This table provides a matrix of SCAP content requirements is provided implemented in the SCAP Content Validation tool v1.2. The matrix indicates which requirements are checked by SCAP Content Validation tool. The section numbers in the matrix refer to SP 800-126 Rev 2 which is available here .
GENERAL |
|||||||
---|---|---|---|---|---|---|---|
Requirement ID | 800-126 Section | 800-126 Statement | 800-126 Derived Requirement | Requirement Type | Error Level | Requirement Category | |
2 | 3.2.2 | The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:Benchmark> element SHALL have an @xml:lang attribute. | @xml:lang attribute SHALL be provided on <xccdf:Benchmark> elements. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
3 | 3.2.2 | The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:version> element and the @id attribute SHALL be used together to uniquely identify all revisions of a benchmark.~Multiple revisions of a single benchmark SHOULD have the same @id attribute value and different <xccdf:version> element values, so that someone who reviews the revisions can readily identify them as multiple versions of a single benchmark. ~Multiple revisions of a single benchmark SHOULD have <xccdf:version> element values that indicate the revision sequence, so that the history of changes from the original benchmark can be determined. ~The @time attribute of the <xccdf:version> element SHOULD be used for a timestamp of when the benchmark was defined. | Multiple revisions of a single benchmark SHOULD have <xccdf:version> element values that indicate the revision sequence, so that the history of changes from the original benchmark can be determined. | SCHEMA | ERROR | SOURCE_CONTENT | |
The @time attribute of the <xccdf:version> element SHOULD be used for a timestamp of when the benchmark was defined. | SCHEMATRON | WARNING | SOURCE_CONTENT | ||||
The @id and <xccdf:version> together MUST uniquely identify an xccdf:Benchmark in a <scap:data-stream-collection> | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
4 | 3.2.2 | The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The @style attribute SHOULD have the value "SCAP_1.2". | The style attribute of the <xccdf:Benchmark> element SHOULD contain the value "SCAP_1.2". | SCHEMATRON | ERROR | SOURCE_CONTENT | |
5 | 3.2.2 | The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:status> element SHALL indicate the current status of the benchmark document. The associated text value SHALL be "draft" for documents released in public draft state and "accepted" for documents that have been officially released by an organization. The @date attribute SHALL be populated with the date of the status change. Additional <xccdf:status> elements MAY be included to indicate historic status transitions. | The <xccdf:status> element SHALL have value 'draft' or 'accepted' | SCHEMATRON | ERROR | SOURCE_CONTENT | |
The "date" attribute of the <xccdf:status> element SHALL be populated with the date of the last status change. | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
8 | 3.2.2 | The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:metadata> element SHALL be provided and SHALL, at minimum, contain the Dublin Core [DCES] terms from Table 14. If provided, additional Dublin Core terms SHALL follow the required terms within the element sequence.~Table 14 - Use of Dublin Core Terms in <xccdf:metadata>~Dublin Core Term~Description of Use~~<dc:creator>~The person, organization, and/or service that created the benchmark~~<dc:publisher>~The person, organization, and/or service that published the benchmark~~<dc:contributor>~The person, organization, and/or service that contributed to the creation of the benchmark~~<dc:source>~An identifier that indicates the organizational context of the benchmark's @id attribute. An organizationally specific URI SHOULD be used.~~ | xccdf:Benchmark/xccdf:metadata SHALL contain, at minimum, one of each of the Dublin Core terms <dc:creator>, <dc:publisher>, <dc:contributor>, <dc:source> | SCHEMATRON | ERROR | SOURCE_CONTENT | |
The <xccdf:metadata> element SHALL be provided in the <xccdf:Benchmark> element. | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
9 | 3.2.1 | The following requirements and conventions apply to the <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> elements:~One or more instances of the <xccdf:title> element SHALL be provided. Each instance MUST contain a text value that briefly indicates the purpose of the containing element. | For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error. | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error. | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
10 | 3.2.1 | The following requirements and conventions apply to the <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> elements:~One or more instances of the <xccdf:description> element SHALL be provided. Each instance MUST contain a text value that describes the purpose of the containing element. | For each <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> element, a <xccdf:description> SHALL be provided. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
15 | 3.5 | Each CPE name [CPE-N] in an <xccdf:platform> or <cpe2:fact-ref> element within an XCCDF document SHALL match at least one CPE entry in a dictionary referenced by the data stream. A match is considered an EQUAL or SUPERSET result when matching the CPE name to a dictionary entry, as defined in the CPE Name Matching specification [CPE-M]. Only non-deprecated names SHOULD be used. | Every <xccdf:platform> or <cpe2:fact-ref> MUST match as EQUAL or SUPERSET to a CPE in a CPE dictionary component of this data stream. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
25 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~The <xccdf:check-content> element SHALL NOT be used to embed check content directly into XCCDF content. | A XCCDF document SHALL NOT contain an <xccdf:check-content> element | SCHEMATRON | ERROR | SOURCE_CONTENT | |
31 | 3.2.4.2 | When evaluating an <xccdf:check-content-ref> element within an <xccdf:check> element, its @href attribute either MUST contain a "#" + @id of a <ds:component-ref> element or MUST be resolved in the context of the XML Catalog specified as part of the <ds:component-ref> element that is referencing this benchmark. In either case, the @href attribute MUST ultimately resolve to a <ds:component-ref> element in the data stream referencing the benchmark containing this <xccdf:check-content-ref> element. See Section 3.1.1 for additional information on <ds:component-ref> resolution. | When evaluating an <xccdf:check-content-ref> element within an <xccdf:check> element, its @href attribute either MUST contain a "#" + @id of a <ds:component-ref> element or MUST be resolved in the context of the XML Catalog specified as part of the <ds:component-ref> element that is referencing this benchmark. In either case, the @href attribute MUST ultimately resolve to a <ds:component-ref> element in the data stream referencing the benchmark containing this <xccdf:check-content-ref> element. See Section 3.1.1 for additional information on <ds:component-ref> resolution. If your content contains external references, SCAPVal will attempt to resolve it in -online mode. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
38 | 3.2.5 | The type and value binding of the specified <xccdf:Value> is constrained to match that lexical representation of the indicated OVAL Variable data type. Table 16 summarizes the constraints regarding data type usage. Additional information regarding OVAL and XCCDF data types can be found in the OVAL Common Schema documentation and the XCCDF specification [XCCDF].~Table 16 - XCCDF-OVAL Data Export Matching Constraints~OVAL Variable Data Type~Matching XCCDF Data Type~~int~number~~float~number~~boolean~boolean~~string, evr_string, version, ios_version, fileset_revision, binary~string~~ | Values of XCCDF datatype 'number', when bound to OVAL variables, the OVAL variables must be of the following OVAL types: int, float | SCHEMATRON | ERROR | SOURCE_CONTENT | |
Values of XCCDF datatype 'boolean', when bound to OVAL variables, the OVAL variables must be the following OVAL type: boolean | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
Values of XCCDF datatype 'string', when bound to OVAL variables, the OVAL variables must be of the following OVAL types: string, evr_string, version, ios_version, fileset_revision, binary | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
42 | 4.5 | The <xccdf:identity> element SHALL identify the security principal used to access rule evaluation on the target(s). This will include the identity name or username used to perform the evaluation. | At least one <xccdf:identity> element SHALL be provided and SHALL contain text to identify the security principal. | SCHEMATRON | ERROR | RESULT_CONTENT | |
44 | 4.5.1 | If the target <xccdf:Rule> identified by the <xccdf:rule-result> element's @idref attribute has one or more <xccdf:ident> elements with a @system attribute value listed in Section 3.2.4.1, then each <xccdf:ident> element SHALL also appear within the <xccdf:rule-result> element. | If the target <xccdf:Rule> identified by the <xccdf:rule-result idref=""> attribute has one or more <ident> elements with the "http://cve.mitre.org" or "http://cpe.mitre.org" or "http://cpe.mitre.org" system identifier, then each <xccdf:ident> element SHALL also appear within the <xccdf:rule-result> element. | SCHEMATRON | ERROR | RESULT_CONTENT | |
51 | 3.3 | This section lists requirements and recommendations for using the Open Vulnerability and Assessment Language (OVAL) to express an OVAL component of an SCAP source data stream (see Table 12). ~While the default version of OVAL used in SCAP 1.2 SHALL be OVAL version 5.10, SCAP content SHOULD utilize the earliest SCAP-supported version of OVAL that includes all required tests and is necessary to properly address the SCAP content's purpose or use case. | This section lists requirements and recommendations for using the Open Vulnerability and Assessment Language (OVAL) to express an OVAL component of an SCAP source data stream (see Table 12). ~While the default version of OVAL used in SCAP 1.2 SHALL be OVAL version 5.10, SCAP content SHOULD utilize the earliest SCAP-supported version of OVAL that includes all required tests and is necessary to properly address the SCAP content’s purpose or use case. | NOT_CHECKED | NA | SOURCE_CONTENT | |
52 | 3.3 | The version of any particular OVAL document instance SHALL be specified using the <oval:schema_version> content element of the <oval:generator> element, as in this example: ~ <oval:generator>~ <oval:product_name>The OVAL Repository</oval:product_name>~ <oval:schema_version>5.10</oval:schema_version>~ </oval:generator> | OVAL content SHALL include the <oval:generator> and <oval:schema_version> elements. | SCHEMA | ERROR | SOURCE_CONTENT | |
54 | 3.3 | If an <oval-var:oval_variables> element is used to carry variable values between an XCCDF processor and an OVAL processor, the <oval:schema_version> of the <oval-var:oval_variables> element SHALL be the same as that of the <oval-def:oval_definitions> element whose external variables are bound by the <oval-var:oval_variables> element. | All SCAP OVAL variables content that does not match the <oval-var:schema_version> of it corresponding OVAL definitions source it shall be considered in error. | NOT_CHECKED | ERROR | SOURCE_CONTENT | |
68 | 4.5.2 | SCAP-conformant content SHALL include full status reporting, including Error, Unknown, Not Applicable, Not Evaluated, True, and False. | SCAP-conformant content SHALL include full status reporting, including Error, Unknown, Not Applicable, Not Evaluated, True, and False. | NOT_CHECKED | NA | RESULT_CONTENT | |
69 | 4.6 | An SCAP OVAL result data stream component SHALL include the results of every OVAL Definition used to generate the reported results. | An SCAP OVAL result data stream component SHALL include the results of every OVAL Definition used to generate the reported results. | NOT_CHECKED | ERROR | RESULT_CONTENT | |
70 | 4.6 | In order to support SCAP instances where OVAL thin content (only the ID of the definition and the results) is preferred, SCAP content consumers SHALL support all valid values for the <oval-res:directives> controlling the expected content of the results file. | In order to support SCAP instances where OVAL thin content (only the ID of the definition and the results) is preferred, SCAP products SHALL support all valid values for the <oval-res:directives> controlling the expected content of the results file. | NOT_CHECKED | NA | RESULT_CONTENT | |
71 | 3.5 | The referenced OVAL inventory class definition SHALL specify the technical procedure for determining whether or not a specific target asset is an instance of the CPE name specified by the <cpe2_dict:cpe-item> element. This usage is encouraged for CPE components. | The referenced OVAL inventory class definition SHALL specify the technical procedure for determining whether or not a specific target asset is an instance of the CPE name specified by the <cpe2_dict:cpe-item> element. This usage is encouraged for CPE components. | NOT_CHECKED | NA | SOURCE_CONTENT | |
72 | 3.5 | If a <cpe2_dict:cpe-item> element contained in a CPE component references an OVAL inventory class definition, then that definition SHALL be resolved by an @href attribute referencing an OVAL source data stream component in the same data stream. | For all SCAP <cpe-dict:cpe-item>'s specified the CPE dictionary component of an SCAP datastream that contain a cpe-dict:check element, that cpe-dict:check element SHALL refer to an OVAL inventory definition in the same SCAP data stream | SCHEMATRON | ERROR | SOURCE_CONTENT | |
