[Verse 1] Navigate to public cyber mil today Download the Viewer, install without delay STIG Viewer's power in your hands to wield Security baselines clearly revealed [Chorus] Import, Create, Filter, Export clean STIG Viewer mastery - know what I mean Windows Server twenty-twenty-two CAT I findings filtered just for you [Verse 2] Import that STIG file, watch it populate Windows Server rules that you must validate Every vulnerability mapped with care Technical controls beyond compare [Chorus] Import, Create, Filter, Export clean STIG Viewer mastery - know what I mean Windows Server twenty-twenty-two CAT I findings filtered just for you [Verse 3] Create new checklist, blank slate to begin Assessment framework housed within CAT I Critical - the highest threat Filter those findings, priorities set [Chorus] Import, Create, Filter, Export clean STIG Viewer mastery - know what I mean Windows Server twenty-twenty-two CAT I findings filtered just for you [Bridge] CKL format exports your review Checklist data preserved and true Compliance documentation in your grip Never let security standards slip [Outro] Four essential steps memorized with ease STIG Viewer conquered, compliance guaranteed
← 5 STIGs and the Canadian Context (CPCSC / ITSG-33) | 2 Lab 2 — Automated SCAP Scanning →