|
- Security Technical Implementation Guides (STIGs) - DoD Cyber Exchange
This site contains the Security Technical Implementation Guides and Security Requirements Guides for the Department of Defense (DOD) information technology systems as mandated by DODI 8500 01 This guidance bridges the gap between the National Institute of Standards and Technology Special Publication 800-53 and risk management framework (RMF)
- Hardening Information — Implementing a Zero Trust Architecture . . . - NIST
Security Technical Implementation Guides (STIGs) are security configuration standards from the Defense Information Systems Agency (DISA) They contain technical guidelines on how to harden information systems
- Beyond the STIG: What hardening really means - Red Hat
Hardening helps prevent unauthorized or unintentional system changes that could have detrimental effects if not properly controlled The practice of hardening can also help reduce the number of active services on the system, limiting other attack or exploit vectors
- DISA STIGs | Hardening Guidance | Steel Rail Security, LLC
Our comprehensive hardening guides are meticulously crafted to meet rigorous federal cybersecurity standards
- STIG hardening recommendations - Mirantis
The guides include recommended administrative processes to reduce exploitation possibility STIG scanning software is used to implement and validate proper configuration Verify that your Linux host comply with the STIG recommendations For example: The system must not permit interactive boot
- Enabling extra OS STIG hardening on a primary or a media server . . .
You can enable extra OS STIG hardening for increased security The additional rules add protection to the sshd process and enforce stricter password policies Note the following about enabling extra OS STIG hardening:
- DISA STIG compliance explained - Titania
STIG compliance is needed for products or IT services to operate on DoD networks and systems Each STIG assesses the product against DoD cybersecurity requirements In many cases, DISA will work with the vendor to develop a STIG and ensure the product is compliant with DoD requirements
- SLES 15 SP7 | Security and Hardening Guide | Hardening SUSE Linux . . .
When a Security Technical Implementation Guide is implemented for a system, the system is hardened The goals are to minimize attacks and to prevent system access (both physically and via a network) and to define processes for maintenance (applying software updates) and vulnerability patching
|
|
|