www.lakeridge.us
Open in
urlscan Pro
2600:1f18:16e:df02::64
Public Scan
Submitted URL: https://lakeridge.us/using-stigs-to-secure-your-systems
Effective URL: https://www.lakeridge.us/using-stigs-to-secure-your-systems
Submission: On December 28 via api from US — Scanned from US
Effective URL: https://www.lakeridge.us/using-stigs-to-secure-your-systems
Submission: On December 28 via api from US — Scanned from US
Form analysis
2 forms found in the DOMPOST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c
<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c" method="POST" id="join-our-newsletter">
<input type="hidden" name="LEADSOURCE" value="Use DISA STIGs to Secure Your IT Systems">
<div class="form-group row">
<label for="first_name">Name*</label>
<input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
</div>
<div class="form-group row">
<label for="email">Email*</label>
<input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
</div>
<div class="form-group row">
<label for="company">Company*</label>
<input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
</div>
<div class="form-group row mt-3">
<div class="d-grid">
<input class="btn btn-primary" type="submit" value="Submit">
</div>
</div>
</form>
POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c
<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c" method="POST" id="join-our-newsletter-blog">
<input type="hidden" name="LEADSOURCE" value="Use DISA STIGs to Secure Your IT Systems">
<div class="form-group row">
<label for="first_name">Name*</label>
<input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
</div>
<div class="form-group row">
<label for="email">Email*</label>
<input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
</div>
<div class="form-group row">
<label for="company">Company*</label>
<input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
</div>
<div class="form-group row mt-3">
<div class="d-grid">
<input class="btn btn-primary" type="submit" value="Submit">
</div>
</div>
</form>
Text Content
JOIN OUR NEWSLETTER Name* Email* Company* * Compliance Solutions NIST SP 800-171 & CMMC COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements. Learn More HIPAA COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements. Learn More FAR 52.204-21 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements. Learn More ISO 27001 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements. Learn More * About * Contact Login Book a Call USE DISA STIGS TO SECURE YOUR IT SYSTEMS The Defense Information Systems Agency (DISA) has a wide range of security technical implementation guides (STIGS) company’s can leverage to secure their IT systems. -------------------------------------------------------------------------------- * email * facebook * twitter * reddit Join Our Newsletter Join our newsletter: Name* Email* Company* WHAT ARE DISA STIGS? STIGS or security technical implementation guides are system configuration recommendations for applications, network devices, workstations, servers, and even printers. Most systems and applications are insecure with their default settings. As a result, they are plagued with a large number of vulnerabilities. DISA STIGS provide specific guidance on how to remediate these common vulnerabilities. WHERE CAN I GET DISA STIGS? You can download DISA STIGS from the DoD Cyber Exchange. To view the STIG XML files you will need to use the STIG Viewer. The STIG Viewer can also be downloaded from the DoD Cyber Exchange. To view your STIGs you simply import the XML file that came with the STIG you downloaded into STIG Viewer. You will then be able to view your STIGS in STIG Viewer. HOW DO I APPLY DISA STIGS TO MY SYSTEMS? If you want to use STIGs to secure your windows based systems then use group policy. To do so you will need to download the relevant admin or ADMX files and upload them to group policy. You can find the ADMX files for a wide range of apps and operating systems via Google. From there you apply the settings shown in the STIG Viewer to the group policy object(s) you created. Then deploy the group policy objects to your windows systems. For non-Windows systems such as printers, routers, and other network devices you will generally have to apply the STIGS manually. Please note that if you have several of the same devices in your environment you might be able to apply STIGS to one of them and apply the same configuration file to the others. If you use Linux servers I would recommend creating a baseline image with the DISA STIGS applied. Use this secure image when deploying Linux servers. DISA STIGS AND CYBERSECURITY COMPLIANCE Most cybersecurity frameworks such as the NIST Cybersecurity Framework, the cybersecurity maturity model certification (CMMC) framework, and the CIS security control framework require the creation of secure baseline configurations for your systems. DISA STIGs allow you to accomplish this. They also include settings on log collection, the use of outdated protocols, and encryption enforcement. All of these settings support your cybersecurity compliance initiatives. NEED HELP DEPLOYING DISA STIGS? Our cybersecurity team can secure your systems using DISA STIGS. If you would like to benefit from our experience and work with us please send us a message at info[@]lakeridge.us. Quick & Simple DISCOVER OUR CYBERSECURITY COMPLIANCE SOLUTIONS: Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you NIST SP 800-171 & CMMC COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements. Learn More HIPAA COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements. Learn More FAR 52.204-21 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements. Learn More ISO 27001 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements. Learn More CYBERSECURITY COMPLIANCE QUICK. SIMPLE. AFFORDABLE. GET STARTED TODAY Book a Discovery Call * * * * PRODUCT * Login * Register * Forgotten password * NIST SP 800-171 & CMMC Compliance * HIPAA Compliance * FAR 52.204-21 Compliance * ISO 27001 Compliance COMPANY * About us * Join our team * Affiliate Program * Contact us RESOURCES * Our blog * HIPAA Handbook * NIST SP 800-171 & CMMC 2.0 Handbook * CMMC 1.0 Handbook LEGALS * Privacy policy * Terms & conditions * Security * Sitemap All rights reserved © Lake Ridge Technologies 2023