Does anyone have any experience with STIGs, Security Technical Implementation Guides, and Ignition. We are doing a few projects using ignition that require some extensive hardening. Curious what STIGs, if any, apply for ignition. I'm not a cyber guy, I'm asking for my own benefit and to possibly help our cyber team.
Thanks in advance.