fbpx
spk-logo-tm-2023
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

How to Conduct System Hardening Using the Defense Information Systems Agency’s (DISA) “Gold Disk”

windchill features best plm software
Written by SPK Blog Post
Published on December 6, 2011

Holes in your IT infrastructure can make for some awkward situations. Whether you’re dealing with sensitive customer information, upcoming product designs, or simply just don’t want people messing with your stuff, maintaining system integrity can be difficult. Symantec is great, but what do you do when the integrity of your system directly relates to national security? Where do you turn when the boss says you gotta keep those centrifuges spinning or heads will roll?

The DoD has developed a process, called DIACAP, for certifying that an Information System (IS) is compliant with DoD security standards. DIACAP stands for DoD Information Assurance Certification and Accreditation Process and you can find additional information about it here and here.

The DISA (an agency within the DoD) has developed a tool, called “Gold Disk”, to help identify and mitigate security holes according to DIACAP standards. It scans your machine and produces a detailed outline of all the Category 1, 2, and 3 vulnerabilities it finds, depending on the applicable Mission Assurance Level. It even goes as far as to suggest the appropriate means of resolving the issue, point out relevant Microsoft Security Bulletins, and offer to fix things for you.

Keep reading for my step-by-step walk-through on how to use DISA’s “Gold Disk”, a handy tool!

David Hubbell
SPK Software Engineer

Latest White Papers

The 7-Step Guide to Effective Application Lifecycle Management

The 7-Step Guide to Effective Application Lifecycle Management

Application Lifecycle Management is vital to high-quality software delivery. In this eBook, we will explore seven best practices to ensure ALM success.  What You Will Learn Explore these 7 steps for effective ALM: Planning Requirements  Managing Workflows Risk...

Related Resources

The 7-Step Guide to Effective Application Lifecycle Management

The 7-Step Guide to Effective Application Lifecycle Management

Application Lifecycle Management is vital to high-quality software delivery. In this eBook, we will explore seven best practices to ensure ALM success.  What You Will Learn Explore these 7 steps for effective ALM: Planning Requirements  Managing Workflows Risk...

Engineering Excellence: Real Results, Not Just Resources

Engineering Excellence: Real Results, Not Just Resources

Engineering Excellence Hello and welcome to Engineering Excellence: Real Results, Not Just Resources. My name is Michael Roberts, Vice President of SPK and Associates, and I'm here with Edwin Chung. Ed, feel free to introduce yourself. Hey, please call me Ed. I'm VP...

Avoiding the Pitfalls of Siloed Operations

Avoiding the Pitfalls of Siloed Operations

When working with two distinct teams such as IT and engineering, it is difficult to avoid siloed operations. One team completes its tasks, while the other completes theirs. The issue with this is when teams fail to collaborate effectively, organizations miss out. This...