Squirrel Defender supports DoD’s Comply-to-Connect (C2C) and NIST SP 800-137 Information Security Continuous Monitoring (ISCM) initiatives.
Automated CCRI SAV
The U.S. DoD is continuously implementing new methods to ensure information security (INFOSEC). The Defense Information Systems Agency (DISA) releases Security Technical Implementation Guides (STIG) and Security Recommendations Guides (SRG) to assist with the protection and defense of the systems that support military readiness and operations. Command Cyber Readiness Inspections (CCRI) are performed to assess defensive posture as it relates to STIGs best practices.
Squirrel Defender automates the tedious manual process of determining if your network devices are configured in accordance with the appropriate DISA STIGs. Defender uses interactive workflows to guide you through automating the remediation process which further reduces the level of effort to maintain your Risk Management Framework (RMF) security controls and posture.
Know your network better than your adversaries.
Solution Features
1. Risk scoring uses the National Security Council risk model for NIST and DISA security control vulnerabilities
2. DISA STIG/SRG security control vulnerability analysis and reporting
​
3. Adaptive automation scales the mitigation/remediation of DISA STIG/SRG security control vulnerabilities
​
4. Continuous visibility using triggers to dynamically verify devices have no new vulnerabilities
​
5. Artifact generation (STIG Checklists) for use with eMASS and other similar systems
6. 100% on-premises - no information leaves your site​
​
7. No sampling; all devices and interfaces are inspected, ensuring thorough security posture review
​
8. Squirrel Defender platform comes pre-hardened using the appropriate DISA STIGs/SRGs
​
9. Curated/Fully supported automation is updated as DISA releases updated or revised STIGs/SRGs security controls
​
10. Integrated Waiver management system for Risk Acceptance (RA) or Plan of Action & Milestone (POAM), ensuring you see actionable findings and the correct risk score
​
11. Embedded STIG Viewer
Trusted to secure the networks of the U.S. defense community
The Squirrel Defender product is used by the U.S. Department of Defense to provide continuous security control vulnerability monitoring and remediation of its network infrastructure environment.
References are available upon request.
CAGE Code
80EX3
NAICS
519190 | 541310 | 541330 | 541511 | 541512 | 541513 | 541519 | 541690 | 611420 | 511210
DUNS
080982289
Supported DISA SRGs & STIGs
-
Network Infrastructure Policy STIG v10 release 6
-
Network WLAN Controller Management Security Technical Implementation Guide: Version 7, Release: 2 for Cisco AIREOS
-
Network WLAN Controller Management Security Technical Implementation Guide: Version 7, Release: 2 for Cisco 9800 WLC
-
Network WLAN Controller Platform Security Technical Implementation Guide: Version 7, Release: 3 for Cisco 9800 WLC
- Cisco ASA Firewall Security Technical Implementation Guide: Version 1, Release: 4
- Cisco ASA NDM Security Technical Implementation Guide: Version 1, Release: 6
- Cisco IOS Router NDM Security Technical Implementation Guide: Version 2, Release: 8
- Cisco IOS Router RTR Security Technical Implementation Guide: Version 2, Release: 6
- Cisco IOS Switch L2S Security Technical Implementation Guide: Version 2, Release: 4
- Cisco IOS Switch NDM Security Technical Implementation Guide: Version 2, Release: 9
- Cisco IOS Switch RTR Security Technical Implementation Guide: Version 2, Release: 5
- Cisco IOS XE Router NDM Security Technical Implementation Guide: Version 2, Release: 9
- Cisco IOS XE Router RTR Security Technical Implementation Guide: Version 2, Release: 9
- Cisco IOS XE Switch L2S Security Technical Implementation Guide: Version 2, Release: 5
- Cisco IOS XE Switch NDM Security Technical Implementation Guide: Version 2, Release: 9
- Cisco IOS XE Switch RTR Security Technical Implementation Guide: Version 2, Release: 5
- Cisco NX OS Switch L2S Security Technical Implementation Guide: Version 2, Release: 3
- Cisco NX OS Switch NDM Security Technical Implementation Guide: Version 2, Release: 8
-
Cisco IOS XE Router NDM Security Technical Implementation Guide: Version 2, Release: 9
-
Cisco IOS XE Router RTR Security Technical Implementation Guide: Version 2, Release: 9
-
Cisco IOS XE Switch L2S Security Technical Implementation Guide: Version 2, Release: 5
-
Cisco IOS XE Switch NDM Security Technical Implementation Guide: Version 2, Release: 9
​​​​
-
Cisco IOS XE Switch RTR Security Technical Implementation Guide: Version 2, Release: 5
-
Cisco NX OS Switch L2S Security Technical Implementation Guide: Version 2, Release: 3
-
Cisco NX OS Switch NDM Security Technical Implementation Guide: Version 2, Release: 8
-
Cisco ASA Firewall Security Technical Implementation Guide: Version 1, Release: 4
-
Cisco ASA NDM Security Technical Implementation Guide: Version 1, Release: 6
-
Arista MLS EOS NDM Security Technical Implementation Guide: Version 1, Release: 1
-
Arista MLS EOS L2S Security Technical Implementation Guide: Version 1, Release: 1
-
Arista MLS EOS Router Security Technical Implementation Guide: Version 1, Release: 1
-
Juniper EX Series Switches NDM Security Technical Implementation Guide: Version 1, Release: 5
-
Juniper EX Series Switches L2S Technical Implementation Guide: Version 1, Release: 2
-
Coming Soon - Juniper EX Series Switches RTR Security Technical Implementation Guide: Version 1, Release: 3
-
Coming Soon - Juniper Router NDM Security Technical Implementation Guide :: Version 2, Release: 3 Benchmark Date: 07 Jun 2023
-
Coming Soon - Juniper SRX SG NDM Security Technical Implementation Guide :: Version 2, Release: 1
-
Coming Soon - Juniper Router RTR Security Technical Implementation Guide :: Version 2, Release: 4 Benchmark Date: 27 Jul 2022
-
Coming Soon - Juniper SRX Services Gateway ALG Security Technical Implementation Guide: Version 2, Release: 1
-
Coming Soon - Juniper SRX Services Gateway VPN Security Technical Implementation Guide: Version 2, Release: 2