diff --git a/README.md b/README.md
index e3e3a2b..3d46978 100644
--- a/README.md
+++ b/README.md
@@ -42,10 +42,13 @@
****
-## Table of Contents
+# Table of Contents
- **[Introduction](#introduction)**
-- **[Hardening standards](#hardening-standards)**
+- **[Policy Compliance (Hardening standards)](#policy-compliance-hardening-standards)**
+ * [Center of Internet Security (CIS)](#center-of-internet-security-cis)
+ * [Security Technical Implementation Guide (STIG)](#security-technical-implementation-guide-stig)
+ * [Security Content Automation Protocol (SCAP)](#security-content-automation-protocol-scap)
- **[DevSec Hardening Framework](#devsec-hardening-framework)**
- **[Contributing](#contributing)**
- **[Other hardening guides](#other-hardening-guides)**
@@ -172,13 +175,27 @@
- **[Testing configuration](#testing-configuration)**
- **[External resources](#external-resources)**
-## Introduction
+# Introduction
-## Hardening standards
+This Hardening Guide provide a high-level overview of the security hardening GNU/Linux systems.
-## DevSec Hardening Framework
+# Policy Compliance (Hardening standards)
- > Security + DevOps: Automatic Server Hardening.
+## Center of Internet Security (CIS)
+
+The [Center for Internet Security (CIS)](https://www.cisecurity.org/cis-benchmarks/) is a nonprofit organization focused on improving public- and private-sector cybersecurity readiness and response.
+
+## Security Technical Implementation Guide (STIG)
+
+A [Security Technical Implementation Guide (STIG)]((https://www.stigviewer.com/stigs)) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security.
+
+## Security Content Automation Protocol (SCAP)
+
+Security Content Automation Protocol (SCAP) provides a mechanism to check configurations, vulnerability management and evaluate policy compliance for a variety of systems. One of the most popular implementations of SCAP is [OpenSCAP](https://www.open-scap.org/security-policies/) and it is very helpful for vulnerability assessment and also as hardening helper.
+
+# DevSec Hardening Framework
+
+ > _Security + DevOps: Automatic Server Hardening._
This project covered a lot of the things in this guide, which can be automated (e.g. setting of grub password or enforcing the permissions of the common directories).
@@ -186,13 +203,13 @@ Project: **[DevSec Hardening Framework](https://dev-sec.io)** + GH repository: *
Thanks for **[@artem-sidorenko](https://github.com/artem-sidorenko)**!
-## Contributing
+# Contributing
If you find something which doesn't make sense, or one of these doesn't seem right, or something seems really stupid; please make a pull request or please add valid and well-reasoned opinions about your changes or comments.
Before add pull request please see **[this](CONTRIBUTING.md)**.
-## Other hardening guides
+# Other hardening guides
| Type of list | Comment |
| :--- | :--- |