SlideShare a Scribd company logo
Datastream
http://martin.preisler.me/category/scap/page/2
Datastream can be thought of as an archive of interlinked SCAP
content(XCCDF,OVAL,CPE,…)
Type of datastream
• Source datastream (SDS)
• Result datastream (ARF)
>> The scanner takes a SDS, evaluates and gives results in the ARF
format back.
Source Datastream
• Has a root element called “data-stream-collection”.
• “data-stream-collection” contains 1 or more elements called “data-
stream”.
>>> each SDS has 1 or more modes in which it can be evaluated.
National Checklist Program (NCP)
• See NIST Special Publication 800-70 Rev.2
• Frequently Asked Questions: General Information
>> http://web.nvd.nist.gov/view/ncp/information
Security Configuration Checklist
• Also called lockdown, hardening guide, benchmark, security technical
implementation guide (STIG).
• Series of instruction for configuring a product to particular
operational environment.
• Can comprise templates, automated scripts, patches or patch
descriptions, XML files, and other procedures.
NIST maintains the National Checklist
Repository.
http://checklists.nist.gov/
Selecting checklists?
• Checklist users should carefully consider the degree of automation
and the source of each checklist.
• NIST defined 4 tiers of checklists to assist users.
• Tier1 checklists: are prose-based with narrative descriptions of how a
person can manually alter a product’s configuration.
• Tier4 checklists: have all security settings documented in machine-
readable, standardized Security Content Automation Protocol (SCAP)
formats,….. (see SP 800-70 Rev2).
Concept scap

More Related Content

PDF
Elasticsearch in production Boston Meetup October 2014
PPTX
ELK - Stack - Munich .net UG
ODP
Elastic Stack ELK, Beats, and Cloud
PPT
The RSC chemical validation and standardization platform, a potential path to...
PDF
Preservation Workflows with Taverna
PDF
Slides Global Warming
DOCX
KPT_Pritam
PDF
Photoshop Exercises
Elasticsearch in production Boston Meetup October 2014
ELK - Stack - Munich .net UG
Elastic Stack ELK, Beats, and Cloud
The RSC chemical validation and standardization platform, a potential path to...
Preservation Workflows with Taverna
Slides Global Warming
KPT_Pritam
Photoshop Exercises

Viewers also liked (20)

PPTX
Brand Focus 1 Page Presentation
PPTX
Cs presentation
DOC
Faheem_Resume_068315
PPSX
Varuna khullar founder@yogawith v
PPSX
Varuna khullar Founder@yogawith v
PDF
Especificaciones de_techo_de_acceso_1403709000421
PDF
McHardy Financial Nov -Dec 2015 Newsletter
PPTX
Photoshop Exercises
PDF
Wicked Problems: Global Warming and Crustaceans
PDF
My Academic Record
PPTX
Evaluation Question 4
DOCX
REPORT_UML_PRITAM
PDF
eWIN_Case_Study_-_A_Workforce_Strategy_to_Improve_Staff_Engagement[1]
PDF
Aimee Gonthier From BFA 2012 to MFA 2015
DOCX
Tecnologia informatica
DOCX
Qué es un buscador
PDF
Leading From Your Strengths
PPTX
The Intersection of Content Strategy and Instructional Design
PDF
Caderno tecnico 82 medicina de felino
PPTX
Science ppt
Brand Focus 1 Page Presentation
Cs presentation
Faheem_Resume_068315
Varuna khullar founder@yogawith v
Varuna khullar Founder@yogawith v
Especificaciones de_techo_de_acceso_1403709000421
McHardy Financial Nov -Dec 2015 Newsletter
Photoshop Exercises
Wicked Problems: Global Warming and Crustaceans
My Academic Record
Evaluation Question 4
REPORT_UML_PRITAM
eWIN_Case_Study_-_A_Workforce_Strategy_to_Improve_Staff_Engagement[1]
Aimee Gonthier From BFA 2012 to MFA 2015
Tecnologia informatica
Qué es un buscador
Leading From Your Strengths
The Intersection of Content Strategy and Instructional Design
Caderno tecnico 82 medicina de felino
Science ppt
Ad

