spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

How to Conduct System Hardening Using the Defense Information Systems Agency’s (DISA) “Gold Disk”

Written by SPK Blog Post
Published on December 6, 2011

Holes in your IT infrastructure can make for some awkward situations. Whether you’re dealing with sensitive customer information, upcoming product designs, or simply just don’t want people messing with your stuff, maintaining system integrity can be difficult. Symantec is great, but what do you do when the integrity of your system directly relates to national security? Where do you turn when the boss says you gotta keep those centrifuges spinning or heads will roll?

The DoD has developed a process, called DIACAP, for certifying that an Information System (IS) is compliant with DoD security standards. DIACAP stands for DoD Information Assurance Certification and Accreditation Process and you can find additional information about it here and here.

The DISA (an agency within the DoD) has developed a tool, called “Gold Disk”, to help identify and mitigate security holes according to DIACAP standards. It scans your machine and produces a detailed outline of all the Category 1, 2, and 3 vulnerabilities it finds, depending on the applicable Mission Assurance Level. It even goes as far as to suggest the appropriate means of resolving the issue, point out relevant Microsoft Security Bulletins, and offer to fix things for you.

Keep reading for my step-by-step walk-through on how to use DISA’s “Gold Disk”, a handy tool!

David Hubbell
SPK Software Engineer

Latest White Papers

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

As a software developer, your main priority should be quickly and efficiently delivering software. The last thing you want is to worry about security threats. In this eBook, we will educate you on threat vectors and how GitLab can help secure your software supply...

Related Resources

An Executive’s Guide to Strengthening Software Supply Chain Security

An Executive’s Guide to Strengthening Software Supply Chain Security

Modern software is assembled from a complex web of components, contributors, and tools, both internal and external. While this modularity accelerates development, it also expands the attack surface. For executives, a single breach in the software supply chain can...

Accelerating Product Development with AI-Powered GitLab Duo

Accelerating Product Development with AI-Powered GitLab Duo

Getting products designed and manufactured quickly is necessary to stay afloat in a competitive market. When working with software-driven products, this timeline can be stricter. Whether you're launching a new application or updating features for a legacy product,...