74 | 3.6 | SCAP content referencing a configuration setting SHALL use the official CCE identifier if a CCE entry for a particular configuration setting exists in the official CCE list. | All CCE references SHOULD be in the official CCE dictionary. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
110 | 4.1 | Content consumers supporting SCAP 1.2 SHALL process SCAP 1.2 content and SCAP 1.0 content. Content consumers SHALL process SCAP content as defined under the corresponding version of NIST SP 800-126 (for SCAP 1.2, this revision; for SCAP 1.0, the original release). | Content consumers supporting SCAP 1.2 SHALL process SCAP 1.2 content and SCAP 1.0 content. Content consumers SHALL process SCAP content as defined under the corresponding version of NIST SP 800-126 (for SCAP 1.2, this revision; for SCAP 1.0, the original release). | NOT_CHECKED | NA | TOOL | |
118 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OVAL check system~Use of the OVAL check system SHALL be indicated by setting the <xccdf:check> element's @system attribute to "http://oval.mitre.org/XMLSchema/oval-definitions-5 ". | @system on <xccdf:check> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2" | SCHEMATRON | ERROR | SOURCE_CONTENT | |
@system on <cpe-dict:check> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2" | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
@system on <cpe-lang:check-fact-ref> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2" | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
119 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~Use of the OCIL check system SHALL be indicated by setting the <xccdf:check> element's @system attribute to "http://scap.nist.gov/schema/ocil/2". | |||||
125 | 3.2.5 | One or more <xccdf:check-export> elements MAY be used to define the binding of <xccdf:Value> elements to OVAL variables. The format of the <xccdf:check-export> element is:~<xccdf:check-export value-id="XCCDF_Value_id" _x000B_ export-name="OVAL_External_Variable_id"/> | One or more <xccdf:check-export> elements MAY be used to define the binding of <xccdf:Value> elements to OVAL variables. The format of the <xccdf:check-export> element is:~<xccdf:check-export value-id="XCCDF_Value_id" _x000B_ export-name="OVAL_External_Variable_id"/> | NOT_CHECKED | NA | SOURCE_CONTENT | |
126 | 4.5.2 | Content consumers SHALL apply the mapping illustrated in Table 21 when deriving <xccdf:check> results from OVAL Definition processing. The corresponding result value SHALL be recorded based on the @class attribute of the OVAL Definition where applicable.~Table 21 - Deriving XCCDF Check Results from OVAL Definition Results~OVAL Definition Result~XCCDF Check Result~~error~error~~unknown~unknown~~not applicable~notapplicable~~not evaluated~notchecked~~Definition Class~Definition Result~~compliance~true~~vulnerability~false~~inventory~true~~patch~false~~~Pass~~Definition Class~Definition Result~~compliance~false~~vulnerability~true~~inventory~false~~patch~true~~~Fail~~ | If the <xccdf:result> value for a <xccdf:rule-result> is 'error', 'unknown', 'notapplicable', or 'notchecked', then the result of at least one OVAL definition referenced by that rule SHALL be 'error', 'unknown', 'not applicable', or 'not evaluated', respectively. If the <xccdf:result> value is 'fail' then the result of at least one of the OVAL definitions referenced SHALL match the fail category as defined in the SCAP table. If the <xccdf:result> value is 'pass' then the result of all of the OVAL definitions referenced SHALL match the pass category as defined in the SCAP table. | SCHEMATRON | ERROR | RESULT_CONTENT | |
The @class attribute of an OVAL definition used in a check cannot be found. scapval may not be able to properly verify OVAL result to XCCDF result mapping. If you have the source content containing the OVAL definition, try the -source_ds option to include it. | SCHEMATRON | WARNING | RESULT_CONTENT | ||||
If the <xccdf:result> value for a <xccdf:rule-result> is 'notapplicable' and OVAL definitions apply, then the OVAL definition referenced by that rule is expected to be 'not applicable' or 'not evaluated'. | SCHEMATRON | WARNING | RESULT_CONTENT | ||||
If OVAL results component contain multiple instances of the same OVAL definition, SCAPVal cannot verify the mappings between OVAL results to XCCDF results. | SCHEMATRON | WARNING | RESULT_CONTENT | ||||
If <xccdf:check-content-ref> @name is not present, the <xccdf:Rule> referenced should also contain no @name reference and should not contain @multi-check="true". | SCHEMATRON | ERROR | RESULT_CONTENT | ||||
131 | 4.5 | XCCDF test results SHALL be documented as the contents of an <xccdf:TestResult> element. | XCCDF test results SHALL be documented as the contents of an <xccdf:TestResult> element. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
133 | 4.5 | The @start-time and @end-time attributes SHALL be provided to indicate when the scan started and completed, respectively. | The @start-time and @end-time attributes SHALL be provided to indicate when the scan started and completed, respectively. | SCHEMATRON | ERROR | RESULT_CONTENT | |
134 | 4.5 | The @test-system attribute SHALL be provided, and it SHALL be a CPE name value indicating the product that was responsible for generating the results. | The @test-system attribute SHALL be provided with a CPE Name value indicating the product that evaluated the checklist. | SCHEMATRON | ERROR | RESULT_CONTENT | |
136 | 4.5 | Each IP address associated with the <xccdf:target> SHALL be enumerated using the <xccdf:target-address> element. | The <xccdf:target> and <xccdf:target-address> elements SHALL be provided. | SCHEMATRON | ERROR | RESULT_CONTENT | |
The <xccdf:target-address> SHALL contain an IP address | SCHEMATRON | ERROR | RESULT_CONTENT | ||||
137 | 4.5 | Where applicable to the target system, each of the <xccdf:fact> elements in Table 20 SHALL be provided. Previous versions of SCAP required additional facts; these have been incorporated into the use of the Asset Identification specification, as discussed in Section 4.4.2.~Table 20 - XCCDF Fact Descriptions~XCCDF Fact~Description of Use~~urn:scap:fact:asset:identifier:ein~Equipment identification number or other inventory tag number~~urn:scap:fact:asset:identifier:guid~Globally unique identifier for the asset, if assigned~~urn:scap:fact:asset:environmental_information:owning_organization~Organization that tracks the asset on its inventory~~urn:scap:fact:asset:environmental_information:current_region~Geographic region where the asset is located~~urn:scap:fact:asset:environmental_information:administration_unit~Name of the organization that does system administration for the asset~~ | Where applicable to the target system, each of the <xccdf:fact> elements in Table 20 SHALL be provided. Previous versions of SCAP required additional facts; these have been incorporated into the use of the Asset Identification specification, as discussed in Section 4.4.2.~Table 20 - XCCDF Fact Descriptions~XCCDF Fact~Description of Use~~urn:scap:fact:asset:identifier:ein~Equipment identification number or other inventory tag number~~urn:scap:fact:asset:identifier:guid~Globally unique identifier for the asset, if assigned~~urn:scap:fact:asset:environmental_information:owning_organization~Organization that tracks the asset on its inventory~~urn:scap:fact:asset:environmental_information:current_region~Geographic region where the asset is located~~urn:scap:fact:asset:environmental_information:administration_unit~Name of the organization that does system administration for the asset~~ | NOT_CHECKED | NA | RESULT_CONTENT | |
138 | 4.5.1 | If the <xccdf:ident> element is included, for tracking purposes it is important that produced XCCDF results have specific meanings. If an <xccdf:ident> element is present and it identifies a CVE, CCE, or CPE entry, then an <xccdf:rule-result> of "pass" SHALL indicate that the check content evaluated within the rule complied with one of the following:~For a CVE entry, the target platform satisfies all the conditions of the XCCDF rule and is unaffected by the vulnerability or exposure referenced by the CVE.~For a CCE entry, the target platform complies with the configuration setting guidance expressed in the XCCDF rule.~For a CPE entry, the target platform was identified on the system.~It is important that these interpretations of <xccdf:ident> elements be preserved. For example, consider two policy recommendations. One is that a particular piece of software be installed, and the second that another piece of software not be installed. Both rules for these policy recommendations could use the same CPE entry in their <xccdf:ident> elements. However, because the interpretation of a CPE entry is that a "pass" result indicates software was installed, the second policy recommendation's rule would violate this. This can be corrected by using the @con:negate attribute, a Boolean attribute that inverts the rule result. The second rule could check for the software being installed and then negate that result, thus giving a result consistent in meaning with the first rule. For rules that cannot have their interpretations preserved through the use of the @con:negate attribute, an alternative is to have a CCE entry corresponding to the recommendation. Rules that do not use <xccdf:ident> elements have no such restrictions. | If the <xccdf:ident> element is included, for tracking purposes it is important that produced XCCDF results have specific meanings. If an <xccdf:ident> element is present and it identifies a CVE, CCE, or CPE entry, then an <xccdf:rule-result> of "pass" SHALL indicate that the check content evaluated within the rule complied with one of the following:~For a CVE entry, the target platform satisfies all the conditions of the XCCDF rule and is unaffected by the vulnerability or exposure referenced by the CVE.~For a CCE entry, the target platform complies with the configuration setting guidance expressed in the XCCDF rule.~For a CPE entry, the target platform was identified on the system.~It is important that these interpretations of <xccdf:ident> elements be preserved. For example, consider two policy recommendations. One is that a particular piece of software be installed, and the second that another piece of software not be installed. Both rules for these policy recommendations could use the same CPE entry in their <xccdf:ident> elements. However, because the interpretation of a CPE entry is that a "pass" result indicates software was installed, the second policy recommendation's rule would violate this. This can be corrected by using the @con:negate attribute, a Boolean attribute that inverts the rule result. The second rule could check for the software being installed and then negate that result, thus giving a result consistent in meaning with the first rule. For rules that cannot have their interpretations preserved through the use of the @con:negate attribute, an alternative is to have a CCE entry corresponding to the recommendation. Rules that do not use <xccdf:ident> elements have no such restrictions. | NOT_CHECKED | NA | RESULT_CONTENT | |
141 | 4.6 | In order to be SCAP conformant, an SCAP content consumer SHALL be able to produce all the types of OVAL Results output described below. The specific result output SHALL be configurable within the SCAP content consumer. | In order to be SCAP conformant, an SCAP content consumer SHALL be able to produce all the types of OVAL Results output described below. The specific result output SHALL be configurable within the SCAP content consumer. | NOT_CHECKED | NA | TOOL | |
149 | 3.5 | A <cpe2_dict:cpe-item> element MAY contain one or more <cpe2-dict:check> elements that reference OVAL inventory class definitions using the following format:~<cpe2_dict:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5"~[href="oval_URL"]>oval_inventory_definition_id</cpe2_dict:check> | A <cpe2_dict:cpe-item> element MAY contain one or more <cpe2-dict:check> elements that reference OVAL inventory class definitions using the following format:~<cpe2_dict:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5"~[href="oval_URL"]>oval_inventory_definition_id</cpe2_dict:check> | NOT_CHECKED | NA | SOURCE_CONTENT | |
150 | 3.7 | CVE references in SCAP content MAY include both "candidate" and "entry" status identifiers. | CVE references in SCAP content MAY include both "candidate" and "entry" status identifiers. | NOT_CHECKED | NA | SOURCE_CONTENT | |
151 | 3.7 | Deprecated CVE identifiers SHALL NOT be used. | Deprecated CVE identifiers SHALL NOT be used. | NOT_CHECKED | NA | SOURCE_CONTENT | |
152 | 3.7 | If a CVE identifier exists for a particular vulnerability, the official CVE identifier SHALL be used. If no CVE exists for the software flaw, an alternate identifier MAY be used, but the user SHOULD seek to have a CVE identifier issued for the vulnerability. | If a CVE identifier exists for a particular vulnerability, the official CVE identifier SHALL be used. If no CVE exists for the software flaw, an alternate identifier MAY be used, but the user SHOULD seek to have a CVE identifier issued for the vulnerability. | NOT_CHECKED | NA | SOURCE_CONTENT | |
154 | 3.1.2 | Each SCAP source data stream component SHALL use one of the elements specified in Table 12 as its document element. | Each SCAP source data stream component SHALL use one of the elements specified in Table 12 as its document element. | SCHEMA | ERROR | SOURCE_CONTENT | |
