Common Result Format (CRF ) Specification Version 0.3 Jon Baker Andrew Buttner Todd Wittbold The MITRE Corporation
|
|
|
- Moses Rich
- 10 years ago
- Views:
Transcription
1 Common Result Format (CRF ) Specification Version 0.3 Jon Baker Andrew Buttner Todd Wittbold The MITRE Corporation
2 Introduction Use Cases Related Preexisting Formats XCCDF Results Format OVAL Results Requirements Representation Simplicity Extensibility Asset Metadata Compatibility with Preexisting Formats Data Integrity Additional Metadata Common Asset Model Support Aggregation Support Data Streaming Patch Naming Detailed Design Data Model ResultSet Generator Assessor Asset AssetId Interface Property PropertyNameEnum Finding FindingTypeEnum ResultEnum Check CheckExport CheckContentReference CheckResultReference XML Representation XML Schema Element Dictionary Example XML Document...2
3 Introduction This document describes a standardized IT asset assessment result format, Common Result Format (CRF ). The CRF aims to facilitate the exchange of assessment results between systems to allow for increased tool interoperability and aggregation of assessment results across large enterprises that utilize diverse technologies to detect patch levels, policy compliance, vulnerability, and asset inventory. CRF expresses assessment results for IT assets in terms of common names and naming schemes. CRF leverages existing standardization efforts that define common names or naming schemes for vulnerabilities (CVE ), configurations (CCE ), platforms (CPE ), software weaknesses (CWE ), and patches (patch binary name). Leveraging these efforts allows meaningful assessment result data to be exchanged in a form that many tools already support or can easily develop support for. Choosing a set of standard names for each type of assessment result will the assessment results obtained from many different applications to be combined in a meaningful way. This combined set of assessments results can then easily be manipulated to allow for enterprise wide reporting. A primary goal of CRF is to allow customers that want to utilize SCAP and SCAP Compliant tools to easily export their assessment data from preexisting non-scap Compliant systems to other SCAP Compliant systems. In this case detailed assessment information including checking logic and low level results may not be available in a standardized format but high level results based on the standardized names and naming schemes mentioned above can still be shared between systems. While facilitating the sharing of information from systems that utilize proprietary checking systems for asset assessment, CRF also accommodates the exchange of standardized detailed checking logic and low level results. If detailed checking and result data from an assessment is available in XCCDF and OVAL, references to it can be included in CRF. Allowing this sort of flexibility ensures that data is only lost if it is in a non-standard format that other tools can not understand while ensuring that the format is useful for tools that have already adopted XCCDF and OVAL and want to exchange and aggregate assessment results for sets of systems. 2 Use Cases Comment [JB]: Coming soon 3 Related Preexisting Formats The following related preexisting formats were considered when developing CRF. 3. XCCDF Results Format The XCCDF standard includes a <TestResult> element that is used to encapsulate the result of applying a Benchmark to one target system. Put another way, A TestResult object represents the results of a single application of the Benchmark to a single target platform. This association is captured via rule ids that are a required piece of each result. The information being captured about a particular system evaluation is very similar to the desired goals of CRF. XCCDF Results is simple in nature and does not contain a lot of extra information. The basic format starts by defining a target (the asset being reported on) and then reporting the true/false result of each rule that was evaluated. Unfortunately, XCCDF Results does not support reporting on items other than XCCDF Rules. Using the XCCDF Results format for result information that was not obtained through the evaluation of an existing Benchmark goes against the intent of the format. XCCDF Results are associated with an existing Benchmark through the rule id. In order to use XCCDF Results for reporting results based on individual
4 CVEs or CCEs, the Rule id would have to be replaced by a CVE/CCE id. Although simple in practice, this change would not be understood by a tool that has been developed to understand the standard. The tool would be expecting a XCCDF Rule id and would not be able to distinguish the change to some other id format. CRF will allow tools that produce XCCDF Results to easily produce CRF documents as long as the XCCDF Results contain references to the defined set of standard names and naming schemes. CRF will also allow references to XCCDF Results documents to be included if they are available. 