2018
DOI: 10.6028/nist.cswp.09102018
|View full text |Cite
|
Sign up to set email alerts
|

Transitioning to the Security Content Automation Protocol (SCAP) Version 2

Abstract: The Security Content Automation Protocol (SCAP) version 2 (v2) automates endpoint posture information collection and the incorporation of that information into network defense capabilities using standardized protocols. SCAP v2 expands the endpoint types supported by SCAP v1 through the explicit inclusion of network equipment, Internet of Things (IoT), and mobile devices in its scope. To automate self-reporting of posture information from endpoint machines, SCAP v2 will integrate with existing network managemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…SCAP Composer's release coincides with a new effort underway to improve upon SCAP version 1.3. Within the proposed scope of this "SCAP 2.0" initiative [22] is improved "SCAP content creation, acquisition, and reuse." SCAP Composer can contribute to this goal by making it easier to combine content into new source data streams.…”
Section: Discussionmentioning
confidence: 99%
“…SCAP Composer's release coincides with a new effort underway to improve upon SCAP version 1.3. Within the proposed scope of this "SCAP 2.0" initiative [22] is improved "SCAP content creation, acquisition, and reuse." SCAP Composer can contribute to this goal by making it easier to combine content into new source data streams.…”
Section: Discussionmentioning
confidence: 99%
“…In particular, XCCDF [11] is used to represent the test results. XCCDF is a NIST specification and one of the main components of the Security Content Automation Protocol (SCAP) [41]. Unlike previous papers that are mainly focused on security testing aspects, this work integrates security testing results to build augmented MUD profiles to restrict the communication of IoT devices.…”
Section: A Security Testing In Iotmentioning
confidence: 99%
“…It should be noted that XCCDF is intended to be used to automate the verification of checklists using the Open Vulnerability and Assessment Language (OVAL) [69]. While some limitations have been identified for the use of XCCDF in the IoT context [70], the evolution of SCAP [41] aims to enhance different aspects of the current XCCDF specification to be considered in IoT. According to Figure 2, it should be noted that the Extended MUD file is generated based on such Assessment Report and the Original MUD file associated to the device itself.…”
Section: ) Profile Generationmentioning
confidence: 99%
See 2 more Smart Citations