169 | 3.2.4.3 | An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that MUST reference an OVAL source data stream component. When implementing a patches up-to-date XCCDF rule, the following approach SHALL be used:~The source data stream MUST include the OVAL source data stream component referenced by the patches up-to-date rule, which contains one or more OVAL patch class definitions. | An xccdf:Rule with @id "xccdf_NAMESPACE_rule_security_patches_up_to_date" MUST reference an OVAL component that contains an oval definition of class 'patch'. If your content contains external references, SCAPVal will attempt to resolve it in -online mode. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
171 | 3.2.4.3 | An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that MUST reference an OVAL source data stream component. When implementing a patches up-to-date XCCDF rule, the following approach SHALL be used:~Each <xccdf:check-content-ref> element SHALL omit the @name attribute. | If a <xccdf:check-content-ref> is in a security patches up-to-date rule then the @name SHALL be omitted from the <xccdf:check-content-ref>. This requirement was removed in SCAP Schematron version 1.1. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
175 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~At least one <xccdf:check-content-ref> element MUST be provided for each <xccdf:check> | At least one <xccdf:check-content-ref> element MUST be provided in each <xccdf:check> | SCHEMATRON | ERROR | SOURCE_CONTENT | |
179 | 4.6 | data results SHALL be expressed as Single Machine Without System Characteristics, Single Machine With System Characteristics, or Single Machine With Thin Results | The <oval-res:directives> element SHALL be:<definition_true content="full" reported="true"/>~<definition_false content="full" reported="true"/>~<definition_unknown content="full" reported="true"/>~<definition_error content="full" reported="true"/>~<definition_not_evaluated content="full" reported="true"/>~<definition_not_applicable content="full" reported="true"/> or <definition_true reported="true"/>~<definition_false reported="true"/>~<definition_unknown reported="true"/>~<definition_error reported="true"/>~<definition_not_evaluated reported="true"/>~<definition_not_applicable reported="true"/> or <definition_true content="thin" reported="true"/>~<definition_false content="thin" reported="true"/>~<definition_unknown content="thin" reported="true"/>~<definition_error content="thin" reported="true"/>~<definition_not_evaluated content="thin" reported="true"/>~<definition_not_applicable content="thin" reported="true"/> | SCHEMATRON | ERROR | RESULT_CONTENT | |
180 | 4.6 | Single Machine Without System Characteristics – A single result file that includes the results of all OVAL Definitions evaluated and "full" results types as described in the <oval-res:ContentEnumeration> element, without system characteristics. ~For this format, the values for the <oval-res:directives> element SHALL be:~<oval-res:directives include_source_definitions="false">~ <oval-res:definition_true content="full" reported="true"/>~ <oval-res:definition_false content="full" reported="true"/>~ <oval-res:definition_unknown content="full" reported="true"/>~ <oval-res:definition_error content="full" reported="true"/>~ <oval-res:definition_not_evaluated content="full" reported="true"/>~ <oval-res:definition_not_applicable content="full" reported="true"/>~</oval-res:directives>~~When creating the OVAL System Characteristics as defined by the <oval-sc:oval_system_characteristics> element, the <oval-sc:collected_objects> and <oval-sc:system_data> elements SHALL NOT be provided. | |||||
181 | 4.6 | Single Machine With System Characteristics – A single result file that includes the results of all OVAL Definitions evaluated and "full" results types as described in the <oval-res:ContentEnumeration> element and the System Characteristics of the target evaluated.~For this format, the values for the <oval-res:directives> element SHALL be:~<oval-res:directives include_source_definitions="false">~ <oval-res:definition_true content="full" reported="true"/>~ <oval-res:definition_false content="full" reported="true"/>~ <oval-res:definition_unknown content="full" reported="true"/>~ <oval-res:definition_error content="full" reported="true"/>~ <oval-res:definition_not_evaluated content="full" reported="true"/>~ <oval-res:definition_not_applicable content="full" reported="true"/> ~</oval-res:directives>~~When creating the OVAL System Characteristics as defined by the <oval-sc:oval_system_characteristics> element, the <oval-sc:collected_objects> and <oval-sc:system_data> elements SHALL be provided. | Error if oval-res directives definitions have @content='full' or @content is not provided and oval-res:oval_system_characteristics does not have both oval-res:collected_objects and oval-res:system_data. In that case it is Single Machine Without System Characteristics. | SCHEMATRON | ERROR | RESULT_CONTENT | |
182 | 4.6 | Single Machine With Thin Results – A single result file that includes the results of all OVAL Definitions evaluated and "thin" results types as described in the OVAL Results schema. A value of "thin" means only the minimal amount of information will be provided.~For this format, the values for the <oval-res:directives> element SHALL be:~<oval-res:directives include_source_definitions="false">~ <oval-res:definition_true content="thin" reported="true"/>~ <oval-res:definition_false content="thin" reported="true"/>~ <oval-res:definition_unknown content="thin" reported="true"/>~ <oval-res:definition_error content="thin" reported="true"/>~ <oval-res:definition_not_evaluated content="thin" reported="true"/>~ <oval-res:definition_not_applicable content="thin" reported="true"/> | |||||
202 | 4.6 | The following requirements and recommendations pertain to content consumers generating OVAL result data stream components.~Each OVAL result data stream component SHALL validate against version 5.10 of the OVAL Results schema regardless of the version of the OVAL Definitions document that was evaluated. | The following requirements and recommendations pertain to content consumers generating OVAL result data stream components.~Each OVAL result data stream component SHALL validate against version 5.10 of the OVAL Results schema regardless of the version of the OVAL Definitions document that was evaluated. | APPLICATION | ERROR | SOURCE_CONTENT | |
206 | 3.2.4.4 | During scoring, current CVSS scores acquired dynamically, such as from a data feed, SHOULD be used in place of the @weight attribute within XCCDF vulnerability-related rules. | During scoring, current CVSS scores acquired dynamically, such as from a data feed, SHOULD be used in place of the @weight attribute within XCCDF vulnerability-related rules. | NOT_CHECKED | NA | SOURCE_CONTENT | |
207 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For compliance class definitions:~If an OVAL compliance class definition maps to one or more CCE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format: ~<oval-def:reference source="http://cce.mitre.org" ref_id="CCE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cce.mitre.org" (preferred method) or "CCE". | OVAL definitions of class 'compliance' should include a reference to a CCE, where applicable. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
208 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For compliance class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and compliance classes. | For OVAL definitions of @class 'compliance', only definitions of class 'compliance' or 'inventory' can be extended. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
209 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For inventory class definitions:~If an OVAL inventory class definition maps to one or more CPE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format: _x000B__x000B_<oval-def:reference source="http://cpe.mitre.org" ref_id="CPE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cpe.mitre.org" (preferred method) or "CPE". | OVAL definitions of class 'inventory' should include a reference to a CPE, where applicable. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
210 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For inventory class definitions:~Definitions that are directly or indirectly extended SHALL be limited to the inventory class. | For OVAL definitions of @class 'inventory', only definitions of class 'inventory' can be extended. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
211 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~If an OVAL patch class definition maps to one or more CVE identifiers, the definition MAY include <oval-def:reference> elements that reference those identifiers using the following format:_x000B__x000B_<oval-def:reference source="http://cve.mitre.org" ref_id="CVE_identifier"/>_x000B__x000B_This recommendation is weaker than its counterparts for the other class definition types because a CVE identifier is not an identifier for a patch; it is more of an association. For example, one patch could fix multiple vulnerabilities, so it would map to multiple CVE identifiers._x000B__x000B_The source attribute SHALL be defined using either "http://cve.mitre.org" (preferred method) or "CVE". | OVAL patch class MAY reference a CVE. This requirement changed from "SHOULD" to "MAY" in SCAP Schematron version 1.1 | SCHEMATRON | WARNING | SOURCE_CONTENT | |
212 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~If an OVAL patch class definition is associated with a source specific identifier (for example, Knowledge Base numbers for Microsoft patches), these identifiers SHOULD be included in <oval-def:reference> elements contained by the definition. For example:_x000B__x000B_<oval-def:reference source="www.microsoft.com/Patch" ref_id="KB912919"/> | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~If an OVAL patch class definition is associated with a source specific identifier (for example, Knowledge Base numbers for Microsoft patches), these identifiers SHOULD be included in <oval-def:reference> elements contained by the definition. For example:_x000B__x000B_<oval-def:reference source="www.microsoft.com/Patch" ref_id="KB912919"/> | NOT_CHECKED | NA | SOURCE_CONTENT | |
213 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and patch classes. | For OVAL definitions of @class 'patch', only definitions of class 'patch' or 'inventory' can be extended. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
214 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For vulnerability class definitions:~If an OVAL vulnerability class definition maps to one or more CVE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format:_x000B__x000B_<oval-def:reference source="http://cve.mitre.org" ref_id="CVE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cve.mitre.org" (preferred method) or "CVE". | OVAL definitions of class 'vulnerability' should include a reference to a CVE, where applicable. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
215 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For vulnerability class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and vulnerability classes. | For OVAL definitions of @class 'vulnerability', only definitions of class 'inventory' or 'vulnerability' can be extended. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
216 | 4.1 | Within the SCAP component specifications, certain constructs may be deprecated. SCAP content consumers MUST support all deprecated constructs because they are still valid. This requirement ensures that legacy content that made use of these deprecated constructs continues to be supported.~Content consumers supporting OVAL SHALL support OVAL Definition documents written against OVAL versions 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, and 5.10. | OVAL documents must be written in one of the following versions: 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 5.10 | APPLICATION | ERROR | TOOL | |
218 | 4.2 | Content consumers SHALL be capable of validating SCAP content against the appropriate schemas and Schematron stylesheets, detecting and reporting errors, and failing gracefully if there are errors. | Content consumers SHALL be capable of validating SCAP content against the appropriate schemas and Schematron stylesheets, detecting and reporting errors, and failing gracefully if there are errors. | NOT_CHECKED | NA | TOOL | |
227 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting). | Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting). | NOT_CHECKED | ERROR | SOURCE_CONTENT | |
228 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system. | Required values for the @class attribute of an OVAL Definition are as follows:~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system. | NOT_CHECKED | ERROR | SOURCE_CONTENT | |
229 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"patch" if it represents a check for whether a discrete patch needs to be installed on the system. | Required values for the @class attribute of an OVAL Definition are as follows:~"patch" if it represents a check for whether a discrete patch needs to be installed on the system. | NOT_CHECKED | ERROR | SOURCE_CONTENT | |
230 | 3.3 | Required values for the @class attribute of an OVAL Definition are as follows:~"inventory" if it represents a check for the presence of a product of interest on the system. | Required values for the @class attribute of an OVAL Definition are as follows:~"inventory" if it represents a check for the presence of a product of interest on the system. | NOT_CHECKED | ERROR | SOURCE_CONTENT | |
