STIG articles explain how to secure your products, environment, and users. When applied to your Mainframe security product, the security standards decrease the risk of unauthorized disclosure of sensitive information.
We are interested in hearing from you!
Now that STIG articles have been around for a couple years, we want to hear about your experience. Your feedback helps us to provide easy to follow information you need to secure your environment.
Please take a moment to answer the following questions and email your response to Laura.Fletcher@broadcom.com.
- Were you aware that Broadcom publishes STIG articles for our mainframe solutions?
- Are you using the STIG articles to secure your environment?
- Do you find the information provided is easy to follow?
- Do the STIG articles add value to your team?
- Have you downloaded the tracker spreadsheet, located in the STIG Articles By Findings topic, which lets you track the status of STIG implementation at
your site?
- Do the STIG articles aid in prioritizing and helping you and the team mitigate risk on the mainframe?
- Any additional thoughts or suggestions?
As a reminder, a list of Cleanup STIG articles can be found at:
Thank you!
------------------------------
Laura Fletcher
Staff Technical Writer
Broadcom
Illinois
------------------------------