Similar to Concept scap (20)

PDF
Security Automation Simplified via NIST OSCAL: We’re Not in Kansas Anymore
PDF
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
PDF
Analysis of Database Issues using AHF and Machine Learning v2 - SOUG
PDF
Analysis of Database Issues using AHF and Machine Learning v2 - AOUG2022
PDF
Getting optimal performance from oracle e-business suite presentation
PDF
Security defined routing_cybergamut_v1_1
PDF
Cdcr apachecon-talk
PDF
Dynamics ax performance tuning
PDF
What’s Evolving in the Elastic Stack
PDF
Spark and Couchbase: Augmenting the Operational Database with Spark
PDF
DBA 101 : Calling all New Database Administrators (PPT)
PDF
NetFlow Monitoring Standard Content Guide for ESM 6.5c
PDF
Remote Log Analytics Using DDS, ELK, and RxJS
PPTX
"Data Provenance: Principles and Why it matters for BioMedical Applications"
PDF
Oracle forensics 101
PPT
Introduction to Data management services
PDF
Esm scg net_flow_6.0c
PPTX
Standard Provenance Reporting and Scientific Software Management in Virtual L...
PDF
Network Monitoring Standard Content Guide for ESM 6.8c
PPTX
Attack monitoring using ElasticSearch Logstash and Kibana
Security Automation Simplified via NIST OSCAL: We’re Not in Kansas Anymore
2012-10-16 Mil-OSS Working Group: Introduction to SCAP Security Guide
Analysis of Database Issues using AHF and Machine Learning v2 - SOUG
Analysis of Database Issues using AHF and Machine Learning v2 - AOUG2022
Getting optimal performance from oracle e-business suite presentation
Security defined routing_cybergamut_v1_1
Cdcr apachecon-talk
Dynamics ax performance tuning
What’s Evolving in the Elastic Stack
Spark and Couchbase: Augmenting the Operational Database with Spark
DBA 101 : Calling all New Database Administrators (PPT)
NetFlow Monitoring Standard Content Guide for ESM 6.5c
Remote Log Analytics Using DDS, ELK, and RxJS
"Data Provenance: Principles and Why it matters for BioMedical Applications"
Oracle forensics 101
Introduction to Data management services
Esm scg net_flow_6.0c
Standard Provenance Reporting and Scientific Software Management in Virtual L...
Network Monitoring Standard Content Guide for ESM 6.8c
Attack monitoring using ElasticSearch Logstash and Kibana
Ad

Concept scap

  • 1. Datastream http://martin.preisler.me/category/scap/page/2 Datastream can be thought of as an archive of interlinked SCAP content(XCCDF,OVAL,CPE,…)
  • 2. Type of datastream • Source datastream (SDS) • Result datastream (ARF) >> The scanner takes a SDS, evaluates and gives results in the ARF format back.
  • 3. Source Datastream • Has a root element called “data-stream-collection”. • “data-stream-collection” contains 1 or more elements called “data- stream”. >>> each SDS has 1 or more modes in which it can be evaluated.
  • 4. National Checklist Program (NCP) • See NIST Special Publication 800-70 Rev.2 • Frequently Asked Questions: General Information >> http://web.nvd.nist.gov/view/ncp/information
  • 5. Security Configuration Checklist • Also called lockdown, hardening guide, benchmark, security technical implementation guide (STIG). • Series of instruction for configuring a product to particular operational environment. • Can comprise templates, automated scripts, patches or patch descriptions, XML files, and other procedures.
  • 6. NIST maintains the National Checklist Repository. http://checklists.nist.gov/
  • 7. Selecting checklists? • Checklist users should carefully consider the degree of automation and the source of each checklist. • NIST defined 4 tiers of checklists to assist users. • Tier1 checklists: are prose-based with narrative descriptions of how a person can manually alter a product’s configuration. • Tier4 checklists: have all security settings documented in machine- readable, standardized Security Content Automation Protocol (SCAP) formats,….. (see SP 800-70 Rev2).