www.lakeridge.us Open in urlscan Pro
2600:1f18:16e:df02::64  Public Scan

Submitted URL: https://lakeridge.us/using-stigs-to-secure-your-systems
Effective URL: https://www.lakeridge.us/using-stigs-to-secure-your-systems
Submission: On December 28 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c

<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&amp;id=2ee620784c" method="POST" id="join-our-newsletter">
  <input type="hidden" name="LEADSOURCE" value="Use DISA STIGs to Secure Your IT Systems">
  <div class="form-group row">
    <label for="first_name">Name*</label>
    <input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
  </div>
  <div class="form-group row">
    <label for="email">Email*</label>
    <input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
  </div>
  <div class="form-group row">
    <label for="company">Company*</label>
    <input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
  </div>
  <div class="form-group row mt-3">
    <div class="d-grid">
      <input class="btn btn-primary" type="submit" value="Submit">
    </div>
  </div>
</form>

POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c

<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&amp;id=2ee620784c" method="POST" id="join-our-newsletter-blog">
  <input type="hidden" name="LEADSOURCE" value="Use DISA STIGs to Secure Your IT Systems">
  <div class="form-group row">
    <label for="first_name">Name*</label>
    <input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
  </div>
  <div class="form-group row">
    <label for="email">Email*</label>
    <input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
  </div>
  <div class="form-group row">
    <label for="company">Company*</label>
    <input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
  </div>
  <div class="form-group row mt-3">
    <div class="d-grid">
      <input class="btn btn-primary" type="submit" value="Submit">
    </div>
  </div>
</form>

Text Content

JOIN OUR NEWSLETTER

Name*
Email*
Company*

 * Compliance Solutions
   
   NIST SP 800-171 & CMMC COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with NIST SP 800-171 and CMMC requirements.
   
   Learn More
   
   HIPAA COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with HIPAA security rule requirements.
   
   Learn More
   
   FAR 52.204-21 COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information
   Systems requirements.
   
   Learn More
   
   ISO 27001 COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with ISO 27001 requirements.
   
   Learn More
 * About
 * Contact

Login Book a Call




USE DISA STIGS TO SECURE YOUR IT SYSTEMS

The Defense Information Systems Agency (DISA) has a wide range of security
technical implementation guides (STIGS) company’s can leverage to secure their
IT systems.

--------------------------------------------------------------------------------

 * email
 * facebook
 * twitter
 * reddit

Join Our Newsletter
Join our newsletter:
Name*
Email*
Company*



WHAT ARE DISA STIGS?

STIGS or security technical implementation guides are system configuration
recommendations for applications, network devices, workstations, servers, and
even printers. Most systems and applications are insecure with their default
settings. As a result, they are plagued with a large number of vulnerabilities.
DISA STIGS provide specific guidance on how to remediate these common
vulnerabilities.


WHERE CAN I GET DISA STIGS?

You can download DISA STIGS from the DoD Cyber Exchange.
To view the STIG XML files you will need to use the STIG Viewer. The STIG Viewer
can also be downloaded from the DoD Cyber Exchange.
To view your STIGs you simply import the XML file that came with the STIG you
downloaded into STIG Viewer. You will then be able to view your STIGS in STIG
Viewer.




HOW DO I APPLY DISA STIGS TO MY SYSTEMS?

If you want to use STIGs to secure your windows based systems then use group
policy. To do so you will need to download the relevant admin or ADMX files and
upload them to group policy. You can find the ADMX files for a wide range of
apps and operating systems via Google. From there you apply the settings shown
in the STIG Viewer to the group policy object(s) you created. Then deploy the
group policy objects to your windows systems.
For non-Windows systems such as printers, routers, and other network devices you
will generally have to apply the STIGS manually. Please note that if you have
several of the same devices in your environment you might be able to apply STIGS
to one of them and apply the same configuration file to the others. If you use
Linux servers I would recommend creating a baseline image with the DISA STIGS
applied. Use this secure image when deploying Linux servers.


DISA STIGS AND CYBERSECURITY COMPLIANCE

Most cybersecurity frameworks such as the NIST Cybersecurity Framework, the
cybersecurity maturity model certification (CMMC) framework, and the CIS
security control framework require the creation of secure baseline
configurations for your systems. DISA STIGs allow you to accomplish this. They
also include settings on log collection, the use of outdated protocols, and
encryption enforcement. All of these settings support your cybersecurity
compliance initiatives.


NEED HELP DEPLOYING DISA STIGS?

Our cybersecurity team can secure your systems using DISA STIGS. If you would
like to benefit from our experience and work with us please send us a message at
info[@]lakeridge.us.
 

Quick & Simple


DISCOVER OUR CYBERSECURITY COMPLIANCE SOLUTIONS:

Whether you need to meet and maintain your compliance requirements, help your
clients meet them, or verify supplier compliance we have the expertise and
solution for you


NIST SP 800-171 & CMMC COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
NIST SP 800-171 and CMMC requirements.
Learn More


HIPAA COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
HIPAA security rule requirements.
Learn More


FAR 52.204-21 COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
requirements.
Learn More


ISO 27001 COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
ISO 27001 requirements.
Learn More
 



CYBERSECURITY COMPLIANCE
QUICK. SIMPLE. AFFORDABLE.
GET STARTED TODAY

Book a Discovery Call
 * 
 * 
 * 
 * 

PRODUCT

 * Login
 * Register
 * Forgotten password
 * NIST SP 800-171 & CMMC Compliance
 * HIPAA Compliance
 * FAR 52.204-21 Compliance
 * ISO 27001 Compliance

COMPANY

 * About us
 * Join our team
 * Affiliate Program
 * Contact us

RESOURCES

 * Our blog
 * HIPAA Handbook
 * NIST SP 800-171 & CMMC 2.0 Handbook
 * CMMC 1.0 Handbook

LEGALS

 * Privacy policy
 * Terms & conditions
 * Security
 * Sitemap

All rights reserved © Lake Ridge Technologies 2023