AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Scap compliance checker v-735192/22/2024 Should that occur, administrators can request risk acceptance for the vulnerability in question so long as justification and details on other related mitigations are provided. STIGs are focused on system security, not necessarily availability, and some settings may break system functionality. STIG packages include a revision history, STIG checklists, and an executive summary document that explains key concepts related to the STIG.Īs with any new system update or implementation, ensure your backups are functioning, and systems are recoverable in the event a STIG item remediation causes a system failure. STIGs can be accessed at cyber.mil in a document library maintained by DISA.
0 Comments
Read More
Leave a Reply. |