3.2 OVAL Results OVAL defines a format for expressing authenticated asset assessment results based on OVAL Definition evaluations, OVAL Results. Data expressed in CRF can be derived from an OVAL Results document as long as the definitions in the OVAL Results document are based on the set of defined standard names and naming schemes. However, because OVAL Results are intended to be based on OVAL Definition evaluations, the format does not meet the goals of CRF. CRF aims to accommodate results obtained from many other methods including unauthenticated assessments of an asset. CRF will allow tools that produce OVAL Results to easily produce CRF documents as long as the OVAL Results contain references to the defined set of standard names and naming schemes. CRF will also allow references to OVAL Results documents to be included if they are available. 4 Requirements The following requirements have guided the development of CRF. 4. Representation A detailed UML data model for CRF is included in this document. An XML Schema based on the data model is also included. An XML representation has been selected because it integrates nicely with SCAP and is a preferred mechanism for data exchange. 4.2 Simplicity CRF attempts to err on the side of simplicity. In order to accommodate preexisting tools that contain large amounts of useful data collected for differing purposes, unneeded complexity has been avoided whenever possible to ensure that CRF is simple to use as either a producer or a consumer of data in the format. 4.3 Extensibility CRF attempts to be extensible and accommodate the various types of data that may be collected by different tools for varying purposes. The format utilizes a minimal common set of assessment information and allows additional information to be included at the discretion of content producers. 4.4 Asset Metadata For asset identification CRF must require only a minimal amount of metadata to uniquely identify an IT asset. CRF must also define an additional set of optional asset metadata to allow tools with additional asset information to encode it if desired. Additionally, unaccounted for asset metadata must be supported without a change to the format. Requiring only a minimal set of metadata to uniquely identify an asset allows for the greatest number of applications to produce CRF documents. CRF must also encapsulate metadata related to the date and time an IT asset was assessed. Assessment results for a given asset might be encoded in a single CRF document many times. In this case each occurrence of the single asset would represent either assessment results generated by different applications, or results generated by the same application at different times, or both.
5 4.5 Compatibility with Preexisting Formats CRF defines a set of attributes for asset identification that allow for simple translation from the asset identification structures defined in OVAL and XCCDF. CRF also attempts to follow existing structures for detailed check result representations when possible. When used in conjunction with other SCAP standards this should reduce the time and cost to adopt CRF. CRF utilizes a structure for representing detailed check information and results that is complementary to the structures defined in the XCCDF specification. Tools that already utilize XCCDF should be able to easily insert detailed check information about a particular finding. 4.6 Data Integrity CRF allows content producers to digitally sign data using XML Signatures to support data integrity checking. 4.7 Additional Metadata CRF defines a set of metadata related to the creation of the document, including the software that produced the document and timestamps related to its creation. 4.8 Common Asset Identification Model Support A common asset identification model should be developed that can be shared across all related standards. When this model is developed CRF will leverage it for asset identification. 4.9 Aggregation Support CRF will allow for a given asset to be reported on or many times in a single instance document. This capability will allow various tools to report on overlapping sets of assets or a single tool to report on a single asset several different times. 4.0 Data Streaming It is expected that a single CRF document could be very large. CRF must be designed to support streaming processing of the data it encodes. To support this requirement any references between objects in a CRF document should be defined to always refer up to previously defined objects. This will ensure that data a given object refers to will be parsed prior to the object itself. 4. Patch Naming A standardized patch naming schema does not currently exist. CRF must support exchanging patch checking information for an asset. Enable to do this a common naming approach must be defined. CRF will uniquely identify patches based on their binary name. So for example, a given Microsoft security bulletin might have several patch binaries associated with it. Each of those patch binaries has a unique name. CRF will utilize this unique name to differentiate these three patches. A survey of major operating systems has shown that differentiating patches based on binary name will work for most cases. 5 Detailed Design This section provides a detailed design description for CRF. 5. Data Model The following UML diagram describes CRF. Each object in the diagram is described in detail.
6 Generator ResultSet -generator[] : Generator -assessors[0..] : Assessor -asset[] : Asset -signature[0..] : XMLSignature -CPEName[] -schemaversion[] : float -timestamp[] -any other data...[0..] Assessor -id[] : int -CPEName[] -any other data...[0..] Asset -id[] : AssetId -assessorid[] : int -timestamp[] -finding[] : Finding AssetId -name[0..] -interface[] : Interface -property[] : Property -any other data...[0..] Finding -type[] : FindingTypeEnum -id[] : string -result[] : ResultEnum -check[] : Check Interface -name[0..] -ipaddress[0..] -macaddress[0..] Property -name[] : PropertyNameEnum -value[] : string Check -system[] : string -parameter[] : CheckParameter -checkcontent[0..] : CheckContentReference -checkresult[0..] : CheckResultReference «enumeration» FindingTypeEnum «enumeration» PropertyNameEnum CheckParameter -name[0..] : string -value[..*] : string 0.. CheckResultReference -href[] : string -name[0..] : string -signature[0..] : XMLSignature 0.. CheckContentReference -href[] : string -name[0..] : string -signature[0..] : XMLSignature «enumeration» ResultEnum
7 5.. ResultSet The ResultSet class is a top level class that simply contains a set of 0 or more Assets, 0 or more Assessors, a Generator, and optionally a Signature. The Signature represents an XML Signature over the entire ResultSet. Each attribute of the ResultSet class is described below: generator Generator Identifies the Tool that compiled the ResultSet. assessor Assessor 0 - * The set of Assessors that assessed one or more of the Assets described in the ResultSet. asset Asset 0 - * The set of Assets being reported on in the ResultSet signature XMLSignature 0 - An optional XmlSignature over the entire ResultSet Generator The Generator class represents information that identifies the system or application that compiled the ResultSet and when the ResultSet was compiled. The Generator class may be extended to accommodate any additional metadata about the Generator of the ResultSet. This class is similar in intent to the GeneratorType defined the oval-common-schema. Each attribute of the Generator class is described below: CPEName uri The CPE name of the tool that compiled the ResultSet. See for the definition of a CPEName. timestamp datetime The timestamp indicates the date and time when the ResultSet was compiled. any any 0 n A tool may add additional metadata into the Generator if needed. This data is not validated and must be defined in some namespace other than the CRF namespace Assessor The Assessor class represents information that identifies the system or application that was used to assess one or more of the Assets in the ResultSet. The Assessor class may be extended to accommodate any additional metadata about the Assessor. Each attribute of the Assessor class is described below: id int The id is an integer that uniquely identifies one Assessor in the ResultSet and serves as a simple mechanism to allow references to Assessors from Assets in the ResultSet. CPEName uri The CPE name of the Assessor. See for the definition of a CPEName. any any 0 n A tool may add additional metadata into the Assessor if needed. This data is not validated and must be defined in some namespace other than the CRF namespace.
8 5..4 Asset The Asset class represents an IT asset and a set of findings for that asset. An Asset may be included in the ResultSet any number of times. This allows an Asset to be assessed by more than one Assessor or at different times by the same Assessor. Each attribute of the Asset class is described below: id AssetId Identifies the asset based on the set of information that the Assessor was able to gather for the Asset. assessorid int A reference to the id of the Assessor that generated the result information for the Asset. timestamp datetime The date and time that the result information for the asset was generated. finding Finding 0 n A set of one or more findings for the Asset AssetId The AssetId class represents a minimum set of metadata needed to uniquely identify an IT asset. Additionally a set of defined properties may also be associated with an Asset. The AssetId class may be extended to accommodate any additional metadata about the Asset. A valid AssetId must specify a name and at least one interface. Each attribute of the AssetId class is described below: name String The fully qualified domain name of the Asset. interface Interface - n The set of interfaces found on the Asset. At least one Interface must be identified. property Property 0 n An optional set of Properties of the Asset. any any 0 - n An Assessor may add additional metadata about an Asset as needed. This data is not validated and must be defined in some namespace other than the CRF namespace Interface The Interface class represents a network interface on an IT asset. An interface object must define at least an IP address or MAC address. Each attribute of the Interface class is described below: name string 0 - The name of the interface. ipaddress string 0 - The ip address associated with the interface. macaddress string 0 - The MAC address of the interface Property The Property class represents a name value pairing of asset identification metadata. The set of allowable Property names is constrained by the PropertyNameEnum datatype. Each attribute of the Property class is described below: name PropertyNameEnum The name of the property. value string The value of the property
9 5..8 PropertyNameEnum The PropertyNameEnum datatype defines the set of allowable property names. Future versions of this specification may separate the allowed set of property names into either an external document or a separate section of this document The set of allowed property names is defined below: Comment [JB2]: Currently defined in the crf spec, but need to be moved out to an external source. This set will change overtime. This list is based on a list sent from Joe Wolfkiel. Name Description urn:crf:asset:identifier:mac should be sent as a pair with the ip address to ensure uniqueness urn:crf:asset:identifier:ipv4 internet protocol version 4 address urn:crf:asset:identifier:ipv6 internet protocol version 6 address urn:crf:asset:identifier:fqdn fully qualified domain name urn:crf:asset:identifier:ein equipment identification number urn:crf:asset:identifier:pki any device pki certificates as a text field urn:crf:asset:identifier:guid globally unique identifier urn:crf:asset:identifier:ldap LDAP directory string urn:crf:asset:identifier:active_directory Active Directory realm urn:crf:asset:identifier:host_name host name if assigned to