
How to approach security compliance automation
Automation Talks with Norbert Ponak (Clourity) | Watch now
In our first online training event, we will cover the implementation of security standards like STIG and CIS in three steps, using XOAP’s config.XO module:
1. Connecting a Windows virtual machine to XOAP.
2. Applying Security Technical Implementation Guidelines (STIG) configurations.
3. Reviewing the results (module and system level)
Automation Talks with Norbert Ponak (Clourity) | Watch now
Automation Talks with Sinisa Sokolic (XOAP) | Watch now
Partner Programs
RESOURCES