Foreword |
|
xiii | |
Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
|
PART I Security Automation Essentials |
|
|
|
Chapter 1 The Security Management Problem |
|
|
3 | (26) |
|
Security Management Challenges |
|
|
4 | (1) |
|
The Number and Variety of Systems and Software to Secure |
|
|
5 | (1) |
|
The Need for Continuous Security Management |
|
|
6 | (2) |
|
The Need for a Comprehensive Picture of Enterprise Security |
|
|
8 | (1) |
|
The Need for Standardization in Security |
|
|
9 | (1) |
|
Security Requirements from Regulations and Other Sources |
|
|
9 | (1) |
|
The Security Automation Solution |
|
|
10 | (4) |
|
Security Automation Basics |
|
|
14 | (2) |
|
Knowledge About Individual Security Elements |
|
|
16 | (2) |
|
Using Checklists to Achieve Compliance |
|
|
18 | (4) |
|
The Evolution of Security Automation Technologies and Standards |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (3) |
|
Risk Measurement Standards |
|
|
27 | (2) |
|
|
29 | (26) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (2) |
|
How the SCAP Component Specifications Fit Together |
|
|
34 | (3) |
|
|
37 | (3) |
|
|
40 | (2) |
|
|
42 | (1) |
|
Inventorying Installed Software |
|
|
43 | (1) |
|
Identifying Security Issues |
|
|
44 | (2) |
|
Monitoring the Security State |
|
|
46 | (1) |
|
Security Measures and Metrics |
|
|
47 | (1) |
|
|
48 | (2) |
|
Fostering Common Terminology |
|
|
50 | (5) |
|
|
|
Chapter 3 SCAP Checklist and Check Languages |
|
|
55 | (40) |
|
Extensible Checklist Configuration Description Format |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (3) |
|
|
61 | (5) |
|
|
66 | (1) |
|
|
67 | (2) |
|
Open Vulnerability and Assessment Language |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (3) |
|
|
74 | (2) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
Open Checklist Interactive Language |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (5) |
|
Question_Test_Action Elements |
|
|
87 | (4) |
|
|
91 | (2) |
|
|
93 | (2) |
|
Chapter 4 Asset Management |
|
|
95 | (20) |
|
|
97 | (1) |
|
Literal and Synthetic Identifiers |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (3) |
|
|
102 | (1) |
|
|
103 | (3) |
|
|
106 | (2) |
|
|
108 | (3) |
|
Assessment Summary Results |
|
|
111 | (1) |
|
|
111 | (4) |
|
|
115 | (38) |
|
Automation Enumerations and Their Purposes |
|
|
116 | (2) |
|
Enumerations Included in SCAP |
|
|
118 | (1) |
|
Common Configuration Enumeration |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (2) |
|
|
123 | (1) |
|
|
124 | (7) |
|
CCE and the National Vulnerability Database |
|
|
131 | (1) |
|
Common Platform Enumeration |
|
|
131 | (2) |
|
|
133 | (6) |
|
Common Vulnerability and Exposures |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
Common Vulnerability Scoring System |
|
|
141 | (1) |
|
Other Related Enumerations and Expressions |
|
|
142 | (1) |
|
Common Weakness Enumeration |
|
|
142 | (2) |
|
Common Attack Pattern Enumeration and Classification |
|
|
144 | (1) |
|
Common Malware Enumeration |
|
|
145 | (1) |
|
|
145 | (3) |
|
Distributed Audit Service |
|
|
148 | (1) |
|
Common Remediation Enumeration |
|
|
149 | (4) |
|
Chapter 6 SCAP Vulnerability Measurement |
|
|
153 | (32) |
|
Common Vulnerability Scoring System |
|
|
155 | (1) |
|
|
155 | (2) |
|
|
157 | (3) |
|
Vulnerability Characteristics |
|
|
160 | (1) |
|
|
160 | (2) |
|
|
162 | (5) |
|
|
167 | (4) |
|
|
171 | (3) |
|
Base, Temporal, Environmental Vectors |
|
|
174 | (1) |
|
|
174 | (3) |
|
|
177 | (1) |
|
Common Vulnerability Reporting Framework (CVRF) |
|
|
178 | (1) |
|
Common Misuse Scoring System (CMSS) |
|
|
179 | (1) |
|
Common Configuration Scoring System |
|
|
180 | (1) |
|
Vulnerability Management in the Enterprise |
|
|
181 | (4) |
|
PART III Putting It All Together |
|
|
|
Chapter 7 Building Automated Security Content |
|
|
185 | (28) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Content Maintenance Tools |
|
|
187 | (1) |
|
Enhanced SCAP Editor (eSCAPe) |
|
|
188 | (6) |
|
|
194 | (1) |
|
Opening and Navigating an SCAP Data Stream |
|
|
195 | (1) |
|
Example: Creating Malware SCAP Content |
|
|
195 | (5) |
|
Example: Creating Content to Check for Malicious File |
|
|
200 | (4) |
|
Using the Regex Validator Tool |
|
|
204 | (1) |
|
Using the Merge OVAL Documents Tool |
|
|
205 | (1) |
|
Some Useful Tips for Creating Content |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
Follow the Rules of the Road |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
211 | (2) |
|
Chapter 8 Putting Security Automation to Work in the Enterprise |
|
|
213 | (14) |
|
How Organizations Are Using Security Automation |
|
|
215 | (1) |
|
Automated Hardware and Software Inventory |
|
|
216 | (2) |
|
Security Configuration Management (SCM) |
|
|
218 | (3) |
|
OpenSCAP Security Automation Software in Linux Distributions |
|
|
221 | (1) |
|
Use of Security Automation to Track Management and Operational Security |
|
|
221 | (2) |
|
Security Automation to Discover Malicious Software |
|
|
223 | (1) |
|
Continuous Monitoring by Integrating Security Systems |
|
|
223 | (1) |
|
|
224 | (1) |
|
Building a Healthy and Resilient Cyber Ecosystem |
|
|
225 | (2) |
|
|
227 | (4) |
|
|
228 | (3) |
Appendix XCCDF, OVAL, OCIL, and Supporting Enumerations Usage |
|
231 | (22) |
Index |
|
253 | |