IT host security policy

IT host security policy

To design your own IT host security policy, consider the security recommendations by:

  • Security Technical Implementation Guides (STIGs)

  • Federal Risk and Authorization Management Program (FedRAMP)

  • Payment Card Industry Data Security Standard (PCI DSS)