Mod 5-3e Vulnerability Management

1234
Across
  1. 2. describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system
  2. 4. can also be used to to conduct a manual audit of information system security controls.
Down
  1. 1. are updated and released during each SRG-STIG Update Release Cycle to capture all newly updated or released SRGs, STIGs, and Tools.
  2. 2. designed to act as a comprehensive STIG compliance tool that provides security monitoring, DISA STIG-specific audit logs, and real-time security event monitoring.
  3. 3. responsible for maintaining the security posture of the Department of Defense Information Network (DoDIN).
  4. 4. an automated compliance scanning tool that leverages the STIGs and OS-specific baselines to analyze and report on the security configuration of an information system.