STIG policy automation will significantly enhance systems availability through improved compliance and better leverage resources
The Department of Defense (DoD) protects its 15,000 networks by defining, implementing, and auditing “best
practices” for installation and maintenance of its information technology resources. The Defense Information
Systems Agency (DISA) develops and publishes policy, in the form of the Security Technical Information Guides
(STIGs). While significant advances have been made in the areas of threat definition and vulnerability assessment,
little progress has been made in automating the arduous tasks of creating and maintaining STIG policy execution on
all of the thousands of servers operated in the DoD
Click the PDS below to better know why Disa STIGS are a good thing and and how STIG Policy is being revolutionized through automation.