232 | 4.3.2 | If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~For each <xccdf:check-content-ref> element, a content consumer either MUST attempt to retrieve the document referenced by the <ds:component-ref> element that is referenced directly by the <xccdf:check-content-ref> element's @href attribute, or it MUST resolve the @href attribute within the context of the XML Catalog specified as part of the <ds:component-ref> element used to reference this benchmark. If not resolvable, the next available <xccdf:check-content-ref> element SHALL be evaluated. If none of the <xccdf:check-content-ref> elements are resolvable, then the result of the rule evaluation SHALL be the XCCDF "notchecked" status and processing of the check SHALL end | If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~For each <xccdf:check-content-ref> element, a content consumer either MUST attempt to retrieve the document referenced by the <ds:component-ref> element that is referenced directly by the <xccdf:check-content-ref> element's @href attribute, or it MUST resolve the @href attribute within the context of the XML Catalog specified as part of the <ds:component-ref> element used to reference this benchmark. If not resolvable, the next available <xccdf:check-content-ref> element SHALL be evaluated. If none of the <xccdf:check-content-ref> elements are resolvable, then the result of the rule evaluation SHALL be the XCCDF "notchecked" status and processing of the check SHALL end | NOT_CHECKED | ERROR | TOOL | |
233 | 4.3.2 | If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~Once a resolvable <xccdf:check-content-ref> element is found, then check system processing SHALL proceed. When evaluating a rule, an <xccdf:rule-result/xccdf:message> with the @severity attribute value of "info" SHALL be generated, indicating the <xccdf:check-content-ref> @href attribute and @name attribute, if provided. | If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~Once a resolvable <xccdf:check-content-ref> element is found, then check system processing SHALL proceed. When evaluating a rule, an <xccdf:rule-result/xccdf:message> with the @severity attribute value of "info" SHALL be generated, indicating the <xccdf:check-content-ref> @href attribute and @name attribute, if provided. | NOT_CHECKED | ERROR | TOOL | |
235 | 4.7 | The following requirements and recommendations pertain to content consumers generating OCIL result data stream components.~An SCAP OCIL result data stream component SHALL include the results of every <ocil:questionnaire>, <ocil:question_test_action>, and <ocil:question> element used to generate the reported results. | The following requirements and recommendations pertain to content consumers generating OCIL result data stream components.~An SCAP OCIL result data stream component SHALL include the results of every <ocil:questionnaire>, <ocil:question_test_action>, and <ocil:question> element used to generate the reported results. | NOT_CHECKED | NA | RESULT_CONTENT | |
251 | 3.2.4.1 | Each <xccdf:Rule> element SHALL include an <xccdf:ident> element containing a CVE, CCE, or CPE identifier reference if an appropriate identifier exists. The meaning of the identifier MUST be consistent with the recommendation implemented by the <xccdf:Rule> element. If the rule references an OVAL Definition, then <xccdf:ident> element content SHALL match the corresponding CVE, CCE, or CPE identifier found in the associated OVAL Definition(s) if an appropriate identifier exists and if that OVAL Definition is the only input to the rule's final result. | An xccdf:Rule should include an xccdf:ident containing a CVE, CCE, or CPE | SCHEMATRON | WARNING | SOURCE_CONTENT | |
If an XCCDF rule references an OVAL definition, then <xccdf:ident> element content SHALL match the corresponding CVE, CCE, or CPE identifier found in the associated OVAL Definition(s). | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
253 | 4.5 | When the <xccdf:TestResult> is the root XCCDF element, then it will include an <xccdf:benchmark> element [XCCDF:6.6.2]. The <xccdf:benchmark> element MUST have an @id attribute specified. | If the <xccdf:TestResult> is the root XCCDF element, then it will include an <xccdf:benchmark> element [XCCDF:6.6.2]. The <xccdf:benchmark> element MUST have an @id attribute specified. | SCHEMATRON | ERROR | RESULT_CONTENT | |
254 | 4.5 | The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~Each XCCDF result data stream component SHALL comply with the XCCDF Results schema. | The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~Each XCCDF result data stream component SHALL comply with the XCCDF Results schema. | APPLICATION | ERROR | RESULT_CONTENT | |
255 | 4.5.2 | When evaluating an <xccdf:Rule> element that references an OVAL Definition, the <xccdf:rule-result> element SHALL be used to capture the result of this evaluation. This result SHALL be determined by evaluating the referenced OVAL Definition on a target host. The result value of an individual <xccdf:check> SHALL be mapped from the OVAL Definition result produced during evaluation. | When evaluating an <xccdf:Rule> element that references an OVAL Definition, the <xccdf:rule-result> element SHALL be used to capture the result of this evaluation. This result SHALL be determined by evaluating the referenced OVAL Definition on a target host. The result value of an individual <xccdf:check> SHALL be mapped from the OVAL Definition result produced during evaluation. | NOT_CHECKED | NA | RESULT_CONTENT | |
257 | 3.2.4.1 | An <xccdf:ident> element referencing a CVE, CCE, or CPE identifier SHALL be ordered before other <xccdf:ident> elements referencing non-SCAP identifiers. Identifiers from previous revisions of CCE or CPE MAY also be specified following the SCAP identifiers. | An <xccdf:ident> element referencing a CVE, CCE, or CPE identifier (using the @system value specified in the 800-126) SHALL be ordered before other <xccdf:ident> elements referencing non-SCAP identifiers. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
258 | 4.5.2 | If the <xccdf:Rule> element under evaluation has an <xccdf:check-content-ref> element with the @name attribute omitted and an <xccdf:check> element with its @multi-check attribute set to "true", then the result of each evaluated OVAL Definition SHALL be recorded as a separate <xccdf:rule-result> element. | If the <xccdf:Rule> element under evaluation has an <xccdf:check-content-ref> element with the @name attribute omitted and an <xccdf:check> element with its @multi-check attribute set to "true", then the result of each evaluated OVAL Definition SHALL be recorded as a separate <xccdf:rule-result> element. | NOT_CHECKED | NA | TOOL | |
260 | 4.5 | The <xccdf:rule-result> elements report the result of the application of each selected rule [XCCDF:6.6.2].~The <xccdf:check/xccdf:check-content-ref> element SHALL record the reference to the check system specific result component report ID and check name within the result file using the @href and @name attributes, respectively. | Every <xccdf:rule-result> other than 'notapplicable', 'notchecked', or 'notselected' must have a <xccdf:check>/<xccdf:check-content-ref> that has attributes @href and @name. One exception is when the referenced <xccdf:Rule> contains @multi-check=false(the default) and has no @name. | SCHEMATRON | ERROR | RESULT_CONTENT | |
267 | 3.1.2 | Each SCAP source data stream component SHOULD NOT use any constructs that are deprecated in its associated specification. | Each SCAP source data stream component SHOULD NOT use any constructs that are deprecated in its associated specification. | NOT_CHECKED | WARNING | SOURCE_CONTENT | |
269 | 3.6 | If no CCE entry exists for the configuration setting of interest, the content author SHOULD seek to have a CCE identifier issued for the configuration setting. | If no CCE entry exists for the configuration setting of interest, the content author SHOULD seek to have a CCE identifier issued for the configuration setting. | NOT_CHECKED | NA | TOOL | |
270 | 4.3.2 | When processing a patches-up-to-date rule, only OVAL patch class definitions SHALL be evaluated; all other classes of definitions (e.g., inventory class definitions) SHALL NOT be evaluated except when they serve, directly or indirectly, as criteria (extended definitions) of patch definitions. | When processing a patches-up-to-date rule, only OVAL patch class definitions SHALL be evaluated; all other classes of definitions (e.g., inventory class definitions) SHALL NOT be evaluated except when they serve, directly or indirectly, as criteria (extended definitions) of patch definitions. | NOT_CHECKED | NA | TOOL | |
271 | 4.5.2 | In this case the <xccdf:rule-result/xccdf:check-content-ref> element SHALL identify the specific check result of each evaluated OVAL Definition using the @href and @name attributes as described in Section 4.5, item 8. | In this case the <xccdf:rule-result/xccdf:check-content-ref> element SHALL identify the specific check result of each evaluated OVAL Definition using the @href and @name attributes as described in Section 4.5, item 8. | NOT_CHECKED | NA | RESULT_CONTENT | |
275 | 3.2.4.3 | An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that MUST reference an OVAL source data stream component. When implementing a patches up-to-date XCCDF rule, the following approach SHALL be used:~The @multi-check attribute of the <xccdf:check> element SHOULD be set to "true". This causes a separate <xccdf:rule-result> to be generated for each OVAL Definition. See Section 4.5.2 for more information. | If a rule is doing a "patches up-to-date" check, then the @multi-check attribute on each xccdf:check in that rule SHOULD be set to "true". This requirement was removed in SCAP Schematron version 1.1. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
276 | 3.2.5 | Use of the <xccdf:source>, <xccdf:complex-value>, and <xccdf:complex-default> elements within the <xccdf:Value> element SHALL NOT be allowed. Within the <xccdf:choices> element of the <xccdf:Value> element, use of the <xccdf:complex-choice> element SHALL NOT be allowed | The use of the <xccdf:source>, <xccdf:complex-value>, and <xccdf:complex-default> elements within the <xccdf:Value> element SHALL NOT be allowed. Within the <xccdf:choices> element of the <xccdf:Value> element, the use of the <xccdf:complex-choice> element SHALL NOT be allowed | SCHEMATRON | ERROR | SOURCE_CONTENT | |
278 | 3.5 | This section lists requirements and recommendations for using Common Platform Enumeration (CPE) to express a CPE component of an SCAP source data stream (see Table 12). ~The Official CPE Dictionary data feed MAY be used by SCAP components to reference CPE names. If use of the Official CPE Dictionary is impractical, a subset of the dictionary MAY be used instead. Creating the reduced official dictionary involves first identifying every CPE in <xccdf:platform> and <cpe2:fact-ref> elements contained within referenced <cpe2:platform-specification> elements in every benchmark in the data stream. Then these CPEs MUST be matched against every entry in the Official CPE Dictionary using the CPE name matching algorithm [CPE-M]. All CPEs matched in the official dictionary with a result of EQUAL or SUPERSET MUST be included in the reduced official dictionary | |||||
279 | 3.5 | One or more third-party dictionaries MAY be included in a data stream as well. All such third-party dictionaries SHOULD follow the requirements of the CPE Dictionary specification [CPE-D]. If including an entire third-party dictionary is impractical, a subset of the dictionary MAY be used instead. The reduced dictionary MUST be created using the same procedure outlined for creating a subset of the official dictionary. ~In all cases, a dictionary component MAY be remote to the data stream collection. | |||||
280 | 3.5 | When creating a subset of the Official CPE Dictionary or a third-party dictionary, a <cpe2_dict:check> element on an entry MAY be added or modified if the existing check does not provide satisfactory content to test the presence of the CPE name. | |||||
281 | 3.1 | Each signature MUST be represented as a <dsig:Signature> element and follow the W3C recommendation [DSIG]. | Each signature MUST be represented as a <dsig:Signature> element and follow the W3C recommendation [DSIG]. | NOT_CHECKED | NA | SOURCE_CONTENT | |
282 | 3.1 | Each <dsig:Signature> element MUST sign only one data stream | Each <dsig:Signature> element MUST sign only one data stream | SCHEMATRON | ERROR | SOURCE_CONTENT | |
283 | 3.1 | The <dsig:Signature> element MUST follow the recommendations in [TMSAD] | The <dsig:Signature> element MUST follow the recommendations in [TMSAD] | APPLICATION | NA | SOURCE_CONTENT | |
284 | 3.1 | A <dsig:Manifest> element MUST be included within the <dsig:Signature> element as a <dsig:Object> element. The <dsig:Manifest> element MUST have a <dsig:Reference> element for each local component referenced by the data stream being signed. External components MAY be omitted from the <dsig:Manifest> element. Each <dsig:Reference> element referencing a <ds:component> or <ds:extended-component> element MUST point to the component being signed by identifying the component in the @URI attribute using "#" + @Id of the component. | A <dsig:Manifest> MUST be included in the <dsig:Signature> as a <dsig:Object> | SCHEMATRON | ERROR | SOURCE_CONTENT | |
The <dsig:Manifest> MUST have a <dsig:Reference> for each local component referenced by the data stream being signed. | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
