Date Published: November 2009
Author(s)
Stephen Quinn (NIST),
David Waltermire (NIST),
Christopher Johnson (NIST),
Karen Scarfone (NIST),
John Banghart (NIST)
This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates information about software flaws and security configurations. This document describes the basics of the SCAP component specifications and their interrelationships, the characteristics of SCAP content, as well as SCAP requirements not defined in the individual SCAP component specifications. This guide provides recommendations on how to use SCAP to achieve security automation for organizations seeking to implement SCAP.
This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates information about software flaws and security configu...
See full abstract
This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates information about software flaws and security configurations. This document describes the basics of the SCAP component specifications and their interrelationships, the characteristics of SCAP content, as well as SCAP requirements not defined in the individual SCAP component specifications. This guide provides recommendations on how to use SCAP to achieve security automation for organizations seeking to implement SCAP.
Hide full abstract
Keywords
Security automation; security configuration; Security Content Automation Protocol; vulnerabilities; SCAP; security content automation;
Control Families
Audit and Accountability;
Security Assessment and Authorization;
Configuration Management;
Maintenance;
Risk Assessment;
System and Communications Protection;
System and Services Acquisition;