Federal Compliance : FIPS and STIG : Civilian vs. Military

FIPS and STIGs are two critical cybersecurity compliance frameworks used primarily by the U.S. government and its contractors, but they have become de facto standards in many high-security industries.

FIPS (Federal Information Processing Standards)

What it is: FIPS are publicly announced standards developed by the U.S. federal government for use by all non-military government agencies and by government contractors. They are created and maintained by the National Institute of Standards and Technology (NIST).

Primary Focus: Cryptography and data security. FIPS compliance is primarily about validating and certifying cryptographic modules and algorithms. The most important FIPS publications for compliance are:

In simple terms: FIPS answers, "Is your encryption strong and implemented correctly according to the government's approved methods?" If a product is "FIPS 140-3 Validated," it means its crypto has been rigorously tested and certified.


STIG (Security Technical Implementation Guide)

What it is: STIGs are detailed, step-by-step configuration guides for securing information systems and software. They are created and maintained by the Defense Information Systems Agency (DISA) for the U.S. Department of Defense (DoD). Conformance is required of both civilian and military systems.

Primary Focus: System hardening and secure configuration. STIGs provide "checklists" for locking down everything from operating systems (Windows, Linux, Unix) and databases (Oracle, SQL Server) to network devices (routers, switches) and specific applications (like web servers and VMware). The goal is to reduce the attack surface by disabling unnecessary services, enforcing strict password policies, configuring audit logging, and applying hundreds of other security settings.

In simple terms: STIGs answer, "Is every single setting on this server, network device, or application configured in the most secure way possible according to DoD standards?"


Key Differences and Relationship

Feature FIPS STIG
Issuing Body NIST (Commerce Department) DISA (Department of Defense)
Primary Scope Cryptographic modules & algorithms System hardening & configuration
What it Certifies A specific product's crypto implementation. The configuration state of an entire system.
Compliance Method Independent lab testing and formal validation. Scanning, manual checks, and documentation.
Typical Requirement "Use FIPS 140-3 validated cryptography." "Harden this Windows Server using the latest Windows STIG."

How They Work Together: In a DoD environment, compliance often requires BOTH. 1. FIPS: Ensures that underlying encryption (e.g., for disk encryption, VPNs, web traffic) is using a certified module. 2. STIG: Ensures that the operating system and applications hosting that FIPS-validated crypto are themselves locked down and securely configured.

For example, a DoD web server must: * Use a FIPS-validated cryptographic module for its TLS certificates (FIPS 140-3). * Have its operating system (e.g., RHEL) hardened according to the RHEL STIG. * Have its web server (e.g., Apache) hardened according to the Apache STIG.


Who Needs to Comply?

Summary


Military

For U.S. military systems, STIGs are actually the primary framework. They are specifically designed for and mandated by DoD. However, the DoD's compliance ecosystem is broader and more rigorous than just STIGs. It's a multi-layered, overlapping set of directives, controls, and processes.

Here’s a breakdown of the key frameworks and requirements specific to U.S. military systems, building on the FIPS/STIG foundation:

1. The Overarching Directive: DoDI 8500.01 and DoDI 8510.01

Everything starts here. These directives establish the DoD Cybersecurity Program and mandate the Risk Management Framework (RMF) as the official process for managing cybersecurity risk. STIG implementation is a critical activity within the RMF process.

2. The Core Process: Risk Management Framework (RMF)

RMF (defined by NIST SP 800-37) is the six-step lifecycle process that all DoD information systems must follow: 1. Categorize the system (using FIPS 199/NIST SP 800-60). 2. Select security controls (using the NIST SP 800-53 control catalog, tailored by the Overlay). 3. Implement the controls (this is where applying STIGs happens). 4. Assess the controls (using STIG checklists with SCAP tools). 5. Authorize the system (the Authorizing Official signs an ATO - Authority to Operate). 6. Monitor continuously.

Key Point: STIGs are the primary tool for implementing and assessing the technical controls selected in RMF Step 2.

3. The Control Baseline: NIST SP 800-53 with DoD Overlays

4. The Classification & Impact Guide: CNSSI 1253

The Committee on National Security Systems Instruction No. 1253 is the bible for classifying systems that handle Classified National Security Information (CNSI). It defines the security control baselines for systems at different classification levels (e.g., Confidential, Secret, Top Secret). * It's far more stringent than FIPS 199. * It dictates the minimum controls (from NIST 800-53) that must be implemented for a given system impact level. The DoD Overlay is built upon CNSSI 1253.

5. The Program Management Standard: CMMC (Cybersecurity Maturity Model Certification)

While STIGs/RMF apply to information systems, CMMC applies to defense contractors (the Defense Industrial Base or DIB) as an organization. * Goal: Protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) in contractor networks. * It's a tiered model (Levels 1-3), with Level 3 requiring the implementation of all 110 security practices from NIST SP 800-171, which itself is derived from NIST 800-53. * Connection to STIGs: A contractor using STIGs to harden their servers that store CUI would be demonstrating compliance with the technical requirements of CMMC Level 3/NIST 800-171.

6. Operational & Tactical Directives: USCYBERCOM Orders

For warfighting systems and networks, U.S. Cyber Command issues specific orders and directives (e.g., the Command Cyber Readiness Inspection (CCRI) program). These are real-world, operational assessments that check if systems deployed in-theater are actually configured according to STIGs and can withstand adversarial attacks.

The Hierarchy in Practice:

For a new military weapons system or IT network, the compliance flow looks like this:

  1. Governance: DoDI 8510.01 says "Use RMF."
  2. Categorization: CNSSI 1253 defines how to categorize a system holding Secret data.
  3. Control Selection: The DoD Overlay, based on CNSSI 1253, selects the required controls from NIST 800-53.
  4. Implementation & Assessment: STIGs provide the actionable, step-by-step instructions to meet those technical controls. Tools like ACAS (Nessus) and SCAP check for STIG compliance.
  5. Authorization: The system owner documents everything in eMASS (Enterprise Mission Assurance Support Service) and requests an ATO.
  6. Contractor Support: If a contractor is building/maintaining the system, they must also meet CMMC requirements at the organizational level.

Summary: The Military-Specific Stack

Layer Framework/Directive Purpose
Process Risk Management Framework (RMF) The mandatory 6-step lifecycle process for all systems.
Technical Guidance Security Technical Implementation Guides (STIGs) The "how-to" checklists for locking down specific technologies.
Control Catalog NIST SP 800-53 + DoD Overlay The "what" - the list of security requirements, tailored for DoD.
Classification Baseline CNSSI 1253 Defines control baselines for classified systems.
Cryptographic Standard FIPS 140-3 / FIPS 201 Mandates validated crypto and PIV cards.
Contractor Security CMMC / NIST SP 800-171 Protects sensitive data in the defense supply chain.
Operational Assessment USCYBERCOM Directives (CCRI) "Live fire" operational testing and inspections.

In essence, STIGs are a component of the much larger, more complex military compliance universe. A military system isn't just "STIG compliant" —it is RMF-compliant, implemented using STIGs, authorized under DoD directives, and often managed by CMMC-certified contractors.