285 | 3.1 | A <dsig:SignatureProperties> element MUST be included within the <dsig:Signature> element as a <dsig:Object> element. At least one <dsig:SignatureProperty> element MUST be populated with <dt:signature-info> as specified in [TMSAD] | A <dsig:SignatureProperties> MUST be included in the <dsig:Signature> as a <dsig:Object> with a dsig:SignatureProperty populated with tmsad:signature-info | SCHEMATRON | ERROR | SOURCE_CONTENT | |
286 | 3.1 | The first <dsig:Reference> element in a <dsig:Signature> element MUST be to the <ds:data-stream> element being signed. The <ds:data-stream> element MUST be referenced in the @URI attribute using "#" + @Id of the <ds:data-stream> | The first <dsig:Reference> element in a <dsig:Signature> element MUST be to the <ds:data-stream> element being signed. The <ds:data-stream> element MUST be referenced in the @URI attribute using "#" + @Id of the <ds:data-stream> | SCHEMATRON | ERROR | SOURCE_CONTENT | |
287 | 3.1 | The second <dsig:Reference> element in a <dsig:Signature> element MUST be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element within the <dsig:Signature> element. The <dsig:SignatureProperties> element MUST be referenced in the @URI attribute using "#" + @Id of the<dsig:SignatureProperties> element. | The second <dsig:Reference> element in a <dsig:Signature> element MUST be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element within the <dsig:Signature> element. The <dsig:SignatureProperties> element MUST be referenced in the @URI attribute using "#" + @Id of the<dsig:SignatureProperties> element. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
288 | 3.1 | The third <dsig:Reference> element MUST be to the <dsig:Manifest> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:Manifest> element MUST be referenced in the @URI attribute using "#" + @Id attribute of the <dsig:Manifest> | The third <dsig:Reference> element MUST be to the <dsig:Manifest> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:Manifest> element MUST be referenced in the @URI attribute using "#" + @Id attribute of the <dsig:Manifest> | SCHEMATRON | ERROR | SOURCE_CONTENT | |
289 | 3.1 | <dsig:Reference> elements on the <dsig:Manifest> element SHOULD be in the same order as the <ds:component-ref> elements on the data stream being signed | <dsig:Reference> elements on the <dsig:Manifest> element SHOULD be in the same order as the <ds:component-ref> elements on the data stream being signed | NOT_CHECKED | WARNING | SOURCE_CONTENT | |
290 | 3.1 | Key information SHOULD be provided on the <dsig:Signature> element. | Key information SHOULD be provided on the <dsig:Signature>. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
291 | 4.2 | Content consumers SHOULD validate XML digital signatures if they exist in the content. Validating a signature includes confirming that the signature value is valid, all of the reference hashes in the signature and manifest are correct, and the public key used to verify the signature is from a trusted source. A data stream with a signature that does not validate SHOULD NOT be evaluated by a content consumer. | Content consumers SHOULD validate XML digital signatures if they exist in the content. Validating a signature includes confirming that the signature value is valid, all of the reference hashes in the signature and manifest are correct, and the public key used to verify the signature is from a trusted source. A data stream with a signature that does not validate SHOULD NOT be evaluated by a content consumer. | NOT_CHECKED | WARNING | TOOL | |
293 | 4.2 | If more than one <ds:data-stream> element is specified on the <ds:data-stream-collection>, the ID of the <ds:data-stream> to execute MUST be indicated to the content consumer, and the content consumer MUST use the specified <ds:data-stream> | If more than one <ds:data-stream> element is specified on the <ds:data-stream-collection>, the ID of the <ds:data-stream> to execute MUST be indicated to the content consumer, and the content consumer MUST use the specified <ds:data-stream> | NOT_CHECKED | ERROR | TOOL | |
294 | 4.2 | If more than one <xccdf:Benchmark> is referenced by a <ds:data-stream>, the ID of the <xccdf:Benchmark> to execute MUST be indicated to the content consumer, and the content consumer MUST process the indicated <xccdf:Benchmark> | If more than one <xccdf:Benchmark> is referenced by a <ds:data-stream>, the ID of the <xccdf:Benchmark> to execute MUST be indicated to the content consumer, and the content consumer MUST process the indicated <xccdf:Benchmark> | NOT_CHECKED | ERROR | TOOL | |
295 | 4.3.1 | CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The CPE SHALL be matched against all CPEs in all of the dictionaries referenced by the <ds:data-stream> element. All CPEs that return an EQUAL or SUPERSET result as defined in CPE Name Matching [CPE-M] SHALL be used in evaluating the <xccdf:platform> or <cpe2:fact-ref>. | CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The CPE SHALL be matched against all CPEs in all of the dictionaries referenced by the <ds:data-stream> element. All CPEs that return an EQUAL or SUPERSET result as defined in CPE Name Matching [CPE-M] SHALL be used in evaluating the <xccdf:platform> or <cpe2:fact-ref>. | NOT_CHECKED | NA | TOOL | |
296 | 4.3.1 | CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~Either a list of CPEs found on the target asset MUST be known before the scan, or a list SHALL be generated. If a previously known list is used, it MUST be equivalent to a newly generated list. To generate the list, the <cpe2_dict:check> element data associated with the found <cpe2_dict:cpe-item> elements SHALL be evaluated against the target using the referenced OVAL inventory class definition. If a <cpe2_dict:check> returns "pass", then the corresponding CPE SHALL be added to the list of CPEs found on the target. | CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~Either a list of CPEs found on the target asset MUST be known before the scan, or a list SHALL be generated. If a previously known list is used, it MUST be equivalent to a newly generated list. To generate the list, the <cpe2_dict:check> element data associated with the found <cpe2_dict:cpe-item> elements SHALL be evaluated against the target using the referenced OVAL inventory class definition. If a <cpe2_dict:check> returns "pass", then the corresponding CPE SHALL be added to the list of CPEs found on the target. | NOT_CHECKED | NA | TOOL | |
297 | 4.3.1 | CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The list of CPEs found on the target asset, along with the <xccdf:platform> or <cpe2:platform-specification> SHALL be used as input to the CPE Applicability Language [CPE-L] algorithm to determine the XCCDF Benchmark applicability to the target asset. | CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The list of CPEs found on the target asset, along with the <xccdf:platform> or <cpe2:platform-specification> SHALL be used as input to the CPE Applicability Language [CPE-L] algorithm to determine the XCCDF Benchmark applicability to the target asset. | NOT_CHECKED | NA | TOOL | |
298 | 4.4.1 | The ARF report MUST contain a report object for each XCCDF, OVAL, and OCIL component executed when a source data stream is evaluated against a target | The ARF report MUST contain a report object for each XCCDF, OVAL, and OCIL component executed when a source data stream is evaluated against a target | NOT_CHECKED | NA | SKIPPED | |
299 | 4.4.2 | The target asset MUST be represented in the ARF report using the <ai:assets> part of ARF. The <ai:asset> element populated about a target asset SHOULD include the fields specified in Table 18, where applicable | The target asset MUST be represented in the ARF report using the <ai:assets> part of ARF. The <ai:asset> element populated about a target asset SHOULD include the fields specified in Table 18, where applicable | SCHEMATRON | WARNING | RESULT_CONTENT | |
300 | 4.4.3 | The source data stream collection that was used to generate the results against the target SHOULD be included in the ARF report as an <arf:report-request>. | The source data stream collection that was used to generate the results against the target SHOULD be included in the ARF report as an <arf:report-request>. | SCHEMATRON | WARNING | RESULT_CONTENT | |
301 | 4.4.4 | Table 19 outlines the relationships that MUST be specified in the ARF report if the stated condition is satisfied. | Table 19 outlines the relationships that MUST be specified in the ARF report if the stated condition is satisfied. | NOT_CHECKED | NA | RESULT_CONTENT | |
304 | 4.5 | An <xccdf:target-id-ref> SHALL be specified with a @system attribute of "http://scap.nist.gov/schema/asset-identification/1.1", an @href attribute value of "", and a @name attribute value of the ID of the <ai:asset> element in the ARF that this <xccdf:TestResult> is about. | An <xccdf:target-id-ref> SHALL be specified with a @system attribute of "http://scap.nist.gov/schema/asset-identification/1.1", an @href attribute value of "", and a @name attribute value of the ID of the <ai:asset> element in the ARF that this <xccdf:TestResult> is about. | SCHEMATRON | ERROR | RESULT_CONTENT | |
NIST SP800-126 errata has updated the "arf-rel" namespace to http://scap.nist.gov/specifications/arf/vocabulary/relationships/1.0# The original namespace of http://scap.nist.gov/vocabulary/arf/relationships/1.0# has been detected. | SCHEMATRON | WARNING | RESULT_CONTENT | ||||
306 | 4.6 | When specifying OVAL system characteristics, a reference SHOULD be made to the target asset in the ARF report collection. Specifically, the <oval-sc:oval_system_characteristics>/<oval-sc:system_info>/##any SHOULD be populated with a <con:asset-identification> element. That element MUST be populated with a single <arf:object-ref> element that points to the <ai:asset> element in the ARF report collection pertaining to the OVAL result. See [ARF] for details on populating the <arf:object-ref> element. | When specifying OVAL system characteristics, a reference SHOULD be made to the target asset in the ARF report collection. Specifically, the <oval-sc:oval_system_characteristics>/<oval-sc:system_info>/##any SHOULD be populated with a <con:asset-identification> element. That element MUST be populated with a single <arf:object-ref> element that points to the <ai:asset> element in the ARF report collection pertaining to the OVAL result. See [ARF] for details on populating the <arf:object-ref> element. | SCHEMATRON | WARNING | RESULT_CONTENT | |
307 | 4.8 | One XML digital signature MAY be included in an <arf:extended-info> element in the ARF report. | One XML digital signature MAY be included in an <arf:extended-info> element in the ARF report. | NOT_CHECKED | NA | RESULT_CONTENT | |
308 | 4.8 | The signature MUST be represented as a <dsig:Signature> element and MUST follow the W3C recommendation [DSIG]. | The signature MUST be represented as a <dsig:Signature> element and MUST follow the W3C recommendation [DSIG]. | APPLICATION | NA | RESULT_CONTENT | |
309 | 4.8 | The <dsig:Signature> element MUST sign the ARF report collection root element. | The <dsig:Signature> element MUST sign the ARF report collection root element. | NOT_CHECKED | NA | RESULT_CONTENT | |
310 | 4.8 | The <dsig:Signature> element MUST follow the recommendations in [TMSAD] | The <dsig:Signature> element MUST follow the recommendations in [TMSAD] | APPLICATION | NA | RESULT_CONTENT | |
311 | 4.8 | A <dsig:SignatureProperties> element MUST be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element MUST be populated with <dt:signature-info> as specified in [TMSAD]. | A <dsig:SignatureProperties> element MUST be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element MUST be populated with <dt:signature-info> as specified in [TMSAD]. | SCHEMATRON | ERROR | RESULT_CONTENT | |
312 | 4.8 | The first <dsig:Reference> element in a <dsig:Signature> element MUST be to the <arf:asset-report-collection> element. The element MUST be referenced in the @URI attribute using the empty string convention "". | The first <dsig:Reference> element in a <dsig:Signature> element MUST be to the <arf:asset-report-collection> element. The element MUST be referenced in the @URI attribute using the empty string convention "". | SCHEMATRON | ERROR | RESULT_CONTENT | |
313 | 4.8 | Two XPath Filter 2 transforms MUST exist on the first <dsig:Reference> element in a <dsig:Signature> element. Both MUST specify a filter type of "subtract". The first transform MUST specify the XPath "/arf:asset-report-collection/arf:extended-infos[count(arf:extended-info[dsig:Signature]) = count(*)]". The second transform MUST specify the XPath "/arf:asset-report-collection/arf:extended-infos/arf:extended-info[dsig:Signature]". In both cases, the namespace prefix "arf" MUST map to the ARF namespace specified in this document. | Two XPath Filter 2 transforms MUST exist on the first <dsig:Reference> element in a <dsig:Signature> element. Both MUST specify a filter type of "subtract". The first transform MUST specify the XPath "/arf:asset-report-collection/arf:extended-infos[count(arf:extended-info[dsig:Signature]) = count(*)]". The second transform MUST specify the XPath "/arf:asset-report-collection/arf:extended-infos/arf:extended-info[dsig:Signature]". In both cases, the namespace prefix "arf" MUST map to the ARF namespace specified in this document. | SCHEMATRON | ERROR | RESULT_CONTENT | |
