DISA Security Technical Implementation Guides (STIGs)
Defense Information Systems Agency (DISA) STIGs provide technical security configuration standards for DOD information systems. Based on Security Requirements Guides (SRGs), STIGs contain technical guidance for hardening systems across operating systems, applications, network devices, databases, and cloud environments. Used by US Department of Defense and widely adopted commercially.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (5)
Application Security
Security requirements for web servers, application servers, databases, and enterprise applications
| Code | Title |
|---|---|
| STIG-APP-001 | Web Server Security |
| STIG-APP-002 | Application Server Hardening |
| STIG-APP-003 | Database Security Configuration |
| STIG-APP-004 | Application Input Validation |
| STIG-APP-005 | Application Authentication and Session Management |
| STIG-APP-006 | Application Logging and Monitoring |
| STIG-APP-007 | Email and Messaging Security |
Cloud and Virtualization
Security requirements for cloud computing environments and virtualization platforms
| Code | Title |
|---|---|
| STIG-CLD-001 | Cloud Service Provider Assessment |
| STIG-CLD-002 | Virtual Machine Hardening |
| STIG-CLD-003 | Container Security |
| STIG-CLD-004 | Identity and Access Management in Cloud |
| STIG-CLD-005 | Cloud Data Protection |
| STIG-CLD-006 | Cloud Network Security |
General Purpose Operating Systems
Security requirements for server and desktop operating systems including Windows, Linux, and macOS
| Code | Title |
|---|---|
| STIG-OS-001 | Account Management Controls |
| STIG-OS-002 | Access Control Mechanisms |
| STIG-OS-003 | Audit and Logging Configuration |
| STIG-OS-004 | Authentication Mechanisms |
| STIG-OS-005 | System Hardening |
| STIG-OS-006 | Encryption and Cryptographic Controls |
| STIG-OS-007 | Patch and Vulnerability Management |
Mobile and Endpoint Security
Security requirements for mobile devices, MDM platforms, and endpoint protection
| Code | Title |
|---|---|
| STIG-MOB-001 | Mobile Device Management |
| STIG-MOB-002 | Mobile OS Security Configuration |
| STIG-MOB-003 | Endpoint Detection and Response |
| STIG-MOB-004 | Removable Media Controls |
| STIG-MOB-005 | Browser Security Configuration |
Network Infrastructure
Security requirements for routers, switches, firewalls, wireless access points, and network devices
| Code | Title |
|---|---|
| STIG-NET-001 | Network Device Management |
| STIG-NET-002 | Routing Protocol Security |
| STIG-NET-003 | Switch Security Configuration |
| STIG-NET-004 | Firewall and ACL Configuration |
| STIG-NET-005 | Wireless Network Security |
| STIG-NET-006 | Network Boundary Protection |
| STIG-NET-007 | VPN and Remote Access Security |
Maps to 547 other frameworks
Frequently Asked Questions
What is DISA Security Technical Implementation Guides (STIGs)?
DISA Security Technical Implementation Guides (STIGs) is a compliance framework from United States with 5 domains and 32 controls. Defense Information Systems Agency (DISA) STIGs provide technical security configuration standards for DOD information systems. Based on Security Requirements Guides (SRGs), STIGs contain technical guidance for hardening systems across operating systems, applications, network devices, databases, and cloud environments. Used by US Department of Defense and widely adopted commercially. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does DISA Security Technical Implementation Guides (STIGs) have?
DISA Security Technical Implementation Guides (STIGs) has 32 controls organised across 5 domains. The largest domains are Application Security (7 controls), General Purpose Operating Systems (7 controls), Network Infrastructure (7 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does DISA Security Technical Implementation Guides (STIGs) map to?
DISA Security Technical Implementation Guides (STIGs) maps to 547 other compliance frameworks. The top mapping partners are ASD Information Security Manual (ISM) (69% coverage), NIST SP 800-171A — Assessing CUI Security Requirements (66% coverage), CSA CCM v4 (66% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with DISA Security Technical Implementation Guides (STIGs) compliance?
Start your DISA Security Technical Implementation Guides (STIGs) compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about DISA Security Technical Implementation Guides (STIGs) requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 32 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required