STIGs, otherwise known as ‘Security Technical Implementation Guides’ are published by DISA (The Defense Information Systems Agency) and must be adhered to by any organization that is connecting to the US Department of Defense’s networks (DoD).

DISA is responsible for maintaining security standards for computer systems and networks which, for any reason, connect to the DoD. STIGs are usually published quarterly, and their purpose is to ensure all connecting organizations remain fully up-to-date and compliant. However, they can be updated at any time if a major threat or new bug has been discovered and it is the responsibility of the connecting organization to ensure compliancy.

The DoD’s security needs are far higher than manufacturers, who are typically focussed on ease of use. This means connecting organizations need to have a robust approach to checking and updating their networks’ security. A system which is deemed secure one month may be vulnerable by the next.

This is where automated configuration auditing tools such as Titania’s Nipper and Paws can be extremely useful. Not only do they save time and money through automating audits and ensuring compliance with STIGs is up to date, they also provide all of the reporting necessary in an audit trail to prove compliance.

Download your free trial and put Titania to the test

Download >

Nipper 
Accurate vulnerability audits to manage risk better.

Our accuracy lets you reduce false positives and negatives whilst providing detailed configuration audits of firewalls, switches and routers. You can strengthen and secure your vital network devices.

Try it now >       Find out more >

Paws
Intelligently validate your security and compliance.

Paws accurately analyses the build configurations of your workstations, laptops and servers against your industry standards to help you evidence compliance, prioritize fixes and secure your devices.

Try it now >        Find out more >