• Technologies
    • Networking
    • Cybersecurity
    • Collaboration
    • Edge Cloud
    • Managed & Professional Services
    • SASE
  • Customer Stories
  • Insights
    • Business Continuity & Disaster Recovery (BCDR)
    • Customer Experience
    • Data-Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Gaming
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Public Sector
    • Higher Education
    • Retail
    • Technology
  • About Lumen
    • Black Lotus Labs
    • Leadership Perspectives
    • Newsroom
    • News Spotlights
  • Technologies
    • Networking
    • Cybersecurity
    • Collaboration
    • Edge Cloud
    • Managed & Professional Services
    • SASE
  • Customer Stories
  • Insights
    • Business Continuity & Disaster Recovery (BCDR)
    • Customer Experience
    • Data-Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Gaming
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Public Sector
    • Higher Education
    • Retail
    • Technology
  • About Lumen
    • Black Lotus Labs
    • Leadership Perspectives
    • Newsroom
    • News Spotlights

Defending the Evolving 21st Century Battlefield

Scott Barnett Posted On March 23, 2023
0
8.5K Views


0
Shares
  • Share On Facebook
  • Tweet It

Workers at Security Operations Center Discuss Threats

Today’s battlefield is not just a physical space populated with assets such as fighter jets, tanks and destroyers. Bits are as important as in battle. A significant portion of today’s arsenal is composed of IT devices, software, servers and other technologies that any large enterprise relies on. In addition, weapons and communications systems are digital, connected, data-intensive and potentially vulnerable to hacking.

Securing the nation involves securing those technologies as well. And that’s a daunting task that will only get harder as artificial intelligence (AI), quantum computing and other potential game-changers are deployed. How do you secure all that? The answer involves a process with many moving parts.

At the U.S. Department of Defense (DoD), that process starts with a Security Technical Implementation Guide (STIG). STIGs will play a major role in fulfilling security initiatives such as the Zero Trust Architecture directive from the White House. Lumen already performs STIG hardening services for several DoD agencies and commands. We are now making this service available across DoD.

A roadmap for a never-ending journey

A STIG is a configuration standard consisting of cybersecurity requirements for specific devices. These guides, when implemented, provide optimal security for software, hardware, physical and logical architectures to further reduce vulnerabilities. Advanced STIGs cover the design of a corporate network, involving configurations of routers, databases, firewalls, domain name servers and switches. STIGs also describe maintenance processes for software updates and vulnerability patching. These ongoing updates are crucial to maintaining the security of any technology since cybersecurity is an arms race of sorts between good actors and bad actors.

The DoD produces STIGs for all technologies in their network architectures. But, as I said, the STIG is just the first part of the process. The “I” stands for “implementation” and that’s where things can get complicated.

How many desktop systems does a given military base have? How many mobile devices? How many commands operate out of that base, each with unique applications? We can multiply these questions across all facilities, all commands and all technologies. You have to identify all your resources and then match them to their appropriate STIGs.

STIGs can be highly specified, such as those that apply to a given hardware device. They can also be broader in scope, encompassing multiple systems and the ways they are used. For instance, there are STIGs involving “information security” that touch on many devices, applications, data types and practices surrounding them. These STIGs must be interpreted by someone who understands the relevant technologies, their uses and the real intention of the details in the STIG. That knowledge is crucial to understanding the various categories of issues (think of them as green, yellow, and red for severity) and how they apply in a given situation.

And once you have all that information, there is the remediation phase of implementation. But it doesn’t end there. Every update of the technology could drive an update of the STIG that applies. Monitoring the status of everything you have is an ongoing requirement. And, of course, new technologies are always being introduced with their own STIGs and their own versions of this same process.

The scope and scale of managing STIGs create a daunting process. Those obligations come alongside the mission of securing the nation.

The Lumen approach

This process has many moving parts, complicated by the difficulty of finding and keeping security experts in the midst of the war for talent. What if some portion – or all – of this process could be handed off to a trusted partner? That’s the idea behind the Lumen STIG as a Service (STIGaaS) offering.

Lumen security experts can take care of as much or as little of the STIG process as agencies and commands need. If you know your inventory and requirements, we can do the remediation, ongoing monitoring and maintenance. We can do the upfront inventory and STIG evaluation and leave the ongoing part to you. Or we can do it all while you keep the nation safe. We can keep you STIG-compliant with new technologies because of our deep relationships inside the technology industry. In the cases where commands are already working with Lumen on larger projects, we may be able to deploy technologies that are already STIG-compliant out of the box.

STIGs are now part of securing the nation. They require expertise, constant investment and the vigilance to ensure they are interpreted correctly, updated constantly and evolved correctly as new technologies join the arsenal of national defense. The STIGaaS model accomplishes those goals with a trusted partner, freeing up DoD resources to focus on their mission.

Learn more about our integrated security solutions.

LEARN MORE

This content is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. Lumen does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user. All third-party company and product or service names referenced in this article are for identification purposes only and do not imply endorsement or affiliation with Lumen. This document represents Lumen products and offerings as of the date of issue.

Post Views: 8,521

Related posts:

  1. Got SOCaaS? How Automation Can Alleviate Cybersecurity Burnout
0
Shares
  • Share On Facebook
  • Tweet It


Defense & IntelligenceZero Trust Network Access (ZTNA)


Author

Scott Barnett

Scott Barnett leads a growing practice that provides value through industry-leading solution sets to the Department of Defense. Scott is an established leader and has held multiple management positions during his 19-year tenure with Lumen. Prior to his current role, Scott was the Director for the National Cable Operator Practice and Director for the ISP and Content Channels within the Level 3 Wholesale Markets Group. Scott has 28 years of technology experience in the areas of wholesale, large enterprise, content, cable, carrier, service providers, satellite and cloud.

Trending Now
Beyond the Finish Line: How Churchill Downs Racetrack Harnesses Advanced Network Solutions for Seamless Kentucky Derby® Operations
Lumen Customer Stories Team April 23, 2025
Announcing the Lumen strategic partnership with Google Cloud: Transforming the future of cloud and network solutions
Lumen April 9, 2025
You may also like
Say Goodbye to Communication Barriers: How DIPS is Transforming the DOD
May 1, 2025
Lumen And Black Lotus Labs: Leading The Charge In Cybersecurity
January 23, 2025
The J-Magic Show: Magic Packets and Where to find them
January 23, 2025
Podcast | Digitalizing Healthcare: How Technology is Changing the Industry
Read Next

Podcast | Digitalizing Healthcare: How Technology is Changing the Industry

  • Categories

    Adaptive Networking

    Connected Security

    Hybrid Cloud

    Communications and Collaboration

    Edge Computing

    SASE


  • Lumen is unleashing the world’s digital potential. We ignite business growth by connecting people, data, and applications – quickly, securely, and effortlessly. As the trusted network for AI, Lumen uses the scale of our network to help companies realize AI’s full potential. From metro connectivity to long-haul data transport to our edge cloud, security, managed service, and digital platform capabilities, we meet our customers’ needs today and as they build for tomorrow.

Services not available everywhere. ©2025 Lumen Technologies. All Rights Reserved.
Press enter/return to begin your search