3/12/2024 0 Comments Stig viewer for macThis tutorial assumes you already have vCM installed and configured and able to communicate with at least one managed system. This is where one of VMware’s most versatile products comes in – the vRealize Configuration Manager (vCM.) This gem of a tool provides unified, cross-platform configuration and compliance management and enforcement of over 80,000 distinct controls from a single interface, complete with fully customizable reports, dashboards, and a whole host of other fun features. ![]() Of course, this particular environment was fairly large, and the information assurance technical staff consisted basically of me so automating these processes became something of a necessity. The term was coined by the Defense Information Systems Agency (DISA), which creates configuration documents in support of the United States Department of Defense (DoD). At the forefront of this list were a long list of DISA STIGs (Defense Information Systems Agency Security Technical Implementation Guides) – a daunting task in any size environment with any size staff. A Security Technical Implementation Guide or STIG is a methodology for standardized secure installation and maintenance of computer software and hardware. ![]() In my previous life as an InfoSec guy, I was responsible for assessing, enforcing, and ensuring continuous compliance with all the various baselines for which my organization was responsible.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |