<?xml version="1.0"?>
<Module projectID="1278" moduleID="1549" filePath="disa/ia/shorts/disa_stigv2_fy12/dev/mod1/data.xml" showTextDisplayMode="captionsAndHTML">
	<ModuleName>mod1</ModuleName>
	<CourseTitle>SRGs and STIGs</CourseTitle>
	<AU>mod1</AU>
	<Title>SRGs and STIGs</Title>
	<Subtitle>SRGs and STIGs</Subtitle>
	<LinkSet>links</LinkSet>
	<DefaultControlText name="inputCompleteBtn" value="Submit"></DefaultControlText>
	<DefaultControlText name="button_print" value="Print Certificate"></DefaultControlText>
	<NavBtns order="helpBtn,exitBtn,[PAGE],resourcesBtn,glossaryBtn,transcriptBtn,turnAudioDescriptionsOffBtn,turnAudioDescriptionsOnBtn,hideCCBtn,showCCBtn,rewindBtn,replayBtn,skipReverseBtn,skipForwardBtn,pauseBtn,resumeBtn,previousPgBtn,pageLocation,nextPgBtn" order_intro=""> <!-- order_intro="" -->
		<NavBtn>
			<ControlType>ReadOnlyText</ControlType>
			<ID>pageLocation</ID>
			<RMAText>Page x of y</RMAText>
		</NavBtn>
		<NavBtn>
			<ID>helpBtn</ID>
			<Label>Help</Label>
			<RMAText>Help</RMAText>
			<ClickEventName>HelpButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>hideCCBtn</ID>
			<Label>Hide Captions</Label>
			<RMAText>Hide Captions</RMAText>
			<ClickEventName>HideCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>showCCBtn</ID>
			<Label>Show Captions</Label>
			<RMAText>Show Captions</RMAText>
			<ClickEventName>ShowCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOffBtn</ID>
			<Label>Turn Audio Descriptions Off</Label>
			<RMAText>Turn Audio Descriptions Off</RMAText>
			<ClickEventName>AudioDescriptionsOffButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOnBtn</ID>
			<Label>Turn Audio Descriptions On</Label>
			<RMAText>Turn Audio Descriptions On</RMAText>
			<ClickEventName>AudioDescriptionsOnButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipReverseBtn</ID>
			<Label>Skip Backward</Label>
			<RMAText>Skip Backward</RMAText>
			<ClickEventName>SkipReverseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipForwardBtn</ID>
			<Label>Skip Forward</Label>
			<RMAText>Skip Forward</RMAText>
			<ClickEventName>SkipForwardButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>transcriptBtn</ID>
			<Label>Transcript</Label>
			<RMAText>Transcript</RMAText>
			<ClickEventName>ShowTextButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true" toggleOffSilent="false">
			<ID>previousPgBtn</ID>
			<Label>Back</Label>
			<RMAText>Back</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn h="19.1" nextBtn="true" toggleOffSilent="false" w="67.6">
			<ID>nextPgBtn</ID>
			<Label>Continue</Label>
			<RMAText>Continue</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Course Start</Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_00</Filename>
					<PageNbr>1</PageNbr>
					<Sec508Data Page="disastig01_00"></Sec508Data>
					<ShowText Page="disastig01_00">
						<Txt frameNbr="4">Welcome to Security Requirements Guides, SRGs, and Security Technical Implementation Guides, STIGs.</Txt>
						<Txt frameNbr="177">Please take a moment to review the interface features available to you. Closed captioning is currently on. To turn it off,</Txt>
						<Txt frameNbr="337">select CC. For an audio description of the visuals on each screen, select the audio description feature. To view a</Txt>
						<Txt frameNbr="538">full transcript of the audio for a screen, select Transcript. If you need any assistance with navigation, technical issues, or</Txt>
						<Txt frameNbr="722">assistive technology, select Help. At the conclusion of each screen, select next to continue. Select Next now to proceed.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Overview</Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_01</Filename>
					<PageNbr>2</PageNbr>
					<Controls>
                        <RollOverButtonControl name="rollover_1">
                            <RMAText>IA, Information Assurance</RMAText>
                        </RollOverButtonControl>
                        <RollOverButtonControl name="rollover_2">
                            <RMAText>SRG, Security Requirements Guide</RMAText>
                        </RollOverButtonControl>
                        <RollOverButtonControl name="rollover_3">
                            <RMAText>STIG, Security Technical Implementation Guide</RMAText>
                        </RollOverButtonControl>
                    </Controls>
					<Sec508Data Page="disastig01_01"></Sec508Data>
					<ShowText Page="disastig01_01">
						<Txt frameNbr="4">Information system security is crucial, but rapidly changing technology and sophisticated hackers have made it</Txt>
						<Txt frameNbr="173">increasingly complex. If you are a stakeholder in Department of Defense, or DoD, Cyber Security, how do you protect</Txt>
						<Txt frameNbr="348">your systems from intruders and configure your systems for maximum security? If a security breach happened, would you</Txt>
						<Txt frameNbr="518">know how to respond? How do you set up your systems so that they will be certified to handle DoD information? How do you</Txt>
						<Txt frameNbr="698">assess your systems for continued compliance with government information assurance, or IA, requirements?</Txt>
						<Txt frameNbr="853">If you are developing new software applications, how can you be sure they will meet DoD IA requirements? To ensure</Txt>
						<Txt frameNbr="1044">that all information systems meet specific IA standards, the DoD has mandated that systems be configured in</Txt>
						<Txt frameNbr="1217">accordance with DoD-approved security guidelines. You can find these guidelines in security requirements guides, or SRGs,</Txt>
						<Txt frameNbr="1407">and in security technical implementation guides, or STIGs. Remember, the use of an SRG or STIG is mandatory</Txt>
						<Txt frameNbr="1622">according to DoD policy; these are not simply recommendations. By the end of this course, you will be able</Txt>
						<Txt frameNbr="1779">to identify the purpose of SRGs and STIGs, and will understand when to use each one.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>SRGs and STIGs</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>What are SRGs and STIGs?</Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_02</Filename>
					<PageNbr>3</PageNbr>
					<Controls>
                        <RollOverButtonControl name="rollover_1">
                            <RMAText>SRG, Security Requirements Guide</RMAText>
                        </RollOverButtonControl>
                        <RollOverButtonControl name="rollover_2">
                            <RMAText>STIG, Security Technical Implementation Guide</RMAText>
                        </RollOverButtonControl>
                    </Controls>
					<Sec508Data Page="disastig01_02"></Sec508Data>
					<Popups>
						<Popup>
							<Title></Title>
							<Subtitle></Subtitle>
							<Filename>disastig01_02_01</Filename>
							<PageNbr>3</PageNbr>
							<Sec508TriggerName>SRG</Sec508TriggerName><!--This tag DEFINES 508 tagging for Popups-->
							<Sec508Data Page="disastig01_02_01"></Sec508Data>
							<ShowText Page="disastig01_02_01">
								<Txt frameNbr="2">There are four Core SRGs. These provide general security guidelines for operating systems, network infrastructure,</Txt>
								<Txt frameNbr="182">applications, and non-technical policy controls. These four Core SRGs are the highest level SRGs and govern specific</Txt>
								<Txt frameNbr="404">technology and policy areas. Core SRGs contain all security requirements for their technology and policy areas.</Txt>
								<Txt frameNbr="600">Technology SRGs are subordinate to the Core SRGs. Technology SRGs do not refer to a specific product or product</Txt>
								<Txt frameNbr="804">version, but contain all requirements that have been flagged as applicable from the parent level Core SRGs. The</Txt>
								<Txt frameNbr="981">technology SRGs provide the basis for product-specific STIGs. In this way, SRGs compile overarching</Txt>
								<Txt frameNbr="1158">technology-specific security settings to help provide assurance that DoD information systems operate at an</Txt>
								<Txt frameNbr="1315">acceptable level of risk. Note that the Core SRGs are not intended for use in assessments. STIGs, or, if</Txt>
								<Txt frameNbr="1511">necessary, Technology SRGs will be used for assessments.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title></Title>
							<Subtitle></Subtitle>
							<Filename>disastig01_02_02</Filename>
							<PageNbr>3</PageNbr>
							<Sec508TriggerName>STIG</Sec508TriggerName><!--This tag DEFINES 508 tagging for Popups-->
							<Sec508Data Page="disastig01_02_02"></Sec508Data>
							<ShowText Page="disastig01_02_02">
								<Txt frameNbr="5">STIGs document DoD policies and security requirements for specific technical products, as well as best practices for</Txt>
								<Txt frameNbr="184">configuration. You can find specific STIGs that cover widely used operating systems, infrastructure services, and</Txt>
								<Txt frameNbr="351">support applications. There are also STIGs that cover general topics such as remote or wireless computing and</Txt>
								<Txt frameNbr="511">networking. Note that STIGs have not yet been created for specific mission applications.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<ShowText Page="disastig01_02">
						<Txt frameNbr="4">So what are SRGs and STIGs? Who needs them and how can they help you secure your information systems? SRGs</Txt>
						<Txt frameNbr="196">provide general security compliance guidelines. They serve as source guidance documents for STIGs. STIGs</Txt>
						<Txt frameNbr="368">document applicable DoD policies and security requirements for specific technical products, as well as</Txt>
						<Txt frameNbr="522">best practices and configuration guidelines. Select SRG or STIG to learn more about each.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title><![CDATA[What's in a STIG?]]></Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_03</Filename>
					<PageNbr>4</PageNbr>
					<Controls>
                        <RollOverButtonControl name="rollover_1">
                            <RMAText>SCAP, Security Content Automation Protocol</RMAText>
                        </RollOverButtonControl>
                    </Controls>
					<Sec508Data Page="disastig01_03"></Sec508Data>
					<ShowText Page="disastig01_03">
						<Txt frameNbr="7">Because STIGs can help you detect, or even avoid intrusions, respond to and recover from security breaches, and</Txt>
						<Txt frameNbr="181">implement specific security policies for technical products incorporated into your information system, your system</Txt>
						<Txt frameNbr="343">is more likely to operate at an acceptable level of risk. A STIG is more than just a text document. STIGs include</Txt>
						<Txt frameNbr="530">detailed guidelines to configure systems for security and compliance, such as benchmarks, which are specific</Txt>
						<Txt frameNbr="680">versions of STIG content with code to perform automated assessment checks. STIGs also include guidance documents</Txt>
						<Txt frameNbr="848">that you can use to configure your system manually. In order to standardize the automation of compliance reporting, the</Txt>
						<Txt frameNbr="1026">code in these benchmarks is compatible with the Security Content Automation Protocol, or SCAP. Note that in the past,</Txt>
						<Txt frameNbr="1200">STIGs and their associated checklists were separate documents, but they are now included in a single document</Txt>
						<Txt frameNbr="1349">that contains both content you can use to configure systems for security and compliance and content you can use to check</Txt>
						<Txt frameNbr="1514">systems for security and compliance. Although conversion efforts began in 2009, you may still encounter</Txt>
						<Txt frameNbr="1675">older STIGs with checklists that are separate documents.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Where do STIGs come from?</Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_04</Filename>
					<PageNbr>5</PageNbr>
					<Controls>
                        <RollOverButtonControl name="rollover_1">
                            <RMAText>DISA, Defense Information Systems Agency</RMAText>
                        </RollOverButtonControl>
                        <RollOverButtonControl name="rollover_2">
                            <RMAText>FSO, Field Security Operations</RMAText>
                        </RollOverButtonControl>
						<RollOverButtonControl name="rollover_3">
							<RMAText>http://iase.disa.mil/stigs/vendor_process/index.html; For an active link to this website, go to the Resources page.</RMAText>
						</RollOverButtonControl>
                        <RollOverButtonControl name="rollover_4">
                            <RMAText>DSAWG, Defense IA/Security Accredidation Working Group</RMAText>
                        </RollOverButtonControl>
                        <RollOverButtonControl name="rollover_5">
                            <RMAText>CIAE, Chief Information Assurance Executive</RMAText>
                        </RollOverButtonControl>
                    </Controls>
					<Sec508Data Page="disastig01_04"></Sec508Data>
					<Popups>
						<Popup>
							<Title></Title>
							<Subtitle></Subtitle>
							<Filename>disastig01_04_01</Filename>
							<PageNbr>5</PageNbr>
							<Sec508TriggerName>The STIG Community</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover_1">
									<RMAText>DISA, Defense Information Systems Agency</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover_2">
									<RMAText>NSA, National Security Agency</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover_3">
									<RMAText>OSD, Office of the Secretary of Defense</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover_4">
									<RMAText>NIST, National Institute of Standards and Technology</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover_5">
							<RMAText>http://iase.disa.mil/stigs/news.html; For an active link to this website, go to the Resources page.</RMAText>
						</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disastig01_04_01"></Sec508Data>
							<ShowText Page="disastig01_04_01">
								<Txt frameNbr="3">Anyone who uses a STIG becomes a member of the STIG community and has a role to play in the development and</Txt>
								<Txt frameNbr="139">maintenance of STIGs. The standing STIG community includes representatives from DISA, the National Security</Txt>
								<Txt frameNbr="292">Agency, or NSA, the Office of the Secretary of Defense, or OSD, Combatant Commands, Military Services, the National</Txt>
								<Txt frameNbr="516">Institute of Standards and Technology, or NIST, and other organizations. You may become a member of the STIG</Txt>
								<Txt frameNbr="680">community and participate in the STIG development process by subscribing to STIG NEWS.</Txt>
							</ShowText>
							
						</Popup>
					</Popups>
					<ShowText Page="disastig01_04">
						<Txt frameNbr="5">A wide variety of STIGs are currently available and new STIGs are released each year. But where do STIGs come</Txt>
						<Txt frameNbr="160">from? How are STIGs developed and what role do you have in their development? Each September, Defense</Txt>
						<Txt frameNbr="319">Information Systems Agency, or DISA, Field Security Operations, or FSO, decides which new STIGs should be</Txt>
						<Txt frameNbr="497">written and which existing STIGs should be updated. It bases these decisions on market trends, technological changes,</Txt>
						<Txt frameNbr="671">customer requirements, and DoD policy and guidance. Vendors who wish to develop a STIG for their product need to</Txt>
						<Txt frameNbr="849">complete a Vendor Intent form and return it to the DISA FSO STIG Customer Support Desk. After FSO creates a new STIG,</Txt>
						<Txt frameNbr="1063">it disseminates it to the STIG community in a draft form. You may become a member of the STIG community and participate</Txt>
						<Txt frameNbr="1214">in the STIG development process. The STIG community evaluates and comments on the draft STIG during a two-week</Txt>
						<Txt frameNbr="1367">comment period and a one-day technical interchange meeting. After the comment period and meetings are completed, the</Txt>
						<Txt frameNbr="1540">draft STIG is presented to the Defense IA Security Accreditation Working Group, or DSAWG, for endorsement of</Txt>
						<Txt frameNbr="1700"><![CDATA[the residual risk and critical requirements. Finally, DISA's Chief Information Assurance Executive, or CIAE, releases the]]></Txt>
						<Txt frameNbr="1904"><![CDATA[STIG in final form. STIGs are not static. They're designed to reflect changes in the environment in which they are]]></Txt>
						<Txt frameNbr="2067">used. If you become a member of the STIG community, you should continue to provide feedback that can be</Txt>
						<Txt frameNbr="2202">incorporated into the STIG the next time it is updated. Select  STIG Community to learn more about the various roles in the</Txt>
						<Txt frameNbr="2371">development and maintenance of STIGs, as well as how to join the STIG community.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Using SRGs and STIGs</Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_05</Filename>
					<PageNbr>6</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover_1">
							<RMAText>http://iase.disa.mil; For an active link to this website, go to the Resources page.</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disastig01_05"></Sec508Data>
					<ShowText Page="disastig01_05">
						<Txt frameNbr="6">Whether operating a current system or implementing a new system, STIGs and SRGs provide important security</Txt>
						<Txt frameNbr="160">guidelines and configuration resources for both system operators and developers. The  check content presented in</Txt>
						<Txt frameNbr="340">STIGs will allow you to assess whether your current systems are in compliance with the STIGs, while the fix text</Txt>
						<Txt frameNbr="491">content in the STIGs will help you configure new and existing products so they meet compliance requirements.</Txt>
						<Txt frameNbr="644">Vendors should use STIG guidelines for both new and existing products during research and development</Txt>
						<Txt frameNbr="757">efforts. But what if an appropriate STIG does not exist? If there is no product-specific STIG for your product,</Txt>
						<Txt frameNbr="941">you should use an appropriate SRG to guide you in implementing the appropriate security requirements. While</Txt>
						<Txt frameNbr="1105">FSO primarily uses SRGs as the basis for writing product-specific STIGs, vendors may use SRGs to build more secure</Txt>
						<Txt frameNbr="1295">products that comply with DoD security standards. SRGs, STIGs, benchmarks, and other information security-related</Txt>
						<Txt frameNbr="1493"><![CDATA[resources are all available at DISA's Information Assurance Support Environment, or IASE, website. Each SRG or STIG will]]></Txt>
						<Txt frameNbr="1729">provide instructions on how to use and apply the guidance it contains.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Review Activity</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Review Activity 1</Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_06</Filename>
					<PageNbr>7</PageNbr>
					<Sec508Data Page="disastig01_06"></Sec508Data>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions><![CDATA[Select True or False for each statement; <b>then select Submit.</b>]]></Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>DoD policy recommends - but does not require - the use of SRGs and STIGs.</Txt>
							<Response>
								<Txt>True</Txt>
							</Response>
							<Response valid="true">
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. DoD requires the use of SRGs and STIGs.</DfltCorrect>
								<DfltIncorrect>Incorrect. DoD requires the use of SRGs and STIGs.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>If there is no existing STIG to perform an assessment for a product then that product may not be used.</Txt>
							<Response>
								<Txt>True</Txt>
							</Response>
							<Response valid="true">
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. If there is no existing STIG, Technology SRGs may be used instead to perform an assessment on that product.</DfltCorrect>
								<DfltIncorrect>Incorrect. If there is no existing STIG, Technology SRGs may be used instead to perform an assessment on that product.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>SRGs should be used to develop new products when specific STIGs do not exist.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. When specific STIGs do not exist, you should use SRGs to develop new products.</DfltCorrect>
								<DfltIncorrect>Incorrect. When specific STIGs do not exist, you should use SRGs to develop new products.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<ShowText Page="disastig01_06">
						<Txt frameNbr="5">Now take a moment to check your understanding.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Course Conclusion</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Conclusion</Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_07</Filename>
					<PageNbr>8</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover_1">
							<RMAText>http://iase.disa.mil; For an active link to this website, go to the Resources page.</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disastig01_07"></Sec508Data>
					<ShowText Page="disastig01_07">
						<Txt frameNbr="7">By now you should be able to identify the purpose of Core SRGs, Technology SRGs, and STIGs, and you should know</Txt>
						<Txt frameNbr="186">when to use them. Remember, Core SRGs provide general security compliance guidelines. Based on Core SRG guidance,</Txt>
						<Txt frameNbr="393">Technology SRGs are used by developers to build STIGs, which themselves document applicable DoD policies and</Txt>
						<Txt frameNbr="579">security requirements for specific technical products. STIGs also include best practices and configuration</Txt>
						<Txt frameNbr="752">guidelines. STIGs are created by DISA in partnership with the STIG user community. DISA encourages community</Txt>
						<Txt frameNbr="936">feedback on both existing and potential new SRGs and STIGs. Remember, also, when to use SRGs and STIGs. You should</Txt>
						<Txt frameNbr="1166">use Core SRGs for general security compliance guidance. Both Core SRGs and Technology SRGs will provide</Txt>
						<Txt frameNbr="1353">guidance for product development. You can use STIGs to assess whether your current systems are compliant</Txt>
						<Txt frameNbr="1500">with DoD security requirements and configuration guidance and, also, to determine how to configure new products. If there</Txt>
						<Txt frameNbr="1693">is no product-specific STIG for your product then you should make use of a technology-specific SRG and use its</Txt>
						<Txt frameNbr="1860">guidelines to perform your certification or security assessment. Finally, remember that all of these resources are</Txt>
						<Txt frameNbr="2031"><![CDATA[available at DISA's IASE website.]]></Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Certificate of Completion</Title>
					<Subtitle></Subtitle>
					<Filename>disastig01_08</Filename>
					<PageNbr>9</PageNbr>
					<Controls>
						<!--<RollOverButtonControl name="nameBox">
							<RMAText>Name Entry field</RMAText>
						</RollOverButtonControl>-->
                        <!--<RollOverButtonControl name="button_print">
                            <RMAText>Print Certificate</RMAText>
                        </RollOverButtonControl>-->
					</Controls>
					<Sec508Data Page="disastig01_08"></Sec508Data>
					<ShowText Page="disastig01_08">
						<Txt frameNbr="105">To print a certificate of completion, enter your name in the space provided, and select Print Certificate.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
	</Topics>
</Module>