<P> A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security . These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities . </P> <P> Examples where STIGs would be of benefit is in the configuration of a desktop computer or an enterprise server . Most operating systems are not inherently secure. which leaves them open to criminals such as identity thieves and computer hackers . A STIG describes how to minimize network - based attacks and prevent system access when the attacker is interfacing with the system, either physically at the machine or over a network . STIGs also describe maintenance processes such as software updates and vulnerability patching . </P> <P> Advanced STIGs might cover the design of a corporate network, covering configurations of routers, firewalls, domain name servers and switches . </P>

Defense information systems agency (disa) security technical implementation guides (stigs)