Ignition and STIGs

Does anyone have any experience with STIGs, Security Technical Implementation Guides, and Ignition. We are doing a few projects using ignition that require some extensive hardening. Curious what STIGs, if any, apply for ignition. I'm not a cyber guy, I'm asking for my own benefit and to possibly help our cyber team.

Thanks in advance.

Off hand most of the STIGs that would apply to an Ignition deployment would be generic in nature and focus on Windows for any Windows clients, SQL server, your network infrastructure, and potentially any browser software. There aren't any focused on Ignition itself that I know of.

1 Like