2010
DOI: 10.6028/nist.sp.800-117
|View full text |Cite
|
Sign up to set email alerts
|

Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0

Abstract: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
34
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(35 citation statements)
references
References 0 publications
1
34
0
Order By: Relevance
“…Implication #2. Rule-based policies based on CVSS score, like the US Government NIST SCAP protocol [20], may not make for an effective strategy: only a negligible number of low-risk vulnerabilities are ruled out, even after controlling for "significant" vulnerabilities. Security policies may require a major adjustment to meet these observations.…”
Section: B Rule-based Policies For Risk Mitigation With Cvssmentioning
confidence: 99%
See 1 more Smart Citation
“…Implication #2. Rule-based policies based on CVSS score, like the US Government NIST SCAP protocol [20], may not make for an effective strategy: only a negligible number of low-risk vulnerabilities are ruled out, even after controlling for "significant" vulnerabilities. Security policies may require a major adjustment to meet these observations.…”
Section: B Rule-based Policies For Risk Mitigation With Cvssmentioning
confidence: 99%
“…For example, the US Federal government with QTA0-08-HC-B-0003 reference notice specified that IT products to manage and assess the security of IT configurations must use the NIST certified S-CAP protocol [20], which explicitly says: "Organizations should use CVSS base scores to assist in prioritizing the remediation of known security-related software flaws based on the relative severity of the flaws." In other words, a rule-based policy is enforced: if the vulnerability is marked as "high risk" by the CVSS assessment, it must be fixed with high priority.…”
Section: Introductionmentioning
confidence: 99%
“…Several standards, among which the PCI-DSS [13] and NIST's SCAP [15] are notable examples, mandate the adoption of CVSS guidelines to guide vulnerability risk mitigation. For example, the PCI-DSS standard uses the concept of 'segmentation' to identify the scope of the compliance within an organization's network: vulnerable systems within the compliance scope are more critical than identical vulnerable systems outside the scope.…”
Section: Discussionmentioning
confidence: 99%
“…For example, different security tools output event logs and alarms following different structures, which may render the correlation between a firewall configuration and an IDS alarm hard to infer. The NIST's SCAP standard [15] aims at achieving this standardization, but its large scale adoption is currently unclear.…”
Section: Null Hypothesismentioning
confidence: 99%
“…This work contributes new vulnerability metrics that can complement the Common Vulnerability Scoring System (CVSS), currently the main risk assessment metric for software vulnerabilities [148]. The CVSS score captures exploitability 54 Chapter 3.…”
Section: Improving Security Risk Assessmentmentioning
confidence: 99%