<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Brad, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086785#M134052</link>
    <description>&lt;P&gt;Hi Brad,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm not aware of any STIG specific to ASA software but if you are using Firepower services on ASA then you can check this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/System-Policy.html#67083&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jul 2017 04:00:05 GMT</pubDate>
    <dc:creator>Aditya Ganjoo</dc:creator>
    <dc:date>2017-07-17T04:00:05Z</dc:date>
    <item>
      <title>Enable STIG Compliance</title>
      <link>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086784#M134051</link>
      <description>&lt;P&gt;I have been looking for documentation that states exactly what is set when one uses the "Enable STIG Compliance" command on an ASA.&amp;nbsp; I have been unable to find what is actually done on the system once this is implemented.&amp;nbsp; Can anyone point me to the documentation that states what settings/constraints are placed on the system when this is set?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086784#M134051</guid>
      <dc:creator>bradleelee</dc:creator>
      <dc:date>2019-03-12T09:42:18Z</dc:date>
    </item>
    <item>
      <title>Hi Brad,</title>
      <link>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086785#M134052</link>
      <description>&lt;P&gt;Hi Brad,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm not aware of any STIG specific to ASA software but if you are using Firepower services on ASA then you can check this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/System-Policy.html#67083&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2017 04:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086785#M134052</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2017-07-17T04:00:05Z</dc:date>
    </item>
    <item>
      <title>Thanks for the response.  I</title>
      <link>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086786#M134053</link>
      <description>&lt;P&gt;Thanks for the response.&amp;nbsp; I am using Firepower and know that command.&amp;nbsp; I have read the documentation that you have referenced which states the following:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For more information on these settings, see the STIG Release Notes for Version 5.4.1.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where is the STIG Release Notes documentation?&amp;nbsp; Specifically for the newer versions? 6+&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2017 15:01:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086786#M134053</guid>
      <dc:creator>bradleelee</dc:creator>
      <dc:date>2017-07-17T15:01:47Z</dc:date>
    </item>
    <item>
      <title>Hi Brad,</title>
      <link>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086787#M134054</link>
      <description>&lt;P&gt;Hi Brad,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Currently, version 6.x + is not certified as STIG compliant. As such, there is currently no STIG documentation for this version.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please keep in mind the following points before enabling it:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1. Cisco does not recommend enabling STIG compliance except to comply with Department of Defense security requirements, because this setting may substantially impact the performance of your system.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;2. Enabling STIG compliance does not guarantee strict compliance to all applicable STIGs.&lt;/P&gt;
&lt;P&gt;3. If you enable STIG compliance on any appliances in your deployment, you must enable it on all appliances. Non-compliant managed devices cannot be registered to STIG-compliant FireSIGHT Management Centers and STIG-compliant managed devices cannot be registered to non-compliant FireSIGHT Management Centers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;4. Applying a system policy with STIG compliance enabled forces appliances to reboot. If you apply a system policy with STIG enabled to an appliance that already has STIG enabled, the appliance does not reboot.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;5. If you apply a system policy with STIG disabled to an appliance that has STIG enabled, STIG remains enabled and the appliance does not reboot. A User is unable to disable this setting without assistance from TAC.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful and mark correct answers&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2017 15:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3086787#M134054</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2017-07-17T15:29:35Z</dc:date>
    </item>
    <item>
      <title>Firepower 6 STIGs Re: Hi Brad,</title>
      <link>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3389333#M134055</link>
      <description>&lt;P&gt;What is the present status for STIG compliance in FirePower 6?&amp;nbsp;&amp;nbsp; I did not see a STIG compliance option in Local&amp;gt;System Policy.&amp;nbsp; The DISA approved products list specifies Firepower 6.2+; it would seem unusual for STIG compliance to be a feature limited to Firepower 5.&lt;/P&gt;</description>
      <pubDate>Fri, 25 May 2018 15:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-stig-compliance/m-p/3389333#M134055</guid>
      <dc:creator>RobL18</dc:creator>
      <dc:date>2018-05-25T15:38:31Z</dc:date>
    </item>
  </channel>
</rss>

