<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>system level control &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/system-level-control/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:48:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>system level control &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SBOM: Rebuild Security Compliance with Automation</title>
		<link>https://www.steelcloud.com/sbom-rebuild-security-compliance-with-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 21 Nov 2022 15:25:53 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[compliance automation]]></category>
		<category><![CDATA[endpoint security software]]></category>
		<category><![CDATA[hardening environment]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[system level control]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87696</guid>

					<description><![CDATA[Understanding SBOM “Software Bill of Materials” and lower-level controls. Throughout the government, several initiatives are underway to support the presidential Executive Order on Improving the Nation’s Cybersecurity issued in May 2021. This order includes implementing a zero-trust framework and providing greater visibility into application vulnerabilities through a Software Bill of Materials (SBOM) that identifies third-party and open-source components in the codebase.  ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Cloud Migration &#8211; Preparing to Move to the Commercial Cloud</title>
		<link>https://www.steelcloud.com/interview-cloud-migration-preparing-to-move-to-the-commercial-cloud/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 23 May 2022 14:41:13 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[cloud migration]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[commercial cloud]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[system level control]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=86752</guid>

					<description><![CDATA[The “how-to” prepare and deliver speed and security for operational capabilities for the commercial cloud explained. In this CyberSecurity TV episode, Maria C. Horton, CISSP-ISSMP, IAM FedRAMP Program Manager/Director, and Brian Hajost, SteelCloud Founder and COO, discuss preparing for migration to the commercial Cloud. Cloud means different things to different people. Cloud is a force ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Zero Trust and How to Protect the Crown Jewels</title>
		<link>https://www.steelcloud.com/interview-zero-trust-and-how-to-protect-the-crown-jewels/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 14 Feb 2022 15:19:24 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[system level control]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83019</guid>

					<description><![CDATA[Zero Trust: Do you build a higher fence or wider moat? In this CyberSecurity TV episode, Glen Hernandez, Captain, U.S. Coast Guard (Retired), Former U.S. Coast Guard CISO Chair, AFCEA Zero Trust Strategies Subcommittee, and Brian Hajost, SteelCloud Founder and COO, discuss Zero Trust and how it differs from the traditional cybersecurity practices. Zero Trust ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Compliance Risk Mitigation and Risk Optimization at Scale</title>
		<link>https://www.steelcloud.com/interview-compliance-risk-mitigation-and-risk-optimization-at-scale/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 26 Jan 2022 16:52:56 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[system level control]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82948</guid>

					<description><![CDATA[Keep your inbox empty (compliance) while managing compliance risk mitigation and risk optimization to scale effectively with automation. In this CyberSecurity TV episode, Terry Roberts Founder and  CEO, White Hawk Inc. and Brian Hajost, SteelCloud Founder and COO, discuss risk mitigation and risk optimization with automation to scale effectiveness. Cybersecurity for computer networks and systems ...]]></description>
		
		
		
			</item>
		<item>
		<title>Interview: Anchors Away: Maritime Cybersecurity Voyage</title>
		<link>https://www.steelcloud.com/interview-anchors-away-maritime-cybersecurity-voyage/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Fri, 17 Dec 2021 18:08:05 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Asset Security]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Authority To Operate]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CMMC 2.0]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[Maritime cybersecurity]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[Risk Management Frame]]></category>
		<category><![CDATA[RMF]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[Security Technical Implementation Guide STIG]]></category>
		<category><![CDATA[system level control]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82825</guid>

					<description><![CDATA[The Maritime Cybersecurity  voyage starts with best system level practices In this CyberSecurity TV interview, Brian Hajost, SteelCloud COO, and guest Dan Turissini (CMMC Registered Practitioner)  and Dave Gardy focuses on  the Maritime industry and what steps they are taking to adopt a cybersecurity structure regiment. Did you know that currently ,there are no mandates ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
