![]() STIGs also describe maintenance processes such as software updates and vulnerability patching.Īdvanced STIGs might cover the design of a corporate network, covering configurations of routers, databases, firewalls, domain name servers and switches. A STIG describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system, either physically at the machine or over a network. Select a type of Permission Level, and then click Share button. Go to Choose people to share with to select the user or group, and then click Add. When I downloaded the STIGViewer I was not able to. Most operating systems are not inherently secure, which leaves them open to criminals such as identity thieves and computer hackers. STIG Viewer 2.9 Doesnt Open on Windows 10 FIRST ensure you have the latest Java Runtime Environment installed on your machine. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities.Įxamples where STIGs would be of benefit is in the configuration of a desktop computer or an enterprise server. The use of STIGs enables a methodology for securing protocols within networks, servers, computers, and logical designs to enhance overall security. A Security Technical Implementation Guide ( STIG) is a configuration standard consisting of cybersecurity requirements for a specific product.
0 Comments
Leave a Reply. |