Jump to content

Security Technical Implementation Guide

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 70.62.125.134 (talk) at 18:58, 20 August 2015. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A Security Technical Implementation Guide or STIG is a methodology for standardized secure installation and maintenance of computer software and hardware. These guides when implemented 'lockdown' common and typically permissive software to further reduce vulnerabilities. The term was coined in 1998 by DISA which creates configuration documents in support of the United States Department of Defense (DoD). The implementation guidelines include recommended administrative processes and span the devices' lifecycle. STIG scanning software is used to implement / validate proper configuration.

An example where STIGs would be of benefit is in the configuration of a desktop computer. Most operating systems are not inherently secure.[citation needed] This leaves them open to criminals such as identity thieves and computer hackers. A STIG describes how to minimize network-based attacks and preventing system access when the attacker is interfacing with the system, either physically at the machine, or over a network. STIGs also describe maintenance processes, such as software updates and vulnerability patching.

Advanced STIGs might cover the design of a corporate network, covering configurations of routers, firewalls, domain name servers and switches.

Resources

Tools

See also