314 | 4.8 | The second <dsig:Reference> element MUST be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element MUST be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties> | The second <dsig:Reference> element MUST be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element MUST be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties> | SCHEMATRON | ERROR | SOURCE_CONTENT | |
315 | 4.8 | Key information SHOULD be provided on the <dsig:Signature> element. | Key information SHOULD be provided on the <dsig:Signature> element. | SCHEMATRON | WARNING | RESULT_CONTENT | |
316 | 4.8 | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The <arf:extended-info> element containing the original signature SHALL be removed from the resulting document. | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The <arf:extended-info> element containing the original signature SHALL be removed from the resulting document. | SCHEMATRON | ERROR | RESULT_CONTENT | |
317 | 4.8 | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The original signature SHALL be captured as a <dsig:Object> element on the new <dsig:Signature> | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The original signature SHALL be captured as a <dsig:Object> element on the new <dsig:Signature> | NOT_CHECKED | NA | SOURCE_CONTENT | |
318 | 4.8 | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The first <dsig:Reference> element on the new <dsig:Signature> element SHALL reference the <dsig:Object> element containing the original signature. The <dsig:Object> element MUST be referenced in the @URI attribute using "#" + @Id of the <dsig:Object> | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The first <dsig:Reference> element on the new <dsig:Signature> element SHALL reference the <dsig:Object> element containing the original signature. The <dsig:Object> element MUST be referenced in the @URI attribute using "#" + @Id of the <dsig:Object> | SCHEMATRON | ERROR | RESULT_CONTENT | |
319 | 4.8 | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The second <dsig:Reference> element MUST be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element MUST be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties> | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The second <dsig:Reference> element MUST be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element MUST be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties> | SCHEMATRON | ERROR | RESULT_CONTENT | |
320 | 4.8 | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~A <dsig:SignatureProperties> element MUST be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element MUST be populated with <dt:signature-info> as specified in [TMSAD]. | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~A <dsig:SignatureProperties> element MUST be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element MUST be populated with <dt:signature-info> as specified in [TMSAD]. | SCHEMATRON | ERROR | RESULT_CONTENT | |
321 | 4.8 | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~Key information SHOULD be provided on the <dsig:Signature> element in accordance with [TMSAD]. | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~Key information SHOULD be provided on the <dsig:Signature> element in accordance with [TMSAD]. | SCHEMATRON | ERROR | RESULT_CONTENT | |
322 | 4.8 | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The new <dsig:Signature> element MUST be placed in a new <arf:extended-info> element in the ARF report collection. | In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The new <dsig:Signature> element MUST be placed in a new <arf:extended-info> element in the ARF report collection. | NOT_CHECKED | NA | RESULT_CONTENT | |
323 | 4.8 | When signing a result data stream, the source data stream collection SHOULD be captured in the ARF report being signed. | When signing a result data stream, the source data stream collection SHOULD be captured in the ARF report being signed. | SCHEMATRON | WARNING | RESULT_CONTENT | |
329 | 3.1.2 | The SCAP source data stream collection SHALL validate against the XML schema representation for the source data stream, as well as all Schematron rules embedded within that schema. | The SCAP source data stream collection SHALL validate against the XML schema representation for the source data stream, as well as all Schematron rules embedded within that schema. | APPLICATION | ERROR | TOOL | |
330 | 3.1.2 | If applicable, each component MUST validate against its associated Schematron stylesheet. For the SCAP source data stream collection, it MUST validate against the version of the SCAP Schematron rules as specified on the <ds:data-stream-collection> element's @schematron-version attribute, and it SHOULD also validate against the latest Schematron rules. | For the SCAP source data stream collection, it MUST validate against the version of the SCAP Schematron rules as specified on the <ds:data-stream-collection> element’s @schematron-version attribute. | APPLICATION | ERROR | SOURCE_CONTENT | |
For the SCAP source data stream collection, it SHOULD also validate against the latest Schematron rules. | APPLICATION | ERROR | SOURCE_CONTENT | ||||
If applicable, each component MUST validate against its associated Schematron stylesheet. | APPLICATION | ERROR | SOURCE_CONTENT | ||||
331 | 3.2.4.1 | When referencing a CVE, CCE, or CPE identifier, an <xccdf:Rule> element MUST have a purpose consistent with one of the rows in Table 15. Based on the purpose of the <xccdf:Rule> element, the <xccdf:Rule> SHALL define its <xccdf:ident> element's @system attribute using the corresponding value from Table 15. Also, if the <xccdf:Rule> element references an OVAL Definition, it SHALL reference an OVAL Definition of the specified class. ~Table 15 – <xccdf:Rule> and <xccdf:ident> Element Values~Purpose of the <xccdf:Rule>~OVAL Definition Class~Identifier Type~Value for <xccdf:ident> @system attribute~~Check compliance with a configuration setting~compliance~CCE~http://cce.mitre.org~~Perform a software inventory check~inventory~CPE~http://cpe.mitre.org~~Check for a software flaw vulnerability~vulnerability~CVE~http://cve.mitre.org~~ | If an <xccdf:Rule> has an <xccdf:ident> with a CCE and that rule reference an OVAL definition, the definition SHALL have @class 'compliance'. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
If an <xccdf:Rule> has an <xccdf:ident> with a CVE and that rule reference an OVAL definition, the definition SHALL have @class 'vulnerability'. | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
If an <xccdf:Rule> has an <xccdf:ident> with a CPE and that rule reference an OVAL definition, the definition SHALL have @class 'inventory'. | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
332 | 3.1 | Content authors MAY place components in any order. | Content authors MAY place components in any order. | NOT_CHECKED | ERROR | SOURCE_CONTENT | |
333 | 3.1.2 | Any component in a data stream collection SHALL be referenced not more than once by any data stream in that collection. | Any component in a data stream collection SHALL be referenced not more than once by any data stream in that collection. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
334 | 3.1.2 | The SCAP components referenced by each <ds:component> and <ds:extended-component> element SHALL validate against the corresponding component schema and its embedded Schematron rules. | The SCAP components referenced by each <ds:component> and <ds:extended-component> element SHALL validate against the corresponding component schema and its embedded Schematron rules. | APPLICATION | ERROR | SOURCE_CONTENT | |
335 | 3.1.2 | Schematron rules to check well-formed SCAP content. The Schematron files for the SCAP specification and its applicable component specifications are located at http://scap.nist.gov/revision/1.2/#schematron. Source content SHOULD pass all Schematron assertions in the Schematron rule files. When creating source content, failed assertions with a "warning" flag MAY be disregarded if the assertion discovers an issue in the content that is justifiable and expected based on the needs of the content author. When executing source content, all failed assertions with a "warning" flag MUST be disregarded. | Schematron rules to check well-formed SCAP content. The Schematron files for the SCAP specification and its applicable component specifications are located at http://scap.nist.gov/revision/1.2/#schematron. Source content SHOULD pass all Schematron assertions in the Schematron rule files. When creating source content, failed assertions with a "warning" flag MAY be disregarded if the assertion discovers an issue in the content that is justifiable and expected based on the needs of the content author. When executing source content, all failed assertions with a "warning" flag MUST be disregarded. | NOT_CHECKED | ERROR | TOOL | |
336 | 3.1.2 | The latest Schematron file SHOULD be used in place of any earlier versions. If the latest file is unavailable, the version specified on the <ds:data-stream-collection> element's @schematron-version attribute SHALL be used instead. | The latest Schematron file SHOULD be used in place of any earlier versions. If the latest file is unavailable, the version specified on the <ds:data-stream-collection> element's @schematron-version attribute SHALL be used instead. | NOT_CHECKED | NA | TOOL | |
337 | 3.1.2 | Also, for the component specifications, the Schematron file on the SCAP website SHALL be used in place of any corresponding Schematron file available elsewhere. | Also, for the component specifications, the Schematron file on the SCAP website SHALL be used in place of any corresponding Schematron file available elsewhere. | NOT_CHECKED | NA | SKIPPED | |
338 | 3.1.3 | The elements listed in Table 13 have special conventions around the format of their identifiers (@id attribute). Authors MUST follow these conventions because they preserve the global uniqueness of the resulting identifiers. In Table 13, namespace contains a valid reverse-DNS style string (limited to letters, numbers, periods, and the hyphen character) that is associated with the content author. Examples include "com.acme.finance" and "gov.tla". These namespace strings MAY have any number of parts, and SCAP content consumers processing them SHALL treat them as case-insensitive (e.g., com.ABC is considered identical to com.abc). The name in the format conventions MUST be an NCName-compliant string [XMLS]. | The elements listed in Table 13 have special conventions around the format of their identifiers (@id attribute). Authors MUST follow these conventions because they preserve the global uniqueness of the resulting identifiers. In Table 13, namespace contains a valid reverse-DNS style string (limited to letters, numbers, periods, and the hyphen character) that is associated with the content author. Examples include "com.acme.finance" and "gov.tla". These namespace strings MAY have any number of parts, and SCAP content consumers processing them SHALL treat them as case-insensitive (e.g., com.ABC is considered identical to com.abc). The name in the format conventions MUST be an NCName-compliant string [XMLS]. | SCHEMA | ERROR | SOURCE_CONTENT | |
339 | 3.2.1 | XInclude elements SHALL NOT be included in XCCDF content [XINCLUDE]. | XInclude elements SHALL NOT be included in XCCDF content [XINCLUDE]. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
340 | 3.2.1 | All remaining OPTIONAL elements in the XCCDF schema MAY be included at the author's discretion unless otherwise noted in this document. | All remaining OPTIONAL elements in the XCCDF schema MAY be included at the author's discretion unless otherwise noted in this document. | NOT_CHECKED | NA | SKIPPED | |
341 | 3.2.2 | The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The @update attribute of the <xccdf:version> element SHOULD be used for a URI that specifies where updates to the benchmark can be obtained. | @update on <xccdf:version> SHOULD be specified | SCHEMATRON | WARNING | SOURCE_CONTENT | |
342 | 3.2.3 | As stated in the XCCDF specification, the use of an <xccdf:Profile> element is not required. | As stated in the XCCDF specification, the use of an <xccdf:Profile> element is not required. | NOT_CHECKED | NA | TOOL | |
343 | 3.2.3 | Use of the <xccdf:set-complex-value> element within the <xccdf:Profile> element SHALL NOT be allowed. | Use of the <xccdf:set-complex-value> element within the <xccdf:Profile> element SHALL NOT be allowed. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
344 | 3.2.4.1 | See Section 4.5.1 for information on the meaning of a "pass/fail" rule result relating to each of the identifier types in Table 15. All rules that contain CCE, CPE, or CVE entries in their <xccdf:ident> elements MUST obey these meanings. As a result, such <xccdf:ident> elements MUST only be included either if the recommendation is identical to these associated meanings or if they have a @con:negate attribute (as described in Section 4.5.1) set to comply with the intended meaning (by default, @con:negate is set to false). In SCAP, an <xccdf:ident> element is not simply a reference to related material – it is a declaration of exact alignment with the described meanings. | See Section 4.5.1 for information on the meaning of a "pass/fail" rule result relating to each of the identifier types in Table 15. All rules that contain CCE, CPE, or CVE entries in their <xccdf:ident> elements MUST obey these meanings. As a result, such <xccdf:ident> elements MUST only be included either if the recommendation is identical to these associated meanings or if they have a @con:negate attribute (as described in Section 4.5.1) set to comply with the intended meaning (by default, @con:negate is set to false). In SCAP, an <xccdf:ident> element is not simply a reference to related material – it is a declaration of exact alignment with the described meanings. | NOT_CHECKED | NA | SKIPPED | |