an asset urn:crf:asset:environmental_information:owning_organization organization that tracks the asset on their ADPE inventory urn:crf:asset:environmental_information:current_region geographic region {e.g. COCOM AOR} where the asset is located name of the organization that urn:crf:asset:environmental_information:administration_unit does system administration for the asset name of the CERT equivalent urn:crf:asset:environmental_information:cnd_service_provider that does incident response for an asset urn:crf:asset:environmental_information:administration_poc:title Title {e.g. Mr, Ms, Col} of the system administrator for an asset urn:crf:asset:environmental_information:administration_poc: of the system administrator for an asset first name of the system urn:crf:asset:environmental_information:administration_poc:first_name administrator for an asset Last name of the system urn:crf:asset:environmental_information:administration_poc:last_name administrator for an asset 5..9 Finding The Finding class represents a finding related to an asset. Findings have a type based on the FindingTypeEnumeration. The type of a Finding identifies the common name or naming scheme that the Finding is based on. The id of the Finding identifies a single item with in the common name or naming scheme identified by the type. The result specifies the outcome of checking the Asset for the identified item. The Finding class also allows for one or more Checks to be associated with a Finding object. Each attribute of the Finding class is described below: type FindingTypeEnum The type of the item being reported on. The allowable set of finding types is defined by the FindingTypeEnum. id string The id of the item being reported on. The structure of
10 result ResultEnum check Check 0 - n the id is based on the type of finding. The result of the item being reported on. The allowable result values are defined by the ResultEnum. The optional set of Checks to be associated with a Finding. The following table describes the meaning of the true and false ResultEnum values based in the FindingTypeEnum value: Finding Type result = true result = false The identified configuration item passed its The identified configuration item failed its CCE check based on the parameters in use in the environment on the asset. check based on the parameters in use in the environment on the asset. CPE CVE CWE Patch The identified application, operating system, or hardware was detected on the asset. The identified vulnerability was detected on the asset. The identified weakness was detected on the asset. The identified patch should be installed on the asset FindingTypeEnum The identified application, operating system, or hardware was detected on the asset. The identified vulnerability was not detected on the asset. The identified weakness was not detected on the asset. The identified patch should not be installed on the asset. The FindingTypeEnum defines the set of supported Finding types. This set of Finding types is expected to change over time. Future versions of this specification may separate the allowed set of Finding types into either an external document or a separate section of this document. Each type is listed and described below: Name CCE CPE CVE CWE Patch Description CRF uses CCE to identify configuration items. See for more information about CCE and the structure of a CCE identifier. See for more information about CPE and the structure of a CPE Name. CRF uses CVE to name vulnerabilities. A value of CVE indicates that that type of finding is based on a CVE name. See for more information about CVE and the structure of a CVE name. See for more information about CWE and the structure of a CWE identifier. See the Patch Naming section of this document for more information about the structure of a patch names. 5.. ResultEnum The ResultEnum defines the set of possible result values. Each value is listed and defined below: Name true false Description The meaning of a true result varies depending on the type of Finding. See the documentation of the Finding class for a table that defines the meaning of a true result for each type of Finding. The meaning of a false result varies depending on the type of Finding. See the documentation of the Finding class for a table that defines the meaning of
11 error unknown not evaluated not applicable a false result for each type of Finding. A result value of 'error' means that the assessor encountered an error while assessing the asset. A result value of 'unknown' means that the Assessor was unable to determine a true or false result. A choice was made not to check the asset for the identified item. The actual result is in essence unknown since if evaluation had occurred it could have been either true or false. The Assessor determined that the specified item is not valid on the Asset Check The Check class represents information about a check, a reference to the check, any parameters passed to the check, and the results of the check or references to the results of the check used by an Assessor to determine a result for a Finding. Each attribute of the Check class is described below: system string The system attribute identifies the checking system used. Allowable checking systems are either OVAL or XCCDF. checkexport CheckExport 0 - n The checkexport attribute allows Assessors to include parameters used by the Check. checkcontent AbsCheckContent 0 - The checkcontent attribute allows Assessors to include inline or by reference the actual check used. checkresult AbsCheckResult 0 - The checkresult attribute allows Assessors to include inline or by reference the actual detailed check results CheckExport The CheckExport class represents a parameter that was used by a Check. Each attribute of the CheckContentReference class is described below: name string Name of the parameter exported to the check. value string - n The set of values provided for the named parameter CheckContentReference The CheckContentReference class allows detailed check content to be associated with a check by reference. Each attribute of the CheckContentReference class is described below: href uri A pointer to the document containing the check. name string 0 - The name of the check in the referenced document. If not specified then the check is the entire referenced document. signature XMlSignature 0 - Optional Xml Signature over the contents of the external document CheckResultReference The CheckResultReference class represents a reference to an external document containing detailed result information for a Check.
