2018
DOI: 10.6028/nist.sp.800-126r3
|View full text |Cite
|
Sign up to set email alerts
|

The technical specification for the security content automation protocol (SCAP) version 1.3

Abstract: AuthorityThis publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal official… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(25 citation statements)
references
References 0 publications
0
24
0
1
Order By: Relevance
“…The latter validates the usability of XACML in distributed systems, underlining some limitations such as the need for a high granularity of sub-policies and the difficulty of maintaining an encoded security policy. The languages and formats introduced by SCAP protocol constitutes also an interesting support, as they cover many complementary specifications, such as vulnerability descriptions and scorings, that are exploitable for automating security in distributed cloud [18]. These standards are usable in our solution.…”
Section: Related Workmentioning
confidence: 98%
“…The latter validates the usability of XACML in distributed systems, underlining some limitations such as the need for a high granularity of sub-policies and the difficulty of maintaining an encoded security policy. The languages and formats introduced by SCAP protocol constitutes also an interesting support, as they cover many complementary specifications, such as vulnerability descriptions and scorings, that are exploitable for automating security in distributed cloud [18]. These standards are usable in our solution.…”
Section: Related Workmentioning
confidence: 98%
“…The developed model is used to implement the logical inference for countermeasure generation. The paper [30] deals with the construction of a common ontology for the SCAP protocol [40]. The SCAP protocol includes the following types of security data: vulnerabilities [6], configurations [3], software and hardware [4], etc.…”
Section: Security Sources and Related Workmentioning
confidence: 99%
“…Since this initial version, there have been three SCAP v1 revisions. The current revision, SCAP 1.3, was released in February 2018 as NIST Special Publication (SP) 800-126 Revision 3 [2]. Over its lifetime, a few critical gaps have been identified in SCAP v1 that need to be addressed to provide a more robust solution:…”
Section: Gaps In Scap V1mentioning
confidence: 99%