Blog Posts Tagged with "DISA"

74db456e73657c300b53105c63db3b6f

The Urgent Need for Mobile Device Security Policies

November 20, 2011 Added by:Kevin Johnson

When gaps are uncovered in an environment, they must be augmented with new policies, as is the case with mobile devices. The need for businesses and government to establish strong policies for mobile environments and the protection of information used with mobile devices is immediate...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Red Hat 5 STIG: Kernel Modules

August 29, 2011 Added by:Jamie Adams

The new draft STIG requires entries in a configuration file to prevent the kernel from loading modules – even if the modules aren't installed on the system. Nonetheless, I have compiled a list of the required settings which must be set in your modprobe.conf configuration file...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Red Hat 5 STIG: Network Settings

August 23, 2011 Added by:Jamie Adams

I would caution administrators from rushing to add all because most are defaults. The settings must be implicitly set in the sysctl.conf config file. My recommendation is to review the entire STIG in order to define a complete sysctl.conf file, so that it can be deployed and tested all at once...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Getting Started with the New Red Hat 5 STIG

August 18, 2011 Added by:Jamie Adams

The generic UNIX STIG supported numerous UNIX and Linux distributions but never addressed Red Hat Enterprise Linux 5. For many years, this lack of support was a source of frustration for system administrators. I've completed my initial review and I want to share some of my findings and tips...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

DoD to Carry Out Clandestine Operations in Cyberspace

May 11, 2011 Added by:Headlines

"There is a lack of historical precedent for what constitutes traditional military activities in cyberspace... Section (962) would clarify that the Secretary of Defense has the authority to conduct clandestine cyberspace activities in support of military operations..."

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

DISA UNIX STIG for Red Hat Enterprise Linux 5 and 6

February 10, 2011 Added by:Jamie Adams

Organizations which use Red Hat Enterprise Linux 5 and must adhere to the DISA UNIX STIG have been stuck with documentation and assessment tools which only support up to Red Hat Enterprise Linux 4. This frustrates system administrators because they must deal with false positives From SRR scripts...

Comments  (2)