skip to Main Content
Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
Article
Collateral
Events
Homepage
Press Release
Uncategorized
Video
Webinar
Contact:
  • Content Types

    category
    Loading....
  • Content Types

  • Topics

  • The Case for Revolutionizing STIG Policy Automation

    STIG policy automation will significantly enhance systems availability through improved compliance and better leverage resources

    The Department of Defense (DoD) protects its 15,000 networks by defining, implementing, and auditing “best
    practices” for installation and maintenance of its information technology resources. The Defense Information
    Systems Agency (DISA) develops and publishes policy, in the form of the Security Technical Information Guides
    (STIGs). While significant advances have been made in the areas of threat definition and vulnerability assessment,
    little progress has been made in automating the arduous tasks of creating and maintaining STIG policy execution on
    all of the thousands of servers operated in the DoD

    Click the PDS below to better know why Disa STIGS are a good thing and and how STIG Policy is being revolutionized through automation.

    Download PDF

    Share This: