How the appliance conducts SCAP scansAbout SCAPSCAP (Secure Content Automation Protocol), is a set of open standards that enumerate software flaws, monitor security-related configurations and product names, and examine systems to determine the presence of vulnerabilities and rank (score) the impact of the discovered security issues on Windows devices. Show SCAP is maintained by the National Institute of Standards and Technology (NIST), and its use is mandated by government agencies such as the US OMB (United States Office of Management and Budget). SCAP uses the US government’s National Vulnerability Database (NVD), which is a standards-based vulnerability management data repository. NVD includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics. For more information on SCAP and NVD, go to the NIST websites at http://scap.nist.gov/index.html and http://nvd.nist.gov/. SCAP supported versions and platformsThe appliance supports SCAP 1.0, 1.1, and 1.2, and SCAP is certified to run on Windows 7 and higher platforms (32-bit and 64-bit systems). The appliance conducts SCAP scans using the KACE Agent software that is installed on managed devices. SCAP is not available for devices that do not have the KACE Agent software installed, such as Agentless devices. How the appliance conducts SCAP scansThe appliance conducts SCAP scans by running scripts on selected Agent-managed devices using security configuration checklists from the National Checklist Repository. For SCAP versions 1.0 and 1.1, the script checks the SCAP data stream written in XML formats using the following SCAP standards: CCE, CPE, CVE, CVSS, OVAL, and XCCDF. See Definitions of SCAP standards. SCAP 1.2 adds the concept of the "Data Stream," where all of the individual results files are combined into a single XML file. In addition, SCAP 1.2 adds a new output format called ARF (Asset Report Format 1.1). For more information, go to http://scap.nist.gov/specifications/arf/. The appliance uses the Agent software to perform SCAP scan compliance checks. The results files are uploaded to the appliance or organization database and collated into a single file for reporting to a government agency (if required). Results are also displayed for each device on the appliance’s SCAP Scan Results page. If the Organization component is enabled on your appliance, you view SCAP scan results for each organization separately. SCAP uses the OVAL Interpreter version 5.10.1 and provides: These features improve software security, threat assessment, and vulnerability correction. Definitions of SCAP standardsSCAP scans monitor device security using specified protocols and standards.
Definitions of SCAP standardsAbout SCAPSCAP (Secure Content Automation Protocol), is a set of open standards that enumerate software flaws, monitor security-related configurations and product names, and examine systems to determine the presence of vulnerabilities and rank (score) the impact of the discovered security issues on Windows devices. SCAP is maintained by the National Institute of Standards and Technology (NIST), and its use is mandated by government agencies such as the US OMB (United States Office of Management and Budget). SCAP uses the US government’s National Vulnerability Database (NVD), which is a standards-based vulnerability management data repository. NVD includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics. For more information on SCAP and NVD, go to the NIST websites at http://scap.nist.gov/index.html and http://nvd.nist.gov/. SCAP supported versions and platformsThe appliance supports SCAP 1.0, 1.1, and 1.2, and SCAP is certified to run on Windows 7 and higher platforms (32-bit and 64-bit systems). The appliance conducts SCAP scans using the KACE Agent software that is installed on managed devices. SCAP is not available for devices that do not have the KACE Agent software installed, such as Agentless devices. How the appliance conducts SCAP scansThe appliance conducts SCAP scans by running scripts on selected Agent-managed devices using security configuration checklists from the National Checklist Repository. For SCAP versions 1.0 and 1.1, the script checks the SCAP data stream written in XML formats using the following SCAP standards: CCE, CPE, CVE, CVSS, OVAL, and XCCDF. See Definitions of SCAP standards. SCAP 1.2 adds the concept of the "Data Stream," where all of the individual results files are combined into a single XML file. In addition, SCAP 1.2 adds a new output format called ARF (Asset Report Format 1.1). For more information, go to http://scap.nist.gov/specifications/arf/. The appliance uses the Agent software to perform SCAP scan compliance checks. The results files are uploaded to the appliance or organization database and collated into a single file for reporting to a government agency (if required). Results are also displayed for each device on the appliance’s SCAP Scan Results page. If the Organization component is enabled on your appliance, you view SCAP scan results for each organization separately. SCAP uses the OVAL Interpreter version 5.10.1 and provides: These features improve software security, threat assessment, and vulnerability correction. Definitions of SCAP standardsSCAP scans monitor device security using specified protocols and standards.
About benchmarksAbout benchmarksA SCAP benchmark is a security configuration checklist that contains a series of rules for evaluating the vulnerabilities of a device in a particular operational environment. The NIST (National Institute of Standards and Technology) maintains the National Checklist Repository that contains various security configuration checklists for specific IT products and categories of IT products. The USGCB (United States Government Configuration Baseline) benchmark standard evolved from the FDCC (Federal Desktop Core Configuration), and currently addresses Windows 7 (along with earlier versions of Windows such as Windows XP or Windows Vista), and Internet Explorer versions 7 and 8. A checklist consists of a ZIP file that contains several XML files called a SCAP Stream. The primary file in the Stream is the XCCDF file. The XCCDF file is a structured collection of security configuration rules for a set of target devices. Essentially, it is a list of OVAL tests that should be run. The other XML files contain the OVAL tests specified in the XCCDF file. For detailed information on the XCCDF Specification, go to http://scap.nist.gov/specifications/xccdf/. A benchmark can contain one or more profiles. A profile specifies the rules that run on specific kinds of devices. For example, a benchmark might contain one set of rules for desktops and another set for servers. How a SCAP scan worksHow a SCAP scan worksBefore SCAP scans are conducted, the appliance imports and verifies a benchmark. After it is imported and verified, the benchmark is loaded into the appliance and the XCCDF file undergoes a process called resolution. During resolution, the oval-command.zip file is generated. This ZIP file contains the input files necessary to run a particular profile. You can view the files on the Script Detail page. See Configure SCAP schedules. The SCAP scan is controlled by a KScript. When the scan runs, the following files are downloaded to the target device as script dependencies:
The KScript initiates the OVAL scans on the target device and generates several results files. The OVAL scanning engine runs two or three times: Each run generates a results file. These files are named according to the run. For example, the file from the first run is named scap-profile-10-result-1.xml and the second is named scap-profile-10-result-2.xml. These files are located in the following directory: C:\Documents and Settings\All Users\Quest\KACE\kbots_cache\packages\kbots\<working directory>. To find the KACE Agent’s working directory, go to Inventory > Devices > Device Detail > Logs. These results files are then uploaded to the appliance and collated into a single results file (xccdf-results.xml). You can use this file for reporting the results to a government agency such as the US OMB (United States Office of Management and Budget). The appliance and managed device retain only the latest results files. In the final step of a run, a subset of the results files is extracted and stored in the Organization database for reporting and displayed on the SCAP Scan Results page for each device. The database tables that contain this information are SCAP_RESULT, SCAP_RESULT_RULE, and SCAP_RESULT_SCORE. See View SCAP scan results. Access SCAP Scan informationYou can access SCAP Scan information in the Security section.
The page also displays a dashboard that shows the results by benchmark. For a device to pass a benchmark, it must score 100%. View and manage benchmarksYou can view and manage SCAP benchmarks, which include profiles and checklists that have been imported to the appliance. Additionally, you can import benchmarks, delete benchmarks, and export benchmarks to CSV format by selecting Choose Action on the SCAP Catalog page.
The SCAP Catalog contains general information about the selected benchmark and the time and date that the SCAP data was uploaded to the appliance. See Download benchmarks from the archive. Import and modify benchmarksYou can import and modify benchmarks from the National Checklist Repository as needed.
The SCAP Configuration Scan Settings page appears and displays Step 1 of the import wizard.
A dialog box appears indicating that the benchmark file is being loaded, followed by the Script Detail page. See Editing SCAP scan schedules. Configure SCAP schedulesYou can import benchmarks or definitions, and change settings for SCAP scans, by configuring SCAP schedules.
What is the name of the database that contains security checklist references security related software flaws Misconfigurations product names and impact Metrices?The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics. For information on how to the cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.
What is the NIST National Vulnerability Database?The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance.
What is name of database which is used in vulnerabilities?A VDB will assign a unique identifier to each vulnerability cataloged such as a number (e.g. 123456) or alphanumeric designation (e.g. VDB-2020-12345). Information in the database can be made available via web pages, exports, or API. A VDB can provide the information for free, for pay, or a combination thereof.
What does CVE stand for?CVE stands for Common Vulnerabilities and Exposures. CVE is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities.
|