{"version":"1.0","provider_name":"Infoblox Blog","provider_url":"https:\/\/www.infoblox.com\/blog","author_name":"Matt Gowarty","author_url":"https:\/\/www.infoblox.com\/blog\/author\/matt-gowarty\/","title":"DISA STIG Compliance for the Enterprise Network\u2026Really?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"r8qZWzXXBw\"><a href=\"https:\/\/www.infoblox.com\/blog\/community\/disa-stig-compliance-for-the-enterprise-network-really\/\">DISA STIG Compliance for the Enterprise Network\u2026Really?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.infoblox.com\/blog\/community\/disa-stig-compliance-for-the-enterprise-network-really\/embed\/#?secret=r8qZWzXXBw\" width=\"600\" height=\"338\" title=\"&#8220;DISA STIG Compliance for the Enterprise Network\u2026Really?&#8221; &#8212; Infoblox Blog\" data-secret=\"r8qZWzXXBw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.infoblox.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/feb-25.jpg","thumbnail_width":660,"thumbnail_height":454,"description":"When most enterprise network experts hear Defense Investigation Services Agency\u2019s (DISA) Security Technical Implementation Guide (STIG), the immediate reaction tends to be \u201cI\u2019m not part of the federal government or Department of Defense, so it doesn\u2019t impact me and has no value to me.\u201d While the first part is correct that DISA STIG requirements are generally imposed on government entities, the second part is incorrect because DISA STIG best practices can provide huge value to enterprises."}