Applying CIS (Center for Internet Security) or STIG (Secure Technical Implementation Guides) is a must-have to meet PCI, HIPAA, NIST, CMMC, FedRAMP and other regulatory compliance requirements. However, it's still challenging because automation at this scale and complexity is hard (trust us, we know!). This is where we come in.
RHEL 8 / Rocky 8 / Alma 8
RHEL 7 / Rocky 7 / Alma 7
Windows Server 2016
Windows Server 2019
Windows Firewall and Advanced Security
Amazon Linux 2
Apache Tomcat 9
CISCO L2 IOS Switches
We can automate and support nearly any custom requirement.
Our Ansible content can be used by entire teams to ensure deployed systems and applications are compliant.
Automatically take a pre and post-run remediation score. Use this NIST-approved reporting to demonstrate compliance or add your own code to manipulate the output into whatever format you need.
We built our content to be repeatedly run on systems, so the same content works with new deployments and existing infrastructure.