
Diving into security and compliance | Guest: Norbert Ponak
Automation Talks | Ep. 02 | Watch now
In our first online training event, we will cover the implementation of security standards like STIG and CIS in three steps, using XOAP’s config.XO module:
1. Connecting a Windows virtual machine to XOAP.
2. Applying Security Technical Implementation Guidelines (STIG) configurations.
3. Reviewing the results (module and system level)
Partner Programs
RESOURCES