-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SCAP v3 #41
Comments
I think there is overlap. This only highlights the need for us to nail the charter and objectives for this WG. |
Couple of notes
Happy to build bridges here, anyone feel free to reach out. I do strongly agree that downstream consumers need be part of the conversation. The folks working on SCAP are who end up operationalizing vulnerability management processes. A fix is only useful once it's been physically deployed to the end user (who is often not the software developer) & it doesn't do anyone any good until that end to end process is done. |
@JasonKeirstead Thanks for the additional context! I think so far we've mostly heard from folks handling disclosure, but not a lot from folks who consume this information. |
We're big fans of SCAP/OpenSCAP. OpenSCAP consumes our OVAL data to give an accurate scan of a system for vulns versus many commercial scanners. If not directly part of the WG's efforts, I fee we should indeed travel that bridge Jason offered us to listen to what's going on with that group and see how the update can assist our efforts. |
@RedHatCRob Interestingly, we just had an OCA Webinar this week and this was one of the topics, which was pulled out into its own short overview video (< 10 mins) https://www.youtube.com/watch?v=Q9SC1fpTKvQ Feel free to get an overview of the project there. @MarcinHoppe happy to arrange someone to speak about this at the next meeting if we want it on the agenda. |
Yeah there is overlap because SCAP is (predominantly) used to checking systems for insecure configuration (but because it uses OVAL under the hood it can pick up standard vulnerabilities). My understanding is that they are also looking at SACM which is being working on by an IETF working group to be the successor of SCAP.
It's good to see OASIS (via Open Cybersecurity Alliance) getting involved and software is being written for it. Finally - as a lesson learned of you expect a user to learn yet another DSL, err on the side of ease of use. E.g. how OSQuery used standard SQL which limits the learning curve. |
Side note... OSQuery is an LF project, I would LOVE if it can take SCAP files or map running software to CVEs out of the box. |
Just a quick heads-up, there are at least 2 unrelated SACMs in the security space:
I swear this is not my fault :-). |
Hahaha! Are you sure about that @david-a-wheeler ? |
@kerberosmansour - I don't know the osquery folks (to my knowledge), sorry! |
This thread seems to be getting a little activity/topic heavy. RE OS Query - OS Query has a wide mandate that goes beyond cyber. I view it as an enabling technology. A project that leveraged OS Query to run an SCAPv2 evaluation would be very cool, but IMHO that would not be part of OS Query itself. Leveraging OS Query for the SCAPv2 reference implementation might be an idea worth pursuing with that project... |
There is that and mapping running software on an end point to PURLs/CPEs
and then mapping those back to CVEs (i.e. vulnerabilities)
-Sherif
…On Fri, Oct 2, 2020 at 7:31 PM Jason Keirstead ***@***.***> wrote:
This thread seems to be getting a little activity/topic heavy.
RE OS Query - OS Query has a wide mandate that goes beyond cyber. I view
it as an enabling technology. A project that leveraged OS Query to run an
SCAPv2 evaluation would be very cool, but IMHO that would not be part of OS
Query itself.
Leveraging OS Query for the SCAPv2 reference implementation might be an
idea worth pursuing with that project...
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#41 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ADGPVQUVAQPGYGPPPRD2RMDSIYL7JANCNFSM4ROMUYVA>
.
|
Anyone feel free to correct me here, but I believe at this point SCAP v2 has been discarded by NIST, who has been focusing on OSCAL instead |
I just saw this:
SCAP is a framework of specifications that supports automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement.
Should we consider aligning or even participating? Standards are good when they are as widely adopted as possible.
Gilles
The text was updated successfully, but these errors were encountered: