This sounds roughly like reinventing OSCAL.

On Fri, Mar 6, 2020 at 11:35 AM Matěj Týč <ma...@redhat.com> wrote:

> Hello Ben,
>
> part of the rule metadata are references - see e.g. the
> audit_rules_dac_modification_setxattr rule from the RHEL8 PCI-DSS profile:
> https://static.open-scap.org/ssg-guides/ssg-rhel8-guide-pci-dss.html#xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr
>
> The rule is part of implementation of many security controls/requirements.
> We also produce tables of references, when you build the ComplianceAsCode
> content locally, you can find the human-readable reference->rule mapping
> e.g. in the build/tables/table-rhel8-pcidssrefs.html file.
>
> However, neither of those forms of referencing is user-friendly wrt your
> use case. Coincidentally, we have started thinking about introducing
> another entity to take part in profiles definition - right now, we define
> profiles as list of selected rules and parametrizations. We are considering
> to use security controls - rules would implement security controls, and
> security controls (plus maybe a couple of extra rules) would implement a
> profile. Having the concept of security controls emphasized in the build
> system would allow us to produce tables that are grouped in a smarter way,
> as well as a better overview of what security controls exist but are not
> implemented by the profile, or what controls are not SCAP-applicable at all.
>
> Therefore, stay tuned, and consider subscribing yourself to the
> scap-security-gu...@lists.fedorahosted.org mailing list, as discussions
> about this new feature may start there as soon as in March. However, there
> is still a relatively long way to go from support in the build system to
> useful output data - consider this more a marathon run than a sprint.
>
> HTH,
> Matej
> On 04. 03. 20 15:18, Benjamin P Segal wrote:
>
> Hi all,
>
> We've been exploring the SCAP security guide for various platforms, their
> policies, and within policies, their provided profiles which might include
> PCI-DSS, HIPAA, various NIST control baselines, DISA STIGs, among many
> others.
>
> Given these different profiles/baselines have been created from guidance
> by the respected authorities, is there a direct way to assess the "gap" in
> terms of meeting the appropriate standards/regulations within an enterprise
> adhering to and enforcing the SCAP baseline(s)?
>
> Or put another way, and in direct reference to PCI-DSS v3.2.1 for the sake
> of a concrete example, PCI-DSS contains about ~260 controls comprising a
> combination of people, processes, and technologies. For the technical
> controls, I see that SCAP provides a lot of these logical
> assertions/remediations in RHELx. But there are also technical controls
> around (e.g.) dynamic penetration testing and collection of various logs
> for evidence for audit which is beyond the scope of SCAP. Is there an easy
> way to, say, extract the PCI-DSS controls that have particular SCAP rules
> to cover them, vs. those that aren't covered, to more easily build out a
> plan for covering full compliance at an enterprise level?
>
> Thank you for your time, in advance.
>
> -Ben
>
>
>
> _______________________________________________
> Open-scap-list mailing 
> listOpen-scap-list@redhat.comhttps://www.redhat.com/mailman/listinfo/open-scap-list
>
> _______________________________________________
> Open-scap-list mailing list
> Open-scap-list@redhat.com
> https://www.redhat.com/mailman/listinfo/open-scap-list



-- 
Trevor Vaughan
Vice President, Onyx Point, Inc
(410) 541-6699 x788

-- This account not approved for unencrypted proprietary information --
_______________________________________________
Open-scap-list mailing list
Open-scap-list@redhat.com
https://www.redhat.com/mailman/listinfo/open-scap-list

Reply via email to