12 href uri A pointer to the document containing the check results. name string 0 - The name of the check in the referenced document. If not specified then the check is the entire referenced document. signature XMlSignature 0 - Optional Xml Signature over the contents of the external document. 5.2 XML Representation 5.2. XML Schema The XML Schema below defines the structure of CRF s XML representation. Comment [JB3]: How will scheamtron be used if at all? Element Dictionary Example XML Document The xml below is provided as a simple point of reference for those that are more comfortable looking at an xml document as an example. Once a schema and element dictionary is added to this document this example will be updated to comply with the schema. The document below was compiled by some tool, cpe:/a:some_vendor0:some_product and contains assessment results from two other tools that assessed two different assets. <?xml version=".0" encoding="utf-8"?> <CommonResultSet xmlns=" xmlns:xsi=" xsi:schemalocation=" crf.xsd" xmlns:crf=" <Generator> <CPEName>cpe:/a:some_vendor0:some_porduct</CPEName> <schema_version>0.2</schema_version> <timestamp> t5:00:00.000</timestamp> <!-- any other structured data --> </Generator> <Assessors> <Assessor id=""> <CPEName>cpe:/a:some_vendor:some_porduct</CPEName> <!-- any other structured data --> </Assessor> <Assessor id="2"> <CPEName>cpe:/a:some_vendor2:some_porduct</CPEName> <!-- any other structured data not definied in the specification --> </Assessor> </Assessors> <Assets> <Asset assessorid="" timestamp=" t3:00:00.000"> <Id> <name>asystem.example.com</name> <interfaces> <!-- one interface is required. --> <interface> <name>broadcom NetXtreme 57xx Gigabit Controller #2</name> <ip_address> </ip_address> <mac_address>00-aa-c5-bc-a-a0</mac_address> </interface> <!-- additional interfaces are supported --> </interfaces> <properties> <!-- optional list of defined properties --> <property name="urn:crf:asset:identifier:ipv4">92.0..</property> </properties>
13 <!-- any other structured data not defined in the specification --> </Id> <Findings> <Finding type="cve" id="cve " result="true"> <check system=" <contentreference href="oval.xml" name="oval:com.example:def:"/> <resultreference href="oval-results.xml" name="oval:com.example:def:"/> </check> </Finding> <Finding type="cce" id="cce-23" result="true"> <check system=" <parameter name="oval:com.example:var:">true</parameter> <parameter export-name="oval:com.example:var:2">8</parameter> <contentreference href="oval.xml" name="oval:com.example:def:2"/> <resultreference href="oval-results.xml" name="oval:com.example:def:2"/> </check> </Finding> <Finding type="cpe" id="cpe:/o:microsoft:windows:xp" result="true"> <check system=" <contentreference href="oval.xml" name="oval:com.example:def:4"/> <resultreference href="oval-results.xml" name="oval:com.example:def:4"/> </check> </Finding> <Finding type="cpe" id="cpe:/o:microsoft:windows:2003" result="false"> <check system=" <contentreference href="oval.xml" name="oval:com.example:def:5"/> <resultreference href="oval-results.xml" name="oval:com.example:def:5"/> </check> </Finding> </Findings> </Asset> <Asset assessorid="2" timestamp=" t4:00:00.000"> <Id> <name>mysystem.example.com</name> <interfaces> <!-- one interface is required. --> <interface> <name>broadcom NetXtreme 57xx Gigabit Controller #2</name> <ip_address> </ip_address> <mac_address>00-aa-c5-bc-a-a</mac_address> </interface> <!