• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

implementation

Implementation of security controls resources part 1

March 3, 2021 by Leave a Comment

What do you use to implement security controls?
First of all, implementation of security controls means to put security on your server, workstations or other information systems. The best guidance is where ever you can get it from. Your organization may provide resources to you. This could be process and procedures. You can also use security implementation guides https://public.cyber.mil/stigs/
But probably the best and most comprehensive source of implementation guidance is from the vendor of the system or OS you are using. For Cisco router security implementation they have guidance on Cisco.com (for example). Cisco probably won’t call them “security controls” but if you know you need to update the IOS, you would search their site for how to update the IOS and what is the most current IOS for your internetwork device.

Filed Under: diarmf - implement, STIGS Tagged With: implementation, rmf implementation, stigs

STIG Update – Quarterly release: SRG-STIG_Library.zip

November 1, 2016 by Bruce Brown Leave a Comment

DISA has released updates to the SRG/STIG Library Compilations in .ZIP format to correspond with the latest quarterly SRG/STIG update cycle. This release also includes newly released SRGs and STIGs published since the last quarterly release of the SRG/STIG Library Compilations.

The SRG/STIG_Library.zip is a compilation of DoD Security Requirements Guides (SRGs), DoD Security Technical Implementation Guides (STIGs) ( provided in XCCDF or .pdf format), Checklists, Security Readiness Review (SRR) Tools that are available through the IASE web site’s STIG pages.

Two versions of the compilation are produced, an FOUO version and a NON-FOUO version entitled U_SRG-STIG_Library.zip and FOUO_SRG-STIG_Library.zip. The file name preceded by FOUO_ contains STIGs and related content that has been designated as FOUO. As such a DoD PKI certificate is required to download it. The file name preceded by U_ is the NON-FOUO version which does not contain FOUO. It is therefore downloadable by the general public. These compilations may be used and distributed in the same manner as the individually downloaded documents. The FOUO compilation as a whole and any separated FOUO content must be handled in accordance with customary FOUO handling and dissemination guidelines.

Please see “SRG/STIG Library Compilation READ ME” for additional information to include include download / extraction instructions and a FAQ.

All related files are available on IASE at: http://iase.disa.mil/stigs/compilations/Pages/index.aspx

Filed Under: diarmf - implement, STIGS Tagged With: diarmf - implement, implementation, STIG, stigs

STIG Update – Announcement of the Draft BIND 9.X Security Technical Implementation Guide (STIG) Version 1

September 15, 2016 by Bruce Brown Leave a Comment

STIG Update – Announcement of the Draft BIND 9.X Security Technical Implementation Guide (STIG) Version 1


DoD has developed the Draft BIND 9.X Security Technical Implementation Guide (STIG) Version 1.  This STIG is available on the NIPRNET at http://iase.disa.mil/stigs/net_perimeter/network-other/Pages/index.aspx for review and comment.

Please provide comments, recommended changes, and/or additions to the draft STIG by 30 September 2016 on the Comment Matrix spreadsheet.  Comments should be sent via NIPRNet email to:  disa.stig_spt@mail.mil with the title and version of the STIG in the subject line.

Filed Under: diarmf - implement, STIGS Tagged With: BIND, implementation, STIG

STIG Update – DISA has released the BlackBerry OS 10.3.x STIG Version 1

March 21, 2016 by Bruce Brown Leave a Comment

DISA has released the BlackBerry OS 10.3.x STIG Version 1. The requirements of the STIG become effective immediately.  The STIG is available at http://iase.disa.mil/stigs/mobility/Pages/smartphone.aspx.


For all STIG related questions, please contact the DISA STIG Customer Support Desk: disa.stig_spt@mail.mil


Update your subscriptions, modify your password or e-mail address, or stop subscriptions at any time on your Subscriber Preferences Page. You will need to use your email address to log in. If you have questions or problems with the subscription service, please visitsubscriberhelp.govdelivery.com. All other inquiries can be directed to subscriptions@disa.mil.

 


 

GovDelivery, Inc. sending on behalf of the Defense Information Systems Agency (DISA) · 408 St. Peter Street, Suite 600 · St. Paul, MN 55102 · 1-800-439-1420

Filed Under: diarmf - implement, STIGS Tagged With: implementation, STIG

IBM DataPower STIG Version 1

February 15, 2016 by Bruce Brown Leave a Comment

DISA has released the IBM DataPower STIG Version 1. The requirements of the STIG become effective immediately.  The STIG is available athttp://iase.disa.mil/stigs/net_perimeter/network-infrastructure/Pages/other.aspx.

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs Tagged With: datapower, disa, ibm, implementation, stigs

DISA Draft Tanium STIGs

December 29, 2015 by Bruce Brown Leave a Comment

DISA has developed the Draft Tanium 6.5 Security Technical Implementation Guides (STIGs)

The Draft STIG is available at: http://iase.disa.mil/stigs/app-security/app-servers/Pages/index.aspx for review and comment.

Please provide comments, recommended changes, and/or additions to the draft STIG by 20 January 2016 on the Comment Matrix spreadsheet, and send comments via NIPRNet email to:  disa.stig_spt@mail.mil.  Include the title and version of the STIGs in the subject line of your email.

Filed Under: diarmf - implement, STIGS Tagged With: disa, implementation, niprnet, STIG, Tanium

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Primary Sidebar

search

Learn to Make 6 Figures in CyberSecurity

Cyber Security How to make up to 6 Figures
6 figures in Cyber Security

This course explains how I have been able to consistently make 6 figures doing cyber security. There is a method that I have used during my development in cyber security. I am presenting that method to you.

View Course

Teleworking - IT Remote Work
Teleworking – IT Remote Work

Teleworking is something I have been doing for the last 5 years. This is how I did it.

Find Teleworking IT Jobs

View Course

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Implementation of security controls resources part 1
  • Convocourses Podcast: course update continuous monitoring and other issues
  • Convocourses Podcast: RMF Course Updates New & NIST-53a
  • ConvoCourses Podcast: Get Into IT from other fields
  • convocourses podcast: RMF Course Updates New NIST 800-53

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert
  • Disa Help Desk | VinHomesData.com on STIG Update – DISA has released the Oracle Java Runtime Environment (JRE) 8 STIG Version 1
  • Bruce Brown on DIARMF – Continuous Monitoring
  • dpresbit on DIARMF – Continuous Monitoring

Tags

8140 8570 ArcSight c&a CISSP colorado cyber cybersecurity cyber security denver DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce HBSS IA implement implementation info assurance information assurance information security ISSO job jobs Linux mcafee nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security SIEM STIG stigs unix VMWare windows

Copyright © 2021 · Author Pro on Genesis Framework · WordPress · Log in