoring and remediation. There are five reasons people are moving to the Cloud. SteelCloud focuses on “Preparedness”, helping customers move securely to the Cloud, implementing continuous STIG and CIS security monitoring, and increasing baseline security and consistency while significantly reducing time and effort. Our patented ConfigOS automation software makes ...]]></description>
		
		
		
			</item>
		<item>
		<title>eBook: Securing Operational Technology in Highly Regulated Industries</title>
		<link>https://www.steelcloud.com/ebook-securing-operational-technology-in-highly-regulated-industries/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 17 Oct 2023 14:18:10 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cyber ready workforce]]></category>
		<category><![CDATA[cybersecurity workforce]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87646</guid>

					<description><![CDATA[Best practices for securing Operational Technology and Industrial Control Systems In this free eBook you will learn how to deploy a holistic approach to STIG and CIS alignment where a coordinated effort managing OT and IT makes sense. ConfigOS automation identifies vulnerabilities, mitigates control issues, streamlines compliance, improves ATO accuracy and speed, and maintains a secure baseline ...]]></description>
		
		
		
			</item>
		<item>
		<title>eBook: How to Beat the Cyberworkforce Shortage</title>
		<link>https://www.steelcloud.com/ebook-how-to-beat-the-cyberworkforce-shortage/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 02 Oct 2023 13:24:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cyber ready workforce]]></category>
		<category><![CDATA[cybersecurity workforce]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87418</guid>

					<description><![CDATA[Rethinking employment strategies to beat the Cyberworkforce shortage. Eliminate manhour shortages in your compliance effort. Whether you’re trying to achieve STIG, CIS, CMMC or eMASS alignment or compliance, everyone encounters the same roadblocks—shortages of time, money and, especially, manhours. This eBook addresses the strategies to overcome these challenges, despite a workforce shortage and the rising cost ...]]></description>
		
		
		
			</item>
		<item>
		<title>DEMO Video: Achieve Continuous Compliance at Scale with ConfigOS MPO</title>
		<link>https://www.steelcloud.com/video-configos-mpo-demo/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 24 Apr 2023 18:04:53 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Compliance at Scale]]></category>
		<category><![CDATA[ConfigOS MPO]]></category>
		<category><![CDATA[Continuous Compliance]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[MPO]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[STIG]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88390</guid>

					<description><![CDATA[Achieve Continuous Compliance at Scale with ConfigOS MPO SteelCloud’s NEW ConfigOS MPO (Master Policy Object) software’s advanced multi-tier architecture is specifically designed to ensure continual compliance for remote and transient endpoints. Compliance activities are performed locally by MPO’s lightweight agents. ConfigOS MPO tracks what endpoints are on/off the network while ensuring each has the appropriate ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/XI8IFzAzFJo" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/XI8IFzAzFJo" />
			<media:title type="plain">ConfigOS MPO Demo</media:title>
			<media:description type="html"><![CDATA[SteelCloud’s ConfigOS MPO (Master Policy Object) software’s advanced multi-tier architecture is specifically designed to ensure continual compliance for remo...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/configos-mpo-demo-1.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>SBOM: Rebuild Security Compliance with Automation</title>
		<link>https://www.steelcloud.com/sbom-rebuild-security-compliance-with-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 21 Nov 2022 15:25:53 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[endpoint security software]]></category>
		<category><![CDATA[hardening environment]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[system level control]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87696</guid>

					<description><![CDATA[Understanding SBOM “Software Bill of Materials” and lower-level controls. Throughout the government, several initiatives are underway to support the presidential Executive Order on Improving the Nation’s Cybersecurity issued in May 2021. This order includes implementing a zero-trust framework and providing greater visibility into application vulnerabilities through a Software Bill of Materials (SBOM) that identifies third-party and open-source components in the codebase.  ...]]></description>
		
		
		
			</item>
		<item>
		<title>eBook: CMMC Compliance: What the NIST?</title>
		<link>https://www.steelcloud.com/ebook-cmmc-compliance-what-the-nist/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 17 Aug 2022 20:09:58 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[eBooks]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[cmmc compliance]]></category>
		<category><![CDATA[commercial cloud]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity maturity model certification]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[nist 800-171]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87223</guid>

