The Security Technical Implementation Guides (STIGs) and the NSA Guides are the configuration standards for Department of Defense (DoD) Information Assurance (IA) and IA-enabled devices/systems. These standards are intended to “lock down” the operating system in order to harden the overall security posture and ensure it is as resistant to attack as possible and fit to be placed on your networks. IA is a critical part of any deployed system and Scientia has a wealth of experience hardening Linux-based systems for DoD deployment, particularly Red Hat Enterprise Linux (RHEL) 5 and 6.

We have incorporated scripts, configuration changes, and custom kickstart files to build a STIG-compliant version of RHEL 6. The kickstart files are flexible and well documented.