Security Technical Implementation Guide

A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs that enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities.

An example where STIGs would be of benefit is in the configuration of a desktop computer. Most operating systems are not inherently secure.[1] This leaves them open to criminals such as identity thieves and computer hackers. A STIG describes how to minimize network-based attacks and preventing system access when the attacker is interfacing with the system, either physically at the machine, or over a network. STIGs also describe maintenance processes, such as software updates and vulnerability patching.

Advanced STIGs might cover the design of a corporate network, covering configurations of routers, firewalls, domain name servers and switches.

References

External links

Resources

Tools

See also

This article is issued from Wikipedia - version of the 6/16/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.