345 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OVAL check system~The @href attribute in the <xccdf:check-content-ref> element MUST reference an OVAL source data stream component using the <ds:component-ref> approach defined above. | <xccdf:check-content-ref> in an OVAL <xccdf:check> MUST reference an OVAL component. If your content contains external references, SCAPVal will attempt to resolve it in -online mode. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
346 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OVAL check system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it MUST reference an OVAL Definition in the designated OVAL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute. | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OVAL check system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it MUST reference an OVAL Definition in the designated OVAL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute. | APPLICATION | ERROR | SOURCE_CONTENT | |
347 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~OCIL questionnaires SHOULD NOT be used if OVAL can perform the same check correctly. | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~OCIL questionnaires SHOULD NOT be used if OVAL can perform the same check correctly. | NOT_CHECKED | NA | SKIPPED | |
348 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~The @href attribute in the <xccdf:check-content-ref> element MUST reference an OCIL source data stream component using the <ds:component-ref> approach defined above. | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~The @href attribute in the <xccdf:check-content-ref> element MUST reference an OCIL source data stream component using the <ds:component-ref> approach defined above. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
349 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it MUST reference an OCIL questionnaire in the designated OCIL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute. | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it MUST reference an OCIL questionnaire in the designated OCIL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
350 | 3.2.4.2 | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~Follow the additional requirements in Appendix B of NIST Interagency Report (IR) 7692, Specifications for the Open Checklist Interactive Language (OCIL) Version 2.0 [OCIL]. | The following requirements and recommendations apply to the <xccdf:check> element:~~This version of SCAP supports the OVAL and OCIL check systems. Use of these check systems SHALL be restricted as follows:~~OCIL check system~Follow the additional requirements in Appendix B of NIST Interagency Report (IR) 7692, Specifications for the Open Checklist Interactive Language (OCIL) Version 2.0 [OCIL]. | APPLICATION | ERROR | SOURCE_CONTENT | |
351 | 3.2.4.2 | If a check system that is not supported by SCAP is used in XCCDF content, this content SHALL NOT be considered well-formed with regards to SCAP. | Only OVAL and OCIL are supported check systems | SCHEMATRON | ERROR | SOURCE_CONTENT | |
352 | 3.2.4.3 | An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that MUST reference an OVAL source data stream component. When implementing a patches up-to-date XCCDF rule, the following approach SHALL be used:~The <xccdf:Rule> element that references an OVAL source data stream component SHALL have the @id attribute value of "xccdf_NAMESPACE_rule_security_patches_up_to_date", where NAMESPACE is the reverse DNS format namespace associated with the content maintainer. | An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that MUST reference an OVAL source data stream component. When implementing a patches up-to-date XCCDF rule, the following approach SHALL be used:~The <xccdf:Rule> element that references an OVAL source data stream component SHALL have the @id attribute value of "xccdf_NAMESPACE_rule_security_patches_up_to_date", where NAMESPACE is the reverse DNS format namespace associated with the content maintainer. | NOT_CHECKED | NA | SKIPPED | |
353 | 3.2.4.4 | CCSS scores are more stable than CVSS scores, but they still may change over time. Accordingly, during scoring, current CCSS scores acquired dynamically, such as from a data feed, MAY be used in place of the @weight attribute within XCCDF configuration setting-related rules. | CCSS scores are more stable than CVSS scores, but they still may change over time. Accordingly, during scoring, current CCSS scores acquired dynamically, such as from a data feed, MAY be used in place of the @weight attribute within XCCDF configuration setting-related rules. | NOT_CHECKED | NA | TOOL | |
354 | 3.2.6 | XCCDF group extension SHALL NOT be allowed. | XCCDF group extension SHALL NOT be allowed. | APPLICATION | ERROR | SOURCE_CONTENT | |
355 | 3.3 | Because SCAP 1.2 supports the use of multiple OVAL source data stream components, an SCAP content creator could choose to divide the OVAL Definitions into multiple components based on the "least version" of each definition. For example, if some OVAL Definitions only required OVAL 5.3 while others required OVAL 5.10, then the content creator could create one OVAL source data stream component for the OVAL 5.3 definitions and another for the OVAL 5.10 definitions. SCAP 1.2 also supports multiple types of OVAL Definitions within a single OVAL source data stream component; for example, a benchmark could reference OVAL compliance and vulnerability definitions contained in a single data stream component. | Because SCAP 1.2 supports the use of multiple OVAL source data stream components, an SCAP content creator could choose to divide the OVAL Definitions into multiple components based on the "least version" of each definition. For example, if some OVAL Definitions only required OVAL 5.3 while others required OVAL 5.10, then the content creator could create one OVAL source data stream component for the OVAL 5.3 definitions and another for the OVAL 5.10 definitions. SCAP 1.2 also supports multiple types of OVAL Definitions within a single OVAL source data stream component; for example, a benchmark could reference OVAL compliance and vulnerability definitions contained in a single data stream component. | NOT_CHECKED | NA | SKIPPED | |
356 | 3.4 | OCIL content SHOULD be used for checking rules that cannot be fully automated with OVAL. | OCIL content SHOULD be used for checking rules that cannot be fully automated with OVAL. | NOT_CHECKED | NA | SKIPPED | |
357 | 3.4 | If an <ocil:questionnaire> element maps to one or more CCE, CVE, and/or CPE identifiers, it SHOULD include <ocil:reference> elements that reference those identifiers using the corresponding following format:~<ocil:reference href="http://cce.mitre.org">CCE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cve.mitre.org">CVE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cpe.mitre.org">CPE_identifier</ocil:reference> | If an <ocil:questionnaire> element maps to one or more CCE, CVE, and/or CPE identifiers, it SHOULD include <ocil:reference> elements that reference those identifiers using the corresponding following format:~<ocil:reference href="http://cce.mitre.org">CCE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cve.mitre.org">CVE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cpe.mitre.org">CPE_identifier</ocil:reference> | NOT_CHECKED | NA | SKIPPED | |
358 | 3.5 | Checklist authors SHOULD ensure that each CPE name [CPE-N] they specify in an <xccdf:platform> or <cpe2:fact-ref> element within an XCCDF document has a check associated with its CPE name. If a corresponding check does not exist, then it will not be possible to fully detect the presence of the product and determine platform applicability. Because there may be a lag between the time that a new product is available and the Official CPE Dictionary is updated to include a CPE name for that product, third-party dictionaries would need to be used to compensate for the lag. | |||||
359 | 3.1 | As such, content authors MAY digitally sign source content following the guidelines in [TMSAD], along with the following requirements. | As such, content authors MAY digitally sign source content following the guidelines in [TMSAD], along with the following requirements. | NOT_CHECKED | NA | SKIPPED | |
360 | 3.1 | One or more XML digital signatures MAY be included as the last elements in the SCAP source data stream collection root element. | One or more XML digital signatures MAY be included as the last elements in the SCAP source data stream collection root element. | SCHEMA | ERROR | SOURCE_CONTENT | |
361 | 4.1 | Content consumers that process legacy SCAP content MUST be capable of outputting results in the same SCAP version as the source content, and MAY convert the legacy SCAP results into SCAP 1.2 results. | Content consumers that process legacy SCAP content MUST be capable of outputting results in the same SCAP version as the source content, and MAY convert the legacy SCAP results into SCAP 1.2 results. | NOT_CHECKED | NA | TOOL | |
362 | 4.2 | Whenever a <ds:extended-component> that is not recognized by the tool is referenced from a <ds:data-stream>, <ds:component>, or <ds:extended-component> element, the tool SHALL issue a warning. | Whenever a <ds:extended-component> that is not recognized by the tool is referenced from a <ds:data-stream>, <ds:component>, or <ds:extended-component> element, the tool SHALL issue a warning. | NOT_CHECKED | NA | TOOL | |
363 | 4.4 | An SCAP result data stream SHALL conform to the [ARF] specification. | An SCAP result data stream SHALL conform to the [ARF] specification. | NOT_CHECKED | NA | RESULT_CONTENT | |
364 | 4.4 | In all situations, one or more component results (e.g., XCCDF, check results), the target asset, and/or the SCAP source data stream collection represented as a report request in ARF MAY be represented either as a local component in the ARF or as a remote resource, leveraging the remote resource capability built into ARF. | In all situations, one or more component results (e.g., XCCDF, check results), the target asset, and/or the SCAP source data stream collection represented as a report request in ARF MAY be represented either as a local component in the ARF or as a remote resource, leveraging the remote resource capability built into ARF. | SCHEMA | ERROR | RESULT_CONTENT | |
365 | 4.4.1 | It MAY contain additional report objects for other results, such as <oval-var:oval_variables> or extended component results. | It MAY contain additional report objects for other results, such as <oval-var:oval_variables> or extended component results. | NOT_CHECKED | NA | RESULT_CONTENT | |
366 | 4.4.1 | Each component result MUST be captured as a separate <arf:report> element in the <arf:asset-report-collection> element, and when reporting on XCCDF, OVAL or OCIL, each component report SHALL use the element specified in Table 17 as its root element. | Each component result MUST be captured as a separate <arf:report> element in the <arf:asset-report-collection> element, and when reporting on XCCDF, OVAL or OCIL, each component report SHALL use the element specified in Table 17 as its root element. | NOT_CHECKED | NA | RESULT_CONTENT | |
367 | 4.4.1 | Each SCAP result data stream component SHOULD NOT use any constructs that are deprecated in its associated specification. | Each SCAP result data stream component SHOULD NOT use any constructs that are deprecated in its associated specification. | NOT_CHECKED | NA | RESULT_CONTENT | |
368 | 4.4.1 | Validation of each component SHALL be done in accordance with the portions of this document that define requirements for the component. | Validation of each component SHALL be done in accordance with the portions of this document that define requirements for the component. | NOT_CHECKED | NA | SKIPPED | |
369 | 4.4.2 | Additional identification information MAY be captured in the <ai:asset> element (asset tag, system GUID, etc.) The guidelines specified in [AI] MUST be followed when populating the asset identification information. | Additional identification information MAY be captured in the <ai:asset> element (asset tag, system GUID, etc.) The guidelines specified in [AI] MUST be followed when populating the asset identification information. | NOT_CHECKED | NA | RESULT_CONTENT | |
370 | 4.5 | The @href attribute SHALL contain "#" + the @id of the <arf:report> containing the check result. This approach provides traceability between XCCDF and check results. | The @href attribute SHALL contain "#" + the @id of the <arf:report> containing the check result. This approach provides traceability between XCCDF and check results. | SCHEMATRON | ERROR | RESULT_CONTENT | |
Depending on the checking engine used (OVAL or OCIL), the the <arf:report> element should contain the relevant (OVAL or OCIL) content. | SCHEMATRON | ERROR | RESULT_CONTENT | ||||
371 | 4.5 | Note that if @multi-check is not set to "true" and the <xccdf:rule-result> represents a group of checks, then the @name attribute SHALL be omitted. | Note that if @multi-check is not set to "true" and the <xccdf:rule-result> represents a group of checks, then the @name attribute SHALL be omitted. | NOT_CHECKED | NA | RESULT_CONTENT | |
