controls/frameworks/stig.json

{"frameworkId":"stig","label":"DISA STIG","version":"M365","description":"Security Technical Implementation Guides \u2014 prescriptive DoD hardening configuration requirements for software, hardware, and operating systems used in US defense and federal environments.","homepageUrl":"https://public.cyber.mil/stigs/","css":"fw-stig","totalControls":148,"registryKey":"stig","csvColumn":"Stig","displayOrder":5,"scoring":{"method":"severity-coverage","categories":{"CAT-I":{"label":"CAT I \u2014 High","description":"Vulnerabilities that allow an attacker to directly gain privileged access or bypass security"},"CAT-II":{"label":"CAT II \u2014 Medium","description":"Vulnerabilities that provide information or capability that could lead to compromise"},"CAT-III":{"label":"CAT III \u2014 Low","description":"Vulnerabilities that degrade security measures or provide limited exposure"}}},"colors":{"light":{"background":"#f3e8ff","color":"#6b21a8"},"dark":{"background":"#3B0764","color":"#C4B5FD"}},"controlIdFormat":"V-{number}"}