-- additional interfaces are supported --> </interfaces> <properties> <!-- optional list of defined properties --> <property name="urn:crf:asset:identifier:ipv4"> </property> </properties> <!-- any other structured data not defined in the specification --> </Id> <Findings> <Finding type="cve" id="cve " result="false"/> <Finding type="cce" id="cce-23" result="true"/> <Finding type="cpe" id="cpe:/o:redhat:linux" result="true"/> <Finding type="cpe" id="cpe:/a:mozilla:firefox" result="true"/> </Findings> </Asset> </Assets> </CommonResultSet>
How To Use A Policy Auditor 6.2.2 (Macafee) To Check For Security Issues
Vendor Provided Validation Details - McAfee Policy Auditor 6.2 The following text was provided by the vendor during testing to describe how the product implements the specific capabilities. Statement of
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
An Enterprise Continuous Monitoring Technical Reference Architecture
An Enterprise Continuous Monitoring Technical Reference Architecture 12/14/2010 Presenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology http://twitter.com/petermmell
Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)
NIST Interagency Report 7800 (Draft) Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT) David Waltermire, Adam Halbardier,
Qualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
Manage Vulnerabilities (VULN) Capability Data Sheet
Manage Vulnerabilities (VULN) Capability Data Sheet Desired State: - Software products installed on all devices are free of known vulnerabilities 1 - The list of known vulnerabilities is up-to-date Desired
ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel
ARF, ARCAT, and Summary Results Lt Col Joseph L. Wolfkiel Enterprise-Level Assessment and Reporting The Concept Assessment Results Format (ARF) Assessment Summary Results (ASR) The Assessment Results Consumer
Federal Desktop Core Configuration (FDCC)
Federal Desktop Core Configuration (FDCC) Presented by: Saji Ranasinghe Date: October, 2007 FDCC Federal Desktop Core Configuration (FDCC) Standardized Configuration with Hardened Security Settings to
Towards security management in the cloud utilizing SECaaS
Towards security management in the cloud utilizing SECaaS JAN MÉSZÁROS University of Economics, Prague Department of Information Technologies W. Churchill Sq. 4, 130 67 Prague 3 CZECH REPUBLIC [email protected]
OVAL Developer Days. July 11-12, 2006
OVAL Developer Days July 11-12, 2006 Introduction...- 3 - Attendee List...- 4 - Day One...- 5 - Session 1...- 5 - OVAL Tutorial... - 5 - Session 2...- 5 - External Repositories... - 5 - Inventory Definitions...
Common Platform Enumeration (CPE) Technical Use Case Analysis
Common Platform Enumeration (CPE) Technical Use Case Analysis The MITRE Corporation November, 2008 Executive Summary A common theme taken from discussions at the Common Platform Enumeration (CPE) Developer
Security Content Automation Protocol for Governance, Risk, Compliance, and Audit
UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security
Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009
Automating Attack Analysis Using Audit Data Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009 2 Introduction Audit logs are cumbersome and traditionally used after the fact for forensics analysis.
