You can find a complete STIG security listing that gives important updates within the expectations for DoD IA and IA-enabled units/methods. Each STIG presents technical steerage to protected details techniques/software package that might or else be susceptible. This is only step one toward growing Puppet Comply’s assessment abilities. In