2011
DOI: 10.1109/mitp.2011.11
|View full text |Cite
|
Sign up to set email alerts
|

Managing Security: The Security Content Automation Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…Security Automation: One objective of acquiring detailed up-to-date asset information is to support the automation of IT-related security processes [28]. The National Institute of Standards and Technology (NIST) in cooperation with the Massachusetts Institute of Technology Research Establishment (MITRE) provide the Security Content Automation Protocol (SCAP), a multipurpose approach which enables e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Security Automation: One objective of acquiring detailed up-to-date asset information is to support the automation of IT-related security processes [28]. The National Institute of Standards and Technology (NIST) in cooperation with the Massachusetts Institute of Technology Research Establishment (MITRE) provide the Security Content Automation Protocol (SCAP), a multipurpose approach which enables e.g.…”
Section: Related Workmentioning
confidence: 99%
“…These efforts resulted in the definition of Security Content Automation Protocol (SCAP). Papers related to SCAP are [1], [2] and [3]. The scope of this protocol is primarily intended to patch, configuration, vulnerability and compliance management.…”
Section: Related Workmentioning
confidence: 99%
“…Kotenko et al [66] also discuss the various standards used by SIEMs to represent security events and incidents in standardized formats: SCAP [68], Common Base Event (CBE) [69], and Common Information Model (CIM) [70]. One of the main design motivations of SIEM technology is that vendors will typically try to ensure all the security data sensor sources have as common a format as possible in order to minimize the amount of "data fusion" analysis that needs to be performed.…”
Section: Security Information and Event Management Systemsmentioning
confidence: 99%