Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Mapping SIEM Vulnerabilities in STIG

Program Document ·
OSTI ID:1812891

SIEM (Security Information and Event Management) tools monitor network traffic and allow users to quickly detect problems in their networks. Because of the valuable information processed by SIEM tools, it is important to understand their vulnerabilities. STIG (Structured Threat Intelligence Graph) is an application created at INL used to visualize data related to cyber threats. Using STIG can allow users to understand vulnerabilities related to their SIEM products and how to protect their systems.

Research Organization:
Idaho National Laboratory (INL), Idaho Falls, ID (United States)
Sponsoring Organization:
USDOE Office of Electricity Delivery and Energy Reliability (OE), Infrastructure Security and Energy Restoration (ISER) (OE-30)
DOE Contract Number:
AC07-05ID14517
OSTI ID:
1812891
Report Number(s):
INL/EXP-21-63614-Rev000
Country of Publication:
United States
Language:
English

Similar Records

Using Structured Intelligence Graph (STIG) to protect our critical infrastructure against cyber attacks [Poster]
Technical Report · Wed Nov 30 23:00:00 EST 2022 · OSTI ID:1988135

Coslett Intern Poster: Faster Cyber Attack Response Using STIG
Program Document · Thu Aug 03 00:00:00 EDT 2023 · OSTI ID:2440144

Cybersecurity for the Operational Technology Environment (CyOTE)
Program Document · Mon Jul 22 00:00:00 EDT 2024 · OSTI ID:2428893