376 | 5 | Note that as stated in Table 3 in Section 3.1, each data stream is required to have a @use-case attribute in its <ds:data-stream> element with a value corresponding either to one of the content types defined in this section or to "OTHER", for data streams not corresponding to a defined use case. | Note that as stated in Table 3 in Section 3.1, each data stream is required to have a @use-case attribute in its <ds:data-stream> element with a value corresponding either to one of the content types defined in this section or to "OTHER", for data streams not corresponding to a defined use case. | SCHEMA | ERROR | SOURCE_CONTENT | |
A1 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | Working off-line, unable to download latest CCE and CPE dictionaries. | APPLICATION | WARNING | SOURCE_CONTENT | |
A2 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | Version not found in OVAL file, unable to apply OVAL schematron rules. | APPLICATION | ERROR | SOURCE_CONTENT | |
A3 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | A file that is required for the SCAP validation use case could not be located. Please ensure that the file is named in accordance with the NIST SP 800-126 and that the file is not contained within a sub folder. | APPLICATION | ERROR | SOURCE_CONTENT | |
A4 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | Skipping unrecognized file in SCAP bundle. | APPLICATION | WARNING | SOURCE_CONTENT | |
A5 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | SCAP use case not found in combined data stream. | APPLICATION | ERROR | SOURCE_CONTENT | |
A6 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | SCAP version not found in combined data stream. | APPLICATION | ERROR | SOURCE_CONTENT | |
A7 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | XCCDF document contains a reference to an unrecognized file type. | APPLICATION | ERROR | SOURCE_CONTENT | |
A8 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | Working off-line, unable to resolve remote reference in XCCDF document. | APPLICATION | ERROR | SOURCE_CONTENT | |
A9 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | Remote reference in XCCDF document could not be located or is too large to download. To override the default maximum size limit for remote references, set the -maxsize parameter | APPLICATION | ERROR | SOURCE_CONTENT | |
A10 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | XML content failed schema validation. | APPLICATION | ERROR | SOURCE_CONTENT | |
A11 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | Unrecognized schema reference. | APPLICATION | ERROR | SOURCE_CONTENT | |
A12 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | In certain instances, a newer XML schema may be substituted for an older one for schema validation. | APPLICATION | WARNING | SOURCE_CONTENT | |
A14 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | Content failed validation against MITRE OVAL schematron validation. | APPLICATION | ERROR | SOURCE_CONTENT | |
A15 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | Unused OVAL definitions exist | APPLICATION | WARNING | SOURCE_CONTENT | |
A16 | N/A | This is an additional, common-sense check. | CCE number is expected, but missing as a reference | APPLICATION | WARNING | SOURCE_CONTENT | |
A17 | N/A | This is an additional, common-sense check. | CCE number is in an invalid format or the check-digit does not match. It should be of format CCE-XXXX-X or CCE-XXXXX-X where each X is a digit, and the final X is a check-digit. | APPLICATION | ERROR | SOURCE_CONTENT | |
A18 | N/A | This is an additional, common-sense check. | The attribute @content-type on <scap:check-system-content> must match the content as such: OVAL_COMPLIANCE, OVAL_PATCH, CPE_INVENTORY, OVAL_VULNERABILITY must contain an <oval-def:oval_definitions> element; OCIL_QUESTIONS must contain an <ocil:ocil> element. | APPLICATION | ERROR | SOURCE_CONTENT | |
A19 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | A file that is required for the SCAP results validation could not be located. Please ensure that the file is named in accordance with the NIST SP 800-126 and that the file is not contained within a sub folder. | APPLICATION | ERROR | RESULT_CONTENT | |
A20 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | The profile provided on the command-line must exist in the source XCCDF document. | APPLICATION | ERROR | SOURCE_CONTENT | |
A21 | N/A | This requirement is intended to help the end-user, but it isn't required for content to pass validation. | The OVAL test type is not checked in the NIST SCAP Validation Program. | APPLICATION | INFO | SOURCE_CONTENT | |
A22 | N/A | This requirement is intended to help the end-user, but it isn't required for content to pass validation. | A custom XPath function is not available | APPLICATION | INFO | SOURCE_CONTENT | |
A23 | N/A | This is an application specific requirement. If content does not pass this check the SCAP Content Validation Tool may fail. | The content contains an XML element in a namespace that is not governed by one of the officially supported SCAP specifications. This tool will not load external XML schemas, so XML schema validation errors may be produced. The namespace is {0} | APPLICATION | WARNING | SOURCE_CONTENT | |
A24 | N/A | This is an extension of requirement 300-1. If the arf-report does not include a source data stream it will print a warning to the user stating that they can manually specify a source data-stream with a command. | The source data stream collection SHOULD be included in the ARF report as an <arf:report-request>. The user should run SCAPVal using the -source_ds argument to specify the source data stream collection that was used to generate the results. | APPLICATION | WARNING | SOURCE_CONTENT | |
A25 | N/A | This requirement for unique xccdf:Profile @id cannot be handled by the XCCDF schema in SCAP source data streams. There is no direct reference to the req in 800-126r2 but this still needs to be checked. | The @id attribute of all <xccdf:Profile> elements in a SCAP source data stream must be unique. | APPLICATION | ERROR | SOURCE_CONTENT | |
CONFIGURATION |
|||||||
Requirement ID | 800-126 Section | 800-126 Statement | 800-126 Derived Requirement | Requirement Type | Error Level | Requirement Category | |
30 | 5.1 | If the XCCDF benchmark component references any CPE names, then the SCAP source data stream MUST include a CPE component, which specifies the products or platforms of interest, and MUST include one or more OVAL inventory class definitions in an OVAL component that contain the technical procedures for determining whether or not a specific target asset has a product or platform of interest. | If an XCCDF referenced from a data stream contains an <xccdf:platform> or <cpe-lang:fact-ref>, then a CPE dictionary component must be reference from the same data stream, and an OVAL component with a definition of class "inventory" must also be referenced. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
236 | 5.1 | The SCAP source data stream component that MUST be included for compliance checking is the XCCDF benchmark, which expresses the checklist. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL compliance definition. This definition SHALL be contained in an OVAL component, which holds definitions of compliance checks used by the checklist. An XCCDF benchmark's rules MAY reference one or more OVAL compliance class definitions in an OVAL component.~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect, such as posing questions to users or harvesting configuration information from an existing database. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component.~An OVAL patch definition. This definition SHALL be contained in an OVAL component, which holds definitions for patch compliance checks. These checks may be needed if an organization includes patch verification in its compliance activities. An XCCDF benchmark MAY reference an OVAL patch definition through a patches up-to-date rule in a manner consistent with Section 3.2.4.3. | For this CONFIGURATION @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
Each xccdf:Rule must reference at least one of the follow items: OVAL compliance class, OCIL Questionnaire, OVAL patch class | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
262 | 5.1 | Each XCCDF benchmark SHALL have at least one rule that references either an OVAL compliance class definition in an OVAL component or an OCIL questionnaire in an OCIL component. | Each XCCDF Benchmark SHALL have at least one rule that references either an OVAL compliance class definition in an OVAL component or an OCIL questionnaire in an OCIL Questionnaire component. If your content contains external references, SCAPVal will attempt to resolve it in -online mode. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
263 | 5.1 | All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream. | All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream. | NOT_CHECKED | ERROR | SOURCE_CONTENT | |
324 | 5.1 | The @use-case attribute in the <ds:data-stream> element MUST be set to "CONFIGURATION". | The @use-case attribute in the <ds:data-stream> element MUST be set to "CONFIGURATION", "VULNERABILITY", "INVENTORY" or "OTHER" | SCHEMATRON | ERROR | SOURCE_CONTENT | |
VULNERABILITY_XCCDF_OVAL |
|||||||
Requirement ID | 800-126 Section | 800-126 Statement | 800-126 Derived Requirement | Requirement Type | Error Level | Requirement Category | |
33 | 5.2 | If the XCCDF benchmark component references any CPE names, then the SCAP source data stream MUST include a CPE component, which specifies the products or platforms of interest, and MUST include one or more OVAL inventory class definitions in an OVAL component that contain the technical procedures for determining whether or not a specific target asset has a product or platform of interest. | If an XCCDF referenced from a data stream contains an <xccdf:platform> or <cpe-lang:fact-ref>, then a CPE dictionary component must be reference from the same data stream, and an OVAL component with a definition of class "inventory" must also be referenced. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
242 | 5.2 | The SCAP source data stream component that MUST be included for vulnerability scanning is the XCCDF benchmark, which expresses the checklist of the flaws to be checked for. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL vulnerability definition. This definition SHALL be contained in an OVAL component, which holds definitions of vulnerability checks used by the checklist. An XCCDF benchmark's rules MAY reference one or more OVAL vulnerability class definitions in an OVAL component.~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect, such as giving a system administrator step-by-step directions for manually examining a system for a vulnerability that cannot be detected with OVAL, and then collecting information on the results of that manual examination. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component. ~An OVAL patch definition. This definition SHALL be contained in an OVAL component, which holds definitions for patch compliance checks. These checks may be needed if an organization includes patch verification in its vulnerability scanning activities. An XCCDF benchmark MAY reference an OVAL patch definition through a patches up-to-date rule in a manner consistent with Section 3.2.4.3. | For this VULNERABILITY @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
Each xccdf:Rule must reference at least one of the follow components: OVAL vulnerability class, OCIL Questionnaire, OVAL patch class | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
265 | 5.2 | Each XCCDF benchmark SHALL have at least one rule that references either an OVAL vulnerability class definition in an OVAL component or an OCIL questionnaire in an OCIL component. | Each XCCDF Benchmark SHALL have at least one rule that references either an OVAL vulnerability definition in the an OVAL component or an OCIL questionnaire in the OCIL Questionnaire component. | SCHEMATRON | ERROR | SOURCE_CONTENT | |
266 | 5.2 | All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream. | All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream. | NOT_CHECKED | ERROR | SOURCE_CONTENT | |
325 | 5.2 | The @use-case attribute in the <ds:data-stream> element MUST be set to "VULNERABILITY". | |||||
SYSTEM_INVENTORY |
|||||||
Requirement ID | 800-126 Section | 800-126 Statement | 800-126 Derived Requirement | Requirement Type | Error Level | Requirement Category | |
248 | 5.3 | The SCAP source data stream component that MUST be included for inventory scanning is the XCCDF benchmark, which references the inventory checks and captures the results. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL inventory definition. This definition SHALL be contained in an OVAL component, which holds definitions of technical procedures for determining whether or not a specific target asset has software (product, platform, malware, etc.) of interest. An XCCDF benchmark's rules MAY reference one or more OVAL inventory class definitions in an OVAL component. ~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect, such as posing questions to users or harvesting inventory information from an existing database. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component. | For this INVENTORY @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode. | SCHEMATRON | WARNING | SOURCE_CONTENT | |
Each xccdf:Rule must reference at least one OVAL definition in CPE_INVENTORY | SCHEMATRON | ERROR | SOURCE_CONTENT | ||||
327 | 5.3 | The @use-case attribute in the <ds:data-stream> element MUST be set to "INVENTORY". |