Security Content Automation Protocol: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: url. URLs might have been anonymized. Add: s2cid, authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by SemperIocundus | #UCB_webform 329/2500
update link
Line 1:
{{Short description|Set of security information exchange specifications}}
The '''Security Content Automation Protocol''' ('''SCAP''') is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization, including e.g., [[FISMAFederal Information Security Management Act of 2002|FISMA (Federal Information Security Management Act, 2002)]] compliance. The [[National Vulnerability Database]] (NVD) is the U.S. government content repository for SCAP. An example of an implementation of SCAP is OpenSCAP.
 
==Purpose==
Line 31:
 
==SCAP Validation Program==
 
The SCAP Validation Program tests the ability of products to employ SCAP standards. The NIST [[National Voluntary Laboratory Accreditation Program]] (NVLAP) accredits independent laboratories under the program to perform SCAP validations.