• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

implementation

Implementation of security controls resources part 2

October 12, 2021 by Bruce Brown Leave a Comment

Many more videos on https://www.youtube.com/convocoursesshort videos at https://www.tiktok.com/@convocourses?lang=enand https://www.instagram.com/convocourseqs/https://www.facebook.com/ConvoCourses-108091850619388Podcast version of the content:https://podcasts.apple.com/us/podcast/convocourses/id1500188278http://www.nist80037rmf.com/google_podcast

Filed Under: Risk Management For DoD IT Tagged With: implementation, Implementation of security controls resources part 2, security controls

Implementation of security controls resources part 1

October 8, 2021 by Bruce Brown Leave a Comment

Many more videos on https://www.youtube.com/convocoursesshort videos at https://www.tiktok.com/@convocourses?lang=enand https://www.instagram.com/convocourseqs/https://www.facebook.com/ConvoCourses-108091850619388Podcast version of the content:https://podcasts.apple.com/us/podcast/convocourses/id1500188278http://www.nist80037rmf.com/google_podcast

Filed Under: Risk Management For DoD IT Tagged With: implementation, Implementation of security controls resources part 1, security controls resources part

Implementation of security controls resources part 1

March 3, 2021 by cyberaware2 Leave a Comment

What do you use to implement security controls?
First of all, implementation of security controls means to put security on your server, workstations or other information systems. The best guidance is where ever you can get it from. Your organization may provide resources to you. This could be process and procedures. You can also use security implementation guides https://public.cyber.mil/stigs/
But probably the best and most comprehensive source of implementation guidance is from the vendor of the system or OS you are using. For Cisco router security implementation they have guidance on Cisco.com (for example). Cisco probably won’t call them “security controls” but if you know you need to update the IOS, you would search their site for how to update the IOS and what is the most current IOS for your internetwork device.

Filed Under: diarmf - implement, STIGS Tagged With: implementation, rmf implementation, stigs

STIG Update – Quarterly release: SRG-STIG_Library.zip

November 1, 2016 by Bruce Brown Leave a Comment

DISA has released updates to the SRG/STIG Library Compilations in .ZIP format to correspond with the latest quarterly SRG/STIG update cycle. This release also includes newly released SRGs and STIGs published since the last quarterly release of the SRG/STIG Library Compilations.

The SRG/STIG_Library.zip is a compilation of DoD Security Requirements Guides (SRGs), DoD Security Technical Implementation Guides (STIGs) ( provided in XCCDF or .pdf format), Checklists, Security Readiness Review (SRR) Tools that are available through the IASE web site’s STIG pages.

Two versions of the compilation are produced, an FOUO version and a NON-FOUO version entitled U_SRG-STIG_Library.zip and FOUO_SRG-STIG_Library.zip. The file name preceded by FOUO_ contains STIGs and related content that has been designated as FOUO. As such a DoD PKI certificate is required to download it. The file name preceded by U_ is the NON-FOUO version which does not contain FOUO. It is therefore downloadable by the general public. These compilations may be used and distributed in the same manner as the individually downloaded documents. The FOUO compilation as a whole and any separated FOUO content must be handled in accordance with customary FOUO handling and dissemination guidelines.

Please see “SRG/STIG Library Compilation READ ME” for additional information to include include download / extraction instructions and a FAQ.

All related files are available on IASE at: http://iase.disa.mil/stigs/compilations/Pages/index.aspx

Filed Under: diarmf - implement, STIGS Tagged With: diarmf - implement, implementation, STIG, stigs

STIG Update – Announcement of the Draft BIND 9.X Security Technical Implementation Guide (STIG) Version 1

September 15, 2016 by Bruce Brown Leave a Comment

STIG Update – Announcement of the Draft BIND 9.X Security Technical Implementation Guide (STIG) Version 1


DoD has developed the Draft BIND 9.X Security Technical Implementation Guide (STIG) Version 1.  This STIG is available on the NIPRNET at http://iase.disa.mil/stigs/net_perimeter/network-other/Pages/index.aspx for review and comment.

Please provide comments, recommended changes, and/or additions to the draft STIG by 30 September 2016 on the Comment Matrix spreadsheet.  Comments should be sent via NIPRNet email to:  disa.stig_spt@mail.mil with the title and version of the STIG in the subject line.

Filed Under: diarmf - implement, STIGS Tagged With: BIND, implementation, STIG

STIG Update – DISA has released the BlackBerry OS 10.3.x STIG Version 1

March 21, 2016 by Bruce Brown Leave a Comment

DISA has released the BlackBerry OS 10.3.x STIG Version 1. The requirements of the STIG become effective immediately.  The STIG is available at http://iase.disa.mil/stigs/mobility/Pages/smartphone.aspx.


For all STIG related questions, please contact the DISA STIG Customer Support Desk: disa.stig_spt@mail.mil


Update your subscriptions, modify your password or e-mail address, or stop subscriptions at any time on your Subscriber Preferences Page. You will need to use your email address to log in. If you have questions or problems with the subscription service, please visitsubscriberhelp.govdelivery.com. All other inquiries can be directed to subscriptions@disa.mil.

 


 

GovDelivery, Inc. sending on behalf of the Defense Information Systems Agency (DISA) · 408 St. Peter Street, Suite 600 · St. Paul, MN 55102 · 1-800-439-1420

Filed Under: diarmf - implement, STIGS Tagged With: implementation, STIG

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in