Content deleted Content added
m Dating maintenance tags: {{By whom?}} {{When?}} |
make purpose clearer |
||
Line 1:
The '''Security Content Automation Protocol''' ('''SCAP''') is a method for using specific standards to enable the automated vulnerability management, measurement, and policy compliance evaluation
==Purpose==
To guard against security threats, organizations need to continuously monitor the computer systems and applications they have deployed, incorporate security upgrades to software and deploy updates to configurations. The Security Content Automation Protocol (SCAP), pronounced "ess-cap",
A vendor of a computer system configuration scanner can get their product validated against SCAP, demonstrating that it will interoperate with other scanners and express the scan results in a standardized way.
SCAP defines how the following standards (referred to as SCAP 'Components') are combined:
===SCAP Components===
Starting with SCAP version 1.0 (July, 2010)
* [[Common Vulnerabilities and Exposures]] [http://cve.mitre.org/ (CVE)]
* [http://nvd.nist.gov/cce/ Common Configuration Enumeration (CCE)] ([http://cce.mitre.org/ prior web-site at MITRE])
Line 12 ⟶ 17:
* [[Extensible Configuration Checklist Description Format]] [http://scap.nist.gov/specifications/xccdf/ (XCCDF)]
* [[Open Vulnerability and Assessment Language]] [http://oval.mitre.org/ (OVAL)]
Starting with SCAP version 1.1 (February, 2011)
* [http://scap.nist.gov/specifications/ocil/ Open Checklist Interactive Language (OCIL) Version 2.0]
Starting with SCAP version 1.2 (September, 2011)
* [http://scap.nist.gov/specifications/ai/ Asset Identification]
* [http://scap.nist.gov/specifications/arf/ Asset Reporting Format (ARF)]
|