					<description><![CDATA[CMMC compliance means going back to the future with NIST In this eBook, readers will learn about the Cybersecurity Maturity Model Certification CMMC program in this eBook. They will illustrate the revisions, updates, and organizational shifts to simplify the process and understanding of achieving and maintaining a &#8220;cyber security framework.&#8221; SteelCloud focuses on &#8220;Preparedness&#8221; and will ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Breaking Down CUI and its Impact on the DIB</title>
		<link>https://www.steelcloud.com/interview-breaking-down-cui-and-its-impact-on-the-dib/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Thu, 04 Aug 2022 16:54:43 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Classified unclassified information]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[Federal Contractor]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87137</guid>

					<description><![CDATA[CUI isn&#8217;t being changed with CMMC 2.0, but DoD&#8217;s enforcement of NIST 800-171 requirements is changing. DoD introduced a lower assurance requirement for contracts deemed not to involve information critical to national security. So, If you are a consultant, system integrator, or member of the defense industrial base, you have probably been thinking a lot ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Making Policy Compliance Work for You &#8211; CIS Benchmarks</title>
		<link>https://www.steelcloud.com/interview-making-policy-compliance-work-for-you-cis-benchmarks/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 27 Jun 2022 16:57:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cis controls]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86890</guid>

					<description><![CDATA[How the CIS Benchmarks and the DISA STIGs come together to form the bedrock principle for policy compliance. What is the best way to manage and configure for best security affect to support the mission and operation? In this CyberSecurity TV episode, Tony Sager, Sr VP Center for Internet Security (CIS), and Brian Hajost, SteelCloud ...]]></description>
		
		
		
		<media:content url="https://www.youtube.com/embed/3aE5JjKUVIs" medium="video" width="1280" height="720">
			<media:player url="https://www.youtube.com/embed/3aE5JjKUVIs" />
			<media:title type="plain">Making Policy Compliance Work for You - CIS Benchmarks &amp; DISA STIGs</media:title>
			<media:description type="html"><![CDATA[In this CyberSecurity TV episode, Tony Sager, Sr VP  Center for Internet Security (CIS),  and Brian Hajost, SteelCloud Founder and COO, discuss making policy...]]></media:description>
			<media:thumbnail url="https://www.steelcloud.com/wp-content/uploads/making-policy-compliance-work-fo.jpg" />
			<media:rating scheme="urn:simple">nonadult</media:rating>
		</media:content>
	</item>
		<item>
		<title>Interview: Cloud Migration &#8211; Preparing to Move to the Commercial Cloud</title>
		<link>https://www.steelcloud.com/interview-cloud-migration-preparing-to-move-to-the-commercial-cloud/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 23 May 2022 14:41:13 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[cloud migration]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[commercial cloud]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[system level control]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86752</guid>

					<description><![CDATA[The “how-to” prepare and deliver speed and security for operational capabilities for the commercial cloud explained. In this CyberSecurity TV episode, Maria C. Horton, CISSP-ISSMP, IAM FedRAMP Program Manager/Director, and Brian Hajost, SteelCloud Founder and COO, discuss preparing for migration to the commercial Cloud. Cloud means different things to different people. Cloud is a force ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Zero Trust and How to Protect the Crown Jewels</title>
		<link>https://www.steelcloud.com/interview-zero-trust-and-how-to-protect-the-crown-jewels/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 14 Feb 2022 15:19:24 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[system level control]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83019</guid>

					<description><![CDATA[Zero Trust: Do you build a higher fence or wider moat? In this CyberSecurity TV episode, Glen Hernandez, Captain, U.S. Coast Guard (Retired), Former U.S. Coast Guard CISO Chair, AFCEA Zero Trust Strategies Subcommittee, and Brian Hajost, SteelCloud Founder and COO, discuss Zero Trust and how it differs from the traditional cybersecurity practices. Zero Trust ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
