From CISO Marketplace — the hub for security professionals Visit

STIG

Data Protection

Definition

Configuration standards for securing hardware and software systems.

Technical Details

STIG, or Security Technical Implementation Guide, is a standardized set of guidelines developed by the U.S. Department of Defense (DoD) to ensure that systems and applications are securely configured. These guidelines provide detailed technical instructions and best practices for securing hardware and software systems against vulnerabilities. STIGs cover a wide range of technology, including operating systems, databases, network devices, and applications, and they are designed to be used in conjunction with risk management frameworks. Each STIG document outlines specific security controls, assessment procedures, and remediation steps that should be implemented to achieve compliance and secure the system effectively.

Practical Usage

STIGs are widely used in the federal government and military environments to ensure that all systems meet a baseline level of security. Organizations implement STIGs as part of their overall cybersecurity strategy to assess, secure, and maintain their systems. This process typically involves conducting regular audits using automated tools that can check compliance against the STIG benchmarks. By following STIG guidelines, organizations can reduce their security vulnerabilities, enhance their incident response capabilities, and demonstrate compliance with regulatory requirements. In addition, STIGs often serve as a foundation for developing security policies and procedures within an organization.

Examples

Related Terms

CIS Controls NIST SP 800-53 Risk Management Framework (RMF) Vulnerability Assessment Configuration Management
← Back to Glossary