About 400 results
Open links in new tab
  1. Cyber Exchange Home

    Login with DoD CAC for full access to cyber information, policy, guidance and training for the Department of Defense Community.

  2. Policies and Guidance - DoD Cyber Exchange

    Login with DoD CAC for full access to cyber information, policy, guidance and training for the Department of Defense Community.

  3. Training - DoD Cyber Exchange

    Developed to be used in conjunction with annual DoD cybersecurity awareness training, this course presents the additional cybersecurity responsibilities for DoD information system users with access …

  4. Security Technical Implementation Guides - DoD Cyber Exchange

    This site contains the Security Technical Implementation Guides and Security Requirements Guides for the Department of Defense (DOD) information technology systems as mandated by DODI 8500.01.

  5. Sign In - DoD Cyber Exchange

    JavaScript required JavaScript is required. This web browser does not support JavaScript or JavaScript in this web browser is not enabled. To find out if your web browser supports JavaScript or to enable …

  6. Tools Configuration Files - DoD Cyber Exchange

    Sep 30, 2025 · Tools & Configuration FilesTools

  7. SRG and STIG Library Compilations - DoD Cyber Exchange

    Dec 2, 2025 · The SRG/STIG Library Compilation comprises all DOD Security Requirements Guides (SRGs) and DOD Security Technical Implementation Guides (STIGs) housed on Cyber Exchange.

  8. DoD Cloud Computing Security - DoD Cyber Exchange

    The Cloud Assessment Division, operating as the DoD Cloud Authorization Services (DCAS) team, supports DoD components by pre-screening, assessing, validating, and managing the initial …

  9. SRG and STIG Tools - DoD Cyber Exchange

    The DOD/DISA STIG Viewer tool provides the capability to view one or more XCCDF (Extensible Configuration Checklist Description Format) formatted STIGs in an easy-to-navigate, human …

  10. Getting Started - DoD Cyber Exchange

    Accessing DoD PKI-protected information is most commonly achieved using the PKI certificates stored on your Common Access Card (CAC). The certificates on your CAC can allow you to perform routine …