Secstate: Flexible Lockdown, Auditing, and Remediation
Secstate: Flexible Lockdown, Auditing, and Remediation Certifiable Linux Integration Project Tresys Technology Karl MacMillan Topics Secstate Overview Sample session illustrating
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP Vasileios A. Baousis (Ph.D) Network Applications Team Slide 1 Agenda Introduction Background - SCAP - Puppet &Mcollective
FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs
FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs Where we have been 1 st Security Automation Workshop nearly 20 people in a small room for the day
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance
An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance Presented by: John Banghart, Booz Allen Hamilton SCAP Validation Project Lead Thoughts on Current State
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 [email protected]
SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference
SCAP for VoIP Automating Configuration Compliance 6 th Annual IT Security Automation Conference Presentation Overview 1. The Business Challenge 2. Securing Voice over IP Networks 3. The ISA VoIP Security
A Vulnerability Assessment Tool based on OVAL in Linux System
A Vulnerability Assessment Tool based on OVAL in Linux System Youngmi Kwon 1, Hui Jae Lee 2, Geuk Lee 3 1 Dept. of InfoCom, Chungnam National University, Daejeon, South Korea [email protected] 2 Dept. of
Continuous Monitoring
Continuous Monitoring The Evolution of FISMA Compliance Tina Kuligowski [email protected] Overview Evolution of FISMA Compliance NIST Standards & Guidelines (SP 800-37r1, 800-53) OMB Memorandums
Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015
For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6
Status Update. Jon Baker September 28, 2010
Status Update Jon Baker September 28, 2010 HS SEDI is a trademark of the U.S. Department of Homeland Security (DHS). OVAL Overview An international, information security, community standard to promote
Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Product: IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
Toward an Ontology Architecture for Cyber-Security Standards
Toward an Ontology Architecture for Cyber-Security Standards Mary C. Parmelee The MITRE Corporation 7515 Colshire Drive, McLean, VA 22102-7539, USA [email protected] Abstract. The rapid growth in magnitude
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
Common Event Expression
Common Event Expression Architecture Overview Version 0.5 The CEE Editorial Board May 2010 Approved for Public Release; Distribution Unlimited. Case 10-2296 This page intentionally left blank. Acknowledgments
Automating Compliance with Security Content Automation Protocol
Automating Compliance with Security Content Automation Protocol presented by: National Institute of Standards and Technology Agenda Information Security Current State Security Content Automation Protocol
Business Object Document (BOD) Message Architecture for OAGIS Release 9.+
Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ an OAGi White Paper Document #20110408V1.0 Open standards that open markets TM Open Applications Group, Incorporated OAGi A consortium
NCIRC Security Tools NIAPC Submission Summary Harris STAT Scanner
NCIRC Security Tools NIAPC Submission Summary Harris STAT Scanner Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Vulnerability Scanning Date Approved for Submission: 24-04-2007
Improved Credential and SSL Configuration for EE 7
Improved Credential and SSL Configuration for EE 7 1. Introduction: SSL, trust stores, keystores and credential repositories are generally difficult areas to configure for Java EE environments. The configuration
Structured Data Capture (SDC) Trial Implementation
Integrating the Healthcare Enterprise 5 IHE Quality, Research, and Public Health Technical Framework Supplement 10 Structured Data Capture (SDC) 15 Trial Implementation 20 Date: October 27, 2015 Author:
Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide
Dell KACE K1000 System Management Appliance Version 5.4 Patching and Security Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Security compliance automation with Red Hat Satellite
Security compliance automation with Red Hat Satellite Matt Micene Solution Architect, DLT Solutions @cleverbeard @nzwulfin Created with http://wordle.net Compliance is a major problem About half of the
Understanding How They Attack Your Weaknesses: CAPEC Sean Barnum MITRE
Understanding How They Attack Your Weaknesses: CAPEC Sean Barnum MITRE HS SEDI is a trademark of the U.S. Department of Homeland Security (DHS). The Long-established Principal of Know Your Enemy One who
The Ontological Approach for SIEM Data Repository
The Ontological Approach for SIEM Data Repository Igor Kotenko, Olga Polubelova, and Igor Saenko Laboratory of Computer Science Problems, Saint-Petersburg Institute for Information and Automation of Russian
Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)
NIST Interagency Report 7669(Draft) Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT) John Banghart Stephen Quinn David Waltermire NIST Interagency Report
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
Introduction to OVAL: A new language to determine the presence of software vulnerabilities
Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction
XML Processing and Web Services. Chapter 17
XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
[MS-SPACSOM]: Intellectual Property Rights Notice for Open Specifications Documentation
[MS-SPACSOM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,
Using SQL Server Management Studio
Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases
Black Hat Briefings USA 2004 Cameron Hotchkies [email protected]
Blind SQL Injection Automation Techniques Black Hat Briefings USA 2004 Cameron Hotchkies [email protected] What is SQL Injection? Client supplied data passed to an application without appropriate data validation
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
DATABASE DESIGN. - Developing database and information systems is performed using a development lifecycle, which consists of a series of steps.
DATABASE DESIGN - The ability to design databases and associated applications is critical to the success of the modern enterprise. - Database design requires understanding both the operational and business
This module explains fundamental aspects of Microsoft Dynamics NAV Development Environment.
MICROSOFT DYNAMICS NAV COURSE OUTLINE 1) MICROSOFT DYNAMICS NAV Module 1: Microsoft Dynamics NAV Development Environment This module explains fundamental aspects of Microsoft Dynamics NAV Development Environment.
