Mapping SIEM Vulnerabilities in STIG
Program Document
·
OSTI ID:1812891
- Idaho National Laboratory
SIEM (Security Information and Event Management) tools monitor network traffic and allow users to quickly detect problems in their networks. Because of the valuable information processed by SIEM tools, it is important to understand their vulnerabilities. STIG (Structured Threat Intelligence Graph) is an application created at INL used to visualize data related to cyber threats. Using STIG can allow users to understand vulnerabilities related to their SIEM products and how to protect their systems.
- Research Organization:
- Idaho National Laboratory (INL), Idaho Falls, ID (United States)
- Sponsoring Organization:
- USDOE Office of Electricity Delivery and Energy Reliability (OE), Infrastructure Security and Energy Restoration (ISER) (OE-30)
- DOE Contract Number:
- AC07-05ID14517
- OSTI ID:
- 1812891
- Report Number(s):
- INL/EXP-21-63614-Rev000
- Country of Publication:
- United States
- Language:
- English
Similar Records
Using Structured Intelligence Graph (STIG) to protect our critical infrastructure against cyber attacks [Poster]
Coslett Intern Poster: Faster Cyber Attack Response Using STIG
Cybersecurity for the Operational Technology Environment (CyOTE)
Technical Report
·
Wed Nov 30 23:00:00 EST 2022
·
OSTI ID:1988135
Coslett Intern Poster: Faster Cyber Attack Response Using STIG
Program Document
·
Thu Aug 03 00:00:00 EDT 2023
·
OSTI ID:2440144
Cybersecurity for the Operational Technology Environment (CyOTE)
Program Document
·
Mon Jul 22 00:00:00 EDT 2024
·
OSTI ID:2428893