Open
banners

From Openscap

Revision as of 07:39, 1 October 2012; view current revision
←Older revision | Newer revision→

Home

SCAP is a line of standards managed by NIST. It was created to provide a standardized approach to maintaining the security of enterprise systems, such as automatically verifying the presence of patches, checking system security configuration settings, and examining systems for signs of compromise.

The SCAP suite contains multiple complex data exchange formats that are to be used to transmit important vulnerability, configuration, and other security data. Historically, there have been few tools that provide a way to query this data in the needed format. This lack of tools makes the barrier to entry very high and discourages adoption of these protocols by the community. It's our goal to create a framework of libraries and tools to improve the accessibility of SCAP and enhance the usability of the information it represents.

OpenSCAP components:

  • Library - It provides interface to SCAP document processing and evaluation. Library is written in C and it provides bindings for python and perl.
  • SCAP Scanner - It utilize the library and provides local scanning capabilities
  • XSLT Transformations - The project provides tranformations that allow user to transform various SCAP content from XML to more human-readable HTMl form.
  • SCAP Content - We also provide example SCAP content that can be used mainly for experimental testing purposes.

OpenSCAP supports following OVAL tests:

Unix schema Linux schema Independent schema
  • dnscache
  • file
  • fileextendedattribute
  • gconf
  • interface
  • password
  • process
  • process58
  • routingtable
  • runlevel
  • shadow
  • sysctl
  • uname
  • xinted
  • dpkginfo
  • iflisteners
  • inetlisteningservers
  • partition
  • rpminfo
  • rpmverify
  • selinuxboolean
  • selinuxsecuritycontext
  • family
  • filehash
  • filehash58
  • environmentvariable
  • environmentvariable58
  • ldap57
  • textfilecontent
  • textfilecontent54
  • xmlfilecontent

Furthermore, OpenSCAP also implements technology that is not included in SCAP standards - the alternative check engine SCE. Allows you to use familiar scripting language of your choice instead of OVAL for checks.

Related Projects

  • scap-workbench - a GUI tool that provides scanning, tailoring, editing and validation functionality for SCAP content
  • firstaidkit - is an automated recovery tool that brings together common recovery processes and applies them to a system.FAK currently integrates OpenSCAP plugin for running security audit checks.
  • secstate - a tool that attempts to streamline the Certification and Accreditation (C&A) process of Linux systems by providing a mechanism to verify, validate, and provide remediation to security relevant configuration items.
  • SCC - a compiler used for SC. SC is a small language intended to make the creation of OVAL content easier. The SC language is more "human readable" than the XML of OVAL.
  • SCE Community Content - set of various security configuration settings (security controls) expressed in standardized format. Each security control can be evaluated by a small shell script which is executed via SCE.

Compliance Communities

Views Article Discussion Edit History
Personal tools:  Log in / create account
Toolbox What links here Related changes Upload file Special pages Printable version