Source |
CSO |
Identifiant |
6665009 |
Date de publication |
2022-09-01 06:15:00 (vue: 2022-09-01 14:05:48) |
Titre |
BrandPost: How to Meet STIG Compliance and Achieve OS Security |
Texte |
Organizations tasked with meeting regulatory framework compliance know (at least some of) the difficulties they will face along their compliance journeys. On top of the resource hours, for instance, it can be costly to ensure compliance.Public sector organizations as well as their contractors and consultants understand the importance of Defense Information Security Agency Security Technical Implementation Guide, or "DISA STIG," compliance. These configuration standards apply to DoD Information Assurance (IA) and IA-enabled devices/systems.The Center for Internet Security (CIS) builds CIS Benchmarks and CIS Hardened Images mapped to these guides to more easily assist with DISA STIG compliance.To read this article in full, please click here |
Envoyé |
Oui |
Condensat |
achieve agency along apply article assist assurance benchmarks brandpost: builds can center cis click compliance configuration consultants contractors costly defense devices/systems difficulties disa dod easily enabled ensure face framework full guide guides hardened here hours how images implementation importance information instance internet journeys know least mapped meet meeting more organizations please public read regulatory resource sector security some standards stig tasked technical these top understand well will |
Tags |
|
Stories |
|
Notes |
|
Move |
|