DISA STIG (Security Technical Implementation Guides)
DISA's mandatory hardening benchmarks for every technology component in DoD information systems, from OS kernels to containerization platforms.
Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) are the mandatory hardening standards for all information technology used by or on behalf of the US Department of Defense. STIGs are published for hundreds of technology components — operating systems (RHEL 9 STIG, Windows Server 2022 STIG), middleware (Apache Tomcat STIG, NGINX STIG), databases (Oracle 19c STIG, PostgreSQL STIG), cloud platforms (AWS Foundations STIG, Azure STIG), and container orchestration (Kubernetes STIG, Docker STIG). Each STIG contains findings categorized as CAT I (Critical — directly enables privilege escalation or data exfiltration), CAT II (High — degraded security posture), and CAT III (Medium — defense-in-depth). CAT I findings must be remediated before an Authority to Operate (ATO) can be granted.
STIGs are delivered as XCCDF/OVAL XML documents consumable by automated scanning tools including SCAP Compliance Checker (SCC), OpenSCAP, and Tenable Nessus. Engineering pipelines at DoD contractors and agencies must integrate STIG scanning into the CI/CD process, producing XCCDF result files that can be imported into eMASS (Enterprise Mission Assurance Support Service) as evidence for continuous authorization. A fully hardened Kubernetes cluster under the current STIG (V1R13) requires, among other controls: disabling anonymous API server authentication, enabling audit logging to an external SIEM, enforcing Pod Security Standards at "restricted" level, enabling RBAC with least-privilege role bindings, and restricting the use of host namespaces and privileged containers. Each of these maps to a specific STIG Vulnerability ID (VulnID) that must appear as "NotAFinding" in the eMASS evidence package.
The practical engineering challenge with STIGs is deviation management. Many STIG controls conflict with operational requirements — for example, the Oracle STIG's requirement to disable the DBMS_SCHEDULER package conflicts with applications that rely on scheduled jobs. DISA allows formally documented "findings" with one of four dispositions: "Not a Finding" (compliant), "Open" (non-compliant, requires POA&M), "Not Applicable" (with written justification), or "Not Reviewed". Organizations frequently misuse "Not Applicable" to paper over genuine non-compliance. Approved deviations require an Operational Requirement (OR) or a formal risk acceptance signed by the Authorizing Official (AO). New STIGs are released quarterly; systems must be re-scanned within 90 days of a STIG update, and new CAT I findings must be remediated within 30 days under most DoD component policies.
We integrate STIG scanning into client CI/CD pipelines using automated SCAP tools, producing machine-readable XCCDF result artifacts that flow directly into eMASS evidence packages. We maintain a STIG deviation library with pre-written Operational Requirement justifications for common conflicts between STIG controls and application functionality, and we track STIG version releases to trigger automated re-scan workflows within the required 90-day window.
Compliance-Native Architecture Guide
Design principles and a structured checklist for building software that is compliant by default — not compliant by retrofit. Covers data architecture, access controls, audit trails, and vendor due diligence.