The Defense Department created Comply to Connect (C2C) as a way to secure its growing array of network endpoints. It is a formal framework for validating new devices, evaluating their compliance with DoD security policies, and continuously monitoring these assets to ensure they remain in security compliance. It also provides automated remediation of device issues, reducing the impact of maintaining cyber hygiene on cybersecurity administrators.
This course examines the challenges to secure device adoption and connection at DoD, as well as how C2C helps defense agencies overcome those challenges. It also walks through a workflow of four phases to implement the C2C framework and explores solutions that can help automate C2C.