Vendor Provided Validation Details - LANDesk Security
Mar 21, 2018 You can find the STIG files (used with STIG viewer) and Benchmark files (used with SCAP tool) here: (You must have a DoD CAC to access, I will not provide yo. Mar 01, 2011 Understanding SCAP NIST guidance and using SCAP tools to automate security. This is a time-saver and will help organizations be more readily prepared for audits that require FDCC compliance.
The following text was provided by the vendor during testing to describe how the product implements the specific capabilities.
SCAP Implementation
LANDesk Security Suite 9.0 Extensions for Federal Desktops (LDSS-FDCC) are built around support for the Security Content Automation Protocol (SCAP).SCAP is a collection of six open standards developed jointly by the government and private sector.Security content written to the SCAP standard can by used by any product that supports the standard.This allows regulatory authorities and configuration managers a means to construct much more definitive guidance than was possible in the past.The guidance is written in the standard format and passed to security products for automated processing and reporting; common input and common output.LDSS-FDCC includes support for all six protocols.It uses the XCCDF and OVAL assessment protocols to determine what items to check and how to check them.It uses the
Exports provided by the LDSS-FDCC include the Tiger.xml format.This format was developed to insulate users and administrators from the intricacies and evolutions of the SCAP languages.Tiger was designed to give any product a fast track to SCAP compatibility and validation.
Buyer's Guide Best of the Best – Staff Picks 2019. With the end of the year rolling around, we picked out some of the hottest motorcycle products and accessories of 2019. Motorcycle parts, exhausts, tires, helmets, handlebars, lights, saddlebags, accessories, and gear with best customer service, fast shipping and 120-day returns. 05 hd fatboy owners manual download free. Free Shipping with $50 purchase. Get free standard shipping to your front door or almost anywhere when you make a $50 minimum purchase. Get Full Details. Free standard shipping is limited to locations within the continental United States and Alaska.
CVE Implementation
LDSS-FDCC includes support for Common Vulnerabilities and Exposures (CVE) names.CVE provides standardized references to known vulnerabilities.This unique identifier provides a common way to refer to vulnerabilities.CVE is the oldest of the six protocols and is directed at vulnerabilities rather than compliance items.Patch content can optionally refer to CVE names, allowing the end user to track attack vectors associated with missing patches.The XCCDF and OVAL compliance checks currently do not reference CVE names. LDSS-FDCC raises the CVE references from the SCAP patch content to populate the XML exports, which are then viewable in the browser.The CVE name is included in references section of the LDSS-FDCC XSL transform.For each patch check listed in the tree.LDSS-FDCC can also perform vulnerability assessments using the included Open Vulnerability and Assessment Language (OVAL) content.The References section includes the CVE name and a link to the NVD site for each CVE name.
LDSS-FDCC includes support for Common Configuration Enumeration (
By including
Exports provided by the LDSS-FDCC include the Tiger.xml format.This format was developed to insulate integrators from the intricacies and evolutions of the SCAP languages.Each configuration check includes the
LDSS-FDCC includes automated support for the Common Platform Enumeration (
The SCAP data stream provides OVAL-based checks that precisely determine whether or not a benchmark applies to a network asset.Compatible tools can use these tests to decide whether or not to assess a benchmark; they can also use this check to filter the list of available benchmarks for a selected network asset. LDSS-FDCC executes the
CVSS Implementation
LDSS-FDCC provides support for the Common Vulnerability Scoring System (CVSS).CVSS represents a standardized approach to measuring the impacts of IT vulnerabilities.Each CVE includes an associated CVSS vector for use in calculating the relative severity of vulnerabilities.The SCAP data stream currently uses a flat scoring methodology, giving all compliance checks the same 'weight' (level of importance).These weights are compatible with CVSS scoring.NIST, through their National Vulnerability Database (NVD), plans to include CVSS vectors and scores for each
XCCDF Implementation
LDSS-FDCC includes seamless support for the eXtensible Configuration Checklist Description Format (XCCDF).XCCDF specifies system settings for automated tools to assess.XCCDF specifies what to check.It is the primary protocol required to process the SCAP data stream.The Secutor XCCDF interpreting engine has been exercised by thousands of users in hundreds of Federal Agencies, hundreds of commercial sites, and over fifty countries.Compliance checklist content, like those developed by NIST for the Federal Desktop Core Configuration (
OVAL Implementation
LDSS-FDCC includes fully integrated support for the Open Vulnerability and Assessment Language (OVAL) standard.OVAL specifies a standardized approach for assessing each system setting.While XCCDF describes what to check, OVAL specifies how to perform the check.LDSS-FDCC includes a mature commercial OVAL interpreter.The OVAL interpreter was engineered to assess local computers and remote targets using agentless 'over the wire' technology.LDSS-FDCC automatically processes the OVAL definition content as referenced in the XCCDF file to perform assessment activities.LDSS-FDCC has an option to bypass the XCCDF file and process OVAL vulnerability content files to perform vulnerability assessments.