Security Technical Implementation Guide (STIG) articles explain how to secure your products, environment, and users. When applied to your Mainframe security product, the security standards decrease the risk of unauthorized disclosure of sensitive information.
We are interested in hearing from you!
Now that STIG articles have been around for a couple years, we want to hear about your experience. Your feedback helps us to provide easy to follow information you need to secure your environment.Please take a moment to answer the following questions and email your response to Scott.Bohnert@broadcom.com.
As a reminder, a list of Top Secret STIG articles can be found at STIG Articles By Findings.