Mod 5-3e Vulnerability Management
Across
- 2. describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system
- 4. can also be used to to conduct a manual audit of information system security controls.
Down
- 1. are updated and released during each SRG-STIG Update Release Cycle to capture all newly updated or released SRGs, STIGs, and Tools.
- 2. designed to act as a comprehensive STIG compliance tool that provides security monitoring, DISA STIG-specific audit logs, and real-time security event monitoring.
- 3. responsible for maintaining the security posture of the Department of Defense Information Network (DoDIN).
- 4. an automated compliance scanning tool that leverages the STIGs and OS-specific baselines to analyze and report on the security configuration of an information system.