Introduction: STIG-Based System Hardening Web App
Help! Help! My photos are missing! Help! Help! The things are popping up everywhere! Help! Help! If you’re in Information Technology, you have heard so many cries for help. With each of these incidents leads to a larger problem. Why are so many of these happening?
Examining the architecture of a system requires a baseline understanding of hardening practices. But, what if it was made easier to implement a hardened system, or network?
Security Technical Implementation Guides (STIGs) are often considered the gold standard for system hardening. This article discusses the development of a web application that will allow system hardening to be automated using STIG benchmarks.
Sprints for ZTForge (Zero-Trust Forge)
Sprint 01: Project Planning (Week 1 & 2)
This will form the foundation to define scope, cost, and time. Objectives and resource allocation will pave the way for more sprints.
Sprint 02: Requirements Gathering (Week 2 & 3)