On 9/27/16 4:07 AM, Jan Cerny wrote:
> Hello David,
>
> ----- Original Message -----
>> From: "david oliva" <david.ol...@verizon.net>
>> To: Open-scap-list@redhat.com
>> Sent: Tuesday, September 27, 2016 3:09:35 AM
>> Subject: [Open-scap] Really nice tool
>>
>>
>>
>> Dear Red Hat /OpenSCAP team:
>>
>>
>>
>>
>> Today 26 Sep 2016 Ihad the opportunity to run OpenSCAP on RHEL 7 for the
>> first time, andI am very pleased.
> Nice to hear that!
>
>> Installing OpenSCAP,and the SCAP Workbench was very straight forward with the
>> yum installcommand.
>>
>>
>>
>> - The content thatcame with the package was easy to run. I used the Workbench
>> to run the XCCDF content, created an XML report and looked at the report in
>> another browser.
> You can also generate a nice HTML report using "Show report" button.
>
>>
>>
>>
>> - It was very niceto see a good use of the CCE specification. The first
>> questioncoming to mind is, do you maintain a CCE dictionary that you can
>> makeavailable? A second question is, if a user wants to identify
>> aconfigurable parameter and no CCE is available, can the user (verylikely a
>> developer) request a CCE number?
> We don't maintain a CCE dictionary, the CCE numbers have been requested from 
> NIST.

Tables which map CCEs to NIST 800-53 references exist. For example, the
following is generated via 'make tables':
http://people.redhat.com/swells/scap-security-guide/RHEL/7/output/table-rhel7-nistrefs-ospp.html

Right now the tables are generated on a per-profile basis. That was
largely driven by user request. There's no reason we couldn't generate a
"master mapping table" if that'd be useful.

As Jan mentioned, CCE numbers are given to technology vendors by NIST.
For Red Hat technologies, we drop the CCEs into the
shared/references/cce-rhel-avail.txt file. From there, community members
can take an available CCE and assign them to a RedHat configuration rule
(e.g. in RHEL6 or RHEL7) via a pull request. Alternatively, open a
ticket requesting a mapping. Note that tickets on GitHub reflect
community initiatives -- no SLAs, just community effort. Tickets
directly against Red Hat (via customer support) carry SLAs. Both methods
are valid, just depends on how you chose to engage with the OpenSCAP
community :)


>> - Analyzing theoutput XML reveals that the findings are mapped to the
>> securitycontrols of SP 800-53 Rev 4. What a nice feature!.
>>
>>
>> - One of the videoson your site (
>> https://www.open-scap.org/security-policies/scap-security-guide/#documentation
>> )indicates that you are engaging a remediation mechanism and not
>> justdiscovering vulnerabilities. Are you using a remediation protocolor
>> specification in particular?
> Remediation is done by remediation scripts. The scripts are written in Bash.
> Those scripts are included in the SCAP content.
> The remediation can be run directly while scanning from SCAP Workbench or 
> oscap command line tool.
>
> Currently we are working on adding remediation in a from of Ansible playbooks.
> See https://blog-zbynek.rhcloud.com/2016/09/12/ssg-openscap-and-ansible/
>
>
>> - The output XMLshows a very nice use of the CPE specification.
>>
>>
>> - The use of XCCDFis also very good. Can you please, point me to a Red Hat
>> XCCDFrepository? Are you planning your content in the
>> NationalVulnerabilities Database?
> I suppose you mean that XCCDF that SCAP Workbench used for scanning your RHEL 
> machine.
> That XCCDF comes from the SCAP Security Guide project. SCAP Security guide is 
> an open-source
> set of security policies written in SCAP format.
> The source code is available at Github:
> https://github.com/OpenSCAP/scap-security-guide
> Latest release is here:
> https://github.com/OpenSCAP/scap-security-guide/releases/download/v0.1.30/scap-security-guide-0.1.30.zip
> We plan to submit the USGCB profile of SCAP Security Guide to NVD.

In regards to a "red hat repository," upstream would be the
OpenSCAP/SCAP Security Guide. Downstream in RHEL, content ships via the
"scap-security-guide" package.

We've been trying to get RHEL6 and RHEL7 content into the NIST NVD for
_*years*_. Seems an impossible task.


>> - I am interested inrunning a vulnerability scan (I would like to see how
>> OpenSCAP usesCVEs and CVSS)
> Yes, it is possible, and it's one of the most common use-cases of OpenSCAP.
> Red Hat provides a CVE streams for all the CVEs discovered in RHEL as a part 
> of Red Hat Security Advisories.
> See 
> https://www.open-scap.org/resources/documentation/perform-vulnerability-scan-of-rhel-6-machine/
> (It's for RHEL6, but in RHEL7 it's very similar)
>
>> - I did not see anyindication of using the Asset Identification (AI)
>> specification.
> OpenSCAP doesn't support this.
>
>> - I did not see anyindication of using the Asset Reporting Format (ARF)
>> specification.
> We fully support the ARF format, both in SCAP Workbench and oscap tool.
> In SCAP Workbench, it's possible to save results as ARF using Save results 
> button.
> Actually we recommend ARF as a best format for reporting :-)
>
>> - I did not see anyindication of using the Common Configuration Scoring
>> System (CCSS)specification.
>> - I did not see anyindication of using the TMSAD specification.
>> - I did not see anyindication of using the Open Checklist Interactive
>> Language (OCIL)specification. I am interested in your use of this
>> specificationbecause many security functions are not “automatable” (can not
>> bechecked with security automation tools).
>
> We don't support these three specifications.

There's no reason we couldn't though. Nobody has asked.


>> - Are you planningto implement the Software Identification (SWID)
>> specification of SCAP1.3?
> SWID is on our radar, but I can't promise anything now.
>
>>
>>
>> _______________________________________________
>> Open-scap-list mailing list
>> Open-scap-list@redhat.com
>> https://www.redhat.com/mailman/listinfo/open-scap-list
> I hope I have answered your questions.
>
> If you have any other questions or need more information,
> we'll be excited to help you.
>
> Best regards
>
> Jan Černý
> Security Technologies | Red Hat, Inc.

_______________________________________________
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Reply via email to