<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>SRG &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/srg/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:41:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>SRG &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NIST 800-53 Rev. 5: Outcome-based vs. Impact-based Controls</title>
		<link>https://www.steelcloud.com/nist-800-53-rev-5-outcome-based-vs-impact-based-controls/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 18:01:18 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST 800-53 Rev 5]]></category>
		<category><![CDATA[NIST 800-53 Rev 5 Control Families]]></category>
		<category><![CDATA[NIST 800-53 Rev 5 RMF]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[SRG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[STIG tools]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80902</guid>

					<description><![CDATA[NIST 800-53 Rev. 5: Outcome-based vs. Impact-based Controls The standards set in NIST 800-53 can significantly impact your organization and how operations are conducted. These impacts are especially true when you have worked to be compliant with Rev. 4 of 800-53 and now must comply with Rev. 5. Below we will go over some key ...]]></description>
		
		
		
			</item>
		<item>
		<title>Creating Checklists from Scan Results, Why it Matters</title>
		<link>https://www.steelcloud.com/creating-checklists-from-scan-results-why-it-matters/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:13:30 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Checklists]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[open scap]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[SRG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[STIG tools]]></category>
		<category><![CDATA[STIG viewer]]></category>
		<category><![CDATA[XCCDF output]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80758</guid>

					<description><![CDATA[By Brian Walker Why are Checklists from scan reports so important? One of the coolest features in the ConfigOS tool suite is filling out a checklist. The typical way this is done is when customers work off an existing checklists per STIG that they want to apply. These checklists contain critical information such as manual ...]]></description>
		
		
		
			</item>
		<item>
		<title>How to reduce compliance man-hour expenditures by over 70% with the best cybersecurity toolkit</title>
		<link>https://www.steelcloud.com/how-to-reduce-annual-compliance-man-hour-expenditures-by-over-70-with-the-best-cybersecurity-toolkit/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 18:51:19 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[SRG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[STIG for Dummies]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[STIG tools]]></category>
		<category><![CDATA[STIG viewer]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80436</guid>

					<description><![CDATA[By Nigel Hughes Having well thought out cybersecurity toolkit can alleviate all sorts of woes and help you win more contracts. The work of a government system integrator has never been more competitive. To win contracts, you need to demonstrate superior speed, innovation, and cost-effectiveness. To differentiate, you also need to utilize your resources effectively ...]]></description>
		
		
		
			</item>
		<item>
		<title>3 Tips for Tackling STIGs</title>
		<link>https://www.steelcloud.com/3-tips-for-tackling-stigs/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 19:10:30 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[SRG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[STIG for Dummies]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[STIG tools]]></category>
		<category><![CDATA[STIG viewer]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80372</guid>

					<description><![CDATA[By Brian Walker As SteelCloud’s Director of Product Management and Customer Support, I field daily inquiries from our clients related to Security Technical Implementation Guides (STIGs). My 3 tips for tackling STIGs will help reduce the complexity around the topic of STIGS, which are filled with many fine details and continually changing requirements. Whether you ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
