![]() Out-of-the box software, servers and devices need to be configured to lower the risk to the wider network. ![]() STIG requirements make commercially available operating systems, devices and servers as secure as possible. Government systems will use a range of off-the-shelf software, servers, and network devices. This is to maintain security of the systems and prevent breaches or cybersecurity incidents. Requirements cover all areas of device or software configuration to achieve secure integration. STIG requirements are comprehensive, and include mobile devices, operating systems, cloud networks, and applications. There are hundreds of different STIG requirements covering a range of products, software versions, and operating systems.
0 Comments
Leave a Reply. |