Learn

Home

Image represents a media kit with boilerplate, logos and more

Developer Guide

Security Technical Implementation Guide

The Security Technical Implementation Guide (STIG) by the Defense Information Systems Agency (DISA) is a set of security standards that ensure IT systems within the U.S. Department of Defense (DoD) and affiliated organizations meet stringent cybersecurity requirements to protect against cyber threats.

Table of Contents

What is STIG? 

The Security Technical Implementation Guide (STIG) is a set of security standards developed by the Defense Information Systems Agency (DISA) to ensure that IT systems within the U.S. Department of Defense (DoD) and other affiliated organizations meet stringent cybersecurity requirements. DISA STIGs provide thorough guidance on securing systems, networks, and applications against cyber threats by defining security configurations, protocols, and management practices. These guides help prevent vulnerabilities by outlining specific steps for securing various aspects of IT infrastructure, including operating systems, databases, networks, and software applications.

Why is STIG important? 

STIGs address critical areas like password policies, access control, firewall configuration, encryption, and patch management, ensuring that all systems meet the required level of security. DISA updates STIGs regularly to keep up with new technologies and emerging cybersecurity threats. Compliance with STIGs is a requirement for DoD agencies, or any organization that is a part of the DoD information networks (DoDIN). This includes defense contractors that connect to the DoD network or system.

By following STIGs, organizations can significantly reduce the risk of cyberattacks, enhance system reliability, and maintain compliance with DoD cybersecurity standards.

What is STIG security?

STIG security refers to the cybersecurity framework established through Security Technical Implementation Guides (STIGs) to secure information systems across the U.S. DoD and other government entities. The primary goal of STIG security is to protect IT systems from vulnerabilities, unauthorized access, and cyber threats by providing detailed security configurations for hardware, software, and network infrastructure. These guides help organizations implement best practices for cybersecurity by enforcing standardized configurations and protocols across operating systems, databases, applications, and network devices.


STIG security also promotes regular assessments and updates to ensure that IT environments are always protected against evolving cyber threats.

What is STIG Compliance? 

Achieving DISA STIG compliance involves conducting a thorough review of existing IT infrastructures to identify areas where systems do not meet the required security configurations. Organizations must then apply the necessary security controls as outlined in the relevant STIGs, which can range from securing operating systems and network devices to enforcing encryption protocols, firewalls, and access control policies. STIG compliance covers a wide range of IT components, including databases, applications, servers, and cloud environments, making it a comprehensive approach to cybersecurity.


Maintaining DISA STIG compliance requires continuous monitoring, regular audits, and timely patching of vulnerabilities to ensure that systems remain secure and up-to-date with the latest security standards. Non-compliance can lead to significant risks, including system compromises, data breaches, and loss of sensitive information, which could jeopardize national security. For this reason, adherence to STIGs is mandatory within the DoD, and many private organizations seeking to improve their cybersecurity posture voluntarily adopt these stringent standards.

What are STIG tools? 

The STIG tool refers to software and utilities developed to assist organizations in automating and managing their compliance with the Security Technical Implementation Guides (STIGs) issued by the Defense Information Systems Agency (DISA). STIGs provide security guidelines for configuring and hardening IT systems to safeguard against vulnerabilities and unauthorized access. The STIG tool is designed to streamline the complex process of applying, assessing, and maintaining STIG compliance across various systems, networks, and applications. It helps organizations, particularly those in the U.S. DoD and contractors, efficiently implement these stringent cybersecurity standards.


A STIG tool typically provides functionalities like automated scanning, compliance assessments, and remediation guidance. It checks whether IT components such as operating systems, databases, network devices, and applications are configured in accordance with the required STIG security standards. The tool generates reports that highlight areas of non-compliance, provides recommendations for remediation, and allows users to track progress toward full compliance. This automation significantly reduces the time and effort needed to manually assess systems, making it easier for IT teams to ensure that their infrastructures are secure.

How SonarQube Supports STIG Compliance


Comprehensive Code Analysis

SonarQube automates the process of identifying vulnerabilities, security hotspots, and non-compliant code practices that could pose risks to an organization's IT environment. By integrating STIG security requirements into its continuous code scanning, SonarQube ensures that software adheres to strict security configurations, including enforcing proper encryption protocols, access controls, and compliance with security policies.

STIG Security Reports

SonarQube provides dedicated STIG reports that offer valuable insights for organizations aiming to comply with DISA’s stringent security requirements. These reports analyze code to ensure it adheres to the configurations and controls specified in STIGs, identifying vulnerabilities and misconfigurations that could compromise system security. The reports also offer actionable recommendations to rectify identified issues, facilitating compliance with STIG requirements.


STIG-Hardened Docker Images

Sonar provides SonarQube Server Docker images that are hardened according to the U.S. DoD STIG standards. These images are available in the Iron Bank, which is the DoD's repository of digitally signed and hardened container images. 

Military-Grade Security

By utilizing SonarQube’s STIG reports, organizations can enhance their security posture to meet the high-security standards necessary for defense and government-related projects. This includes identifying and addressing vulnerabilities and misconfigurations that align with the rigorous standards required by governmental agencies.

SonarQube Tools and Features


SonarQube Server

The SonarQube Server provides a robust platform for static code analysis, helping organizations implement and maintain STIG compliance. The Enterprise Edition and Data Center Edition of SonarQube Server include STIG reports. It supports various programming languages and integrates seamlessly with existing development workflows, ensuring continuous monitoring and improvement of code quality and security.

SonarQube Cloud

SonarQube Cloud (formerly SonarCloud) extends the capabilities of SonarQube to cloud environments, offering scalable and flexible solutions for code analysis. The SonarQube Cloud Enterprise Plan includes STIG reports, along with other advanced security reporting features. It ensures that cloud-based applications also adhere to STIG requirements, providing the same level of security and compliance as on-premises solutions.