Developer Guide. Christian W. Günther [email protected]. Library version: 1.0 RC7 Revision: 7
Developer Guide Christian W. Günther [email protected] Library version: 1.0 RC7 Revision: 7 November 14, 2009 The XES Meta-model Introduction Event logs, as they occur in practice and research, can
[MS-ACCDT]: Access Template File Format. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-ACCDT]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Active Directory Compatibility with ExtremeZ-IP
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP
2.1 The scope of Time Stamping Protocol (TSP)
XML Security Time Stamping Protocol Axelle Apvrille Vincent Girier Storage Technology European Operations 1 Rd Point Général Eisenhower 31106 Toulouse, France Axelle Apvrille,Vincent Girier @storagetek.com
Standard Recommended Practice extensible Markup Language (XML) for the Interchange of Document Images and Related Metadata
Standard for Information and Image Management Standard Recommended Practice extensible Markup Language (XML) for the Interchange of Document Images and Related Metadata Association for Information and
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we
VRDA Vulnerability Response Decision Assistance
VRDA Vulnerability Response Decision Assistance Art Manion CERT/CC Yurie Ito JPCERT/CC EC2ND 2007 2007 Carnegie Mellon University VRDA Rationale and Design 2 Problems Duplication of effort Over 8,000 vulnerability
STIGs,, SCAP and Data Metrics
Defense Information Systems Agency A Combat Support Agency STIGs,, SCAP and Data Metrics Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation Division DISA Field Security
Vulnerability Scanning Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014
Vulnerability Scanning Requirements and Process Clarification Disposition and FAQ 11/27/2014 Table of Contents 1. Vulnerability Scanning Requirements and Process Clarification Disposition... 3 2. Vulnerability
Standards Required to Support XML-Based B2B Integration
Standards Required to Support XML-Based B2B Integration A conceptual model for understanding XML convergence Companies across all industries are realizing the fundamental benefits of using the Internet
Multiple electronic signatures on multiple documents
Multiple electronic signatures on multiple documents Antonio Lioy and Gianluca Ramunno Politecnico di Torino Dip. di Automatica e Informatica Torino (Italy) e-mail: [email protected], [email protected] web
Core Components Data Type Catalogue Version 3.1 17 October 2011
Core Components Data Type Catalogue Version 3.1 17 October 2011 Core Components Data Type Catalogue Version 3.1 Page 1 of 121 Abstract CCTS 3.0 defines the rules for developing Core Data Types and Business
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
TZWorks Windows Event Log Viewer (evtx_view) Users Guide
TZWorks Windows Event Log Viewer (evtx_view) Users Guide Abstract evtx_view is a standalone, GUI tool used to extract and parse Event Logs and display their internals. The tool allows one to export all
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Queensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Total Exploration & Production: Field Monitoring Case Study
Total Exploration & Production: Field Monitoring Case Study 1 Summary TOTAL S.A. is a word-class energy producer and provider, actually part of the super majors, i.e. the worldwide independent oil companies.
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Product Navigator User Guide
Product Navigator User Guide Table of Contents Contents About the Product Navigator... 1 Browser support and settings... 2 Searching in detail... 3 Simple Search... 3 Extended Search... 4 Browse By Theme...
2. Basic Relational Data Model
2. Basic Relational Data Model 2.1 Introduction Basic concepts of information models, their realisation in databases comprising data objects and object relationships, and their management by DBMS s that
WirelessOffice Administrator LDAP/Active Directory Support
Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Products that are referred to in this document may be trademarks and/or registered trademarks of the respective owners.
2015 GEOVAP, spol. s r. o. All rights reserved. GEOVAP, spol. s r. o. Cechovo nabrezi 1790 530 03 Pardubice Czech Republic +420 466 024 618 http://www.geovap.cz Products that are referred to in this document
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
Representation of E-documents in AIDA Project
Representation of E-documents in AIDA Project Diana Berbecaru Marius Marian Dip. di Automatica e Informatica Politecnico di Torino Corso Duca degli Abruzzi 24, 10129 Torino, Italy Abstract Initially developed
Log Analysis Software Architecture
Log Analysis Software Architecture Contents 1 Introduction 1 2 Definitions 2 3 Software goals 2 4 Requirements 2 4.1 User interaction.......................................... 3 4.2 Log file reading..........................................
