Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, identify vulnerabilities, write customized auditing content, and evaluate compliance across your enterprise. Throughout, the authors provide detailed case studies and tips on selecting appropriate security components.
- Understand SCAP (Security Content Automation Protocol) technologies and standards
- Track compliance using benchmarks and scoring systems
- Build machine-readable configuration checks using XCCDF, OVAL, and OCIL
- Perform vulnerability assessments and find misconfiguration
- Maximize product interoperability through the use of standard enumeration
- Assess and monitor residual risk using CVSS values
- Use SCAP editors and XML to create and debug automated checks
- Accurately assess threats using software assurance automation
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, identify...
See full abstract
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, identify vulnerabilities, write customized auditing content, and evaluate compliance across your enterprise. Throughout, the authors provide detailed case studies and tips on selecting appropriate security components.
- Understand SCAP (Security Content Automation Protocol) technologies and standards
- Track compliance using benchmarks and scoring systems
- Build machine-readable configuration checks using XCCDF, OVAL, and OCIL
- Perform vulnerability assessments and find misconfiguration
- Maximize product interoperability through the use of standard enumeration
- Assess and monitor residual risk using CVSS values
- Use SCAP editors and XML to create and debug automated checks
- Accurately assess threats using software assurance automation
Hide full abstract